Age | Commit message (Collapse) | Author | Files | Lines |
|
- Updating fast_xml to version 1.1.24.
- Updating p1_utils to version 1.0.10.
- Updating stringprep to version 1.0.10.
- Compatibility with R19.3+
- XEP-0084 (User Avatar) support
|
|
- Updating stun to version 1.0.15.
- Updating fast_tls to version 1.0.16.
- Updating p1_utils to version 1.0.10.
- Compatibility with R20
|
|
- Updating fast_tls to version 1.0.16.
- Updating p1_utils to version 1.0.10.
|
|
Upstream changes:
- support an error response when the account is locked (thanks @sushi514)
- add an environment variable MIKUTTER_CONFROOT
- sweep legacy code
|
|
2.54.0
======
* New/updated translations: Basque, Belarusian, Brazilian
Portuguese, Bulgarian, Catalan, Chinese (Taiwan), Danish, Danish,
Dutch, French, Galician, Hungarian, Italian, Korean, Latvian,
Lithuanian, Malayalam, Nepali, Polish, Serbian, Slovak, Swedish,
Turkish
2.53.90
=======
* gnutls: Stop using %LATEST_RECORD_VERSION in priority string,
since that gives better compatibility with current gnutls /
current real world. [#782218, Michael Catanzaro]
* gnutls: Provide a better error message when a TLS alert is
received. [#782218, Michael Catanzaro]
* New/updated translations: Croatian, Czech, Esperanto, Friulian,
German, Indonesian, Italian, Kazakh, Slovenian, Spanish
|
|
1.51 2017-10-11
- Added the following missing methods for IPv6 lookups to the pure Perl
implementation: name_by_addr_v6, name_by_name_v6, org_by_addr_v6, and
org_by_name_v6. Reported by Earl Killian. GitHub #28.
|
|
|
|
|
|
A native Ruby implementation of the SMB Protocol Family. It currently
supports MS-SMB and MS-SMB2. This library currently include both a
client level, and packet level support. A user can aprse and
manipulate raw SMB packets, or simply use the simple client to perform
SMB operations. See the Wiki for more information on this porject's
long-term goals, style guide, and developer tips.
|
|
Release 2.1.7:
Features Added:
* None
Bugs Fixed:
* Correct PyEZ TechWiki link.
* SRX Branch cluster fails SW.install()
|
|
|
|
Patches from Juoni Malinen and Mathy Vanhoef.
Fixes:
- CVE-2017-13077
- CVE-2017-13078
- CVE-2017-13079
- CVE-2017-13080
- CVE-2017-13081
- CVE-2017-13082
- CVE-2017-13086
- CVE-2017-13087
- CVE-2017-13088
Tested by leot, thanks!
Subject: [PATCH 1/8] hostapd: Avoid key reinstallation in FT handshake
Do not reinstall TK to the driver during Reassociation Response frame
processing if the first attempt of setting the TK succeeded. This avoids
issues related to clearing the TX/RX PN that could result in reusing
same PN values for transmitted frames (e.g., due to CCM nonce reuse and
also hitting replay protection on the receiver) and accepting replayed
frames on RX side.
This issue was introduced by the commit
0e84c25434e6a1f283c7b4e62e483729085b78d2 ('FT: Fix PTK configuration in
authenticator') which allowed wpa_ft_install_ptk() to be called multiple
times with the same PTK. While the second configuration attempt is
needed with some drivers, it must be done only if the first attempt
failed.
Subject: [PATCH 2/8] Prevent reinstallation of an already in-use group key
Track the current GTK and IGTK that is in use and when receiving a
(possibly retransmitted) Group Message 1 or WNM-Sleep Mode Response, do
not install the given key if it is already in use. This prevents an
attacker from trying to trick the client into resetting or lowering the
sequence counter associated to the group key.
Subject: [PATCH 3/8] Extend protection of GTK/IGTK reinstallation of WNM-Sleep
Mode cases
This extends the protection to track last configured GTK/IGTK value
separately from EAPOL-Key frames and WNM-Sleep Mode frames to cover a
corner case where these two different mechanisms may get used when the
GTK/IGTK has changed and tracking a single value is not sufficient to
detect a possible key reconfiguration.
Subject: [PATCH 4/8] Prevent installation of an all-zero TK
Properly track whether a PTK has already been installed to the driver
and the TK part cleared from memory. This prevents an attacker from
trying to trick the client into installing an all-zero TK.
