This is an automated email from the git hooks/post-receive script. It was generated because a ref change was pushed to the repository containing the project "IPFire 2.x development tree". The branch, core55 has been created at 9ad2f534d91ca02ad0bbaab6751eb8bd395ece0f (commit) - Log ----------------------------------------------------------------- commit 9ad2f534d91ca02ad0bbaab6751eb8bd395ece0f Author: Arne Fitzenreiter <arne_f(a)ipfire.org> Date: Thu Jan 5 14:51:05 2012 +0100 finish core55. commit 0bd6df5798d8cb6f3f64e94ede16c0ad3e15028b Author: Arne Fitzenreiter <arne_f(a)ipfire.org> Date: Thu Jan 5 14:50:25 2012 +0100 core55: add openssh to updater. commit 8384f58553215c523a89afa06949888b35ecd275 Author: Arne Fitzenreiter <arne_f(a)ipfire.org> Date: Thu Jan 5 14:38:01 2012 +0100 openssh: update to 5.9p1. commit 5d098ffb5ae8c501f53ccca6e12fd0711d477c8c Author: Arne Fitzenreiter <arne_f(a)ipfire.org> Date: Thu Jan 5 14:31:26 2012 +0100 openssl: security update to 0.9.8s. DTLS Plaintext Recovery Attack (CVE-2011-4108) Double-free in Policy Checks (CVE-2011-4109) Uninitialized SSL 3.0 Padding (CVE-2011-4576) Malformed RFC 3779 Data Can Cause Assertion Failures (CVE-2011-4577) Affected users should upgrade to OpenSSL 1.0.0f or 0.9.8s. SGC Restart DoS Attack (CVE-2011-4619) http://www.openssl.org/news/secadv_20120104.txt ----------------------------------------------------------------------- hooks/post-receive -- IPFire 2.x development tree