Sourced from pymysql's releases.
v1.1.1
[!WARNING] This release fixes a vulnerability (CVE-2024-36039). All users are recommended to update to this version.
If you can not update soon, check the input value from untrusted source has an expected type. Only dict input from untrusted source can be an attack vector.
What's Changed
- Prohibit dict parameter for
Cursor.execute(). It didn't produce valid SQL and might cause SQL injection. (CVE-2024-36039)- Added ssl_key_password param by
@svaskovin PyMySQL/PyMySQL#1145Merged PRs
- Add support for Python 3.12 by
@hugovkin PyMySQL/PyMySQL#1134- chore(deps): update actions/checkout action to v4 by
@renovatein PyMySQL/PyMySQL#1136- Update codecov/codecov-action action to v4 by
@renovatein PyMySQL/PyMySQL#1137- ci: use codecov@v3 by
@methanein PyMySQL/PyMySQL#1142- chore(deps): update dessant/lock-threads action to v5 by
@renovatein PyMySQL/PyMySQL#1141- doc: use rtd theme by
@methanein PyMySQL/PyMySQL#1143- use Ruff as formatter by
@methanein PyMySQL/PyMySQL#1144- chore(deps): update dependency sphinx-rtd-theme to v2 by
@renovatein PyMySQL/PyMySQL#1147- chore(deps): update actions/setup-python action to v5 by
@renovatein PyMySQL/PyMySQL#1152- chore(deps): update github/codeql-action action to v3 by
@renovatein PyMySQL/PyMySQL#1154- chore(deps): update codecov/codecov-action action to v4 by
@renovatein PyMySQL/PyMySQL#1158- Support error packet without sqlstate by
@methanein PyMySQL/PyMySQL#1160- test json - mariadb without JSON type by
@grooverdanin PyMySQL/PyMySQL#1165New Contributors
@hugovkmade their first contribution in PyMySQL/PyMySQL#1134@svaskovmade their first contribution in PyMySQL/PyMySQL#1145Full Changelog: https://github.com/PyMySQL/PyMySQL/compare/v1.1.0...v1.1.1
Sourced from pymysql's changelog.
v1.1.1
Release date: 2024-05-21
[!WARNING] This release fixes a vulnerability (CVE-2024-36039). All users are recommended to update to this version.
If you can not update soon, check the input value from untrusted source has an expected type. Only dict input from untrusted source can be an attack vector.
- Prohibit dict parameter for
Cursor.execute(). It didn't produce valid SQL and might cause SQL injection. (CVE-2024-36039)- Added ssl_key_password param. #1145
2cab9ec
v1.1.1521e400
forbid dict parameter7f032a6
remove coveralls from requirements69f6c74
ruff formatb4ed688
test json - mariadb without JSON type (#1165)bbd049f
Support error packet without sqlstate (#1160)9694747
pyupgrade1f0b785
chore(deps): update codecov/codecov-action action to v4 (#1158)1e28be8
chore(deps): update github/codeql-action action to v3 (#1154)f13f054
chore(deps): update actions/setup-python action to v5 (#1152)