How to interpret the output of CVE commands#

pro cves#

In the Pro Client version 35, we introduce the pro cves command. This command will display all of installed packages that are affected by a CVE. This can be better visualized in the following example:

Package         Priority     Origin        Vulnerability
firefox         medium       esm-infra     CVE-2020-6852
openssh         low          standard      CVE-2021-3188
openssh         low          standard      CVE-2020-1288
openssh         low          standard      CVE-2020-1290
openssh-client  low          esm-apps      CVE-2021-3188
openssh-client  low          standard      CVE-2020-1288
openssh-client  low          standard      CVE-2020-1290
python3-apt     medium       esm-infra     CVE-2020-6852
vim             critical     esm-infra     CVE-2011-3374
vim             high         standard      CVE-2011-3380
vim-tiny        high         -             CVE-2011-3380
vim-tiny        low          -             CVE-2011-3380

We can see that the table is oriented per-package. Additionally, we can see that the table will have a line for each CVE that affects an installed package. For example, openssh is affected by three distinct CVEs and because of that, it has three rows in the table.

With that said, the table will always contain four headers:

  • Package: The name of the package affected by a CVE

  • Priority: The ubuntu priority for the CVE

  • Origin: The ubuntu pocket where the fix can be found:
    • esm-infra: Fix is available on the esm-infra pocket. This means that user must have esm-infra service enabled through Pro in the machine to access it

    • esm-apps: Fix is available on the esm-apps pocket. This means that user must have esm-apps service enabled through Pro in the machine to access it

    • fips: Fix is available on the fips pocket. This means that user must have fips service enabled through Pro in the machine to access it

    • fips-updates: Fix is available on the fips-updates pocket. This means that user must have fips-updates service enabled through Pro in the machine to access it

    • standard: Fix is available on the ubuntu security or updates pocket

    • -: No fix is available for this CVE

  • Vulnerability: The name of the CVE

It is also important to say that the table is ordered by Package and Priority.

What if no CVEs affect the system#

If no CVEs affect the system, the command will display the following message:

No CVES found that affect this system

Supported flags#

The command support two flags:

  • –unfixable: Show only unfixable CVEs

  • –fixable: Show only fixable CVEs

pro cve#

If you suspect that a CVE affects your system and wants to verify if that is true, you can use the pro cve command for this. This command will show you all the related information to a CVE if it affects your Ubuntu release.

For example, let’s assume that CVE-2022-2286 affects your system and you run:

pro cve CVE-2024-5480

You will see an output similar to this one:

name:               CVE-2024-5480
public-url:         https://ubuntu.com/security/CVE-2024-5480
published-at:       2024-05-26
cve-cache-date:     2024-11-27
apt-cache-date:     2024-11-25
priority:           critical
cvss-score:         9.8
cvss-severity:      urgent
description: |
  Systems with microprocessors utilizing speculative execution and indirect branch
  prediction may allow unauthorized disclosure of information to an attacker with
  local user access via a side-channel analysis of the data cache.
notes:
 - mdeslaur> requires sourcing a vim commands file or similar
affected-packages:
  firefox: available (esm-infra) 1.2.3~esm1
  python3: available (standard)  1.5
  vim:     deferred
related-usns:
  USN-6841-1: PHP vulnerability
  USN-6839-1: MariaDB vulnerability

Let’s break it down the output of this command. We start by telling you some basic information for the CVE:

  • name: The CVE name

  • public-url: The ubuntu dedicated CVE page

  • published-at: The published date of the CVE

  • cve-cache-date: The date of the local CVE data source cache

  • apt-cache-date: The last time the APT state was updated in the system (i.e. running an apt install operation)

  • priority: The ubuntu priority for this CVE

  • cvss-score: The CVSS score of the CVE

  • cvss-severity: The CVSS severity of the CVE

  • description: The CVE description

  • notes: The CVE related notes

The next block is now displaying which installed packages in the machine are affected by the CVE, in the format:

affected-packages:
  firefox: available (esm-infra) 1.2.3~esm1
  python3: available (standard)  1.5
  vim:     deferred

If the package has a fix available, we will use the format:

affected-packages:
  firefox: available (esm-infra) 1.2.3~esm1

This line can be broke down into four distinct fields:

  • name: The package name

  • status: The CVE fix status for that package

  • origin: The CVE fix origin

  • version: The package version that will fix the CVE for that package

And if the package doesn’t have a fix available, we will use the format:

affected-packages:
  vim:     deferred

Where the line will only contain the package name and the CVE status for it

Finally, we also display the related USNs to the CVE:

related-usns:
  USN-6841-1: PHP vulnerability
  USN-6839-1: MariaDB vulnerability

What if the CVE doesn’t affect my system ?#

If the CVE doesn’t affect your system, The affected-packages field will be displayed like this:

affected-packages: []

Which means that no installed packages are affected by the CVE.

What if the CVE doesn’t affect my Ubuntu release ?#

If the CVE doesn’t affect the Ubuntu release you are running own, that means that our CVE source data will not contain any information about it. Therefore, the command will display the following output:

CVE-2025-26520 doesn't affect Ubuntu 16.04.
For more information, visit: https://ubuntu.com/security/CVE-2025-26520

In this example, the CVE-2025-26520 doesn’t affect the Xenial Ubuntu release (Ubuntu 16.04).