Back to Trivy

Oracle Linux

docs/guide/coverage/os/oracle.md

0.70.03.4 KB
Original Source

Oracle Linux

Trivy supports the following scanners for OS packages.

ScannerSupported
SBOM
Vulnerability
License

Please see here for supported versions.

The table below outlines the features offered by Trivy.

FeatureSupported
Unfixed vulnerabilities-
Dependency graph
End of life awareness

SBOM

Trivy detects packages that have been installed through package managers such as dnf and yum.

Vulnerability

Oracle Linux offers its own security advisories, and these are utilized when scanning Oracle Linux for vulnerabilities.

Data Source

See here.

Fixed Version

Trivy takes fixed versions from Oracle security advisories.

Flavors

Trivy detects the flavor for version of the found package and finds vulnerabilities only for that flavor.

FlavorFormatExample
normalversion without fips and ksplice3.6.16-4.el8
fips*_fips10:3.6.16-4.0.1.el8_fips
ksplice*.ksplice*.*2:2.34-60.0.3.ksplice1.el9_2.7, 151.0.1.ksplice2.el8

For example Trivy finds CVE-2021-33560 only for the normal and fips flavors. For the ksplice flavor, CVE-2021-33560 will be skipped.

Severity

Trivy determines vulnerability severity based on the severity metric provided in Oracle security advisories. For example, the security patch for CVE-2023-0464 is provided as ELSA-2023-2645. Its severity is rated as "MODERATE". Thus, even though it's evaluated as "HIGH" in the NVD, Trivy displays it with a severity of "MEDIUM".

The table below is the mapping of Oracle's threat to Trivy's severity levels.

OracleTrivy
LowLow
ModerateMedium
ImportantHigh
CriticalCritical

Status

Trivy supports the following vulnerability statuses for Oracle Linux.

StatusSupported
Fixed
Affected
Under Investigation
Will Not Fix
Fix Deferred
End of Life

License

Trivy identifies licenses by examining the metadata of RPM packages.