Skip to content

fix(deps): vuln minor upgrades — 15 packages (minor: 7 · patch: 8) [src/loadgenerator]#73

Closed
gh-worker-campaigns-3e9aa4[bot] wants to merge 1 commit into
mainfrom
engraver-auto-version-upgrade/minorpatch/pip/loadgenerator/0-1776936103
Closed

fix(deps): vuln minor upgrades — 15 packages (minor: 7 · patch: 8) [src/loadgenerator]#73
gh-worker-campaigns-3e9aa4[bot] wants to merge 1 commit into
mainfrom
engraver-auto-version-upgrade/minorpatch/pip/loadgenerator/0-1776936103

Conversation

@gh-worker-campaigns-3e9aa4
Copy link
Copy Markdown

Summary: High-severity security update — 15 packages upgraded (MINOR changes included)

Manifests changed:

  • src/loadgenerator (pip)

✅ Action Required: Please review the changes below. If they look good, approve and merge this PR.


Updates

Package From To Type Dep Type Vulnerabilities Fixed
urllib3 2.0.7 2.6.3 minor Direct 6 HIGH, 4 MODERATE
flask-cors 4.0.0 4.0.2 patch Direct 3 HIGH, 7 MODERATE
werkzeug 3.0.1 3.0.6 patch Direct 2 HIGH, 10 MODERATE
idna 3.4 3.11 minor Direct 2 HIGH, 1 MODERATE
brotli 1.1.0 1.2.0 minor Direct 1 HIGH
jinja2 3.1.2 3.1.6 patch Direct 10 MODERATE
requests 2.31.0 2.33.1 minor Direct 6 MODERATE
googleapis-common-protos 1.61.0 1.74.0 minor Direct -
six 1.16.0 1.17.0 minor Direct -
typing-extensions 4.8.0 4.15.0 minor Direct -
click 8.1.7 8.1.8 patch Direct -
configargparse 1.7 1.7.5 patch Direct -
deprecated 1.2.14 1.2.18 patch Direct -
flask 3.0.0 3.0.3 patch Direct 2 LOW
markupsafe 2.1.3 2.1.5 patch Direct -

Packages marked with "-" are updated due to dependency constraints.


