Compare commits

...

67 Commits

Author SHA1 Message Date
Felix Kaechele 7e0328ccf6 backport fix for CVE-2022-41741 and CVE-2022-41742
Signed-off-by: Felix Kaechele <felix@kaechele.ca>
2022-11-10 11:50:18 -05:00
Felix Kaechele be3281ae9b Merge branch 'rawhide' into epel7 2021-10-18 19:49:53 -04:00
Felix Kaechele 0cc5fc00c4 Merge branch 'rawhide' into epel7 2021-10-18 18:59:38 -04:00
Felix Kaechele 8325e98e19 Merge branch 'main' into epel7 2021-06-01 20:16:40 -04:00
Felix Kaechele e4b9c8a028 Merge branch 'rawhide' into epel7 2021-05-25 12:31:26 -04:00
Felix Kaechele 058fcd1881 Merge branch 'rawhide' into epel7 2021-04-21 12:34:32 -04:00
Robert Scheck 956dc7e0d3 Build against OpenSSL 1.1 on RHEL/CentOS 7 (for TLSv1.3 support) 2020-10-31 03:07:39 +01:00
Felix Kaechele 0d69dc951a fix 404.html location and indenting (rhbz#1409685)
include patch for CVE-2019-20372 (rhbz#1790280)
rework patches to work with %%autosetup
2020-06-07 12:20:31 -04:00
Warren Togami bd6f020456 Merge remote-tracking branch 'origin/master' into epel7 2019-10-02 22:09:56 -07:00
Warren Togami 793b7e1d28 EPEL committee decision to maintain EPEL7 nginx with Fedora, first step is to replace with master branch files. 2019-10-02 22:04:44 -07:00
Jamie Nguyen c18be768fe Add missing directory for vim plugin 2019-05-07 06:50:29 +01:00
Tadej Janež 023a09b06a
Enable building the ngx_http_auth_request_module module (RHBZ #1471107) 2018-03-06 10:17:29 +01:00
Luboš Uhliarik 7c6355f049 update to upstream release 1.12.2
Resolves: #1468584 - (CVE-2017-7529) CVE-2017-7529 nginx: Integer
  overflow in nginx range filter module leading to memory disclosure
2017-10-18 09:41:50 +02:00
Luboš Uhliarik f959394896 Resolves: #1478662 - rebuild for ALPN support 2017-09-18 11:15:08 +02:00
Jamie Nguyen 0ad69b3018 Merge branch 'master' into epel7 2016-10-31 12:35:17 +00:00
Jamie Nguyen 1f569e93dc Merge branch 'master' into epel7 2016-07-04 14:10:49 +01:00
Jamie Nguyen 4859abf2bd Merge branch 'master' into epel7 2016-07-02 19:52:06 +01:00
Jamie Nguyen 950c07b784 Merge branch 'master' into epel7 2016-07-02 19:49:52 +01:00
Jamie Nguyen a9d27fe9fb Merge branch 'master' into epel7 2016-07-02 19:35:51 +01:00
Jamie Nguyen d8a9dd4d5a Merge branch 'master' into epel7 2016-07-02 19:31:25 +01:00
Jamie Nguyen 7be939a1eb Merge branch 'master' into epel7 2016-07-02 19:24:50 +01:00
Jamie Nguyen 02037aa84e Merge branch 'master' into epel7 2016-07-02 19:13:46 +01:00
Jamie Nguyen fc810867b3 Bump release 2016-05-31 18:55:26 +01:00
Jamie Nguyen 193efa4e1d Fix CVE-2016-4450 2016-05-31 18:40:37 +01:00
Jamie Nguyen 2f9b55b87b Fix various CVEs from 1.8.1 2016-01-26 18:12:02 +00:00
Jamie Nguyen 310718c028 Improve gitignore 2016-01-26 17:33:32 +00:00
Jamie Nguyen bfa5831962 Remove tar 2016-01-26 17:32:58 +00:00
Jamie Nguyen 6e067ad07d Bump release and changelog 2015-10-04 08:52:20 +01:00
Jamie Nguyen 89a360a565 Remove PID file before starting nginx (#1268621)
`nginx -t` creates the file /run/nginx.pid if it doesn't exist. `nginx -t` is
executed by ExecStartPre (in nginx.service) and creates /run/nginx.pid with the
correct SELinux context. However, when manually running `nginx -t` from the
cmdline, the SELinux transition for systemd services doesn't occur and
/run/nginx.pid is created with the wrong SELinux context. A workaround is to
make sure that the PID file is removed before starting nginx.
2015-10-04 08:51:42 +01:00
