[ Все 3 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z ]
×

Пакет nginx-mod-http-perl-2:1.20.1-22.el9_6.2.inferit.aarch64 download

Имя nginx-mod-http-perl
Эпоха 2
Версия 1.20.1
Релиз 22.el9_6.2.inferit
Архитектура aarch64
Сайт https://nginx.org
Лицензия BSD
Время сборки 2025-05-15 22:10:47
Хост сборки builder-arm64-1.inferitos.ru
Краткое описание Nginx HTTP perl module
Репозитории AppStream
Полное описание Nginx HTTP perl module.
Эррата INFSA-2025:7402
Размер 31 КиБ
Исходный проект nginx-1.20.1-22.el9_6.2.inferit
Контрольная сумма SHA-256 fc3282fc8f5c306fd88f6c5aca18357f8b0fe5f1c42467895ecd6221265b58db
× Full screenshot
История изменений link
* Mon Mar 31 2025 Luboš Uhliarik <luhliari@redhat.com> - 2:1.20.1-22.2
- Resolves: RHEL-85550 - nginx: Memory disclosure in the
  ngx_http_mp4_module (CVE-2022-41742)
- Resolves: RHEL-85527 - nginx: Memory corruption in the
  ngx_http_mp4_module (CVE-2022-41741)

* Fri Mar 21 2025 Luboš Uhliarik <luhliari@redhat.com> - 2:1.20.1-22.1
- Resolves: RHEL-84339 - nginx: Nginx: Specially crafted file may cause
  Denial of Service (CVE-2024-7347)

* Thu Feb 13 2025 Luboš Uhliarik <luhliari@redhat.com> - 2:1.20.1-22
- Resolves: RHEL-78236 - nginx: TLS Session Resumption
  Vulnerability (CVE-2025-23419)

* Wed Feb 05 2025 Luboš Uhliarik <luhliari@redhat.com> - 2:1.20.1-21
- Resolves: RHEL-77486 - [RFE] nginx use systemd-sysusers

* Sun Oct 13 2024 Arkady L. Shane <tigro@msvsphere-os.ru> - 2:1.20.1-20.inferit
- Set 120 symbols in listing

* Mon Jul 15 2024 Luboš Uhliarik <luhliari@redhat.com> - 2:1.20.1-20
- Resolves: RHEL-40075 - nginx worker processes memory leak

* Mon Jun 10 2024 Luboš Uhliarik <luhliari@redhat.com> - 1:1.20.1-19
- Resolves: RHEL-40371- openssl 3.2 ENGINE regression

* Thu May 30 2024 Luboš Uhliarik <luhliari@redhat.com> - 2:1.20.1-17
- bump package epoch to resolve RHEL-33939
- Resolves: RHEL-33939 - Update path for nginx broken for existing CS
  installations

* Mon Oct 16 2023 Luboš Uhliarik <luhliari@redhat.com> - 1:1.20.1-16
- Resolves: RHEL-12518 - nginx: HTTP/2: Multiple HTTP/2 enabled web servers are
  vulnerable to a DDoS attack (Rapid Reset Attack) (CVE-2023-44487)