Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Sign up!
EnGarde Community
What is the most important Linux security technology?
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Latest Newsletters
Linux Advisory Watch: February 27th, 2015
Linux Security Week: February 23rd, 2015
LinuxSecurity Newsletters
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

Fedora Core 3 Update: ruby-1.8.2-1.FC3.1 Print E-mail
User Rating:      How can I rate this item?
Posted by Joseph Shakespeare   
Fedora Ruby is the interpreted scripting language for quick and easy object-oriented programming. It has many features to process text files and to do system management tasks (as in Perl). It is simple, straight-forward, and extensible.
Fedora Update Notification

Product     : Fedora Core 3
Name        : ruby
Version     : 1.8.2
Release     : 1.FC3.1
Summary     : An interpreter of object-oriented scripting language
Description :
Ruby is the interpreted scripting language for quick and easy
object-oriented programming.  It has many features to process text
files and to do system management tasks (as in Perl).  It is simple,
straight-forward, and extensible.


* Sat Jan 29 2005 Akira TAGOH  - 1.8.2-1.FC3.1

- backported the changes from devel:
  - separated out to rdoc package.
  - make the dependency of irb for rdoc. (#144708)
  - fixed the wrong generation of file manifest. (#146055)
  - spec file clean up.

This update can be downloaded from:

871bf38f9749e99bb5c25bc2da6379ff  SRPMS/ruby-1.8.2-1.FC3.1.src.rpm
c4afcb2e94f74269d4d95b4e5a420532  x86_64/rdoc-1.8.2-1.FC3.1.x86_64.rpm
2d3ac7973a1e36a1b80e8ad1294df048  x86_64/irb-1.8.2-1.FC3.1.x86_64.rpm
702bbfeb901e880c3366f1df2cb15e02  x86_64/ruby-1.8.2-1.FC3.1.x86_64.rpm
427ace7e3876a0d7484e6e7f63685ca0  x86_64/ri-1.8.2-1.FC3.1.x86_64.rpm
20bdf76cad2e4220325f084435b1d78f  x86_64/debug/ruby-debuginfo-1.8.2-1.FC3.1.x86_64.rpm
2a059cd6129e6b6edf3f20f2e8a1233f  x86_64/ruby-devel-1.8.2-1.FC3.1.x86_64.rpm
73bbb816a1539230618903cf1fb92269  x86_64/ruby-docs-1.8.2-1.FC3.1.x86_64.rpm
784ad3f0f3156d31c621d705b3cbf1f3  x86_64/ruby-libs-1.8.2-1.FC3.1.x86_64.rpm
15eae998d2d6fa804fc9c9e1e1667314  x86_64/ruby-mode-1.8.2-1.FC3.1.x86_64.rpm
0482a4226d75c15b08dafbe2f207d484  x86_64/ruby-tcltk-1.8.2-1.FC3.1.x86_64.rpm
1d21a7b9b2cbb511d198dca53732bf01  x86_64/ruby-libs-1.8.2-1.FC3.1.i386.rpm
c30c7bfbe0405f4e034754e439753f5b  i386/ruby-devel-1.8.2-1.FC3.1.i386.rpm
a55f1158ba92ad7824ebf73303e8c7bc  i386/irb-1.8.2-1.FC3.1.i386.rpm
49ae3c0990a0a0fd010da702d9cb0ba1  i386/rdoc-1.8.2-1.FC3.1.i386.rpm
16f4e9a10be4eb8ab50b05ab4f0f500f  i386/ri-1.8.2-1.FC3.1.i386.rpm
f102ecdd46329e4423adfa09a57f68d6  i386/ruby-1.8.2-1.FC3.1.i386.rpm
2bce2b13e3769dd718d0f6865ea9fbcb  i386/debug/ruby-debuginfo-1.8.2-1.FC3.1.i386.rpm
208be3e15af74b4aaae97212aff5795e  i386/ruby-docs-1.8.2-1.FC3.1.i386.rpm
1d21a7b9b2cbb511d198dca53732bf01  i386/ruby-libs-1.8.2-1.FC3.1.i386.rpm
380c44e2781f820bfc439406c084d0f0  i386/ruby-mode-1.8.2-1.FC3.1.i386.rpm
2fb359cab1bb6e4bf853523d4ecbc9e9  i386/ruby-tcltk-1.8.2-1.FC3.1.i386.rpm

This update can also be installed with the Update Agent; you can
launch the Update Agent with the 'up2date' command.

fedora-announce-list mailing list
< Prev   Next >


Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Yesterday's Edition
DDoS Exploit Targets Open Source Rejetto HFS
Gemalto Confirms It Was Hacked But Insists the NSA Didnít Get Its Crypto Keys
Hackers exploit router flaws in unusual pharming attack
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2015 Guardian Digital, Inc. All rights reserved.