]> git.ipfire.org Git - ipfire-2.x.git/blobdiff - html/cgi-bin/vulnerabilities.cgi
vulnerabilities.cgi: Add English and German translations for new flaws
[ipfire-2.x.git] / html / cgi-bin / vulnerabilities.cgi
index 77223c4faddfb3f0561e65caedc25f477cf2c736..1fb57220e3067b2f85b3b15403c47dd06c09424c 100644 (file)
@@ -2,7 +2,7 @@
 ###############################################################################
 #                                                                             #
 # IPFire.org - A linux based firewall                                         #
-# Copyright (C) 2007-2022  IPFire Team  <info@ipfire.org>                     #
+# Copyright (C) 2007-2023  IPFire Team  <info@ipfire.org>                     #
 #                                                                             #
 # This program is free software: you can redistribute it and/or modify        #
 # it under the terms of the GNU General Public License as published by        #
@@ -30,14 +30,14 @@ require "${General::swroot}/lang.pl";
 require "${General::swroot}/header.pl";
 
 my %VULNERABILITIES = (
-       "gather_data_sampling" => "gather data sampling",
+       "gather_data_sampling" => "$Lang::tr{'downfall gather data sampling'} (CVE-2022-40982)",
        "itlb_multihit" => "$Lang::tr{'itlb multihit'} (CVE-2018-12207)",
        "l1tf" => "$Lang::tr{'foreshadow'} (CVE-2018-3620)",
        "mds" => "$Lang::tr{'fallout zombieload ridl'} (CVE-2018-12126, CVE-2018-12130, CVE-2018-12127, CVE-2019-11091)",
        "meltdown" => "$Lang::tr{'meltdown'} (CVE-2017-5754)",
        "mmio_stale_data" => "$Lang::tr{'mmio stale data'} (CVE-2022-21123, CVE-2022-21125, CVE-2022-21127, CVE-2022-21166)",
        "retbleed" => "$Lang::tr{'retbleed'} (CVE-2022-29900, CVE-2022-29901)",
-       "spec_rstack_overflow" => "spec rstack overflow",
+       "spec_rstack_overflow" => "$Lang::tr{'spec rstack overflow'} (CVE-2023-20569)",
        "spec_store_bypass" => "$Lang::tr{'spectre variant 4'} (CVE-2018-3639)",
        "spectre_v1" => "$Lang::tr{'spectre variant 1'} (CVE-2017-5753)",
        "spectre_v2" => "$Lang::tr{'spectre variant 2'} (CVE-2017-5715)",