Trivy supports the following scanners for OS packages.
Please see here for supported versions.
The table below outlines the features offered by Trivy.
Trivy detects packages that have been installed through package managers such as
Amazon Linux offers its own security advisories, and these are utilized when scanning Amazon Linux for vulnerabilities.
When looking at fixed versions, it's crucial to consider the patches supplied by Amazon.
For example, for CVE-2023-0464, the fixed version for Amazon Linux 2023 is listed as
3.0.8-1.amzn2023.0.2 in ALAS2023-2023-181.
Note that this is different from the upstream fixed version, which is
3.1.1, and so on.
Typically, only the upstream information gets listed on NVD, so it's important not to get confused.
Trivy determines vulnerability severity based on the severity metric provided by Amazon. For example, the security patch for CVE-2023-0464 in Amazon Linux 2023 is provided as ALAS2023-2023-181. Its severity is rated as "Medium". Thus, even though it's evaluated as "HIGH" in the NVD, Trivy displays it with a severity of "MEDIUM".
The table below is the mapping of Amazon's severity to Trivy's severity levels.
Trivy supports the following vulnerability statuses for Amazon Linux.
|Will Not Fix|
|End of Life|
Trivy identifies licenses by examining the metadata of RPM packages.