Hi, There are two kinds of check. remote checks and local checks.
Anyway, both scanners works same way. Nessus contains a bit more remote check(s) and updated oracle linux checks. -- Eero On Mon, Jun 11, 2018 at 11:30 AM Ewae Rpok <ewaer...@gmail.com> wrote: > Thanks again for the advice. > > Do all the community feeds work by checking only version numbers? If so, > I think this would help me make a stronger case to get funding for Nessus. > > Cheers, > Ewae. > > On Saturday, 9 June 2018, Eero Volotinen <eero.voloti...@iki.fi> wrote: > >> Well. I think that checking only version numbers are not reliable way to >> evaluate security of server.. >> >> If you really want to do it, then just pick commercial nessus.. >> >> Eero >> >> la 9. kesäk. 2018 klo 1.01 Ewae Rpok <ewaer...@gmail.com> kirjoitti: >> >>> Thanks for confirming, Eero. >>> >>> Any advice for alternative approaches to managing vulnerability >>> assessment on Oracle Linux? >>> >>> Cheers, >>> Ewae. >>> >>> On Friday, 8 June 2018, Eero Volotinen <eero.voloti...@iki.fi> wrote: >>> >>>> Hi, >>>> >>>> I "was" developer of that feed :) >>>> >>>> I haven't updated it for while, due to lack of time and/or sponsor ;) >>>> >>>> Eero >>>> >>>> pe 8. kesäk. 2018 klo 17.59 Ewae Rpok <ewaer...@gmail.com> kirjoitti: >>>> >>>>> Hello all. >>>>> >>>>> Can anyone advise on scanning Oracle Linux vulnerabilities? >>>>> The Community feed seems to omit checks for errata published post 2016. >>>>> >>>>> e.g. https://linux.oracle.com/errata/ELSA-2018-0395.html was not >>>>> reported despite kernel-uek 4.1.12-61.1.18 being run and >>>>> kernel-3.10.0-514 being installed (both built 04 Nov 2016). >>>>> >>>>> Equivalent vulnerability in CentOS/RHEL-compatible kernel was >>>>> positively >>>>> identified when run against CentOS system: >>>>> https://lists.centos.org/pipermail/centos-announce/2018-May/022843.html >>>>> CentOS Update for kernel CESA-2018:1629 centos7 >>>>> OID 1.3.6.1.4.1.25623.1.0.882885 >>>>> >>>>> Vulnerabilities are actually found - just nothing new. >>>>> Supported by the following found on a recent kali linux install: >>>>> >>>>> root@kali:/var/lib/openvas/plugins# find . -name "ELSA*"|sort -rn|head >>>>> ./2016/ELSA-2016-3554.nasl.asc >>>>> ./2016/ELSA-2016-3554.nasl >>>>> ./2016/ELSA-2016-3553.nasl.asc >>>>> ./2016/ELSA-2016-3553.nasl >>>>> ./2016/ELSA-2016-3552.nasl.asc >>>>> ./2016/ELSA-2016-3552.nasl >>>>> ./2016/ELSA-2016-3551.nasl.asc >>>>> ./2016/ELSA-2016-3551.nasl >>>>> ./2016/ELSA-2016-3531.nasl.asc >>>>> ./2016/ELSA-2016-3531.nasl >>>>> root@kali:/var/lib/openvas/plugins# find . -name "gb_CESA*"|sort >>>>> -rn|head >>>>> ./2018/centos/gb_CESA-2018_1726_thunderbird_centos6.nasl.asc >>>>> ./2018/centos/gb_CESA-2018_1726_thunderbird_centos6.nasl >>>>> ./2018/centos/gb_CESA-2018_1725_thunderbird_centos7.nasl.asc >>>>> ./2018/centos/gb_CESA-2018_1725_thunderbird_centos7.nasl >>>>> ./2018/centos/gb_CESA-2018_1700_procps-ng_centos7.nasl.asc >>>>> ./2018/centos/gb_CESA-2018_1700_procps-ng_centos7.nasl >>>>> ./2018/centos/gb_CESA-2018_1669_libvirt_centos6.nasl.asc >>>>> ./2018/centos/gb_CESA-2018_1669_libvirt_centos6.nasl >>>>> ./2018/centos/gb_CESA-2018_1660_qemu-guest-agent_centos6.nasl.asc >>>>> ./2018/centos/gb_CESA-2018_1660_qemu-guest-agent_centos6.nasl >>>>> root@kali:/var/lib/openvas/plugins# >>>>> >>>>> >>>>> vulners.com has different looking pages for Oracle Linux >>>>> vulnerabilities >>>>> before and after the apparent cutoff - e.g. >>>>> https://vulners.com/openvas/OPENVAS:1361412562310122925 >>>>> and >>>>> https://vulners.com/oraclelinux/ELSA-2016-3559 >>>>> >>>>> Should I be using a different tool or approach? >>>>> >>>>> Thanks in advance, >>>>> Ewae. >>>>> _______________________________________________ >>>>> Openvas-discuss mailing list >>>>> Openvas-discuss@wald.intevation.org >>>>> >>>>> https://lists.wald.intevation.org/cgi-bin/mailman/listinfo/openvas-discuss >>>> >>>>
_______________________________________________ Openvas-discuss mailing list Openvas-discuss@wald.intevation.org https://lists.wald.intevation.org/cgi-bin/mailman/listinfo/openvas-discuss