From 6e16017fc0042bc346dc2d405a04528a4b4c0922 Mon Sep 17 00:00:00 2001 From: Arne Fitzenreiter Date: Fri, 11 Aug 2023 23:29:26 +0200 Subject: [PATCH] vulnerabilities.cgi: add new gather_data_sampling and spec_rstack_overfow this not add details and translation strings yet. Signed-off-by: Arne Fitzenreiter --- html/cgi-bin/vulnerabilities.cgi | 2 ++ 1 file changed, 2 insertions(+) diff --git a/html/cgi-bin/vulnerabilities.cgi b/html/cgi-bin/vulnerabilities.cgi index 0edd127d78..77223c4fad 100644 --- a/html/cgi-bin/vulnerabilities.cgi +++ b/html/cgi-bin/vulnerabilities.cgi @@ -30,12 +30,14 @@ require "${General::swroot}/lang.pl"; require "${General::swroot}/header.pl"; my %VULNERABILITIES = ( + "gather_data_sampling" => "gather data sampling", "itlb_multihit" => "$Lang::tr{'itlb multihit'} (CVE-2018-12207)", "l1tf" => "$Lang::tr{'foreshadow'} (CVE-2018-3620)", "mds" => "$Lang::tr{'fallout zombieload ridl'} (CVE-2018-12126, CVE-2018-12130, CVE-2018-12127, CVE-2019-11091)", "meltdown" => "$Lang::tr{'meltdown'} (CVE-2017-5754)", "mmio_stale_data" => "$Lang::tr{'mmio stale data'} (CVE-2022-21123, CVE-2022-21125, CVE-2022-21127, CVE-2022-21166)", "retbleed" => "$Lang::tr{'retbleed'} (CVE-2022-29900, CVE-2022-29901)", + "spec_rstack_overflow" => "spec rstack overflow", "spec_store_bypass" => "$Lang::tr{'spectre variant 4'} (CVE-2018-3639)", "spectre_v1" => "$Lang::tr{'spectre variant 1'} (CVE-2017-5753)", "spectre_v2" => "$Lang::tr{'spectre variant 2'} (CVE-2017-5715)", -- 2.39.5