]> git.ipfire.org Git - people/pmueller/ipfire-2.x.git/blobdiff - html/cgi-bin/vulnerabilities.cgi
vulnearabilities.cgi: add tsx async abort and itlb_multihit
[people/pmueller/ipfire-2.x.git] / html / cgi-bin / vulnerabilities.cgi
index 76eb79f8220a67bc2f7136921ccca843154715df..333b03399dbfa4c8ff0001a8183a176dfedb8e47 100644 (file)
@@ -30,12 +30,14 @@ require "${General::swroot}/lang.pl";
 require "${General::swroot}/header.pl";
 
 my %VULNERABILITIES = (
+       "itlb_multihit" => "$Lang::tr{'itlb multihit'} (CVE-2018-12207)",
        "l1tf" => "$Lang::tr{'foreshadow'} (CVE-2018-3620)",
        "mds" => "$Lang::tr{'fallout zombieload ridl'} (CVE-2018-12126, CVE-2018-12130, CVE-2018-12127, CVE-2019-11091)",
        "meltdown" => "$Lang::tr{'meltdown'} (CVE-2017-5754)",
        "spec_store_bypass" => "$Lang::tr{'spectre variant 4'} (CVE-2018-3639)",
        "spectre_v1" => "$Lang::tr{'spectre variant 1'} (CVE-2017-5753)",
        "spectre_v2" => "$Lang::tr{'spectre variant 2'} (CVE-2017-5715)",
+       "tsx_async_abort" => "$Lang::tr{'taa zombieload2'} (CVE-2019-11135)",
 );
 
 my $errormessage = "";
@@ -117,7 +119,7 @@ for my $vuln (sort keys %VULNERABILITIES) {
        if ($status eq "Not affected") {
                $status_message = $Lang::tr{'not affected'};
                $colour = "white";
-               $bgcolour = ${Header::colourblack};
+               $bgcolour = ${Header::colourgreen};
 
        # Vulnerable
        } elsif ($status eq "Vulnerable") {
@@ -125,17 +127,11 @@ for my $vuln (sort keys %VULNERABILITIES) {
                $colour = "white";
                $bgcolour = ${Header::colourred};
 
-       # Mitigated but smt is enabled
-       } elsif ($status eq "Mitigation-SMT") {
-               $status_message = $Lang::tr{'mitigated'};
-               $colour = "white";
-               $bgcolour = ${Header::colourred};
-
        # Mitigated
        } elsif ($status eq "Mitigation") {
                $status_message = $Lang::tr{'mitigated'};
                $colour = "white";
-               $bgcolour = ${Header::colourgreen};
+               $bgcolour = ${Header::colourblue};
 
        # Unknown report from kernel
        } else {
@@ -156,7 +152,7 @@ for my $vuln (sort keys %VULNERABILITIES) {
                                <font color="$colour">
 END
        if ($message) {
-               print "<strong>$status_message</strong>: $message";
+               print "<strong>$status_message</strong> - $message";
        } else {
                print "<strong>$status_message</strong>";
        }
@@ -233,15 +229,14 @@ sub check_status($) {
        my $status = <FILE>;
        close(FILE);
 
-       if ($status =~ /^(Vulnerable): (.*)$/) {
-               return ($1, $2);
-       }
+       chomp($status);
 
+       # Fix status when something has been mitigated, but not fully, yet
        if ($status =~ /^(Mitigation): (.*vulnerable.*)$/) {
-               return ("Mitigation-SMT", $2);
+               return ("Vulnerable", $status);
        }
 
-       if ($status =~ /^(Mitigation): (.*)$/) {
+       if ($status =~ /^(Vulnerable|Mitigation): (.*)$/) {
                return ($1, $2);
        }