require "${General::swroot}/header.pl";
my %VULNERABILITIES = (
+ "itlb_multihit" => "$Lang::tr{'itlb multihit'} (CVE-2018-12207)",
"l1tf" => "$Lang::tr{'foreshadow'} (CVE-2018-3620)",
"mds" => "$Lang::tr{'fallout zombieload ridl'} (CVE-2018-12126, CVE-2018-12130, CVE-2018-12127, CVE-2019-11091)",
"meltdown" => "$Lang::tr{'meltdown'} (CVE-2017-5754)",
"spec_store_bypass" => "$Lang::tr{'spectre variant 4'} (CVE-2018-3639)",
"spectre_v1" => "$Lang::tr{'spectre variant 1'} (CVE-2017-5753)",
"spectre_v2" => "$Lang::tr{'spectre variant 2'} (CVE-2017-5715)",
+ "tsx_async_abort" => "$Lang::tr{'taa zombieload2'} (CVE-2019-11135)",
);
my $errormessage = "";
if ($status eq "Not affected") {
$status_message = $Lang::tr{'not affected'};
$colour = "white";
- $bgcolour = ${Header::colourblack};
+ $bgcolour = ${Header::colourgreen};
# Vulnerable
} elsif ($status eq "Vulnerable") {
} elsif ($status eq "Mitigation") {
$status_message = $Lang::tr{'mitigated'};
$colour = "white";
- $bgcolour = ${Header::colourgreen};
+ $bgcolour = ${Header::colourblue};
# Unknown report from kernel
} else {
<font color="$colour">
END
if ($message) {
- print "<strong>$status_message</strong>: $message";
+ print "<strong>$status_message</strong> - $message";
} else {
print "<strong>$status_message</strong>";
}
my $status = <FILE>;
close(FILE);
+ chomp($status);
+
# Fix status when something has been mitigated, but not fully, yet
if ($status =~ /^(Mitigation): (.*vulnerable.*)$/) {
- return ("Vulnerable", $2);
+ return ("Vulnerable", $status);
}
if ($status =~ /^(Vulnerable|Mitigation): (.*)$/) {