This is an automated email from the git hooks/post-receive script. It was generated because a ref change was pushed to the repository containing the project "IPFire 2.x development tree".
The branch, core55 has been created at 9ad2f534d91ca02ad0bbaab6751eb8bd395ece0f (commit)
- Log ----------------------------------------------------------------- commit 9ad2f534d91ca02ad0bbaab6751eb8bd395ece0f Author: Arne Fitzenreiter arne_f@ipfire.org Date: Thu Jan 5 14:51:05 2012 +0100
finish core55.
commit 0bd6df5798d8cb6f3f64e94ede16c0ad3e15028b Author: Arne Fitzenreiter arne_f@ipfire.org Date: Thu Jan 5 14:50:25 2012 +0100
core55: add openssh to updater.
commit 8384f58553215c523a89afa06949888b35ecd275 Author: Arne Fitzenreiter arne_f@ipfire.org Date: Thu Jan 5 14:38:01 2012 +0100
openssh: update to 5.9p1.
commit 5d098ffb5ae8c501f53ccca6e12fd0711d477c8c Author: Arne Fitzenreiter arne_f@ipfire.org Date: Thu Jan 5 14:31:26 2012 +0100
openssl: security update to 0.9.8s.
DTLS Plaintext Recovery Attack (CVE-2011-4108) Double-free in Policy Checks (CVE-2011-4109) Uninitialized SSL 3.0 Padding (CVE-2011-4576) Malformed RFC 3779 Data Can Cause Assertion Failures (CVE-2011-4577) Affected users should upgrade to OpenSSL 1.0.0f or 0.9.8s. SGC Restart DoS Attack (CVE-2011-4619)
http://www.openssl.org/news/secadv_20120104.txt
-----------------------------------------------------------------------
hooks/post-receive -- IPFire 2.x development tree