Name: | nginx |
---|---|
Epoch: | 2 |
Version: | 1.20.1 |
Release: | 22.0.1.el9_6.2 |
Architecture: | aarch64 |
Group: | Unspecified |
Size: | 151933 |
License: | BSD |
RPM: | nginx-1.20.1-22.0.1.el9_6.2.aarch64.rpm |
Source RPM: | nginx-1.20.1-22.0.1.el9_6.2.src.rpm |
Build Date: | Tue May 20 2025 |
Build Host: | build-ol9-aarch64.oracle.com |
Vendor: | Oracle America |
URL: | https://nginx.org |
Summary: | A high performance web server and reverse proxy server |
Description: | Nginx is a web server and a reverse proxy server for HTTP, SMTP, POP3 and IMAP protocols, with a strong focus on high concurrency, performance and low memory usage. |
- Reference oracle-indexhtml within Requires [Orabug: 33802044] - Remove Red Hat references [Orabug: 29498217] - Update upstream references [Orabug: 36579090]
- Resolves: RHEL-85556 - nginx: Memory disclosure in the ngx_http_mp4_module (CVE-2022-41742) - Resolves: RHEL-91446 - nginx: Memory corruption in the ngx_http_mp4_module (CVE-2022-41741)
- Resolves: RHEL-84477 - nginx: specially crafted MP4 file may cause denial of service (CVE-2024-7347)
- Resolves: RHEL-78236 - nginx: TLS Session Resumption Vulnerability (CVE-2025-23419)
- Resolves: RHEL-77486 - [RFE] nginx use systemd-sysusers
- Resolves: RHEL-40075 - nginx worker processes memory leak
- Resolves: RHEL-40371- openssl 3.2 ENGINE regression
- bump package epoch to resolve RHEL-33939 - Resolves: RHEL-33939 - Update path for nginx broken for existing CS installations
- Resolves: RHEL-12518 - nginx: HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack) (CVE-2023-44487)