mirror of
https://github.com/aquasecurity/trivy.git
synced 2025-12-22 23:26:39 -08:00
84 lines
3.4 KiB
Markdown
84 lines
3.4 KiB
Markdown
# Oracle Linux
|
|
Trivy supports the following scanners for OS packages.
|
|
|
|
| Scanner | Supported |
|
|
| :-----------: | :-------: |
|
|
| SBOM | ✓ |
|
|
| Vulnerability | ✓ |
|
|
| License | ✓ |
|
|
|
|
Please see [here](index.md#supported-os) for supported versions.
|
|
|
|
The table below outlines the features offered by Trivy.
|
|
|
|
| Feature | Supported |
|
|
| :-----------------------------------: | :-------: |
|
|
| Unfixed vulnerabilities | - |
|
|
| [Dependency graph][dependency-graph] | ✓ |
|
|
| End of life awareness | ✓ |
|
|
|
|
## SBOM
|
|
Trivy detects packages that have been installed through package managers such as `dnf` and `yum`.
|
|
|
|
## Vulnerability
|
|
Oracle Linux offers its own security advisories, and these are utilized when scanning Oracle Linux for vulnerabilities.
|
|
|
|
### Data Source
|
|
See [here](../../scanner/vulnerability.md#data-sources).
|
|
|
|
### Fixed Version
|
|
Trivy takes fixed versions from [Oracle security advisories][alerts].
|
|
|
|
#### Flavors
|
|
Trivy detects the flavor for version of the found package and finds vulnerabilities only for that flavor.
|
|
|
|
| Flavor | Format | Example |
|
|
|:-------:|:------------------------------------:|------------------------------------------------------|
|
|
| normal | version without `fips` and `ksplice` | 3.6.16-4.el8 |
|
|
| fips | `*_fips` | 10:3.6.16-4.0.1.el8_fips |
|
|
| ksplice | `*.ksplice*.*` | 2:2.34-60.0.3.ksplice1.el9_2.7, 151.0.1.ksplice2.el8 |
|
|
|
|
|
|
For example Trivy finds [CVE-2021-33560](https://linux.oracle.com/cve/CVE-2021-33560.html) only for the `normal` and `fips` flavors.
|
|
For the `ksplice` flavor, [CVE-2021-33560](https://linux.oracle.com/cve/CVE-2021-33560.html) will be skipped.
|
|
|
|
### Severity
|
|
Trivy determines vulnerability severity based on the severity metric provided in [Oracle security advisories][alerts].
|
|
For example, the security patch for [CVE-2023-0464][CVE-2023-0464] is provided as [ELSA-2023-2645][ELSA-2023-2645].
|
|
Its severity is rated as "MODERATE".
|
|
Thus, even though it's evaluated as "HIGH" in the NVD, Trivy displays it with a severity of "MEDIUM".
|
|
|
|
The table below is the mapping of Oracle's threat to Trivy's severity levels.
|
|
|
|
| Oracle | Trivy |
|
|
| :-------: | :------: |
|
|
| Low | Low |
|
|
| Moderate | Medium |
|
|
| Important | High |
|
|
| Critical | Critical |
|
|
|
|
### Status
|
|
Trivy supports the following [vulnerability statuses] for Oracle Linux.
|
|
|
|
| Status | Supported |
|
|
| :-----------------: | :-------: |
|
|
| Fixed | ✓ |
|
|
| Affected | ✓ |
|
|
| Under Investigation | |
|
|
| Will Not Fix | |
|
|
| Fix Deferred | |
|
|
| End of Life | |
|
|
|
|
## License
|
|
Trivy identifies licenses by examining the metadata of RPM packages.
|
|
|
|
[dependency-graph]: ../../configuration/reporting.md#show-origins-of-vulnerable-dependencies
|
|
|
|
[oval]: https://linux.oracle.com/security/oval/
|
|
[alerts]: https://www.oracle.com/security-alerts/
|
|
|
|
[CVE-2023-0464]: https://linux.oracle.com/cve/CVE-2023-0464.html
|
|
[ELSA-2023-2645]: https://linux.oracle.com/errata/ELSA-2023-2645.html
|
|
[NVD]: https://nvd.nist.gov/vuln/detail/CVE-2023-0464
|
|
|
|
[vulnerability statuses]: ../../configuration/filtering.md#by-status |