-------------------------------------------------------------------------------- Fedora Update Notification FEDORA-2020-19e6451efc 2020-05-08 02:43:36.320483 --------------------------------------------------------------------------------
Name : rubygem-rack-protection Product : Fedora 32 Version : 2.0.8.1 Release : 1.fc32 URL : http://sinatrarb.com/protection/ Summary : Ruby gem that protects against typical web attacks Description : Protect against typical web attacks, works with all Rack apps, including Rails.
-------------------------------------------------------------------------------- Update Information:
* Update to rack-protection 2.0.8.1. * Update to Sinatra 2.0.8.1. -------------------------------------------------------------------------------- ChangeLog:
* Tue Apr 28 2020 V��t Ondruch vondruch@redhat.com - 2.0.8.1-1 - Update to rack-protection 2.0.8.1. Resolves: rhbz#1744277 Resolves: rhbz#1800024 * Thu Jan 30 2020 Fedora Release Engineering releng@fedoraproject.org - 2.0.3-5 - Rebuilt for https://fedoraproject.org/wiki/Fedora_32_Mass_Rebuild -------------------------------------------------------------------------------- References:
[ 1 ] Bug #1744277 - rubygem-rack-protection-2.0.8.1 is available https://bugzilla.redhat.com/show_bug.cgi?id=1744277 [ 2 ] Bug #1744278 - rubygem-sinatra-2.0.8.1 is available https://bugzilla.redhat.com/show_bug.cgi?id=1744278 [ 3 ] Bug #1800024 - rubygem-rack-protection: FTBFS in Fedora rawhide/f32 https://bugzilla.redhat.com/show_bug.cgi?id=1800024 --------------------------------------------------------------------------------
This update can be installed with the "dnf" update program. Use su -c 'dnf upgrade --advisory FEDORA-2020-19e6451efc' at the command line. For more information, refer to the dnf documentation available at http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label
All packages are signed with the Fedora Project GPG key. More details on the GPG keys used by the Fedora Project can be found at https://fedoraproject.org/keys --------------------------------------------------------------------------------