| Index | index by Group | index by Distribution | index by Vendor | index by creation date | index by Name | Mirrors | Help | Search |
| Name: nginx-filesystem | Distribution: CentOS |
| Version: 1.20.1 | Vendor: CentOS |
| Release: 24.el9 | Build date: Thu Jun 19 11:38:47 2025 |
| Group: Unspecified | Build host: aarch64-01.stream.rdu2.redhat.com |
| Size: 141 | Source RPM: nginx-1.20.1-24.el9.src.rpm |
| Packager: builder@centos.org | |
| Url: https://nginx.org | |
| Summary: The basic directory layout for the Nginx server | |
The nginx-filesystem package contains the basic directory layout for the Nginx server including the correct permissions for the directories.
BSD
* Wed May 14 2025 Luboš Uhliarik <luhliari@redhat.com> - 2:1.20.1-24
- Resolves: RHEL-84477 - nginx: specially crafted MP4 file may cause
denial of service (CVE-2024-7347)
- Resolves: RHEL-85556 - nginx: Memory disclosure in the
ngx_http_mp4_module (CVE-2022-41742)
- Resolves: RHEL-91446 - nginx: Memory corruption in the
ngx_http_mp4_module (CVE-2022-41741)
* Thu Apr 24 2025 Luboš Uhliarik <luhliari@redhat.com> - 2:1.20.1-23
- Resolves: RHEL-6786 - SSL-errors 0A000126 / NS_NET_ERROR_PARTIAL_TRANSFER
at nginx with reverse-proxy
* Thu Feb 13 2025 Luboš Uhliarik <luhliari@redhat.com> - 2:1.20.1-22
- Resolves: RHEL-78236 - nginx: TLS Session Resumption
Vulnerability (CVE-2025-23419)
* Wed Feb 05 2025 Luboš Uhliarik <luhliari@redhat.com> - 2:1.20.1-21
- Resolves: RHEL-77486 - [RFE] nginx use systemd-sysusers
* Mon Jul 15 2024 Luboš Uhliarik <luhliari@redhat.com> - 2:1.20.1-20
- Resolves: RHEL-40075 - nginx worker processes memory leak
* Mon Jun 10 2024 Luboš Uhliarik <luhliari@redhat.com> - 1:1.20.1-19
- Resolves: RHEL-40371- openssl 3.2 ENGINE regression
* Thu May 30 2024 Luboš Uhliarik <luhliari@redhat.com> - 2:1.20.1-17
- bump package epoch to resolve RHEL-33939
- Resolves: RHEL-33939 - Update path for nginx broken for existing CS
installations
* Mon Oct 16 2023 Luboš Uhliarik <luhliari@redhat.com> - 1:1.20.1-16
- Resolves: RHEL-12518 - nginx: HTTP/2: Multiple HTTP/2 enabled web servers are
vulnerable to a DDoS attack (Rapid Reset Attack) (CVE-2023-44487)
/etc/nginx /etc/nginx/conf.d /etc/nginx/default.d /etc/systemd/system/nginx.service.d /usr/lib/systemd/system/nginx.service.d /usr/lib/sysusers.d/nginx.conf /usr/share/nginx /usr/share/nginx/html
Generated by rpm2html 1.8.1
Fabrice Bellet, Tue Oct 21 05:16:11 2025