# Skip element if it has config as file extension.
next if ($file =~ m/\.config$/);
+ # Skip rules file for whitelisted hosts.
+ next if ("$rulespath/$file" eq $whitelist_file);
+
# Delete the current processed file, if not, exit this function
# and return an error message.
unlink("$rulespath/$file") or return "Could not delete $rulespath/$file. $!\n";
# create main/security file
touch /var/ipfire/main/security
+chmod 644 /var/ipfire/main/security
+chown nobody:nobody /var/ipfire/main/security
# Update Language cache
/usr/local/bin/update-lang-cache
if ($status eq "Not affected") {
$status_message = $Lang::tr{'not affected'};
$colour = "white";
- $bgcolour = ${Header::colourblack};
+ $bgcolour = ${Header::colourgreen};
# Vulnerable
} elsif ($status eq "Vulnerable") {
} elsif ($status eq "Mitigation") {
$status_message = $Lang::tr{'mitigated'};
$colour = "white";
- $bgcolour = ${Header::colourgreen};
+ $bgcolour = ${Header::colourblue};
# Unknown report from kernel
} else {
<font color="$colour">
END
if ($message) {
- print "<strong>$status_message</strong>: $message";
+ print "<strong>$status_message</strong> - $message";
} else {
print "<strong>$status_message</strong>";
}
my $status = <FILE>;
close(FILE);
+ chomp($status);
+
# Fix status when something has been mitigated, but not fully, yet
if ($status =~ /^(Mitigation): (.*vulnerable.*)$/) {
- return ("Vulnerable", $2);
+ return ("Vulnerable", $status);
}
if ($status =~ /^(Vulnerable|Mitigation): (.*)$/) {