This fixes the earlier fix in commit
ad00d64e7d8827b3cebd665a0ceb08adabf15e1e ('Fix TK configuration to the
driver in EAPOL-Key 3/4 retry case') which did not take into account
possibility of an extra message 1/4 showing up between retries of
message 3/4.
Subject: [PATCH 5/8] Fix PTK rekeying to generate a new ANonce
The Authenticator state machine path for PTK rekeying ended up bypassing
the AUTHENTICATION2 state where a new ANonce is generated when going
directly to the PTKSTART state since there is no need to try to
determine the PMK again in such a case. This is far from ideal since the
new PTK would depend on a new nonce only from the supplicant.
Fix this by generating a new ANonce when moving to the PTKSTART state
for the purpose of starting new 4-way handshake to rekey PTK.
Subject: [PATCH 6/8] TDLS: Reject TPK-TK reconfiguration
Do not try to reconfigure the same TPK-TK to the driver after it has
been successfully configured. This is an explicit check to avoid issues
related to resetting the TX/RX packet number. There was already a check
for this for TPK M2 (retries of that message are ignored completely), so
that behavior does not get modified.
For TPK M3, the TPK-TK could have been reconfigured, but that was
followed by immediate teardown of the link due to an issue in updating
the STA entry. Furthermore, for TDLS with any real security (i.e.,
ignoring open/WEP), the TPK message exchange is protected on the AP path
and simple replay attacks are not feasible.
As an additional corner case, make sure the local nonce gets updated if
the peer uses a very unlikely "random nonce" of all zeros.
Subject: [PATCH 7/8] WNM: Ignore WNM-Sleep Mode Response without pending
request
Commit 03ed0a52393710be6bdae657d1b36efa146520e5 ('WNM: Ignore WNM-Sleep
Mode Response if WNM-Sleep Mode has not been used') started ignoring the
response when no WNM-Sleep Mode Request had been used during the
association. This can be made tighter by clearing the used flag when
successfully processing a response. This adds an additional layer of
protection against unexpected retransmissions of the response frame.
Subject: [PATCH 8/8] FT: Do not allow multiple Reassociation Response frames
The driver is expected to not report a second association event without
the station having explicitly request a new association. As such, this
case should not be reachable. However, since reconfiguring the same
pairwise or group keys to the driver could result in nonce reuse issues,
be extra careful here and do an additional state check to avoid this
even if the local driver ends up somehow accepting an unexpected
Reassociation Response frame.
|
|
Add TOOL_DEPENDS+=glib2-tools to glib2/buildlink3.mk
|
|
- Revert "Move gdbus-codegen users to py-glib2-tools by including
glib2/buildtools.mk" 1f764df
- while here change to TOOL_DEPENDS
- switch from py-glib2-tools to glib2-tools
|
|
|
|
|
|
3.5.0
Features / Improvements
* Allow 'full_text' param when getting direct messages
* Explicitly return api code when parsing error
* Remove deprecated function and clean up codes
Bug Fixes
* update_status: first positional argument should be 'status'
* Fix "TypeError: Can't convert 'bytes' object to str implicitly"
* Fix duplicate raise in auth.py
|
|
|
|
Fix yaz_scan - 3 args gives SEGV PHPYAZ-34
|
|
|
|
Version 4.8.3:
* fixed compilation with older C++ compilers.
* fixed 2 other core dumps on exit (incorrect order of deallocation).
|
|
From Edgar Fuß in PR 52610.
Bump PKGREVISION.
|
|
This is a regularly scheduled stable release.
Resolved issues:
#4357: Removing paused folders no longer triggers a crash.
#4360: Add further security related HTTP headers
#4375: Improve info level logging in some cases
#4377: Improve GUI tooltips in chromium based browsers
#4382: Hide temporary files on Windows
#4387: Add -device-id command line switch
In addition, failure to upgrade folder markers from file to directory type is
no longer fatal.
|
|
Pkgsrc changes:
* None.
Upstream changes:
Features:
* Set trust-anchor-signaling default to yes
* Fix #1440: [dnscrypt] client nonce cache.
* Fix #1435: Please allow UDP to be disabled separately upstream and
downstream.
Bug fixes:
* Fix that looping modules always stop the query, and don't pass
control.
* Fix unbound-host to report error for DNSSEC state of failed lookups.
* Spelling fixes, from Josh Soref.
* Fix #1400: allowing use of global cache on ECS-forwarding unless
always-forward.