Security Details

🚨 Critical & High Severity (14 fixed)
Package CVE Severity Summary Unsafe Version Fixed In
brotli GHSA-2qfp-q593-8484 HIGH Scrapy is vulnerable to a denial of service (DoS) attack due to flaws in brotli decompression implementation 1.1.0 1.2.0
flask-cors GHSA-hxwh-jpp2-84pm HIGH Flask-CORS allows the Access-Control-Allow-Private-Network CORS header to be set to true by default 4.0.0 4.0.2
flask-cors CVE-2024-6221 HIGH - 4.0.0 -
flask-cors PYSEC-2024-71 HIGH - 4.0.0 4.0.2
idna PYSEC-2024-60 high - 3.4 1d365e17e10d72d0b7876316fc7b9ca0eebdd38d
idna CVE-2024-3651 high - 3.4 -
urllib3 CVE-2025-66418 HIGH urllib3 allows an unbounded number of links in the decompression chain 2.0.7 -
urllib3 GHSA-gm62-xv2j-4w53 HIGH urllib3 allows an unbounded number of links in the decompression chain 2.0.7 2.6.0
urllib3 CVE-2025-66471 HIGH urllib3 Streaming API improperly handles highly compressed data 2.0.7 -
urllib3 GHSA-2xpw-w6gg-jr37 HIGH urllib3 streaming API improperly handles highly compressed data 2.0.7 2.6.0
urllib3 GHSA-38jv-5279-wg99 HIGH Decompression-bomb safeguards bypassed when following HTTP redirects (streaming API) 2.0.7 2.6.3
urllib3 CVE-2026-21441 HIGH urllib3 vulnerable to decompression-bomb safeguard bypass when following HTTP redirects (streaming API) 2.0.7 -
werkzeug GHSA-2g68-c3qc-8985 HIGH Werkzeug debugger vulnerable to remote execution when interacting with attacker controlled domain 3.0.1 3.0.3
werkzeug CVE-2024-34069 HIGH Werkzeug's improper usage of a pathname and improper CSRF protection results in the remote command execution 3.0.1 -
ℹ️ Other Vulnerabilities (40)
Package CVE Severity Summary Unsafe Version Fixed In
flask-cors GHSA-8vgw-p6qm-5gr7 MODERATE Flask-CORS allows for inconsistent CORS matching 4.0.0 6.0.0
flask-cors CVE-2024-6844 MODERATE - 4.0.0 -
flask-cors GHSA-43qf-4rqw-9q2g MODERATE Flask-CORS vulnerable to Improper Handling of Case Sensitivity 4.0.0 6.0.0
flask-cors CVE-2024-6839 MODERATE - 4.0.0 -
flask-cors GHSA-84pr-m4jr-85g5 MODERATE flask-cors vulnerable to log injection when the log level is set to debug 4.0.0 4.0.1
flask-cors GHSA-7rxf-gvfg-47g4 MODERATE Flask-CORS improper regex path matching vulnerability 4.0.0 6.0.0
flask-cors CVE-2024-6866 MODERATE - 4.0.0 -
idna GHSA-jjg7-2v4v-x38h MODERATE Internationalized Domain Names in Applications (IDNA) vulnerable to denial of service from specially crafted inputs to idna.encode 3.4 3.7
jinja2 CVE-2024-56326 MODERATE Jinja has a sandbox breakout through indirect reference to format method 3.1.2 -
jinja2 GHSA-h5c8-rqwp-cp95 MODERATE Jinja vulnerable to HTML attribute injection when passing user input as keys to xmlattr filter 3.1.2 3.1.3
jinja2 CVE-2024-56201 MODERATE Jinja has a sandbox breakout through malicious filenames 3.1.2 -
jinja2 GHSA-gmj6-6f8f-6699 MODERATE Jinja has a sandbox breakout through malicious filenames 3.1.2 3.1.5
jinja2 GHSA-q2x7-8rv6-6q7h MODERATE Jinja has a sandbox breakout through indirect reference to format method 3.1.2 3.1.5
jinja2 CVE-2024-34064 MODERATE Jinja vulnerable to HTML attribute injection when passing user input as keys to xmlattr filter 3.1.2 -
jinja2 GHSA-h75v-3vvj-5mfj MODERATE Jinja vulnerable to HTML attribute injection when passing user input as keys to xmlattr filter 3.1.2 3.1.4
jinja2 CVE-2025-27516 MODERATE Jinja sandbox breakout through attr filter selecting format method 3.1.2 -