Jamie Nguyen b73f5f3ef9 Bump release and changelog 2015-07-03 13:40:44 +01:00
Jamie Nguyen d6fe3140ac Switch back to /bin/kill due to SELinux denials 2015-07-03 13:40:32 +01:00
Jamie Nguyen 41a69e61a1 Bump release and changelog 2015-06-16 22:27:51 +01:00
Jamie Nguyen 14760f87c2 Set KillMode=process (#1231543) 2015-06-16 22:27:02 +01:00
Jamie Nguyen 8895b33172 Bump release and changelog 2015-06-16 22:26:26 +01:00
Jamie Nguyen 2711a74d48 Optimize png images with optipng 2015-06-16 22:25:58 +01:00
Ville Skyttä b1999fb929 Use absolute paths to images in error pages 2015-06-16 22:25:52 +01:00
Jamie Nguyen 3b023b1fa5 Bump release and changelog 2015-06-14 18:14:35 +01:00
Jamie Nguyen 66c81d4eac KillMode=mixed is not supported on systemd v208 2015-06-14 18:13:05 +01:00
Jamie Nguyen 1f6028c976 Minor improvements to nginx.service and logrotate 2015-06-14 18:12:52 +01:00
Jamie Nguyen 19236f4025 Bump release and changelog 2015-05-10 10:09:33 +01:00
Jamie Nguyen fc84ebd99d Remove redundant commands from %post 2015-05-10 10:04:05 +01:00
Jamie Nguyen 8b3545a6ae Remove redundant files 2015-05-10 10:02:04 +01:00
Jamie Nguyen a05b40aebb Extend sleep times and add additional check 2015-05-10 10:00:53 +01:00
Jamie Nguyen 822ac7d7f4 Add --with-pcre-jit 2015-05-10 10:00:36 +01:00
Jamie Nguyen 8960fe5b7c Run nginx-upgrade on package update 2015-05-10 09:59:45 +01:00
Jamie Nguyen abfbfbdfeb Remove systemd conditionals 2015-05-10 09:59:31 +01:00
Jamie Nguyen fc7b5b3b29 Add TimeoutStopSec=5 and KillMode=mixed 2015-05-10 09:56:51 +01:00
Jamie Nguyen c7df15134f Improve nginx.conf 2015-05-10 09:56:23 +01:00
Jamie Nguyen 675148b262 Update to upstream release 1.6.3 2015-04-09 19:57:31 +01:00
Jamie Nguyen 56a5c49435 Merge branch 'master' into epel7 2014-10-22 20:48:10 +01:00
Jamie Nguyen bb4239efa0 Merge branch 'master' into epel7 2014-10-22 20:14:38 +01:00
Jamie Nguyen 09d71762bc Revert "Create nginx-filesystem subpackage (patch from Remi Collet)"
This reverts commit aa7abdd0d6.
2014-10-22 20:14:35 +01:00
Jamie Nguyen aa7abdd0d6 Create nginx-filesystem subpackage (patch from Remi Collet) 2014-09-22 17:58:51 +01:00
Jamie Nguyen 618531bf75 Merge branch 'master' into epel7 2014-09-17 07:38:00 +01:00
Jamie Nguyen c6a4d3a834 Merge branch 'master' into epel7 2014-08-05 16:43:47 +01:00
Jamie Nguyen ce560d3c4b Merge branch 'master' into epel7 2014-08-05 15:57:02 +01:00
Jamie Nguyen b074711b52 Revert "systemd is fedora 16+ or EL7"
This reverts commit 23f650d0c7.
2014-08-05 15:56:54 +01:00
Warren Togami e754ce11f2 Merge remote-tracking branch 'origin/f21' into epel7 2014-07-30 13:05:55 -10:00
Warren Togami 23f650d0c7 systemd is fedora 16+ or EL7 2014-07-29 17:59:01 -10:00
Jamie Nguyen 95d07b04c4 Merge branch 'master' into f19 2014-03-18 21:15:38 +00:00
Jamie Nguyen 2ef2d094a7 Merge branch 'master' into f19 2014-03-05 18:46:21 +00:00
Jamie Nguyen 5b0b18bc81 Merge branch 'master' into f19 2014-02-16 18:14:58 +00:00
Jamie Nguyen 3335a2cdf2 Merge branch 'master' into f19 2014-02-16 18:13:15 +00:00
Jamie Nguyen 1f05349f9e Merge branch 'master' into f19 2014-02-16 18:02:14 +00:00
Peter Borsa fd256c6cd1 Merge branch 'master' into f19 2013-11-20 10:53:00 +01:00
Jamie Nguyen d5faf95acf Merge branch 'master' into f19
Conflicts:
	nginx.spec
	sources
2013-11-03 09:30:36 +00:00
Jonathan Steffan e09136d836 Add conditionals to assist in backporting nginx to non-systemd distros. 2013-08-09 11:30:28 -06:00
2 changed files with 320 additions and 1 deletions

