Sourced from werkzeug's releases.
3.0.6
This is the Werkzeug 3.0.6 security fix release, which fixes security issues but does not otherwise change behavior and should not result in breaking changes.
PyPI: https://pypi.org/project/Werkzeug/3.0.6/ Changes: https://werkzeug.palletsprojects.com/en/stable/changes/#version-3-0-6
- Fix how
max_form_memory_sizeis applied when parsing large non-file fields. GHSA-q34m-jh98-gwm2safe_joincatches certain paths on Windows that were not caught byntpath.isabson Python < 3.11. GHSA-f9vj-2wh5-fj8j3.0.5
This is the Werkzeug 3.0.5 fix release, which fixes bugs but does not otherwise change behavior and should not result in breaking changes.
PyPI: https://pypi.org/project/Werkzeug/3.0.5/ Changes: https://werkzeug.palletsprojects.com/en/stable/changes/#version-3-0-5 Milestone: https://github.com/pallets/werkzeug/milestone/37?closed=1
- The Watchdog reloader ignores file closed no write events. #2945
- Logging works with client addresses containing an IPv6 scope. #2952
- Ignore invalid authorization parameters. #2955
- Improve type annotation fore
SharedDataMiddleware. #2958- Compatibility with Python 3.13 when generating debugger pin and the current UID does not have an associated name. #2957
3.0.4
This is the Werkzeug 3.0.4 fix release, which fixes bugs but does not otherwise change behavior and should not result in breaking changes.
PyPI: https://pypi.org/project/Werkzeug/3.0.4/ Changes: https://werkzeug.palletsprojects.com/en/3.0.x/changes/#version-3-0-4 Milestone: https://github.com/pallets/werkzeug/milestone/36?closed=1
- Restore behavior where parsing
multipart/x-www-form-urlencodeddata with invalid UTF-8 bytes in the body results in no form data parsed rather than a 413 error. #2930- Improve
parse_options_headerperformance when parsing unterminated quoted string values. #2904- Debugger pin auth is synchronized across threads/processes when tracking failed entries. #2916
- Dev server handles unexpected
SSLEOFErrordue to issue in Python < 3.13. #2926- Debugger pin auth works when the URL already contains a query string. #2918
3.0.3
This is the Werkzeug 3.0.3 security release, which fixes security issues and bugs but does not otherwise change behavior and should not result in breaking changes.
PyPI: https://pypi.org/project/Werkzeug/3.0.3/ Changes: https://werkzeug.palletsprojects.com/en/3.0.x/changes/#version-3-0-3 Milestone: https://github.com/pallets/werkzeug/milestone/35?closed=1
- Only allow
localhost,.localhost,127.0.0.1, or the specified hostname when running the dev server, to make debugger requests. Additional hosts can be added by using the debugger middleware directly. The debugger UI makes requests using the full URL rather than only the path. GHSA-2g68-c3qc-8985- Make reloader more robust when
""is insys.path. #2823
... (truncated)
Sourced from werkzeug's changelog.
Version 3.0.6
Released 2024-10-25
- Fix how
max_form_memory_sizeis applied when parsing large non-file fields. :ghsa:q34m-jh98-gwm2safe_joincatches certain paths on Windows that were not caught byntpath.isabson Python < 3.11. :ghsa:f9vj-2wh5-fj8jVersion 3.0.5
Released 2024-10-24
- The Watchdog reloader ignores file closed no write events. :issue:
2945- Logging works with client addresses containing an IPv6 scope :issue:
2952- Ignore invalid authorization parameters. :issue:
2955- Improve type annotation fore
SharedDataMiddleware. :issue:2958- Compatibility with Python 3.13 when generating debugger pin and the current UID does not have an associated name. :issue:
2957Version 3.0.4
Released 2024-08-21
- Restore behavior where parsing
multipart/x-www-form-urlencodeddata with invalid UTF-8 bytes in the body results in no form data parsed rather than a 413 error. :issue:2930- Improve
parse_options_headerperformance when parsing unterminated quoted string values. :issue:2904- Debugger pin auth is synchronized across threads/processes when tracking failed entries. :issue:
2916- Dev server handles unexpected
SSLEOFErrordue to issue in Python < 3.13. :issue:2926- Debugger pin auth works when the URL already contains a query string. :issue:
2918Version 3.0.3
Released 2024-05-05
- Only allow
localhost,.localhost,127.0.0.1, or the specified hostname when running the dev server, to make debugger requests. Additional hosts can be added by using the debugger middleware directly. The debugger
... (truncated)
5eaefc3
release version 3.0.62767bcb
Merge commit from fork87cc78a
catch special absolute path on Windows Python < 3.1150cfeeb
Merge commit from fork8760275
apply max_form_memory_size another level up in the parser8d6a12e
start version 3.0.6a7b121a
release version 3.0.5 (#2961)9caf72a
release version 3.0.5e28a245
catch OSError from getpass.getuser (#2960)e6b4cce
catch OSError from getpass.getuserSourced from black's releases.
