Igor,
dont worry. The updtae was successfullly applied. The vulnerabilty update failing on qidmap should hopefully correct itself the next days (should be done by now). Even if not, it will be a minor problem, as it refers to the vis service (vulnerability scanner) which has got its special tables inside postgres database. Pls double check if you use vis service at all. In most cases its a prerequisite update thats missing in your environment. If the problem stays active and you are using vis service contact IBM support. As a refernce for you I have included auto updates of 9-13th for you
| DSM-SymantecEndpointProtection-7.5-20230818071925.noarch.rpm |
DSM, Scanner, Protocol |
Installed |
Sep 13, 2023, 4:06:23 AM |
| DSM-ApacheWebserver-7.5-20230727093436.noarch.rpm |
DSM, Scanner, Protocol |
Installed |
Sep 13, 2023, 4:05:59 AM |
| DSM-CheckPoint-7.5-20230823075416.noarch.rpm |
DSM, Scanner, Protocol |
Installed |
Sep 13, 2023, 4:05:36 AM |
| DSM-GNULinuxServer-7.5-20230818071905.noarch.rpm |
DSM, Scanner, Protocol |
Installed |
Sep 13, 2023, 4:05:12 AM |
| DSM-CiscoIronPort-7.5-20230828074111.noarch.rpm |
DSM, Scanner, Protocol |
Installed |
Sep 13, 2023, 4:04:49 AM |
| DSM-PostFixMailTransferAgent-7.5-20230726101128.noarch.rpm |
DSM, Scanner, Protocol |
Installed |
Sep 13, 2023, 4:04:27 AM |
| DSM-VmWareVCenter-7.5-20230802094710.noarch.rpm |
DSM, Scanner, Protocol |
Installed |
Sep 13, 2023, 4:04:01 AM |
| DSM-EMCVMWare-7.5-20230802090925.noarch.rpm |
DSM, Scanner, Protocol |
Installed |
Sep 13, 2023, 4:03:37 AM |
| PROTOCOL-SyslogRedirect-7.5-20230727122515.noarch.rpm |
DSM, Scanner, Protocol |
Installed |
Sep 13, 2023, 4:03:24 AM |
| DSM-CloudflareLogs-7.5-20230821110436.noarch.rpm |
DSM, Scanner, Protocol |
Installed |
Sep 13, 2023, 4:03:01 AM |
| DSM-MicrosoftIIS-7.5-20230801074351.noarch.rpm |
DSM, Scanner, Protocol |
Installed |
Sep 13, 2023, 4:02:38 AM |
| DSM-FireEyeMPS-7.5-20230801113053.noarch.rpm |
DSM, Scanner, Protocol |
Installed |
Sep 13, 2023, 4:02:16 AM |
| VIS-Outpost24VulnerabilityScanner-7.5-20230630165044.noarch.rpm |
DSM, Scanner, Protocol |
Installed |
Sep 13, 2023, 4:02:03 AM |
| DSM-MicrosoftExchange-7.5-20230825110824.noarch.rpm |
DSM, Scanner, Protocol |
Installed |
Sep 13, 2023, 4:01:40 AM |
| PROTOCOL-Office365MessageTraceRESTAPI-7.5-20230619145111.noarch.rpm |
DSM, Scanner, Protocol |
Installed |
Sep 13, 2023, 4:01:26 AM |
| DSM-ExtremeNetworksExtremeWare-7.5-20230818091838.noarch.rpm |
DSM, Scanner, Protocol |
Installed |
Sep 13, 2023, 4:01:02 AM |
| Daily Update |
Vulnerability |
Installed |
Sep 13, 2023, 3:58:19 AM |
------------------------------
[Karl] [Jaeger] [Business Partner]
[QRadar Specialist]
[pro4bizz]
[Karlsruhe] [Germany]
[4972190981722]
------------------------------
Original Message:
Sent: Fri September 15, 2023 06:34 AM
From: Igor Sydorenko
Subject: Vulnerability import failed
Hello. Recently, I got an alert in QRadar about automatic updates installed with errors.
In auto update log I've found the following:
An error occurred while updating vulnerabilities.
DAU applied auto update package from 09/13/2023 at 23:01 with errors.
No DAU update was deployed.
Patch manifest from 09/13/2023 at 23:01 successfully processed.
Cannot apply qidmap updates. Vulnerability import failed.
WAU from 09/13/2023 at 23:01 successfully applied.
Has anyone solved the same problem?
Can someone suggest what the vulnerability updates affect? On the OS, or is it a vulnerability scanner component?
------------------------------
Igor Sydorenko
------------------------------