Index index by Group index by Distribution index by Vendor index by creation date index by Name Mirrors Help Search

nginx-mod-http-perl-1.20.1-24.el9 RPM for aarch64

From CentOS Stream 9 AppStream for aarch64

Name: nginx-mod-http-perl Distribution: CentOS
Version: 1.20.1 Vendor: CentOS
Release: 24.el9 Build date: Thu Jun 19 11:38:47 2025
Group: Unspecified Build host: aarch64-01.stream.rdu2.redhat.com
Size: 141581 Source RPM: nginx-1.20.1-24.el9.src.rpm
Packager: builder@centos.org
Url: https://nginx.org
Summary: Nginx HTTP perl module
Nginx HTTP perl module.

Provides

Requires

License

BSD

Changelog

* Wed May 14 2025 Luboš Uhliarik <luhliari@redhat.com> - 2:1.20.1-24
  - Resolves: RHEL-84477 - nginx: specially crafted MP4 file may cause
    denial of service (CVE-2024-7347)
  - Resolves: RHEL-85556 - nginx: Memory disclosure in the
    ngx_http_mp4_module (CVE-2022-41742)
  - Resolves: RHEL-91446 - nginx: Memory corruption in the
    ngx_http_mp4_module (CVE-2022-41741)
* Thu Apr 24 2025 Luboš Uhliarik <luhliari@redhat.com> - 2:1.20.1-23
  - Resolves: RHEL-6786 - SSL-errors 0A000126 / NS_NET_ERROR_PARTIAL_TRANSFER
    at nginx with reverse-proxy
* Thu Feb 13 2025 Luboš Uhliarik <luhliari@redhat.com> - 2:1.20.1-22
  - Resolves: RHEL-78236 - nginx: TLS Session Resumption
    Vulnerability (CVE-2025-23419)
* Wed Feb 05 2025 Luboš Uhliarik <luhliari@redhat.com> - 2:1.20.1-21
  - Resolves: RHEL-77486 - [RFE] nginx use systemd-sysusers
* Mon Jul 15 2024 Luboš Uhliarik <luhliari@redhat.com> - 2:1.20.1-20
  - Resolves: RHEL-40075 - nginx worker processes memory leak
* Mon Jun 10 2024 Luboš Uhliarik <luhliari@redhat.com> - 1:1.20.1-19
  - Resolves: RHEL-40371- openssl 3.2 ENGINE regression
* Thu May 30 2024 Luboš Uhliarik <luhliari@redhat.com> - 2:1.20.1-17
  - bump package epoch to resolve RHEL-33939
  - Resolves: RHEL-33939 - Update path for nginx broken for existing CS
    installations
* Mon Oct 16 2023 Luboš Uhliarik <luhliari@redhat.com> - 1:1.20.1-16
  - Resolves: RHEL-12518 - nginx: HTTP/2: Multiple HTTP/2 enabled web servers are
    vulnerable to a DDoS attack (Rapid Reset Attack) (CVE-2023-44487)

Files

/usr/lib/.build-id
/usr/lib/.build-id/11
/usr/lib/.build-id/11/21ab877b5bdbe2e5ad9ef82e0a43b9172e20eb
/usr/lib/.build-id/94
/usr/lib/.build-id/94/ce3e87244a6dd789460470a97bfba6ceef4377
/usr/lib64/nginx/modules/ngx_http_perl_module.so
/usr/lib64/perl5/vendor_perl/auto/nginx
/usr/lib64/perl5/vendor_perl/auto/nginx/nginx.so
/usr/lib64/perl5/vendor_perl/nginx.pm
/usr/share/nginx/modules/mod-http-perl.conf


Generated by rpm2html 1.8.1

Fabrice Bellet, Thu Sep 4 04:44:11 2025