[2/2] vulnerabilities.cgi: Avoid superfluous line breaks by widening SMT configuration table

Message ID f2d14d86-5c67-4c27-90e1-75c0092dc911@ipfire.org
State Accepted
Commit a566ba13923a8abad29dcb953a913b005c5c19dc
Headers
Series [1/2] vulnerabilities.cgi: Add English and German translations for new flaws |

Commit Message

Peter Müller Aug. 15, 2023, 4:18 p.m. UTC
  Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
---
 html/cgi-bin/vulnerabilities.cgi | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)
  

Patch

diff --git a/html/cgi-bin/vulnerabilities.cgi b/html/cgi-bin/vulnerabilities.cgi
index 1fb57220e..1946cf171 100644
--- a/html/cgi-bin/vulnerabilities.cgi
+++ b/html/cgi-bin/vulnerabilities.cgi
@@ -183,7 +183,7 @@  print "<form method='post' action='$ENV{'SCRIPT_NAME'}'>\n";
 my $smt_status = &smt_status();
 
 print <<END;
-	<table class="tbl" width="66%">
+	<table class="tbl" width="100%">
 		<tbody>
 			<tr>
 				<th colspan="2" align="center">