| Index | index by Group | index by Distribution | index by Vendor | index by creation date | index by Name | Mirrors | Help | Search | 
| Name: nginx-mod-http-perl | Distribution: CentOS | 
| Version: 1.20.1 | Vendor: CentOS | 
| Release: 22.el9 | Build date: Thu Feb 13 13:23:09 2025 | 
| Group: Unspecified | Build host: aarch64-05.stream.rdu2.redhat.com | 
| Size: 141581 | Source RPM: nginx-1.20.1-22.el9.src.rpm | 
| Packager: builder@centos.org | |
| Url: https://nginx.org | |
| Summary: Nginx HTTP perl module | |
Nginx HTTP perl module.
BSD
* Thu Feb 13 2025 Luboš Uhliarik <luhliari@redhat.com> - 2:1.20.1-22
  - Resolves: RHEL-78236 - nginx: TLS Session Resumption
    Vulnerability (CVE-2025-23419)
* Wed Feb 05 2025 Luboš Uhliarik <luhliari@redhat.com> - 2:1.20.1-21
  - Resolves: RHEL-77486 - [RFE] nginx use systemd-sysusers
* Mon Jul 15 2024 Luboš Uhliarik <luhliari@redhat.com> - 2:1.20.1-20
  - Resolves: RHEL-40075 - nginx worker processes memory leak
* Mon Jun 10 2024 Luboš Uhliarik <luhliari@redhat.com> - 1:1.20.1-19
  - Resolves: RHEL-40371- openssl 3.2 ENGINE regression
* Thu May 30 2024 Luboš Uhliarik <luhliari@redhat.com> - 2:1.20.1-17
  - bump package epoch to resolve RHEL-33939
  - Resolves: RHEL-33939 - Update path for nginx broken for existing CS
    installations
* Mon Oct 16 2023 Luboš Uhliarik <luhliari@redhat.com> - 1:1.20.1-16
  - Resolves: RHEL-12518 - nginx: HTTP/2: Multiple HTTP/2 enabled web servers are
    vulnerable to a DDoS attack (Rapid Reset Attack) (CVE-2023-44487)
/usr/lib/.build-id /usr/lib/.build-id/7d /usr/lib/.build-id/7d/e2119f55bed78db66527950bfc8c5222099bdf /usr/lib/.build-id/86 /usr/lib/.build-id/86/61bf88ee72096a9d8119ce24048d77c251f178 /usr/lib64/nginx/modules/ngx_http_perl_module.so /usr/lib64/perl5/vendor_perl/auto/nginx /usr/lib64/perl5/vendor_perl/auto/nginx/nginx.so /usr/lib64/perl5/vendor_perl/nginx.pm /usr/share/nginx/modules/mod-http-perl.conf
Generated by rpm2html 1.8.1
Fabrice Bellet, Thu Oct 30 06:21:22 2025