From owner-freebsd-python@FreeBSD.ORG  Fri Apr 17 22:11:31 2015
Return-Path: <owner-freebsd-python@FreeBSD.ORG>
Delivered-To: python@FreeBSD.org
Received: from mx1.freebsd.org (mx1.freebsd.org
 [IPv6:2001:1900:2254:206a::19:1])
 (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits))
 (No client certificate requested)
 by hub.freebsd.org (Postfix) with ESMTPS id 3D26AF42
 for <python@FreeBSD.org>; Fri, 17 Apr 2015 22:11:31 +0000 (UTC)
Received: from kenobi.freebsd.org (kenobi.freebsd.org
 [IPv6:2001:1900:2254:206a::16:76])
 (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
 (Client did not present a certificate)
 by mx1.freebsd.org (Postfix) with ESMTPS id 261E96DB
 for <python@FreeBSD.org>; Fri, 17 Apr 2015 22:11:31 +0000 (UTC)
Received: from bugs.freebsd.org ([127.0.1.118])
 by kenobi.freebsd.org (8.14.9/8.14.9) with ESMTP id t3HMBVak065220
 for <python@FreeBSD.org>; Fri, 17 Apr 2015 22:11:31 GMT
 (envelope-from bugzilla-noreply@freebsd.org)
From: bugzilla-noreply@freebsd.org
To: python@FreeBSD.org
Subject: [Bug 199162] [MAINTAINER] devel/dulwich: Update to 0.10.1a (Security
 Update)
Date: Fri, 17 Apr 2015 22:11:31 +0000
X-Bugzilla-Reason: CC
X-Bugzilla-Type: changed
X-Bugzilla-Watch-Reason: None
X-Bugzilla-Product: Ports & Packages
X-Bugzilla-Component: Individual Port(s)
X-Bugzilla-Version: Latest
X-Bugzilla-Keywords: easy, needs-qa, patch, security
X-Bugzilla-Severity: Affects Some People
X-Bugzilla-Who: commit-hook@freebsd.org
X-Bugzilla-Status: New
X-Bugzilla-Priority: ---
X-Bugzilla-Assigned-To: freebsd-ports-bugs@FreeBSD.org
X-Bugzilla-Target-Milestone: ---
X-Bugzilla-Flags: maintainer-feedback+ merge-quarterly+
X-Bugzilla-Changed-Fields: 
Message-ID: <bug-199162-21822-KdXBv0pMsW@https.bugs.freebsd.org/bugzilla/>
In-Reply-To: <bug-199162-21822@https.bugs.freebsd.org/bugzilla/>
References: <bug-199162-21822@https.bugs.freebsd.org/bugzilla/>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 7bit
X-Bugzilla-URL: https://bugs.freebsd.org/bugzilla/
Auto-Submitted: auto-generated
MIME-Version: 1.0
X-BeenThere: freebsd-python@freebsd.org
X-Mailman-Version: 2.1.20
Precedence: list
List-Id: FreeBSD-specific Python issues <freebsd-python.freebsd.org>
List-Unsubscribe: <http://lists.freebsd.org/mailman/options/freebsd-python>,
 <mailto:freebsd-python-request@freebsd.org?subject=unsubscribe>
List-Archive: <http://lists.freebsd.org/pipermail/freebsd-python/>
List-Post: <mailto:freebsd-python@freebsd.org>
List-Help: <mailto:freebsd-python-request@freebsd.org?subject=help>
List-Subscribe: <http://lists.freebsd.org/mailman/listinfo/freebsd-python>,
 <mailto:freebsd-python-request@freebsd.org?subject=subscribe>
X-List-Received-Date: Fri, 17 Apr 2015 22:11:31 -0000

https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=199162

--- Comment #4 from commit-hook@freebsd.org ---
A commit references this bug:

Author: jbeich
Date: Fri Apr 17 22:11:16 UTC 2015
New revision: 384191
URL: https://svnweb.freebsd.org/changeset/ports/384191

Log:
  Document new Dulwich vulnerability. CVE-2015-0838

  PR:        199162
  Submitted by:    Marco Br?der (maintainer)

Changes:
  head/security/vuxml/vuln.xml

-- 
You are receiving this mail because:
You are on the CC list for the bug.