{% extends "security/cves/base_cve.html" %} {% block title %}{{ cve.id }}{% endblock %} {% block body_class %} is-paper {% endblock body_class %} {% block content %} {% if cve.impact %} {% set cvssV3 = cve.impact.baseMetricV3.cvssV3 %} {% endif %}

{{ cve.id }}

{% if cve.codename %}

Name{{ cve.codename }}

{% endif %} {% if cve.published %}

Publication date {{ cve.published }}

{% endif %} {% if cve.updated_at %}

Last updated {{ cve.updated_at }}

{% endif %}
{% if cve.priority or cvssV3 %}
{% if cve.priority %}

Ubuntu priority

{% if cve.priority == 'unknown' %} {% endif %} {% if cve.priority == 'negligible' %} {% endif %} {% if cve.priority == 'low' %} {% endif %} {% if cve.priority == 'medium' %} {% endif %} {% if cve.priority == 'high' %} {% endif %} {% if cve.priority == 'critical' %} {% endif %}

{{ cve.priority | capitalize }}

Why this priority?

{% endif %} {% if cvssV3 %}

Cvss 3 Severity Score

{% set baseScore = cvssV3.baseScore %} {% if baseScore <= 3.9 %}

{{ cvssV3.baseScore | capitalize }} · Low

{% elif baseScore <= 6.9 %}

{{ cvssV3.baseScore | capitalize }} · Medium

{% elif baseScore <= 8.9 %}

{{ cvssV3.baseScore | capitalize }} · High

{% elif baseScore <= 10 %}

{{ cvssV3.baseScore | capitalize }} · Critical

{% endif %}

Score breakdown

{% elif cve.cvss3 %}

CVSS 3 base score: {{ cve.cvss3 }}

{% endif %}
{% endif %}
{% if cve.description %}

{{ cve.description }}

{% endif %} {% if cve.ubuntu_description %}

From the Ubuntu Security Team

{{ cve.ubuntu_description }}

{% endif %} {% if cve.notes and only_priority_note == False %}

Read the notes from the security team

{% endif %} {% if cve.priority_reason %}

Why is this CVE {{ cve.priority }} priority?

{{ cve.priority_reason }}

Learn more about Ubuntu priority

{% endif %}
{% if cve.mitigation %}

Mitigation

{{ cve.mitigation }}

{% endif %}

Status

{% if cve.status == 'active' and only_upstream == False %}
{% for package in cve.packages %} {% for status in package.statuses %} {% if status.release_codename and status.release_codename != "upstream" %} {% if loop.index == 1 %}{% endif %} {# djlint: off #} {% if status.icon %} {% else %} {% endif %} {# djlint: on #} {% endif %} {% endfor %} {% endfor %}
Package Ubuntu Release Status
{{ package["name"] }} {{ status.version }} {% if status.support_tag %}{{ status.support_tag }}{% endif %} {{ status.release_codename }} {% if status.pocket_desc and status.pocket_desc.label != "Ubuntu Pro" %} {{ status.pocket_desc.label }} {{ status.pocket_desc.text }} {% endif %}
{{ status.name }} {% if status.name == "Fixed" %}{{ status.description }} {% endif %} {% if status.pocket_desc and status.pocket_desc.label == "Ubuntu Pro" %} {% endif %}
{{ status.name }} {% if status.status == "ignored" %} {{ status.description }} {% endif %}
{% endif %}
{% if cve.expanded_coverage %}

Get expanded security coverage with Ubuntu Pro

Reduce your average CVE exposure time from 98 days to 1 day with expanded CVE patching, ten-years security maintenance and optional support for the full stack of open-source applications. Free for personal use.

Get Ubuntu Pro
{% endif %} {% if cve.notes and only_priority_note == False %}

Notes

{% for note in cve.notes if "Priority reason" not in note.note %}
{% if note.author %}

{{ note.author }}

{% endif %}

{{ note.note }}

{% endfor %}
{% endif %} {% if patches %}

Patch details

For informational purposes only. We recommend not to cherry-pick updates. How can I get the fixes?

{% for package in cve.packages %} {% if package["name"] in patches|map(attribute="name") %} {% endif %} {% endfor %}
Package Patch details
{{ package["name"] }}
{% endif %} {% if cvssV3 %}

Severity score breakdown

Parameter Value
Base score {% set baseScore = cvssV3.baseScore %} {% if baseScore <= 3.9 %} {{ cvssV3.baseScore | capitalize }} · Low {% elif baseScore <= 6.9 %} {{ cvssV3.baseScore | capitalize }} · Medium {% elif baseScore <= 8.9 %} {{ cvssV3.baseScore | capitalize }} · High {% elif baseScore <= 10 %} {{ cvssV3.baseScore | capitalize }} · Critical {% endif %}
Attack vector {{ cvssV3.attackVector | capitalize }}
Attack complexity {{ cvssV3.attackComplexity | capitalize }}
Privileges required {{ cvssV3.privilegesRequired | capitalize }}
User interaction {{ cvssV3.userInteraction | capitalize }}
Scope {{ cvssV3.scope | capitalize }}
Confidentiality {{ cvssV3.confidentialityImpact | capitalize }}
Integrity impact {{ cvssV3.integrityImpact | capitalize }}
Availability impact {{ cvssV3.availabilityImpact | capitalize }}
Vector {{ cvssV3.vectorString }}
{% endif %}

References

{% if cve.notices %}

Related Ubuntu Security Notices (USN)

    {% for notice in cve.notices %} {% endfor %}
{% endif %} {% if other_references %}

Other references

{% endif %}
{# djlint: off #} {# djlint: on #} {% endblock %}