|
1 | 1 | Release Notes for |
2 | 2 | P4Ruby, Perforce's script API for Ruby |
3 | 3 |
|
4 | | - Version 2020.1 |
| 4 | + Version 2020.1 Patch 1 |
5 | 5 |
|
6 | 6 | Introduction |
7 | 7 |
|
@@ -39,7 +39,7 @@ Installing P4Ruby |
39 | 39 |
|
40 | 40 | gem install p4ruby |
41 | 41 |
|
42 | | - Alternatively, you can use Bundler (http://bundler.io). In your Gemfile, |
| 42 | + Alternatively, you can use Bundler (http://bundler.io). In your Gemfile, |
43 | 43 | specify |
44 | 44 |
|
45 | 45 | gem 'p4ruby', '~> 2020.1' |
@@ -136,7 +136,7 @@ Compatibility Statements |
136 | 136 | 2.6 | 2019.1 or later |
137 | 137 | 2.7 | 2020.1 or later |
138 | 138 |
|
139 | | - Support for Ruby release 2.5 was disabled on Windows as of the |
| 139 | + Support for Ruby release 2.5 was disabled on Windows as of the |
140 | 140 | P4Ruby 2020.1 release. |
141 | 141 |
|
142 | 142 | It is recommended that you use a Ruby distribution that can deploy |
@@ -323,6 +323,16 @@ Key to symbols used in change notes below. |
323 | 323 | *** -- requires new p4d server program |
324 | 324 |
|
325 | 325 | -------------------------------------------------------------------------- |
| 326 | + |
| 327 | +New functionality in 2020.1 Patch 1 |
| 328 | + |
| 329 | + (Job #104855) * *** |
| 330 | + Windows builds have updated version of OpenSSL(1.1.1i), |
| 331 | + to address possible vulnerability: CVE-2015-0288. |
| 332 | + Linux builds are not affected. |
| 333 | + |
| 334 | +-------------------------------------------------------------------------- |
| 335 | +-------------------------------------------------------------------------- |
326 | 336 | New functionality in 2020.1 |
327 | 337 |
|
328 | 338 | #1966018 (Bug #102615) * ** |
|
0 commit comments