Compatibility matrix
The following table shows the operating systems where the vulnerability detector currently is supported and the provider configuration needed for each distribution.
Distribution |
Versions |
Configuration provider |
---|---|---|
Red Hat & CentOS |
5 |
Red Hat Security Data |
6 |
||
7 |
||
8 |
||
Amazon Linux |
1 |
|
2 |
||
Ubuntu |
trusty / 14 |
Canonical |
xenial / 16 |
||
bionic / 18 |
||
Debian |
wheezy / 7 |
Debian |
jessie / 8 |
||
stretch / 9 |
||
buster / 10 |
||
Windows |
All supported versions |
National Vulnerability Database |
Note
The operating system support for a provider can be expanded using the allow option.