This is an automated email from the git hooks/post-receive script. It was generated because a ref change was pushed to the repository containing the project "IPFire 2.x development tree".
The branch, core132 has been updated via 29abc2d07cf297b5ccf32798d6c3cd7dbecef6b2 (commit) via e896a9bd3de5b254340c03f7dcbced73c6721c50 (commit) via 413f84e9883e7c9b6d74aad74c01aa0325d3180a (commit) via a96bcf413ac96d9df1ff883e3daeb7cdb4911b57 (commit) from 2f34103d47a490cc9d1b7ef4f067f261fc52250a (commit)
Those revisions listed above that are new to this repository have not appeared on any other notification email; so we list those revisions in full, below.
- Log ----------------------------------------------------------------- commit 29abc2d07cf297b5ccf32798d6c3cd7dbecef6b2 Author: Arne Fitzenreiter arne_f@ipfire.org Date: Sat May 25 07:39:38 2019 +0200
vulnerabilities.cgi: again change colours
red - vulnerable blue - mitigated green - not affected
because we not really trust the mitigations so they shound not green.
Signed-off-by: Arne Fitzenreiter arne_f@ipfire.org
commit e896a9bd3de5b254340c03f7dcbced73c6721c50 Author: Arne Fitzenreiter arne_f@ipfire.org Date: Sat May 25 06:54:35 2019 +0200
vulnerabilities.cgi fix string handling
remove lf at the end for correct matching and not strip "Mitigated:" if it was not full working and still vulnerable.
Signed-off-by: Arne Fitzenreiter arne_f@ipfire.org
commit 413f84e9883e7c9b6d74aad74c01aa0325d3180a Author: Michael Tremer michael.tremer@ipfire.org Date: Wed May 22 11:08:43 2019 +0100
vulnerabilities.cgi: Regard mitigations that only mitigate something still as vulnerable
Signed-off-by: Michael Tremer michael.tremer@ipfire.org
commit a96bcf413ac96d9df1ff883e3daeb7cdb4911b57 Author: Michael Tremer michael.tremer@ipfire.org Date: Wed May 22 11:05:20 2019 +0100
vulnerabilities.cgi: Simplify regexes
We can do the split in one.
Signed-off-by: Michael Tremer michael.tremer@ipfire.org
-----------------------------------------------------------------------
Summary of changes: html/cgi-bin/vulnerabilities.cgi | 21 +++++++-------------- 1 file changed, 7 insertions(+), 14 deletions(-)
Difference in files: diff --git a/html/cgi-bin/vulnerabilities.cgi b/html/cgi-bin/vulnerabilities.cgi index 76eb79f82..a8746c30c 100644 --- a/html/cgi-bin/vulnerabilities.cgi +++ b/html/cgi-bin/vulnerabilities.cgi @@ -117,7 +117,7 @@ for my $vuln (sort keys %VULNERABILITIES) { if ($status eq "Not affected") { $status_message = $Lang::tr{'not affected'}; $colour = "white"; - $bgcolour = ${Header::colourblack}; + $bgcolour = ${Header::colourgreen};
# Vulnerable } elsif ($status eq "Vulnerable") { @@ -125,17 +125,11 @@ for my $vuln (sort keys %VULNERABILITIES) { $colour = "white"; $bgcolour = ${Header::colourred};
- # Mitigated but smt is enabled - } elsif ($status eq "Mitigation-SMT") { - $status_message = $Lang::tr{'mitigated'}; - $colour = "white"; - $bgcolour = ${Header::colourred}; - # Mitigated } elsif ($status eq "Mitigation") { $status_message = $Lang::tr{'mitigated'}; $colour = "white"; - $bgcolour = ${Header::colourgreen}; + $bgcolour = ${Header::colourblue};
# Unknown report from kernel } else { @@ -156,7 +150,7 @@ for my $vuln (sort keys %VULNERABILITIES) { <font color="$colour"> END if ($message) { - print "<strong>$status_message</strong>: $message"; + print "<strong>$status_message</strong> - $message"; } else { print "<strong>$status_message</strong>"; } @@ -233,15 +227,14 @@ sub check_status($) { my $status = <FILE>; close(FILE);
- if ($status =~ /^(Vulnerable): (.*)$/) { - return ($1, $2); - } + chomp($status);
+ # Fix status when something has been mitigated, but not fully, yet if ($status =~ /^(Mitigation): (.*vulnerable.*)$/) { - return ("Mitigation-SMT", $2); + return ("Vulnerable", $status); }
- if ($status =~ /^(Mitigation): (.*)$/) { + if ($status =~ /^(Vulnerable|Mitigation): (.*)$/) { return ($1, $2); }
hooks/post-receive -- IPFire 2.x development tree