Sourced from pymysql's releases.
v1.1.1
[!WARNING] This release fixes a vulnerability (CVE-2024-36039). All users are recommended to update to this version.
If you can not update soon, check the input value from untrusted source has an expected type. Only dict input from untrusted source can be an attack vector.
What's Changed
- Prohibit dict parameter for
Cursor.execute()
. It didn't produce valid SQL and might cause SQL injection. (CVE-2024-36039)- Added ssl_key_password param by
@svaskov
in PyMySQL/PyMySQL#1145Merged PRs
- Add support for Python 3.12 by
@hugovk
in PyMySQL/PyMySQL#1134- chore(deps): update actions/checkout action to v4 by
@renovate
in PyMySQL/PyMySQL#1136- Update codecov/codecov-action action to v4 by
@renovate
in PyMySQL/PyMySQL#1137- ci: use codecov@v3 by
@methane
in PyMySQL/PyMySQL#1142- chore(deps): update dessant/lock-threads action to v5 by
@renovate
in PyMySQL/PyMySQL#1141- doc: use rtd theme by
@methane
in PyMySQL/PyMySQL#1143- use Ruff as formatter by
@methane
in PyMySQL/PyMySQL#1144- chore(deps): update dependency sphinx-rtd-theme to v2 by
@renovate
in PyMySQL/PyMySQL#1147- chore(deps): update actions/setup-python action to v5 by
@renovate
in PyMySQL/PyMySQL#1152- chore(deps): update github/codeql-action action to v3 by
@renovate
in PyMySQL/PyMySQL#1154- chore(deps): update codecov/codecov-action action to v4 by
@renovate
in PyMySQL/PyMySQL#1158- Support error packet without sqlstate by
@methane
in PyMySQL/PyMySQL#1160- test json - mariadb without JSON type by
@grooverdan
in PyMySQL/PyMySQL#1165New Contributors
@hugovk
made their first contribution in PyMySQL/PyMySQL#1134@svaskov
made their first contribution in PyMySQL/PyMySQL#1145Full Changelog: https://github.com/PyMySQL/PyMySQL/compare/v1.1.0...v1.1.1
Sourced from pymysql's changelog.
v1.1.1
Release date: 2024-05-21
[!WARNING] This release fixes a vulnerability (CVE-2024-36039). All users are recommended to update to this version.
If you can not update soon, check the input value from untrusted source has an expected type. Only dict input from untrusted source can be an attack vector.
- Prohibit dict parameter for
Cursor.execute()
. It didn't produce valid SQL and might cause SQL injection. (CVE-2024-36039)- Added ssl_key_password param. #1145
2cab9ec
v1.1.1521e400
forbid dict parameter7f032a6
remove coveralls from requirements69f6c74
ruff formatb4ed688
test json - mariadb without JSON type (#1165)bbd049f
Support error packet without sqlstate (#1160)9694747
pyupgrade1f0b785
chore(deps): update codecov/codecov-action action to v4 (#1158)1e28be8
chore(deps): update github/codeql-action action to v3 (#1154)f13f054
chore(deps): update actions/setup-python action to v5 (#1152)