Skip to content

Amazon Linux

Trivy supports the following scanners for OS packages.

Scanner Supported

Please see here for supported versions.

The table below outlines the features offered by Trivy.

Feature Supported
Unfixed vulnerabilities -
Dependency graph


Trivy detects packages that have been installed through package managers such as dnf and yum.


Amazon Linux offers its own security advisories, and these are utilized when scanning Amazon Linux for vulnerabilities.

Data Source

See here.

Fixed Version

When looking at fixed versions, it's crucial to consider the patches supplied by Amazon. For example, for CVE-2023-0464, the fixed version for Amazon Linux 2023 is listed as 3.0.8-1.amzn2023.0.2 in ALAS2023-2023-181. Note that this is different from the upstream fixed version, which is 3.0.9, 3.1.1, and so on. Typically, only the upstream information gets listed on NVD, so it's important not to get confused.


Trivy determines vulnerability severity based on the severity metric provided by Amazon. For example, the security patch for CVE-2023-0464 in Amazon Linux 2023 is provided as ALAS2023-2023-181. Its severity is rated as "Medium". Thus, even though it's evaluated as "HIGH" in the NVD, Trivy displays it with a severity of "MEDIUM".

The table below is the mapping of Amazon's severity to Trivy's severity levels.

Amazon Trivy
Low Low
Medium Medium
Important High
Critical Critical


Trivy supports the following vulnerability statuses for Amazon Linux.

Status Supported
Under Investigation
Will Not Fix
Fix Deferred
End of Life


Trivy identifies licenses by examining the metadata of RPM packages.