jinja2 GHSA-cpwx-vrp4-4pq7 MODERATE Jinja2 vulnerable to sandbox breakout through attr filter selecting format method 3.1.2 3.1.6
jinja2 CVE-2024-22195 MODERATE Jinja vulnerable to Cross-Site Scripting (XSS) 3.1.2 -
requests GHSA-gc5v-m9x4-r6x2 MODERATE Requests has Insecure Temp File Reuse in its extract_zipped_paths() utility function 2.31.0 2.33.0
requests CVE-2024-47081 MODERATE Requests vulnerable to .netrc credentials leak via malicious URLs 2.31.0 -
requests GHSA-9wx4-h78v-vm56 MODERATE Requests Session object does not verify requests after making first request with verify=False 2.31.0 2.32.0
requests CVE-2026-25645 MODERATE Requests has Insecure Temp File Reuse in its extract_zipped_paths() utility function 2.31.0 -
requests GHSA-9hjg-9r4m-mvj7 MODERATE Requests vulnerable to .netrc credentials leak via malicious URLs 2.31.0 2.32.4
requests CVE-2024-35195 MODERATE Requests Session object does not verify requests after making first request with verify=False 2.31.0 -
urllib3 GHSA-pq67-6m6q-mj2v MODERATE urllib3 redirects are not disabled when retries are disabled on PoolManager instantiation 2.0.7 2.5.0
urllib3 CVE-2025-50181 MODERATE urllib3 redirects are not disabled when retries are disabled on PoolManager instantiation 2.0.7 -
urllib3 GHSA-34jh-p97f-mpxf MODERATE urllib3's Proxy-Authorization request header isn't stripped during cross-origin redirects 2.0.7 1.26.19
urllib3 CVE-2024-37891 MODERATE Proxy-Authorization request header isn't stripped during cross-origin redirects in urllib3 2.0.7 -
werkzeug CVE-2026-21860 MODERATE Werkzeug safe_join() allows Windows special device names with compound extensions 3.0.1 -
werkzeug GHSA-87hc-h4r5-73f7 MODERATE Werkzeug safe_join() allows Windows special device names with compound extensions 3.0.1 3.1.5
werkzeug GHSA-29vq-49wr-vm6x MODERATE Werkzeug safe_join() allows Windows special device names 3.0.1 3.1.6
werkzeug CVE-2026-27199 MODERATE Werkzeug safe_join() allows Windows special device names 3.0.1 -
werkzeug GHSA-q34m-jh98-gwm2 MODERATE Werkzeug possible resource exhaustion when parsing file data in forms 3.0.1 3.0.6
werkzeug CVE-2024-49767 MODERATE Werkzeug possible resource exhaustion when parsing file data in forms 3.0.1 -
werkzeug GHSA-f9vj-2wh5-fj8j MODERATE Werkzeug safe_join not safe on Windows 3.0.1 3.0.6
werkzeug CVE-2024-49766 MODERATE Werkzeug safe_join not safe on Windows 3.0.1 -
werkzeug GHSA-hgf8-39gv-g3f2 MODERATE Werkzeug safe_join() allows Windows special device names 3.0.1 3.1.4
werkzeug CVE-2025-66221 MODERATE Werkzeug safe_join() allows Windows special device names 3.0.1 -
flask GHSA-68rp-wp8r-4726 LOW Flask session does not add Vary: Cookie header when accessed in some ways 3.0.0 3.1.3
flask CVE-2026-27205 LOW Flask session does not add Vary: Cookie header when accessed in some ways 3.0.0 -
⚠️ Dependencies that have Reached EOL (7)
Dependency Unsafe Version EOL Date New Version Path
click 8.1.7 - 8.1.8 src/loadgenerator/requirements.txt
configargparse 1.7 - 1.7.5 src/loadgenerator/requirements.txt
googleapis-common-protos 1.61.0 - 1.74.0 src/loadgenerator/requirements.txt
idna 3.4 - 3.11 src/loadgenerator/requirements.txt
markupsafe 2.1.3 - 2.1.5 src/loadgenerator/requirements.txt
requests 2.31.0 - 2.33.1 src/loadgenerator/requirements.txt
typing-extensions 4.8.0 - 4.15.0 src/loadgenerator/requirements.txt
📅 Dependencies Nearing EOL (1)
Dependency Unsafe Version EOL Date New Version Path
six 1.16.0 May 5, 2026 1.17.0 src/loadgenerator/requirements.txt

