Trivy supports the following scanners for OS packages.
Please see here for supported versions.
The table below outlines the features offered by Trivy.
Trivy detects packages that have been installed through package managers such as
AlmaLinux offers its own security advisories, and these are utilized when scanning AlmaLinux for vulnerabilities.
When looking at fixed versions, it's crucial to consider the patches supplied by AlmaLinux.
For example, for CVE-2023-0464, the fixed version for AlmaLinux 9 is listed as
3.0.7-16.el9_2 in their advisory.
Note that this is different from the upstream fixed version, which is
3.1.1, and son on.
Typically, only the upstream information gets listed on NVD, so it's important not to get confused.
Trivy calculates the severity of an issue based on the severity provided by AlmaLinux. If the severity is not provided or defined yet by AlmaLinux, the severity from the NVD is taken into account.
Using CVE-2023-0464 as an example, while it is rated as "High" in NVD, AlmaLinux has marked as "moderate". As a result, Trivy will display it as "Medium".
The table below is the mapping of AlmaLinux's severity to Trivy's severity levels.
Trivy supports the following vulnerability statuses for AlmaLinux.
|Will Not Fix|
|End of Life|
Trivy identifies licenses by examining the metadata of RPM packages.