This is an automated email from the git hooks/post-receive script. It was generated because a ref change was pushed to the repository containing the project "IPFire 2.x development tree".
The branch, next has been updated via e9c62e37f42cbdf7c071abe6cb12ba81e0f3c123 (commit) from 4d43b3dcb1b31444ff49f3cc0ea4b04d4e6599fb (commit)
Those revisions listed above that are new to this repository have not appeared on any other notification email; so we list those revisions in full, below.
- Log ----------------------------------------------------------------- commit e9c62e37f42cbdf7c071abe6cb12ba81e0f3c123 Author: Arne Fitzenreiter arne_f@ipfire.org Date: Sat Jun 13 12:23:46 2020 +0200
vulnerabilities.cgi: add srdbs (CVE-2020-0543)
Signed-off-by: Arne Fitzenreiter arne_f@ipfire.org
-----------------------------------------------------------------------
Summary of changes: config/rootfiles/core/146/filelists/files | 1 + html/cgi-bin/vulnerabilities.cgi | 3 ++- langs/de/cgi-bin/de.pl | 1 + langs/en/cgi-bin/en.pl | 1 + 4 files changed, 5 insertions(+), 1 deletion(-)
Difference in files: diff --git a/config/rootfiles/core/146/filelists/files b/config/rootfiles/core/146/filelists/files index ce4e51768..393ad7227 100644 --- a/config/rootfiles/core/146/filelists/files +++ b/config/rootfiles/core/146/filelists/files @@ -2,3 +2,4 @@ etc/system-release etc/issue srv/web/ipfire/cgi-bin/credits.cgi var/ipfire/langs +srv/web/ipfire/cgi-bin/vulnerabilities.cgi diff --git a/html/cgi-bin/vulnerabilities.cgi b/html/cgi-bin/vulnerabilities.cgi index 333b03399..d5f81cdc1 100644 --- a/html/cgi-bin/vulnerabilities.cgi +++ b/html/cgi-bin/vulnerabilities.cgi @@ -2,7 +2,7 @@ ############################################################################### # # # IPFire.org - A linux based firewall # -# Copyright (C) 2007-2019 IPFire Team info@ipfire.org # +# Copyright (C) 2007-2020 IPFire Team info@ipfire.org # # # # This program is free software: you can redistribute it and/or modify # # it under the terms of the GNU General Public License as published by # @@ -37,6 +37,7 @@ my %VULNERABILITIES = ( "spec_store_bypass" => "$Lang::tr{'spectre variant 4'} (CVE-2018-3639)", "spectre_v1" => "$Lang::tr{'spectre variant 1'} (CVE-2017-5753)", "spectre_v2" => "$Lang::tr{'spectre variant 2'} (CVE-2017-5715)", + "srbds" => "$Lang::tr{'srbds'} (CVE-2020-0543)", "tsx_async_abort" => "$Lang::tr{'taa zombieload2'} (CVE-2019-11135)", );
diff --git a/langs/de/cgi-bin/de.pl b/langs/de/cgi-bin/de.pl index 216d49d7c..26ad2ab1e 100644 --- a/langs/de/cgi-bin/de.pl +++ b/langs/de/cgi-bin/de.pl @@ -2256,6 +2256,7 @@ 'squid extension methods' => 'Ihre <tt>extension_methods</tt> Liste', 'squid extension methods invalid' => 'Ihre 'extension_methods' Liste darf nur Worte aus Großbuchstaben und Ziffer enthalten, die mittels eines Leerzeichens getrennt werden.', 'squid fix cache' => 'Zwischenspeicher reparieren', +'srbds' => 'Special Register Buffer Data Sampling', 'src port' => 'Quellport', 'srcprt range overlaps' => 'Quellportbereich überlappt mit einem bereits definierten Port.', 'srcprt within existing' => 'Quellport befindet sich innnerhalb eines bereits definierten Portbereichs.', diff --git a/langs/en/cgi-bin/en.pl b/langs/en/cgi-bin/en.pl index ff08bce0c..51483530b 100644 --- a/langs/en/cgi-bin/en.pl +++ b/langs/en/cgi-bin/en.pl @@ -2284,6 +2284,7 @@ 'squid extension methods' => 'Your <tt>extension_methods</tt> list', 'squid extension methods invalid' => 'Your 'extension_methods' list can only contain uppercase words of letters and digits, separated with a space. ', 'squid fix cache' => 'Repair cache', +'srbds' => 'Special register buffer data sampling', 'src port' => 'Src Port', 'srcprt range overlaps' => 'Source port range overlaps an already defined port.', 'srcprt within existing' => 'Source port is within an already defined port range.',
hooks/post-receive -- IPFire 2.x development tree