Skip to content

HTTPS clone URL

Subversion checkout URL

You can clone with HTTPS or Subversion.

Download ZIP

v3.0.9.rc5

Preparing for 3.0.9.rc5 release

v3.0.9.rc3

bumping to rc3 since syck is not playing nicely

v3.0.4

3.0.4 fixes:
* CVE-2011-0446
* CVE-2011-0447
* CVE-2011-0449
* CVE-2011-0448

v2.3.11

2.3.11 release, fixes CVE-2011-0446 and CVE-2011-0447

v3.0.4.rc1

RC release for 3.0.4 to allow for testing before cutting the final re…
…lease

v3.0.1

3.0.1 Release
Security Release on top of 3.0.0 to address CVE-2010-3993

v2.3.10

2.3.10 Release
Contains bugfixes and a security fix for CVE-2010-3993

v2.3.9.pre

Prepare for Rails 2.3.9. Release 2.3.9.pre gems.

v3.0.0

Add .yardopts so YARD can document Rails

v3.0.0_RC2

mysql db defaults to mysql2 gem

v3.0.0_RC

fix bad logic in determining if in rails app subdir
Signed-off-by: David Heinemeier Hansson <david@loudthinking.com>

v3.0.0.beta4

Merge branch 'master' of github.com:rails/rails

v2.3.8

SQLite: forward compatibility with future driver releases
[#4633]

Signed-off-by: Jeremy Kemper <jeremy@bitsweat.net>

v2.3.7

2.3.7 release: fix rails_xss compatibility

v3.0.0.beta.3

Merge branch 'master' of github.com:rails/rails

v3.0.0.beta3

Merge branch 'master' of github.com:rails/rails

v3.0.0.beta1

Bump git versions to 3.0.0.beta1 since we've released

v2.3.5

Ruby on Rails 2.3.5
* Improved Ruby 1.9 Support
* Compatible with the rails_xss plugin
* Fixes a bug with filtered parameter logs
* Numerous fixes to Active Record's nested attributes functionality
* Fixes to ActiveResource to be slightly more flexible when handling response content types.
* Fixes for the Nokogiri backend for XmlMini

v2.2.3

Rails version 2.2.3
Addresses CVE-2009-3009, a timing weakness in the cookie store and multiple bug fixes

v2.3.4

Includes fixes for CVE2009-3009 and the timing weakness in ActiveSupp…
…ort::MessageVerifier

v2.3.3.1

Forgot to bump the railties versions

v2.3.3

Release version 2.3.3
Bug Fixes and minor feature additions.
Something went wrong with that request. Please try again.