etc/issue
srv/web/ipfire/cgi-bin/credits.cgi
var/ipfire/langs
+srv/web/ipfire/cgi-bin/vulnerabilities.cgi
###############################################################################
# #
# IPFire.org - A linux based firewall #
-# Copyright (C) 2007-2019 IPFire Team <info@ipfire.org> #
+# Copyright (C) 2007-2020 IPFire Team <info@ipfire.org> #
# #
# This program is free software: you can redistribute it and/or modify #
# it under the terms of the GNU General Public License as published by #
"spec_store_bypass" => "$Lang::tr{'spectre variant 4'} (CVE-2018-3639)",
"spectre_v1" => "$Lang::tr{'spectre variant 1'} (CVE-2017-5753)",
"spectre_v2" => "$Lang::tr{'spectre variant 2'} (CVE-2017-5715)",
+ "srbds" => "$Lang::tr{'srbds'} (CVE-2020-0543)",
"tsx_async_abort" => "$Lang::tr{'taa zombieload2'} (CVE-2019-11135)",
);
'squid extension methods' => 'Ihre <tt>extension_methods</tt> Liste',
'squid extension methods invalid' => 'Ihre \'extension_methods\' Liste darf nur Worte aus Großbuchstaben und Ziffer enthalten, die mittels eines Leerzeichens getrennt werden.',
'squid fix cache' => 'Zwischenspeicher reparieren',
+'srbds' => 'Special Register Buffer Data Sampling',
'src port' => 'Quellport',
'srcprt range overlaps' => 'Quellportbereich überlappt mit einem bereits definierten Port.',
'srcprt within existing' => 'Quellport befindet sich innnerhalb eines bereits definierten Portbereichs.',
'squid extension methods' => 'Your <tt>extension_methods</tt> list',
'squid extension methods invalid' => 'Your \'extension_methods\' list can only contain uppercase words of letters and digits, separated with a space. ',
'squid fix cache' => 'Repair cache',
+'srbds' => 'Special register buffer data sampling',
'src port' => 'Src Port',
'srcprt range overlaps' => 'Source port range overlaps an already defined port.',
'srcprt within existing' => 'Source port is within an already defined port range.',