-
Notifications
You must be signed in to change notification settings - Fork 21.7k
Permalink
Choose a base ref
{{ refName }}
default
Choose a head ref
{{ refName }}
default
Comparing changes
Choose two branches to see what’s changed or to start a new pull request.
If you need to, you can also or
learn more about diff comparisons.
Open a pull request
Create a new pull request by comparing changes across two branches. If you need to, you can also .
Learn more about diff comparisons here.
base repository: rails/rails
Failed to load repositories. Confirm that selected base ref is valid, then try again.
Loading
base: v6.1.7
Could not load branches
Nothing to show
Loading
Could not load tags
Nothing to show
{{ refName }}
default
Loading
...
head repository: rails/rails
Failed to load repositories. Confirm that selected head ref is valid, then try again.
Loading
compare: v6.1.7.3
Could not load branches
Nothing to show
Loading
Could not load tags
Nothing to show
{{ refName }}
default
Loading
- 13 commits
- 55 files changed
- 4 contributors
Commits on Jan 17, 2023
-
Added integer width check to PostgreSQL::Quoting
Given a value outside the range for a 64bit signed integer type PostgreSQL will treat the column type as numeric. Comparing integer values against numeric values can result in a slow sequential scan. This behavior is configurable via ActiveRecord::Base.raise_int_wider_than_64bit which defaults to true. [CVE-2022-44566]
Configuration menu - View commit details
-
Copy full SHA for 4f44aa9 - Browse repository at this point
Copy the full SHA 4f44aa9View commit details -
Configuration menu - View commit details
-
Copy full SHA for 90e8a90 - Browse repository at this point
Copy the full SHA 90e8a90View commit details -
Configuration menu - View commit details
-
Copy full SHA for a7cda7e - Browse repository at this point
Copy the full SHA a7cda7eView commit details -
Configuration menu - View commit details
-
Copy full SHA for 8dc4595 - Browse repository at this point
Copy the full SHA 8dc4595View commit details -
Make sanitize_as_sql_comment more strict
Though this method was likely never meant to take user input, it was attempting sanitization. That sanitization could be bypassed with carefully crafted input. This commit makes the sanitization more robust by replacing any occurrances of "/*" or "*/" with "/ *" or "* /". It also performs a first pass to remove one surrounding comment to avoid compatibility issues for users relying on the existing removal. This also clarifies in the documentation of annotate that it should not be provided user input. [CVE-2023-22794]
Configuration menu - View commit details
-
Copy full SHA for 3db858c - Browse repository at this point
Copy the full SHA 3db858cView commit details -
Configuration menu - View commit details
-
Copy full SHA for c443466 - Browse repository at this point
Copy the full SHA c443466View commit details
Commits on Jan 25, 2023
-
Merge pull request #47087 from jhawthorn/cookie_domain
Fix cookie domain for `domain: all` on two letter single level TLD
Configuration menu - View commit details
-
Copy full SHA for 1e5011d - Browse repository at this point
Copy the full SHA 1e5011dView commit details -
Configuration menu - View commit details
-
Copy full SHA for 3e0c1a5 - Browse repository at this point
Copy the full SHA 3e0c1a5View commit details -
Configuration menu - View commit details
-
Copy full SHA for f0c5e60 - Browse repository at this point
Copy the full SHA f0c5e60View commit details
Commits on Mar 13, 2023
-
Configuration menu - View commit details
-
Copy full SHA for 3cf23c3 - Browse repository at this point
Copy the full SHA 3cf23c3View commit details -
Ignore certain data-* attributes in rails-ujs when element is content…
…editable There is a potential DOM based cross-site scripting issue in rails-ujs which leverages the Clipboard API to target HTML elements that are assigned the contenteditable attribute. This has the potential to occur when pasting malicious HTML content from the clipboard that includes a data-method, data-disable-with or data-remote attribute. [CVE-2023-23913]
Configuration menu - View commit details
-
Copy full SHA for 5037a13 - Browse repository at this point
Copy the full SHA 5037a13View commit details -
Configuration menu - View commit details
-
Copy full SHA for 7167e53 - Browse repository at this point
Copy the full SHA 7167e53View commit details -
Configuration menu - View commit details
-
Copy full SHA for f09dc7c - Browse repository at this point
Copy the full SHA f09dc7cView commit details
Loading
This comparison is taking too long to generate.
Unfortunately it looks like we can’t render this comparison for you right now. It might be too big, or there might be something weird with your repository.
You can try running this command locally to see the comparison on your machine:
git diff v6.1.7...v6.1.7.3