| Index | index by Group | index by Distribution | index by Vendor | index by creation date | index by Name | Mirrors | Help | Search |
| Name: nginx-mod-stream | Distribution: CentOS |
| Version: 1.20.1 | Vendor: CentOS |
| Release: 23.el9 | Build date: Wed May 14 21:57:39 2025 |
| Group: Unspecified | Build host: ppc64le-02.stream.rdu2.redhat.com |
| Size: 281421 | Source RPM: nginx-1.20.1-23.el9.src.rpm |
| Packager: builder@centos.org | |
| Url: https://nginx.org | |
| Summary: Nginx stream modules | |
Nginx stream modules.
BSD
* Thu Apr 24 2025 Luboš Uhliarik <luhliari@redhat.com> - 2:1.20.1-23
- Resolves: RHEL-6786 - SSL-errors 0A000126 / NS_NET_ERROR_PARTIAL_TRANSFER
at nginx with reverse-proxy
* Thu Feb 13 2025 Luboš Uhliarik <luhliari@redhat.com> - 2:1.20.1-22
- Resolves: RHEL-78236 - nginx: TLS Session Resumption
Vulnerability (CVE-2025-23419)
* Wed Feb 05 2025 Luboš Uhliarik <luhliari@redhat.com> - 2:1.20.1-21
- Resolves: RHEL-77486 - [RFE] nginx use systemd-sysusers
* Mon Jul 15 2024 Luboš Uhliarik <luhliari@redhat.com> - 2:1.20.1-20
- Resolves: RHEL-40075 - nginx worker processes memory leak
* Mon Jun 10 2024 Luboš Uhliarik <luhliari@redhat.com> - 1:1.20.1-19
- Resolves: RHEL-40371- openssl 3.2 ENGINE regression
* Thu May 30 2024 Luboš Uhliarik <luhliari@redhat.com> - 2:1.20.1-17
- bump package epoch to resolve RHEL-33939
- Resolves: RHEL-33939 - Update path for nginx broken for existing CS
installations
* Mon Oct 16 2023 Luboš Uhliarik <luhliari@redhat.com> - 1:1.20.1-16
- Resolves: RHEL-12518 - nginx: HTTP/2: Multiple HTTP/2 enabled web servers are
vulnerable to a DDoS attack (Rapid Reset Attack) (CVE-2023-44487)
/usr/lib/.build-id /usr/lib/.build-id/25 /usr/lib/.build-id/25/8eab1718b8b215e2d9b2e73c43dd11860e0edd /usr/lib64/nginx/modules/ngx_stream_module.so /usr/share/nginx/modules/mod-stream.conf
Generated by rpm2html 1.8.1
Fabrice Bellet, Tue Oct 21 04:59:16 2025