Package nginx-core-2:1.20.1-22.el9_6.3.inferit.x86_64
Name | nginx-core |
---|---|
Epoch | 2 |
Version | 1.20.1 |
Release | 22.el9_6.3.inferit |
Architecture | x86_64 |
Website/URL | https://nginx.org |
License | BSD |
Build Time | 2025-06-26 13:13:54 |
Build Host | builder-x86-05.inferitos.ru |
Summary | nginx minimal core |
Repositories | AppStream |
Description | nginx minimal core |
Errata | — |
Size | 572 KiB |
Source Project | nginx-1.20.1-22.el9_6.3.inferit |
SHA-256 checksum | 393cfe468268778481f2dcb862cf32f4960a73a1c04238601a83e5a1dd2864e3 |
×
* Wed May 14 2025 Luboš Uhliarik <luhliari@redhat.com> - 2:1.20.1-22.3 - Resolves: RHEL-89991 - SSL-errors 0A000126 / NS_NET_ERROR_PARTIAL_TRANSFER at nginx with reverse-proxy * Mon Mar 31 2025 Luboš Uhliarik <luhliari@redhat.com> - 2:1.20.1-22.2 - Resolves: RHEL-85550 - nginx: Memory disclosure in the ngx_http_mp4_module (CVE-2022-41742) - Resolves: RHEL-85527 - nginx: Memory corruption in the ngx_http_mp4_module (CVE-2022-41741) * Fri Mar 21 2025 Luboš Uhliarik <luhliari@redhat.com> - 2:1.20.1-22.1 - Resolves: RHEL-84339 - nginx: Nginx: Specially crafted file may cause Denial of Service (CVE-2024-7347) * Thu Feb 13 2025 Luboš Uhliarik <luhliari@redhat.com> - 2:1.20.1-22 - Resolves: RHEL-78236 - nginx: TLS Session Resumption Vulnerability (CVE-2025-23419) * Wed Feb 05 2025 Luboš Uhliarik <luhliari@redhat.com> - 2:1.20.1-21 - Resolves: RHEL-77486 - [RFE] nginx use systemd-sysusers * Sun Oct 13 2024 Arkady L. Shane <tigro@msvsphere-os.ru> - 2:1.20.1-20.inferit - Set 120 symbols in listing * Mon Jul 15 2024 Luboš Uhliarik <luhliari@redhat.com> - 2:1.20.1-20 - Resolves: RHEL-40075 - nginx worker processes memory leak * Mon Jun 10 2024 Luboš Uhliarik <luhliari@redhat.com> - 1:1.20.1-19 - Resolves: RHEL-40371- openssl 3.2 ENGINE regression * Thu May 30 2024 Luboš Uhliarik <luhliari@redhat.com> - 2:1.20.1-17 - bump package epoch to resolve RHEL-33939 - Resolves: RHEL-33939 - Update path for nginx broken for existing CS installations * Mon Oct 16 2023 Luboš Uhliarik <luhliari@redhat.com> - 1:1.20.1-16 - Resolves: RHEL-12518 - nginx: HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack) (CVE-2023-44487)