How to interpret the output of CVE commands#
pro cves#
In the Pro Client version 35, we introduce the pro cves
command.
This command will display all of installed packages that are affected
by a CVE. This can be better visualized in the following example:
Package Priority Origin Vulnerability
firefox medium esm-infra CVE-2020-6852
openssh low standard CVE-2021-3188
openssh low standard CVE-2020-1288
openssh low standard CVE-2020-1290
openssh-client low esm-apps CVE-2021-3188
openssh-client low standard CVE-2020-1288
openssh-client low standard CVE-2020-1290
python3-apt medium esm-infra CVE-2020-6852
vim critical esm-infra CVE-2011-3374
vim high standard CVE-2011-3380
vim-tiny high - CVE-2011-3380
vim-tiny low - CVE-2011-3380
We can see that the table is oriented per-package. Additionally, we can see that the table will have a line for each CVE that affects an installed package. For example, openssh is affected by three distinct CVEs and because of that, it has three rows in the table.
With that said, the table will always contain four headers:
Package: The name of the package affected by a CVE
Priority: The ubuntu priority for the CVE
- Origin: The ubuntu pocket where the fix can be found:
esm-infra: Fix is available on the esm-infra pocket. This means that user must have esm-infra service enabled through Pro in the machine to access it
esm-apps: Fix is available on the esm-apps pocket. This means that user must have esm-apps service enabled through Pro in the machine to access it
fips: Fix is available on the fips pocket. This means that user must have fips service enabled through Pro in the machine to access it
fips-updates: Fix is available on the fips-updates pocket. This means that user must have fips-updates service enabled through Pro in the machine to access it
standard: Fix is available on the ubuntu security or updates pocket
-: No fix is available for this CVE
Vulnerability: The name of the CVE
It is also important to say that the table is ordered by Package and Priority.
What if no CVEs affect the system#
If no CVEs affect the system, the command will display the following message:
No CVES found that affect this system
Supported flags#
The command support two flags:
–unfixable: Show only unfixable CVEs
–fixable: Show only fixable CVEs
pro cve#
If you suspect that a CVE affects your system and wants to verify
if that is true, you can use the pro cve
command for this.
This command will show you all the related information to a CVE if it affects
your Ubuntu release.
For example, let’s assume that CVE-2022-2286
affects your system and you run:
pro cve CVE-2024-5480
You will see an output similar to this one:
name: CVE-2024-5480
public-url: https://ubuntu.com/security/CVE-2024-5480
published-at: 2024-05-26
cve-cache-date: 2024-11-27
apt-cache-date: 2024-11-25
priority: critical
cvss-score: 9.8
cvss-severity: urgent
description: |
Systems with microprocessors utilizing speculative execution and indirect branch
prediction may allow unauthorized disclosure of information to an attacker with
local user access via a side-channel analysis of the data cache.
notes:
- mdeslaur> requires sourcing a vim commands file or similar
affected-packages:
firefox: available (esm-infra) 1.2.3~esm1
python3: available (standard) 1.5
vim: deferred
related-usns:
USN-6841-1: PHP vulnerability
USN-6839-1: MariaDB vulnerability
Let’s break it down the output of this command. We start by telling you some basic information for the CVE:
name: The CVE name
public-url: The ubuntu dedicated CVE page
published-at: The published date of the CVE
cve-cache-date: The date of the local CVE data source cache
apt-cache-date: The last time the APT state was updated in the system (i.e. running an apt install operation)
priority: The ubuntu priority for this CVE
cvss-score: The CVSS score of the CVE
cvss-severity: The CVSS severity of the CVE
description: The CVE description
notes: The CVE related notes
The next block is now displaying which installed packages in the machine are affected by the CVE, in the format:
affected-packages:
firefox: available (esm-infra) 1.2.3~esm1
python3: available (standard) 1.5
vim: deferred
If the package has a fix available, we will use the format:
affected-packages:
firefox: available (esm-infra) 1.2.3~esm1
This line can be broke down into four distinct fields:
name: The package name
status: The CVE fix status for that package
origin: The CVE fix origin
version: The package version that will fix the CVE for that package
And if the package doesn’t have a fix available, we will use the format:
affected-packages:
vim: deferred
Where the line will only contain the package name and the CVE status for it
Finally, we also display the related USNs to the CVE:
related-usns:
USN-6841-1: PHP vulnerability
USN-6839-1: MariaDB vulnerability
What if the CVE doesn’t affect my system ?#
If the CVE doesn’t affect your system, The affected-packages field will be displayed like this:
affected-packages: []
Which means that no installed packages are affected by the CVE.
What if the CVE doesn’t affect my Ubuntu release ?#
If the CVE doesn’t affect the Ubuntu release you are running own, that means that our CVE source data will not contain any information about it. Therefore, the command will display the following output:
CVE-2025-26520 doesn't affect Ubuntu 16.04.
For more information, visit: https://ubuntu.com/security/CVE-2025-26520
In this example, the CVE-2025-26520 doesn’t affect the Xenial Ubuntu release (Ubuntu 16.04).