www/py-django52: New port, copied from www/py-django51
Django is a high-level Python Web framework that encourages rapid development
and clean, pragmatic design.
Developed and used over the past two years by a fast-moving online-news
operation, Django was designed from scratch to handle two challenges: the
intensive deadlines of a newsroom and the stringent requirements of experienced
Web developers. It has convenient niceties for developing content-management
systems, but it's an excellent tool for building any Web site.
security/openvpn: security update to 2.6.14
"Fix possible ASSERT() on OpenVPN servers using --tls-crypt-v2
Security scope: OpenVPN servers between 2.6.1 and 2.6.13 using
--tls-crypt-v2 can be made to abort with an ASSERT() message by sending
a particular combination of authenticated and malformed packets.
To trigger the bug, a valid tls-crypt-v2 client key is needed, or
network observation of a handshake with a valid tls-crypt-v2 client key
No crypto integrity is violated, no data is leaked, and no remote code
execution is possible.
This bug does not affect OpenVPN clients."
clean up CONFLICTS_INSTALL
ChangeLog: https://github.com/OpenVPN/openvpn/blob/v2.6.14/Changes.rst#overview-of-changes-in-2614
[5 lines not shown]
security/openvpn-devel: upgrade port to git commit b75849ba36 (2025-04-02)
Fixes CVE-2025-2704 (servers using --tls-crypt-v2 can be made to ASSERT()
by sending a particular sequence of authenticated and malformed packets).
New feature: Multisocket support (listening to multiple sockets, UDP and
TCP, in one server) - with a number of minor bug fixes to that.
New feature: --override-username (see manpage for details)
Other minor features, polishing and bugfixes.
Security: 2cad4541-0f5b-11f0-89f8-411aefea0df9
Security: CVE-2025-2704
MFH: 2025Q2
(cherry picked from commit a73af948cdbfea8096fcaff9819227be822a9530)
security/openvpn: security update to 2.6.14
"Fix possible ASSERT() on OpenVPN servers using --tls-crypt-v2
Security scope: OpenVPN servers between 2.6.1 and 2.6.13 using
--tls-crypt-v2 can be made to abort with an ASSERT() message by sending
a particular combination of authenticated and malformed packets.
To trigger the bug, a valid tls-crypt-v2 client key is needed, or
network observation of a handshake with a valid tls-crypt-v2 client key
No crypto integrity is violated, no data is leaked, and no remote code
execution is possible.
This bug does not affect OpenVPN clients."
ChangeLog: https://github.com/OpenVPN/openvpn/blob/v2.6.14/Changes.rst#overview-of-changes-in-2614
Security: 2cad4541-0f5b-11f0-89f8-411aefea0df9
Security: CVE-2025-2704
MFH: 2025Q2
security/openvpn-devel: upgrade port to git commit b75849ba36 (2025-04-02)
Fixes CVE-2025-2704 (servers using --tls-crypt-v2 can be made to ASSERT()
by sending a particular sequence of authenticated and malformed packets).
New feature: Multisocket support (listening to multiple sockets, UDP and
TCP, in one server) - with a number of minor bug fixes to that.
New feature: --override-username (see manpage for details)
Other minor features, polishing and bugfixes.
Security: 2cad4541-0f5b-11f0-89f8-411aefea0df9
Security: CVE-2025-2704
MFH: 2025Q2