How to gvm upgrade

Content on WhatAnswers is provided "as is" for informational purposes. While we strive for accuracy, we make no guarantees. Content is AI-assisted and should not be used as professional advice.

Last updated: April 4, 2026

Quick Answer: A GVM upgrade, often referring to a 'Greenbone Vulnerability Management' upgrade, involves updating the software and its vulnerability databases to ensure effective network security scanning. This process typically includes updating the Greenbone Community Edition (GCE) or Greenbone Enterprise Appliance software and ensuring the Network Vulnerability Tests (NVTs), SCAP data, and CERT-Bund data are current.

Key Facts

What is a GVM Upgrade?

A GVM upgrade, commonly associated with the Greenbone Vulnerability Management (GVM) system, is a critical process for maintaining the effectiveness of your network security posture. GVM is an open-source framework of services and tools that performs vulnerability scanning and management. Upgrading GVM ensures that the system is equipped with the latest security information, software patches, and features, enabling it to detect emerging threats and vulnerabilities accurately. Without regular upgrades, your GVM installation can become outdated, leading to missed vulnerabilities and an incomplete understanding of your network's security status.

Why are GVM Upgrades Important?

The landscape of cybersecurity is constantly evolving, with new vulnerabilities discovered daily and attackers developing new methods. GVM relies on a vast database of Network Vulnerability Tests (NVTs), SCAP data, and CERT-Bund advisories to identify these threats. When you perform a GVM upgrade, you are essentially updating this intelligence. This ensures that your scanner can recognize the latest exploits, misconfigurations, and weaknesses in your systems. An outdated scanner might fail to detect critical vulnerabilities, leaving your network exposed. Furthermore, GVM software itself receives updates that improve performance, fix bugs, and introduce new scanning capabilities or reporting features. Therefore, regular upgrades are not just recommended; they are essential for robust vulnerability management.

Components of a GVM Upgrade

A comprehensive GVM upgrade typically involves updating several key components:

How to Perform a GVM Upgrade

The method for upgrading GVM can vary depending on how you initially installed it. Here are common scenarios:

For GVM Installed via Package Manager (e.g., apt, yum)

If you installed GVM using your Linux distribution's package manager (like apt on Debian/Ubuntu or yum/dnf on Fedora/CentOS/RHEL), the upgrade process is usually straightforward. You will typically update the GVM packages along with your system's regular updates.

  1. Update Package Lists: Run the command to refresh your system's package repository information.
    - For Debian/Ubuntu: sudo apt update
    - For Fedora/CentOS/RHEL: sudo dnf update --refresh (or sudo yum update)
  2. Upgrade GVM Packages: Install the available updates for GVM.
    - For Debian/Ubuntu: sudo apt upgrade greenbone-vulnerability-manager (the package name might vary; check your distribution's specifics) or sudo apt dist-upgrade to upgrade all packages.
    - For Fedora/CentOS/RHEL: sudo dnf upgrade (or sudo yum upgrade)
  3. Update Feeds: After the software is updated, you must update the vulnerability data feeds. This is usually done through the GVM interface or via command-line tools like greenbone-nvt-sync, greenbone-feed-sync, or similar commands depending on your GVM version and setup. Many installations have automated feed updates configured.
  4. Restart Services: It's often a good practice to restart the GVM services after an upgrade to ensure all changes take effect.
    - Example commands (may vary): sudo systemctl restart gsad.service gvm.service ospd-openvas.service

For GVM Installed from Source or via Docker

If you compiled GVM from source or are using Docker containers, the upgrade process will be different.

Automating GVM Upgrades and Feed Synchronization

Manual upgrades can be time-consuming and prone to errors. Many GVM installations include mechanisms for automating feed synchronization. The Greenbone Security Assistant (GSA) web interface often has options to check for and initiate feed updates. Additionally, you can use cron jobs or systemd timers to schedule the execution of feed synchronization scripts (e.g., greenbone-feed-sync) regularly. Automating these updates ensures that your GVM is always running with the latest threat intelligence, providing continuous protection.

Troubleshooting Common Upgrade Issues

While upgrades are generally smooth, issues can arise:

Always refer to the official Greenbone documentation for the most accurate and up-to-date instructions specific to your GVM version.

Sources

  1. Greenbone Community Editionfair-use
  2. Greenbone Vulnerability Management API Documentationfair-use
  3. Greenbone Vulnerability Manager - WikipediaCC-BY-SA-4.0

Missing an answer?

Suggest a question and we'll generate an answer for it.