Review Checklist

Standard review:

  • Review changes for compatibility with your code
  • Check for breaking changes in release notes
  • Run tests locally or wait for CI
  • Approve and merge this PR

Update Mode: Vulnerability Remediation (High)

🤖 Generated by DataDog Automated Dependency Management System

@campaigner-prod
Copy link
Copy Markdown

Release Notes

urllib3 (2.0.7 → 2.6.3) — GitHub Release

2.6.3

🚀 urllib3 is fundraising for HTTP/2 support

urllib3 is raising ~$40,000 USD to release HTTP/2 support and ensure long-term sustainable maintenance of the project after a sharp decline in financial support. If your company or organization uses Python and would benefit from HTTP/2 support in Requests, pip, cloud SDKs, and thousands of other projects please consider contributing financially to ensure HTTP/2 support is developed sustainably and maintained for the long-haul.

Thank you for your support.

Changes

2.6.2

🚀 urllib3 is fundraising for HTTP/2 support

urllib3 is raising ~$40,000 USD to release HTTP/2 support and ensure long-term sustainable maintenance of the project after a sharp decline in financial support. If your company or organization uses Python and would benefit from HTTP/2 support in Requests, pip, cloud SDKs, and thousands of other projects please consider contributing financially to ensure HTTP/2 support is developed sustainably and maintained for the long-haul.

Thank you for your support.

Changes

2.6.1

🚀 urllib3 is fundraising for HTTP/2 support

urllib3 is raising ~$40,000 USD to release HTTP/2 support and ensure long-term sustainable maintenance of the project after a sharp decline in financial support. If your company or organization uses Python and would benefit from HTTP/2 support in Requests, pip, cloud SDKs, and thousands of other projects please consider contributing financially to ensure HTTP/2 support is developed sustainably and maintained for the long-haul.

Thank you for your support.

Changes

2.6.0

🚀 urllib3 is fundraising for HTTP/2 support

urllib3 is raising ~$40,000 USD to release HTTP/2 support and ensure long-term sustainable maintenance of the project after a sharp decline in financial support. If your company or organization uses Python and would benefit from HTTP/2 support in Requests, pip, cloud SDKs, and thousands of other projects please consider contributing financially to ensure HTTP/2 support is developed sustainably and maintained for the long-haul.

Thank you for your support.

Security

  • Fixed a security issue where streaming API could improperly handle highly compressed HTTP content ("decompression bombs") leading to excessive resource consumption even when a small amount of data was requested. Reading small chunks of compressed data is safer and much more efficient now. (CVE-2025-66471 reported by @Cycloctane, 8.9 High, GHSA-2xpw-w6gg-jr37)

(truncated — see source for full notes)

flask-cors (4.0.0 → 4.0.2) — GitHub Release

4.0.2

What's Changed

New Contributors

Full Changelog: corydolphin/flask-cors@4.0.1...4.0.2

4.0.1

What's Changed

New Contributors

Full Changelog: corydolphin/flask-cors@4.0.0...4.0.1

werkzeug (3.0.1 → 3.0.6) — GitHub Release

3.0.6

This is the Werkzeug 3.0.6 security fix release, which fixes security issues but does not otherwise change behavior and should not result in breaking changes.

PyPI: https://pypi.org/project/Werkzeug/3.0.6/
Changes: https://werkzeug.palletsprojects.com/en/stable/changes/#version-3-0-6

  • Fix how max_form_memory_size is applied when parsing large non-file fields. GHSA-q34m-jh98-gwm2
  • safe_join catches certain paths on Windows that were not caught by ntpath.isabs on Python < 3.11. GHSA-f9vj-2wh5-fj8j

3.0.5

This is the Werkzeug 3.0.5 fix release, which fixes bugs but does not otherwise change behavior and should not result in breaking changes.

PyPI: https://pypi.org/project/Werkzeug/3.0.5/
Changes: https://werkzeug.palletsprojects.com/en/stable/changes/#version-3-0-5
Milestone: https://github.com/pallets/werkzeug/milestone/37?closed=1

3.0.4

This is the Werkzeug 3.0.4 fix release, which fixes bugs but does not otherwise change behavior and should not result in breaking changes.

PyPI: https://pypi.org/project/Werkzeug/3.0.4/
Changes: https://werkzeug.palletsprojects.com/en/3.0.x/changes/#version-3-0-4
Milestone: https://github.com/pallets/werkzeug/milestone/36?closed=1

3.0.3

This is the Werkzeug 3.0.3 security release, which fixes security issues and bugs but does not otherwise change behavior and should not result in breaking changes.