* use a cachedb answer even if it's "expired" when serve-expired is yes
(patch from Jinmei Tatuya).
* trigger refetching of the answer in that case (this will bypass
cachedb lookup)
* allow storing a 0-TTL answer from cachedb in the in-memory message
cache when serve-expired is yes
* Fix DNSCACHE_STORE_ZEROTTL to be bigger than 0xffff.
* Log name of looping module
* Fix #1450: Generate again patch contrib/aaaa-filter-iterator.patch
(by Danilo G. Baio).
* Fix param unused warning for windows exportsymbol compile.
* Use RCODE from A query on DNS64 synthesized answer.
* Fix trust-anchor-signaling works in libunbound.
* Fix spelling in unbound-control man page.
|
|
|
|
Last release from 2005 and tested with python-2.4. Nothing in pkgsrc
uses it.
|
|
|
|
0.91 2017-10-06 Ben Bullock <bkb@cpan.org>
* Documentation (esp. SEE ALSO, BUGS)
* Better validation of IPv4 addresses in ipv6_chkip
|
|
Upstream changes:
Quagga 1.2.2
Upstream did not publsh NEWS -- basically bug fixes
Quagga 1.2.1
bug fixes and minor improvements
Quagga 1.2.0
This is a feature release, for testing or more adventurous
users. More conservative users may wish to stay with an older
release. This release contains:
Next-Hop Resolution Protocol support from Timo Teräs
BGP Large Community support, thanks to Job Snijders and Keyur Patel
BGP session establishment reworked, for speed and reliability
BGP route-advertisement timer interval default lowered, to 3s for eBGP and 1s for iBGP.
BGP Connect retries made more aggressive, with lower retry timer and a slower-ramping backoff.
Quagga 1.1.1
bug and security fixes
There is a known regression with IPv6 BGP sessions, see Bugzilla #870.
Quagga 1.1.0
This is a release with a number of new features, and many bug fixes.
Notably:
Greatly improved nexthop resolution for recursive routes. (Cumulus)
Event driven nexthop resolution for BGP (Cumulus)
Route tags support (Piotr Chytła, Packet Consulting)
Transport of TE related metrics over OSPF, IS-IS (Olivier Dugeon, Orange)
IPv6 Multipath for zebra and BGP (Ayan Banerjee, Cumulus)
This release also changed the default of 'link-detect' state,
controlling whether zebra will respond to link-state events and
consider an interface to be down when link is down. To retain
current the behavior save your config before updating, otherwise
remove the 'link-detect' flag from your config prior to
updating. There is also a new global 'default link-detect (on|off)'
flag to configure the global default.
Quagga 1.0.20161017
zebra IPv6 RA and BGP MRT dump security fixes
|
|
* Fixed handling RA's from multiple routers
* Fixed changing to a better route based on gateway
* IPv6 default route is now deleted when config is not persistent
* Use hmac(3) if available in libc to reduce binary size
|
|
Release 0.12.7:
This is a minor bugfix release to help Tahoe-LAFS.
It depends upon a newer version of I2P, which should handle Tahoe storage
servers that listen on I2P sockets (the Tahoe executable makes an outbound
connection to the local I2P daemon, however it then accepts inbound TLS
connections on that same socket, which confuses the TLS negotiation because
both sides appear to be "clients", and TLS requires exactly one "client" and
one "server").
It also fixes a minor Tub shutdown behavior to let unit tests work more
reliably.
|
|
|
|
XDR is an open data format, specified in RFC 4506. This library
provides a way to read and write XDR data from Ruby. It can read/write
all of the primitive XDR types and also provides facilities to define
readers for the compound XDR types (enums, structs and unions).
|
|
1.11.166
api-change:redshift: Update redshift command to latest version
1.11.165
api-change:kinesisanalytics: Update kinesisanalytics command to latest version
api-change:route53domains: Update route53domains command to latest version
1.11.164
api-change:ssm: Update ssm command to latest version
api-change:ec2: Update ec2 command to latest version
1.11.163
api-change:cloudhsm: Update cloudhsm command to latest version
1.11.162
api-change:route53: Update route53 command to latest version
api-change:organizations: Update organizations command to latest version
api-change:mturk: Update mturk command to latest version
api-change:codebuild: Update codebuild command to latest version
api-change:appstream: Update appstream command to latest version
|
|
1.7.24
api-change:redshift: Update redshift client to latest version
1.7.23
api-change:route53domains: Update route53domains client to latest version
api-change:kinesisanalytics: Update kinesisanalytics client to latest version
1.7.22
api-change:ssm: Update ssm client to latest version
api-change:ec2: Update ec2 client to latest version
1.7.21
api-change:cloudhsm: Update cloudhsm client to latest version
1.7.20
api-change:organizations: Update organizations client to latest version
api-change:route53: Update route53 client to latest version
api-change:codebuild: Update codebuild client to latest version
api-change:mturk: Update mturk client to latest version
api-change:appstream: Update appstream client to latest version
|
|
A compiler bug causes incorrect compilation of the NetBSD-specific
code in cpu_sysctl.c. This results in a crash shortly after startup if
the machine has 2 or more CPUs.
