- 
    Mon Oct 16 2023 David Sloboda <david.x.sloboda@oracle.com> - 1:1.20.1-1.0.1.1
    
- Resolves: RHEL-12732 - nginx:1.20/nginx: HTTP/2: Multiple HTTP/2 enabled web
  servers are vulnerable to a DDoS attack (Rapid Reset Attack) (CVE-2023-44487)
   
  
  - 
    Mon Apr 04 2022 EL Errata <el-errata_ww@oracle.com> - 1.20.1-1.0.1
    
- Remove Red Hat references [Orabug: 29498217]
   
  
  - 
    Tue Dec 21 2021 Joe Orton <jorton@redhat.com> - 1:1.20.1-1
    
- rebase to 1.20.1 (addressing CVE-2021-23017)
   
  
  - 
    Wed Dec 01 2021 Joe Orton <jorton@redhat.com> - 1:1.20.0-4
    
- add delaycompress to logrotate config (#2015243)
   
  
  - 
    Fri Sep 10 2021 Luboš Uhliarik <luhliari@redhat.com> - 1:1.20.0-3
    
- Add -mod-devel subpackage for building external nginx modules (Neal Gompa)
  Resolves: #1991787
   
  
  - 
    Fri Aug 20 2021 Luboš Uhliarik <luhliari@redhat.com> - 1:1.20.0-2
    
- Resolves: #1991796 - build nginx with --with-compat
   
  
  - 
    Wed May 05 2021 Lubos Uhliarik <luhliari@redhat.com> - 1:1.20.0-1
    
- new version 1.20.0
- Resolves: #1945671 - RFE: add nginx:1.20 module stream
   
  
  - 
    Thu Nov 12 2020 Lubos Uhliarik <luhliari@redhat.com> - 1:1.18.0-3
    
- Resolves: #1651377 - centralizing default index.html on nginx
- Resolves: #1825683 - Outdated Red Hat branding used in nginx default pages
   
  
  - 
    Wed Apr 22 2020 Lubos Uhliarik <luhliari@redhat.com> - 1:1.18.0-2
    
- new version 1.18.0
- Resolves: #1668717 - [RFE] Support loading certificates from hardware token
  (PKCS#11)
- Increased types_hash_max_size to 4096 in default config
- Drop location / from default config (rhbz#1564768)
- Drop default_sever from default config (rhbz#1373822)
   
  
  - 
    Thu Aug 29 2019 Lubos Uhliarik <luhliari@redhat.com> - 1:1.16.1-1
    
- update to 1.16.1
- Resolves: #1745697 - CVE-2019-9511 nginx:1.16/nginx: HTTP/2: large amount
  of data request leads to denial of service
- Resolves: #1745690 - CVE-2019-9513 nginx:1.16/nginx: HTTP/2: flood using
  PRIORITY frames resulting in excessive resource consumption
- Resolves: #1745645 - CVE-2019-9516 nginx:1.16/nginx: HTTP/2: 0-length
  headers leads to denial of service