-
Mon Oct 16 2023 Alan Steinberg <alan.steinberg@oracle.com> - 1:1.20.1-1.1
- Resolves: RHEL-12518 - nginx: HTTP/2: Multiple HTTP/2 enabled web servers are
vulnerable to a DDoS attack (Rapid Reset Attack) (CVE-2023-44487)
-
Wed Jul 14 2021 Luboš Uhliarik <luhliari@redhat.com> - 1:1.20.1-1
- new version 1.20.1
-
Tue May 25 2021 Luboš Uhliarik <luhliari@redhat.com> - 1:1.18.0-3
- Resolves: #1963183 - CVE-2021-23017 rh-nginx118-nginx: nginx: Off-by-one
in ngx_resolver_copy() when labels are followed by a pointer to a root
domain name
-
Wed Sep 16 2020 Lubos Uhliarik <luhliari@redhat.com> - 1:1.18.0-2
- switch rh-nginx118 to rh-perl530
-
Tue Jul 21 2020 Lubos Uhliarik <luhliari@redhat.com> - 1:1.18.0-1
- Resolves: #1853206 - RFE: add collection for NGINX 1.18
- Increased types_hash_max_size to 4096 in default config
- Drop location / from default config (rhbz#1564768)
- Drop default_sever from default config (rhbz#1373822)
-
Tue Jun 23 2020 Lubos Uhliarik <luhliari@redhat.com> - 1:1.16.1-5
- Resolves: #1798233 - CVE-2019-20372 rh-nginx116-nginx: nginx: HTTP request
smuggling via error pages in http/ngx_http_special_response.c
-
Mon Oct 07 2019 Lubos Uhliarik <luhliari@redhat.com> - 1:1.16.1-4
- Resolves: #1758809 - Nginx service does not start (wrong version used in the
systemd unit file)
-
Thu Aug 29 2019 Lubos Uhliarik <luhliari@redhat.com> - 1:1.16.1-3
- Resolves: #1745696 - CVE-2019-9511 rh-nginx116-nginx: HTTP/2: large amount
of data request leads to denial of service
- Resolves: #1745689 - CVE-2019-9513 rh-nginx116-nginx: HTTP/2: flood using
PRIORITY frames resulting in excessive resource consumption
- Resolves: #1745668 - CVE-2019-9516 rh-nginx116-nginx: HTTP/2: 0-length
headers leads to denial of service
-
Tue Aug 06 2019 Luboš Uhliarik <luhliari@redhat.com> - 1:1.16.0-1
- Resolves: #1721187 - RFE: add collection for nginx 1.16
- enable ngx_stream_ssl_preread module
-
Wed Aug 08 2018 Luboš Uhliarik <luhliari@redhat.com> - 1:1.14.0-3
- fixed service file and error documents