Disable optimisation in netsnmp_cpu_arch_load() only.
This works around the problem reported in PR pkg/50939.
|
|
1.6.3:
Bug fixes.
|
|
Changes 1.6:
Add in a check for the windows version of EWOULDBLOCK
Apparently in newer versions of python this just works, but in older
versions the error codes were not consistent across platforms.
|
|
|
|
|
|
|
|
Changes in libsoup from 2.59.90.1 to 2.60.0:
* New/updated translations: Catalan, Danish, Dutch, Nepali
Changes in libsoup from 2.59.90 to 2.59.90.1:
* CVE-2017-2885: Fixed a chunked decoding buffer overrun that
could be exploited against either clients or servers.
[#785774]
Changes in libsoup from 2.58.0 to 2.59.90:
* Several SoupAuthNegotiate compatibility fixes [#783780,
#783781, Tomas Popela]
* Include a payload in SoupWebsocketConnection's "ping"
messages (to avoid problems with certain buggy server
implementations), and emit a signal when receiving a "pong"
(to allow apps to notice when the remote peer has
disconnected them). [#785660, David Woodhouse]
* Fix the interpretation of wss:// URIs, which previously
mostly didn't work. [#784766, Nirbheek Chauhan].
* Fixed SoupContentSniffer behavior on XML files with no
Content-Type
[https://bugs.webkit.org/show_bug.cgi?id=173923]
* Fixed a bug with cancelling async requests [#773257, Carlos
Garcia Campos]
* Reverted the (undocumented) change in 2.58.0 to call
soup_session_abort() after changing
SoupSession:proxy-resolver; while this made its behavior
more consistent with :proxy-uri, it ended up breaking
things. [#781590]
* Allow HTTP responses that have no trailing CRLF after the
response headers (and no body) [#780352, Carlos Garcia
Campos]
* Fixed an out-of-bounds read in SoupURI parsing [#785042]
* Fixed a spurious (debug-level) error message in
SoupWebsocketConnection [#784935, Ignacio Casal Quinteiro]
* Fixed introspection annotations on
soup_message_headers_get_content_range() [Philip Withnall]
* Fixed a flake in tests/header-parsing [#777258]
* Update tests/test-cert.pem to use stronger algorithms to
avoid problems with newer gnutls. [#784949, Jan Alexander
Steffens]
* Fixed examples/get to not accidentally break https
certificate validation [#784259, Sebatian Dröge]
* Misc updates to apache/php stuff in unit tests:
* Dropped support for Apache 2.2
* Deal with mod_unixd being compiled-in [#776478]
* Switched PHP support from PHP 5 to PHP 7
* Updated translations:
Esperanto, Turkish
|
|
Version 2.4.4
=============
This is primarily a maintenance release, with further improved OpenSSL 1.1
integration, several minor bug fixes and other minor improvements.
Bug fixes
---------
- Fix issues when a pushed cipher via the Negotiable Crypto Parameters (NCP) is
rejected by the remote side
- Ignore ``--keysize`` when NCP have resulted in a changed cipher.
- Configurations using ``--auth-nocache`` and the management interface to provide
user credentials (like NetworkManager on Linux) on client side with servers
implementing authentication tokens (for example, using ``--auth-gen-token``)
will now behave correctly and not query the user for an, to them, unknown
authentication token on renegotiations of the tunnel.
- Fix bug causing invalid or corrupt SOCKS port number when changing the
proxy via the management interface.
- The man page should now have proper escaping of hyphens/minus characters
and have seen some minor corrections.
User-visible Changes
--------------------
- Linux servers with systemd which uses the ``openvpn-server@.service`` unit
file for server configurations will now utilize the automatic restart feature
in systemd. If the OpenVPN server process dies unexpectedly, systemd will
ensure the OpenVPN configuration will be restarted without any user interaction.
