X-Git-Url: http://git.ipfire.org/?a=blobdiff_plain;f=html%2Fcgi-bin%2Fvulnerabilities.cgi;h=333b03399dbfa4c8ff0001a8183a176dfedb8e47;hb=dc7466ce9a007b1fe5554d6c873d40c724ccd1a5;hp=a15accfa03a0c021de6674195abe9202a1d5cb91;hpb=e896a9bd3de5b254340c03f7dcbced73c6721c50;p=people%2Fpmueller%2Fipfire-2.x.git diff --git a/html/cgi-bin/vulnerabilities.cgi b/html/cgi-bin/vulnerabilities.cgi index a15accfa03..333b03399d 100644 --- a/html/cgi-bin/vulnerabilities.cgi +++ b/html/cgi-bin/vulnerabilities.cgi @@ -30,12 +30,14 @@ require "${General::swroot}/lang.pl"; require "${General::swroot}/header.pl"; my %VULNERABILITIES = ( + "itlb_multihit" => "$Lang::tr{'itlb multihit'} (CVE-2018-12207)", "l1tf" => "$Lang::tr{'foreshadow'} (CVE-2018-3620)", "mds" => "$Lang::tr{'fallout zombieload ridl'} (CVE-2018-12126, CVE-2018-12130, CVE-2018-12127, CVE-2019-11091)", "meltdown" => "$Lang::tr{'meltdown'} (CVE-2017-5754)", "spec_store_bypass" => "$Lang::tr{'spectre variant 4'} (CVE-2018-3639)", "spectre_v1" => "$Lang::tr{'spectre variant 1'} (CVE-2017-5753)", "spectre_v2" => "$Lang::tr{'spectre variant 2'} (CVE-2017-5715)", + "tsx_async_abort" => "$Lang::tr{'taa zombieload2'} (CVE-2019-11135)", ); my $errormessage = ""; @@ -117,7 +119,7 @@ for my $vuln (sort keys %VULNERABILITIES) { if ($status eq "Not affected") { $status_message = $Lang::tr{'not affected'}; $colour = "white"; - $bgcolour = ${Header::colourblack}; + $bgcolour = ${Header::colourgreen}; # Vulnerable } elsif ($status eq "Vulnerable") { @@ -129,7 +131,7 @@ for my $vuln (sort keys %VULNERABILITIES) { } elsif ($status eq "Mitigation") { $status_message = $Lang::tr{'mitigated'}; $colour = "white"; - $bgcolour = ${Header::colourgreen}; + $bgcolour = ${Header::colourblue}; # Unknown report from kernel } else {