PyPI: https://pypi.org/project/Werkzeug/3.0.3/
Changes: https://werkzeug.palletsprojects.com/en/3.0.x/changes/#version-3-0-3
Milestone: https://github.com/pallets/werkzeug/milestone/35?closed=1

3.0.2

(truncated — see source for full notes)

idna (3.4 → 3.11) — GitHub Release

v3.8

What's Changed

  • Fix regression where IDNAError exception was not being produced for certain inputs.
  • Add support for Python 3.13, drop support for Python 3.5 as it is no longer testable.
  • Documentation improvements
  • Updates to package testing using Github actions

Thanks to Hugo van Kemenade for contributions to this release.

Full Changelog: kjd/idna@v3.7...v3.8

v3.7

What's Changed

  • Fix issue where specially crafted inputs to encode() could take exceptionally long amount of time to process. [CVE-2024-3651]

Thanks to Guido Vranken for reporting the issue.

Full Changelog: kjd/idna@v3.6...v3.7

(and 3 more releases — view all)

brotli (1.1.0 → 1.2.0) — GitHub Release

v1.2.0

SECURITY

  • python: added Decompressor::can_accept_more_data method and optional
    output_buffer_limit argument Decompressor::process;
    that allows mitigation of unexpectedly large output;
    reported by Charles Chan (https://github.com/charleswhchan)

Added

  • decoder / encoder: added static initialization to reduce binary size
  • python: allow limiting decoder output (see SECURITY section)
  • CLI: brcat alias; allow decoding concatenated brotli streams
  • kt: pure Kotlin decoder
  • cgo: support "raw" dictionaries
  • build: Bazel modules

Removed

  • java: dropped finalize() for native entities

Fixed

  • java: in compress pass correct length to native encoder

Improved

  • build: install man pages
  • build: updated / fixed / refined Bazel buildfiles
  • encoder: faster encoding
  • cgo: link via pkg-config
  • python: modernize extension / allow multi-phase module initialization

Changed

  • decoder / encoder: static tables use "small" model (allows 2GiB+ binaries)
jinja2 (3.1.2 → 3.1.6) — GitHub Release

3.1.6

This is the Jinja 3.1.6 security release, which fixes security issues but does not otherwise change behavior and should not result in breaking changes compared to the latest feature release.

PyPI: https://pypi.org/project/Jinja2/3.1.6/
Changes: https://jinja.palletsprojects.com/en/stable/changes/#version-3-1-6

  • The |attr filter does not bypass the environment's attribute lookup, allowing the sandbox to apply its checks. GHSA-cpwx-vrp4-4pq7

3.1.5

This is the Jinja 3.1.5 security fix release, which fixes security issues and bugs but does not otherwise change behavior and should not result in breaking changes compared to the latest feature release.

PyPI: https://pypi.org/project/Jinja2/3.1.5/
Changes: https://jinja.palletsprojects.com/changes/#version-3-1-5
Milestone: https://github.com/pallets/jinja/milestone/16?closed=1

(truncated)

3.1.4

This is the Jinja 3.1.4 security release, which fixes security issues and bugs but does not otherwise change behavior and should not result in breaking changes.

PyPI: https://pypi.org/project/Jinja2/3.1.4/
Changes: https://jinja.palletsprojects.com/en/3.1.x/changes/#version-3-1-4

  • The xmlattr filter does not allow keys with / solidus, > greater-than sign, or = equals sign, in addition to disallowing spaces. Regardless of any validation done by Jinja, user input should never be used as keys to this filter, or must be separately validated first. GHSA-h75v-3vvj-5mfj

3.1.3

This is a fix release for the 3.1.x feature branch.