24.3.0
Highlights
This release is a milestone: it fixes Black's first CVE security vulnerability. If you run Black on untrusted input, or if you habitually put thousands of leading tab characters in your docstrings, you are strongly encouraged to upgrade immediately to fix CVE-2024-21503.
This release also fixes a bug in Black's AST safety check that allowed Black to make incorrect changes to certain f-strings that are valid in Python 3.12 and higher.
Stable style
- Don't move comments along with delimiters, which could cause crashes (#4248)
- Strengthen AST safety check to catch more unsafe changes to strings. Previous versions of Black would incorrectly format the contents of certain unusual f-strings containing nested strings with the same quote type. Now, Black will crash on such strings until support for the new f-string syntax is implemented. (#4270)
- Fix a bug where line-ranges exceeding the last code line would not work as expected (#4273)
Performance
- Fix catastrophic performance on docstrings that contain large numbers of leading tab characters. This fixes CVE-2024-21503. (#4278)
Documentation
- Note what happens when
--checkis used with--quiet(#4236)
Sourced from black's changelog.
24.3.0
Highlights
This release is a milestone: it fixes Black's first CVE security vulnerability. If you run Black on untrusted input, or if you habitually put thousands of leading tab characters in your docstrings, you are strongly encouraged to upgrade immediately to fix CVE-2024-21503.
This release also fixes a bug in Black's AST safety check that allowed Black to make incorrect changes to certain f-strings that are valid in Python 3.12 and higher.
Stable style
- Don't move comments along with delimiters, which could cause crashes (#4248)
- Strengthen AST safety check to catch more unsafe changes to strings. Previous versions of Black would incorrectly format the contents of certain unusual f-strings containing nested strings with the same quote type. Now, Black will crash on such strings until support for the new f-string syntax is implemented. (#4270)
- Fix a bug where line-ranges exceeding the last code line would not work as expected (#4273)
Performance
- Fix catastrophic performance on docstrings that contain large numbers of leading tab characters. This fixes CVE-2024-21503. (#4278)
Documentation
- Note what happens when
--checkis used with--quiet(#4236)
552baf8
Prepare release 24.3.0 (#4279)f000936
Fix catastrophic performance in lines_with_leading_tabs_expanded() (#4278)7b5a657
Fix --line-ranges behavior when ranges are at EOF (#4273)1abcffc
Use regex where we ignore case on windows (#4252)719e674
Fix 4227: Improve documentation for --quiet --check (#4236)e5510af
update plugin url for Thonny (#4259)6af7d11
Fix AST safety check false negative (#4270)f03ee11
Ensure blib2to3.pygram is initialized before use (#4224)e4bfedb
fix: Don't move comments while splitting delimiters (#4248)d0287e1
Make trailing comma logic more concise (#4202)bd81538
2024.07.04 (#295)06a2cbf
Bump peter-evans/create-pull-request from 6.0.5 to 6.1.0 (#294)13bba02
Bump actions/checkout from 4.1.6 to 4.1.7 (#293)e8abcd0
Bump pypa/gh-action-pypi-publish from 1.8.14 to 1.9.0 (#292)124f4ad
2024.06.02 (#291)c2196ce
--- (#290)fefdeec
Bump actions/checkout from 4.1.4 to 4.1.5 (#289)3c5fb15
Bump actions/download-artifact from 4.1.6 to 4.1.7 (#286)4a9569a
Bump actions/checkout from 4.1.2 to 4.1.4 (#287)1fc8086
Bump peter-evans/create-pull-request from 6.0.4 to 6.0.5 (#288)