Deprecated features
-------------------
- ``--no-replay`` is deprecated and will be removed in OpenVPN 2.5.
- ``--keysize`` is deprecated in OpenVPN 2.4 and will be removed in v2.6
Security
--------
- CVE-2017-12166: Fix bounds check for configurations using ``--key-method 1``.
Before this fix, it could allow an attacker to send a malformed packet to
trigger a stack overflow. This is considered to be a low risk issue, as
``--key-method 2`` has been the default since OpenVPN 2.0 (released on
2005-04-17). This option is already deprecated in v2.4 and will be
completely removed in v2.5.
|
|
version 2.78
Fix logic of appending ".<layer>" to PXE basename. Thanks to Chris
Novakovic for the patch.
Revert ping-check of address in DHCPDISCOVER if there
already exists a lease for the address. Under some
circumstances, and netbooted windows installation can reply
to pings before if has a DHCP lease and block allocation
of the address it already used during netboot. Thanks to
Jan Psota for spotting this.
Fix DHCP relaying, broken in 2.76 and 2.77 by commit
ff325644c7afae2588583f935f4ea9b9694eb52e. Thanks to
John Fitzgibbon for the diagnosis and patch.
Try other servers if first returns REFUSED when
--strict-order active. Thanks to Hans Dedecker
for the patch
Fix regression in 2.77, ironically added as a security
improvement, which resulted in a crash when a DNS
query exceeded 512 bytes (or the EDNS0 packet size,
if different.) Thanks to Christian Kujau, Arne Woerner
Juan Manuel Fernandez and Kevin Darbyshire-Bryant for
chasing this one down. CVE-2017-13704 applies.
Fix heap overflow in DNS code. This is a potentially serious
security hole. It allows an attacker who can make DNS
requests to dnsmasq, and who controls the contents of
a domain, which is thereby queried, to overflow
(by 2 bytes) a heap buffer and either crash, or
even take control of, dnsmasq.
CVE-2017-14491 applies.
Credit to Felix Wilhelm, Fermin J. Serna, Gabriel Campana
Kevin Hamacher and Ron Bowes of the Google Security Team for
finding this.
Fix heap overflow in IPv6 router advertisement code.
This is a potentially serious security hole, as a
crafted RA request can overflow a buffer and crash or
control dnsmasq. Attacker must be on the local network.
CVE-2017-14492 applies.
Credit to Felix Wilhelm, Fermin J. Serna, Gabriel Campana
and Kevin Hamacher of the Google Security Team for
finding this.
Fix stack overflow in DHCPv6 code. An attacker who can send
a DHCPv6 request to dnsmasq can overflow the stack frame and
crash or control dnsmasq.
CVE-2017-14493 applies.
Credit to Felix Wilhelm, Fermin J. Serna, Gabriel Campana
Kevin Hamacher and Ron Bowes of the Google Security Team for
finding this.
Fix information leak in DHCPv6. A crafted DHCPv6 packet can
cause dnsmasq to forward memory from outside the packet
buffer to a DHCPv6 server when acting as a relay.
CVE-2017-14494 applies.
Credit to Felix Wilhelm, Fermin J. Serna, Gabriel Campana
Kevin Hamacher and Ron Bowes of the Google Security Team for
finding this.
Fix DoS in DNS. Invalid boundary checks in the
add_pseudoheader function allows a memcpy call with negative
size An attacker which can send malicious DNS queries
to dnsmasq can trigger a DoS remotely.
dnsmasq is vulnerable only if one of the following option is
specified: --add-mac, --add-cpe-id or --add-subnet.
CVE-2017-14496 applies.
Credit to Felix Wilhelm, Fermin J. Serna, Gabriel Campana
Kevin Hamacher and Ron Bowes of the Google Security Team for
finding this.
Fix out-of-memory Dos vulnerability. An attacker which can
send malicious DNS queries to dnsmasq can trigger memory
allocations in the add_pseudoheader function
The allocated memory is never freed which leads to a DoS
through memory exhaustion. dnsmasq is vulnerable only
if one of the following option is specified:
--add-mac, --add-cpe-id or --add-subnet.
CVE-2017-14495 applies.