  • Fix for GHSA-h5c8-rqwp-cp95. You are affected if you are using xmlattr and passing user input as attribute keys.

(truncated — see source for full notes)

requests (2.31.0 → 2.33.1) — GitHub Release

v2.33.1

2.33.1 (2026-03-30)

Bugfixes

New Contributors

Full Changelog: https://github.com/psf/requests/blob/main/HISTORY.md#2331-2026-03-30

v2.33.0

2.33.0 (2026-03-25)

Announcements

Security

  • CVE-2026-25645 requests.utils.extract_zipped_paths now extracts contents to a non-deterministic location to prevent malicious file replacement. This does not affect default usage of Requests, only applications calling the utility function directly.

Improvements

Bugfixes

Deprecations

Documentation

  • Various typo fixes and doc improvements.

New Contributors

Full Changelog: https://github.com/psf/requests/blob/main/HISTORY.md#2330-2026-03-25

v2.32.5

2.32.5 (2025-08-18)

Bugfixes

  • The SSLContext caching feature originally introduced in 2.32.0 has created
    a new class of issues in Requests that have had negative impact across a number
    of use cases. The Requests team has decided to revert this feature as long term
    maintenance of it is proving to be unsustainable in its current iteration.

Deprecations

  • Added support for Python 3.14.
  • Dropped support for Python 3.8 following its end of support.

v2.32.4

2.32.4 (2025-06-10)

Security

Improvements

  • Numerous documentation improvements

Deprecations

v2.32.3

2.32.3 (2024-05-29)

Bugfixes

v2.32.2

2.32.2 (2024-05-21)

Deprecations

  • To provide a more stable migration for custom HTTPAdapters impacted

(truncated — see source for full notes)

googleapis-common-protos (1.61.0 → 1.74.0) — Changelog

https://github.com/googleapis/google-cloud-python/blob/main/CHANGELOG.md

six (1.16.0 → 1.17.0) — Commit comparison

... and 1 more commits

typing-extensions (4.8.0 → 4.15.0) — GitHub Release

4.15.0

No user-facing changes since 4.15.0rc1.

New features since 4.14.1:

4.14.1

Release 4.14.1 (July 4, 2025)

  • Fix usage of typing_extensions.TypedDict nested inside other types
    (e.g., typing.Type[typing_extensions.TypedDict]). This is not allowed by the
    type system but worked on older versions, so we maintain support.

4.14.0

This release adds several new features, including experimental support for inline typed dictionaries (PEP 764) and sentinels (PEP 661), and support for changes in Python 3.14. In addition, Python 3.8 is no longer supported.

Changes since 4.14.0rc1:

  • Remove __or__ and __ror__ methods from typing_extensions.Sentinel
    on Python versions <3.10. PEP 604 was introduced in Python 3.10, and
    typing_extensions does not generally attempt to backport PEP-604 methods
    to prior versions.
  • Further update typing_extensions.evaluate_forward_ref with changes in Python 3.14.

Changes included in 4.14.0rc1:

  • Drop support for Python 3.8 (including PyPy-3.8). Patch by Victorien Plot.
  • Do not attempt to re-export names that have been removed from typing,
    anticipating the removal of typing.no_type_check_decorator in Python 3.15.
    Patch by Jelle Zijlstra.
  • Update typing_extensions.Format, typing_extensions.evaluate_forward_ref, and
    typing_extensions.TypedDict to align
    with changes in Python 3.14. Patches by Jelle Zijlstra.
  • Fix tests for Python 3.14 and 3.15. Patches by Jelle Zijlstra.

New features:

  • Add support for inline typed dictionaries (PEP 764).
    Patch by Victorien Plot.
  • Add typing_extensions.Reader and typing_extensions.Writer. Patch by
    Sebastian Rittau.
  • Add support for sentinels (PEP 661). Patch by
    Victorien Plot.

4.13.2

4.13.1

This is a bugfix release fixing two edge cases that appear on old bugfix releases of CPython.

