From owner-freebsd-python@FreeBSD.ORG Fri Apr 17 22:11:31 2015 Return-Path: <owner-freebsd-python@FreeBSD.ORG> Delivered-To: python@FreeBSD.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTPS id 3D26AF42 for <python@FreeBSD.org>; Fri, 17 Apr 2015 22:11:31 +0000 (UTC) Received: from kenobi.freebsd.org (kenobi.freebsd.org [IPv6:2001:1900:2254:206a::16:76]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 261E96DB for <python@FreeBSD.org>; Fri, 17 Apr 2015 22:11:31 +0000 (UTC) Received: from bugs.freebsd.org ([127.0.1.118]) by kenobi.freebsd.org (8.14.9/8.14.9) with ESMTP id t3HMBVak065220 for <python@FreeBSD.org>; Fri, 17 Apr 2015 22:11:31 GMT (envelope-from bugzilla-noreply@freebsd.org) From: bugzilla-noreply@freebsd.org To: python@FreeBSD.org Subject: [Bug 199162] [MAINTAINER] devel/dulwich: Update to 0.10.1a (Security Update) Date: Fri, 17 Apr 2015 22:11:31 +0000 X-Bugzilla-Reason: CC X-Bugzilla-Type: changed X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: Ports & Packages X-Bugzilla-Component: Individual Port(s) X-Bugzilla-Version: Latest X-Bugzilla-Keywords: easy, needs-qa, patch, security X-Bugzilla-Severity: Affects Some People X-Bugzilla-Who: commit-hook@freebsd.org X-Bugzilla-Status: New X-Bugzilla-Priority: --- X-Bugzilla-Assigned-To: freebsd-ports-bugs@FreeBSD.org X-Bugzilla-Target-Milestone: --- X-Bugzilla-Flags: maintainer-feedback+ merge-quarterly+ X-Bugzilla-Changed-Fields: Message-ID: <bug-199162-21822-KdXBv0pMsW@https.bugs.freebsd.org/bugzilla/> In-Reply-To: <bug-199162-21822@https.bugs.freebsd.org/bugzilla/> References: <bug-199162-21822@https.bugs.freebsd.org/bugzilla/> Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: 7bit X-Bugzilla-URL: https://bugs.freebsd.org/bugzilla/ Auto-Submitted: auto-generated MIME-Version: 1.0 X-BeenThere: freebsd-python@freebsd.org X-Mailman-Version: 2.1.20 Precedence: list List-Id: FreeBSD-specific Python issues <freebsd-python.freebsd.org> List-Unsubscribe: <http://lists.freebsd.org/mailman/options/freebsd-python>, <mailto:freebsd-python-request@freebsd.org?subject=unsubscribe> List-Archive: <http://lists.freebsd.org/pipermail/freebsd-python/> List-Post: <mailto:freebsd-python@freebsd.org> List-Help: <mailto:freebsd-python-request@freebsd.org?subject=help> List-Subscribe: <http://lists.freebsd.org/mailman/listinfo/freebsd-python>, <mailto:freebsd-python-request@freebsd.org?subject=subscribe> X-List-Received-Date: Fri, 17 Apr 2015 22:11:31 -0000 https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=199162 --- Comment #4 from commit-hook@freebsd.org --- A commit references this bug: Author: jbeich Date: Fri Apr 17 22:11:16 UTC 2015 New revision: 384191 URL: https://svnweb.freebsd.org/changeset/ports/384191 Log: Document new Dulwich vulnerability. CVE-2015-0838 PR: 199162 Submitted by: Marco Br?der (maintainer) Changes: head/security/vuxml/vuln.xml -- You are receiving this mail because: You are on the CC list for the bug.