Credit to Felix Wilhelm, Fermin J. Serna, Gabriel Campana
Kevin Hamacher and Ron Bowes of the Google Security Team for
finding this.
|
|
*******************
* GUPnP IGD 0.2.4 *
*******************
- Add API to delete mapping by internal IP/port instead of the external one
|
|
1.0.2
=====
- Fix a potential crash of GUPnPProxy when trying to access a dangling
GUPnPServiceProxy pointer of a server handler.
Bugs fixed in this release:
- https://bugzilla.gnome.org/show_bug.cgi?id=777491
All contributors to this release:
- Sven Neumann <neumann@teufel.de>
1.0.1
=====
- Connman CM: Various fixes
- Linux CM: Fix compiler warning about negative shift
- Documentation: Fix FSF address
- Documentation: Fix references
- Build: Update ax_append_link_flags
Bugs fixed in this release:
- https://bugzilla.gnome.org/show_bug.cgi?id=770318
All contributors to this release:
- Sven Neumann <neumann@teufel.de>
- Jens Georg <mail@jensge.org>
- Oliver Tappe <zooey@hirschkaefer.de>
|
|
1.0.2
=====
- Small documentation fixes
- Fix deprecation warning with GTK+-3.22
All contributors to this release:
- Jens Georg <mail@jensge.org>
1.0.1
=====
- Fix some compiler/c89 issues with recent mingw
- Use proper ssize_t modifier in printf
- Make documentation point to itself by declaring it stable
- Use correct FSF address in documentation text
All contributors to this release:
- Jens Georg <mail@jensge.org>
|
|
3.28.0 (2017-09-29)
+ *nix: Official Linux binaries are now built for Debian 9 (Stretch)
- Do not disable password saving settings if fzdefaults.xml contains a kiosk mode setting of 0.
3.28.0-rc1 (2017-09-22)
+ Add "Close once" as queue completion action
- Fixed crash if FileZilla is forced to close, e.g. when the system is shutting down, while there are open dialogs
- If the transfer queue asks for a password and the password dialog is canceled the queue processing is now stopped
- OS X, *nix: Improve detection of invalid character encodings in local filenames
- Fix potential crash expanding directory tree items while changing selections
|
|
0.11.0 (2017-09-29)
+ Add fz::buffer class
- *nix: fz::process::spawn no longer calls async-signal-unsafe functions between forking and calling execv in the child.
|
|
Changes:
2017.10.01
----------
Core
* [YoutubeDL] Document youtube_include_dash_manifest
Extractors
+ [tvp] Add support for new URL schema (#14368)
+ [generic] Add support for single format Video.js embeds (#14371)
* [yahoo] Bypass geo restriction for brightcove (#14210)
* [yahoo] Use extracted brightcove account id (#14210)
* [rtve:alacarta] Fix extraction (#14290)
+ [yahoo] Add support for custom brigthcove embeds (#14210)
+ [generic] Add support for Video.js embeds
+ [gfycat] Add support for /gifs/detail URLs (#14322)
* [generic] Fix infinite recursion for twitter:player URLs (#14339)
* [xhamsterembed] Fix extraction (#14308)
2017.09.24
----------
Core
+ [options] Accept lrc as a subtitle conversion target format (#14292)
* [utils] Fix handling raw TTML subtitles (#14191)
Extractors
* [24video] Fix timestamp extraction and make non fatal (#14295)
+ [24video] Add support for 24video.adult (#14295)
+ [kakao] Add support for tv.kakao.com (#12298, #14007)
+ [twitter] Add support for URLs without user id (#14270)
+ [americastestkitchen] Add support for americastestkitchen.com (#10764,
#13996)
* [generic] Fix support for multiple HTML5 videos on one page (#14080)
* [mixcloud] Fix extraction (#14088, #14132)
+ [lynda] Add support for educourse.ga (#14286)
* [beeg] Fix extraction (#14275)
* [nbcsports:vplayer] Correct theplatform URL (#13873)
* [twitter] Fix duration extraction (#14141)
* [tvplay] Bypass geo restriction
+ [heise] Add support for YouTube embeds (#14109)
+ [popcorntv] Add support for popcorntv.it (#5914, #14211)
* [viki] Update app data (#14181)
* [morningstar] Relax URL regular expression (#14222)
* [openload] Fix extraction (#14225, #14257)
* [noovo] Fix extraction (#14214)
* [dailymotion:playlist] Relax URL regular expression (#14219)
+ [twitch] Add support for go.twitch.tv URLs (#14215)
* [vgtv] Relax URL regular expression (#14223)
|