Bugfixes:

  • Fix regression in 4.13.0 on Python 3.10.2 causing a TypeError when using Concatenate.
    Patch by Daraan.
  • Fix TypeError when using evaluate_forward_ref on Python 3.10.1-2 and 3.9.8-10.
    Patch by Daraan.

4.13.0

New features:

  • Add typing_extensions.TypeForm from PEP 747. Patch by
    Jelle Zijlstra.
  • Add typing_extensions.get_annotations, a backport of
    inspect.get_annotations that adds features specified
    by PEP 649. Patches by Jelle Zijlstra and Alex Waygood.
  • Backport evaluate_forward_ref from CPython PR

(truncated — see source for full notes)

click (8.1.7 → 8.1.8) — GitHub Release

This is the Click 8.1.8 fix release, which fixes bugs but does not otherwise change behavior and should not result in breaking changes compared to the latest feature release.

PyPI: https://pypi.org/project/click/8.1.8/
Changes: https://click.palletsprojects.com/en/stable/changes/#version-8-1-8
Milestone https://github.com/pallets/click/milestones/23?closed=1

configargparse (1.7 → 1.7.5) — GitHub Release

Slightly simplified PyPI deployment workflow via setuptools-scm

deprecated (1.2.14 → 1.2.18) — GitHub Release

v1.2.18

What's Changed

Full Changelog: laurent-laporte-pro/deprecated@v1.2.17...v1.2.18

v1.2.17

What's Changed

Full Changelog: laurent-laporte-pro/deprecated@v1.2.16...v1.2.17

v1.2.16

What's Changed

New Contributors

Full Changelog: laurent-laporte-pro/deprecated@v1.2.15...v1.2.16

v1.2.15

What's Changed

New Contributors

Full Changelog: laurent-laporte-pro/deprecated@v1.2.14...v1.2.15

flask (3.0.0 → 3.0.3) — GitHub Release

3.0.3

This is a fix release for the 3.0.x feature branch.

PyPI: https://pypi.org/project/Flask/3.0.3/
Changes: https://flask.palletsprojects.com/en/3.0.x/changes/#version-3-0-3
Milestone: https://github.com/pallets/flask/milestone/35?closed=1

3.0.2

This is a fix release for the 3.0.x feature release branch. It fixes bugs but does not otherwise change behavior and should not result in breaking changes.

3.0.1

This is a fix release for the 3.0.x feature release branch.

Fixes an issue where using other JSON providers, such as flask-orjson, previously caused loaded session data to have an incorrect format in some cases.

markupsafe (2.1.3 → 2.1.5) — GitHub Release

2.1.5

This is a fix release for the 2.1.x feature release branch. It fixes bugs but does not otherwise change behavior and should not result in breaking changes.

Fixes a regression in striptags behavior from 2.14. Spaces are now collapsed correctly.

2.1.4

This is a fix release for the 2.1.x feature release branch. It fixes bugs but does not otherwise change behavior and should not result in breaking changes.


Generated by ADMS Sources: 13 GitHub Releases, 1 Changelog, 1 Commit comparison.

@hugovk
Copy link
Copy Markdown

hugovk commented Apr 23, 2026

Please could you fix your bot not to mention me in your automated updates? Thank you!

@moezein0
Copy link
Copy Markdown

@hugovk Changelogs feature is tagging people which is not expected. The feature flag is off now should not be the case anymore

@seberm-6
Copy link
Copy Markdown

Hey, sorry for the noise. This was caused by a bug in our automated dependency update system that incorrectly included upstream changelog content in PR comments, triggering notifications to external contributors. The feature flag has been turned off and we're working on a fix. Sorry about that again.

@seberm-6 seberm-6 closed this Apr 23, 2026
@hugovk
Copy link
Copy Markdown

hugovk commented Apr 23, 2026

Thanks, appreciated :)

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants