Skip to content
Permalink

Comparing changes

Choose two branches to see what’s changed or to start a new pull request. If you need to, you can also or learn more about diff comparisons.

Open a pull request

Create a new pull request by comparing changes across two branches. If you need to, you can also . Learn more about diff comparisons here.
base repository: rails/rails
Failed to load repositories. Confirm that selected base ref is valid, then try again.
Loading
base: v6.1.7
Choose a base ref
...
head repository: rails/rails
Failed to load repositories. Confirm that selected head ref is valid, then try again.
Loading
compare: v6.1.7.3
Choose a head ref
  • 13 commits
  • 55 files changed
  • 4 contributors

Commits on Jan 17, 2023

  1. Added integer width check to PostgreSQL::Quoting

    Given a value outside the range for a 64bit signed integer type
    PostgreSQL will treat the column type as numeric. Comparing
    integer values against numeric values can result in a slow
    sequential scan.
    
    This behavior is configurable via
    ActiveRecord::Base.raise_int_wider_than_64bit which defaults to true.
    
    [CVE-2022-44566]
    fresh-eggs authored and jhawthorn committed Jan 17, 2023
    Configuration menu
    Copy the full SHA
    4f44aa9 View commit details
    Browse the repository at this point in the history
  2. Configuration menu
    Copy the full SHA
    90e8a90 View commit details
    Browse the repository at this point in the history
  3. Configuration menu
    Copy the full SHA
    a7cda7e View commit details
    Browse the repository at this point in the history
  4. Configuration menu
    Copy the full SHA
    8dc4595 View commit details
    Browse the repository at this point in the history
  5. Make sanitize_as_sql_comment more strict

    Though this method was likely never meant to take user input, it was
    attempting sanitization. That sanitization could be bypassed with
    carefully crafted input.
    
    This commit makes the sanitization more robust by replacing any
    occurrances of "/*" or "*/" with "/ *" or "* /". It also performs a
    first pass to remove one surrounding comment to avoid compatibility
    issues for users relying on the existing removal.
    
    This also clarifies in the documentation of annotate that it should not
    be provided user input.
    
    [CVE-2023-22794]
    jhawthorn committed Jan 17, 2023
    Configuration menu
    Copy the full SHA
    3db858c View commit details
    Browse the repository at this point in the history
  6. Version 6.1.7.1

    jhawthorn committed Jan 17, 2023
    Configuration menu
    Copy the full SHA
    c443466 View commit details
    Browse the repository at this point in the history

Commits on Jan 25, 2023

  1. Merge pull request #47087 from jhawthorn/cookie_domain

    Fix cookie domain for `domain: all` on two letter single level TLD
    jhawthorn committed Jan 25, 2023
    Configuration menu
    Copy the full SHA
    1e5011d View commit details
    Browse the repository at this point in the history
  2. Version 6.1.7.2

    jhawthorn committed Jan 25, 2023
    Configuration menu
    Copy the full SHA
    3e0c1a5 View commit details
    Browse the repository at this point in the history
  3. Configuration menu
    Copy the full SHA
    f0c5e60 View commit details
    Browse the repository at this point in the history

Commits on Mar 13, 2023

  1. Implement SafeBuffer#bytesplice

    amatsuda authored and jhawthorn committed Mar 13, 2023
    Configuration menu
    Copy the full SHA
    3cf23c3 View commit details
    Browse the repository at this point in the history
  2. Ignore certain data-* attributes in rails-ujs when element is content…

    …editable
    
    There is a potential DOM based cross-site scripting issue in rails-ujs
    which leverages the Clipboard API to target HTML elements that are
    assigned the contenteditable attribute. This has the potential to occur
    when pasting malicious HTML content from the clipboard that includes
    a data-method, data-disable-with or data-remote attribute.
    
    [CVE-2023-23913]
    fresh-eggs authored and jhawthorn committed Mar 13, 2023
    Configuration menu
    Copy the full SHA
    5037a13 View commit details
    Browse the repository at this point in the history
  3. Prepare version 6.1.7.3

    jhawthorn committed Mar 13, 2023
    Configuration menu
    Copy the full SHA
    7167e53 View commit details
    Browse the repository at this point in the history
  4. Configuration menu
    Copy the full SHA
    f09dc7c View commit details
    Browse the repository at this point in the history
Loading