Skip to content
Permalink

Comparing changes

Choose two branches to see what’s changed or to start a new pull request. If you need to, you can also or learn more about diff comparisons.

Open a pull request

Create a new pull request by comparing changes across two branches. If you need to, you can also . Learn more about diff comparisons here.
base repository: rails/rails
base: v5.0.0.beta1
Choose a base ref
...
head repository: rails/rails
compare: v5.0.0.beta1.1
Choose a head ref
  • 7 commits
  • 32 files changed
  • 2 contributors

Commits on Jan 22, 2016

  1. use secure string comparisons for basic auth username / password

    this will avoid timing attacks against applications that use basic auth.
    
    CVE-2015-7576
    tenderlove committed Jan 22, 2016
    Copy the full SHA
    17e6f15 View commit details
    Browse the repository at this point in the history
  2. stop caching mime types globally

    Unknown mime types should not be cached globally.  This global cache
    leads to a memory leak and a denial of service vulnerability.
    
    CVE-2016-0751
    tenderlove committed Jan 22, 2016
    Copy the full SHA
    51313c2 View commit details
    Browse the repository at this point in the history
  3. Don't short-circuit reject_if proc

    When updating an associated record via nested attribute hashes the
    reject_if proc could be bypassed if the _destroy flag was set in the
    attribute hash and allow_destroy was set to false.
    
    The fix is to only short-circuit if the _destroy flag is set and the
    option allow_destroy is set to true. It also fixes an issue where
    a new record wasn't created if _destroy was set and the option
    allow_destroy was set to false.
    
    CVE-2015-7577
    pixeltrix authored and tenderlove committed Jan 22, 2016
    Copy the full SHA
    0fde6f5 View commit details
    Browse the repository at this point in the history
  4. Copy the full SHA
    b7758b4 View commit details
    Browse the repository at this point in the history
  5. Eliminate instance level writers for class accessors

    Instance level writers can have an impact on how the Active Model /
    Record objects are saved.  Specifically, they can be used to bypass
    validations.  This is a problem if mass assignment protection is
    disabled and specific attributes are passed to the constructor.
    
    CVE-2016-0753
    tenderlove committed Jan 22, 2016
    Copy the full SHA
    4642d68 View commit details
    Browse the repository at this point in the history

Commits on Jan 25, 2016

  1. Copy the full SHA
    23c3672 View commit details
    Browse the repository at this point in the history
  2. bumping version

    tenderlove committed Jan 25, 2016
    Copy the full SHA
    908c011 View commit details
    Browse the repository at this point in the history