View File

@ -0,0 +1,313 @@
From c200c8e90f7ab8b7f2138830955b31a43b3bd1b6 Mon Sep 17 00:00:00 2001
From: Felix Kaechele <felix@kaechele.ca>
Date: Thu, 10 Nov 2022 11:45:38 -0500
Subject: [PATCH] backport fix CVE-2022-41741 and CVE-2022-41742
Backported to 1.20.1
Signed-off-by: Felix Kaechele <felix@kaechele.ca>
---
src/http/modules/ngx_http_mp4_module.c | 147 +++++++++++++++++++++++++
1 file changed, 147 insertions(+)
diff --git a/src/http/modules/ngx_http_mp4_module.c b/src/http/modules/ngx_http_mp4_module.c
index 0e93fbd..4f4d89d 100644
--- a/src/http/modules/ngx_http_mp4_module.c
+++ b/src/http/modules/ngx_http_mp4_module.c
@@ -1070,6 +1070,12 @@ ngx_http_mp4_read_ftyp_atom(ngx_http_mp4_file_t *mp4, uint64_t atom_data_size)
return NGX_ERROR;
}
+ if (mp4->ftyp_atom.buf) {
+ ngx_log_error(NGX_LOG_ERR, mp4->file.log, 0,
+ "duplicate mp4 ftyp atom in \"%s\"", mp4->file.name.data);
+ return NGX_ERROR;
+ }
+
atom_size = sizeof(ngx_mp4_atom_header_t) + (size_t) atom_data_size;
ftyp_atom = ngx_palloc(mp4->request->pool, atom_size);
@@ -1128,6 +1134,12 @@ ngx_http_mp4_read_moov_atom(ngx_http_mp4_file_t *mp4, uint64_t atom_data_size)
return NGX_DECLINED;
}
+ if (mp4->moov_atom.buf) {
+ ngx_log_error(NGX_LOG_ERR, mp4->file.log, 0,
+ "duplicate mp4 moov atom in \"%s\"", mp4->file.name.data);
+ return NGX_ERROR;
+ }
+
conf = ngx_http_get_module_loc_conf(mp4->request, ngx_http_mp4_module);
if (atom_data_size > mp4->buffer_size) {
@@ -1195,6 +1207,12 @@ ngx_http_mp4_read_mdat_atom(ngx_http_mp4_file_t *mp4, uint64_t atom_data_size)
ngx_log_debug0(NGX_LOG_DEBUG_HTTP, mp4->file.log, 0, "mp4 mdat atom");
+ if (mp4->mdat_atom.buf) {
+ ngx_log_error(NGX_LOG_ERR, mp4->file.log, 0,
+ "duplicate mp4 mdat atom in \"%s\"", mp4->file.name.data);
+ return NGX_ERROR;
+ }
+
data = &mp4->mdat_data_buf;
data->file = &mp4->file;
data->in_file = 1;
@@ -1321,6 +1339,12 @@ ngx_http_mp4_read_mvhd_atom(ngx_http_mp4_file_t *mp4, uint64_t atom_data_size)
ngx_log_debug0(NGX_LOG_DEBUG_HTTP, mp4->file.log, 0, "mp4 mvhd atom");
+ if (mp4->mvhd_atom.buf) {
+ ngx_log_error(NGX_LOG_ERR, mp4->file.log, 0,
+ "duplicate mp4 mvhd atom in \"%s\"", mp4->file.name.data);
+ return NGX_ERROR;
+ }
+
atom_header = ngx_mp4_atom_header(mp4);
mvhd_atom = (ngx_mp4_mvhd_atom_t *) atom_header;
mvhd64_atom = (ngx_mp4_mvhd64_atom_t *) atom_header;
@@ -1586,6 +1610,13 @@ ngx_http_mp4_read_tkhd_atom(ngx_http_mp4_file_t *mp4, uint64_t atom_data_size)
atom_size = sizeof(ngx_mp4_atom_header_t) + (size_t) atom_data_size;
trak = ngx_mp4_last_trak(mp4);
+
+ if (trak->out[NGX_HTTP_MP4_TKHD_ATOM].buf) {
+ ngx_log_error(NGX_LOG_ERR, mp4->file.log, 0,
+ "duplicate mp4 tkhd atom in \"%s\"", mp4->file.name.data);
+ return NGX_ERROR;
+ }
+
trak->tkhd_size = atom_size;
ngx_mp4_set_32value(tkhd_atom->size, atom_size);
@@ -1624,6 +1655,12 @@ ngx_http_mp4_read_mdia_atom(ngx_http_mp4_file_t *mp4, uint64_t atom_data_size)
trak = ngx_mp4_last_trak(mp4);
+ if (trak->out[NGX_HTTP_MP4_MDIA_ATOM].buf) {
+ ngx_log_error(NGX_LOG_ERR, mp4->file.log, 0,
+ "duplicate mp4 mdia atom in \"%s\"", mp4->file.name.data);
+ return NGX_ERROR;
+ }
+
atom = &trak->mdia_atom_buf;
atom->temporary = 1;
atom->pos = atom_header;
@@ -1747,6 +1784,13 @@ ngx_http_mp4_read_mdhd_atom(ngx_http_mp4_file_t *mp4, uint64_t atom_data_size)
atom_size = sizeof(ngx_mp4_atom_header_t) + (size_t) atom_data_size;
trak = ngx_mp4_last_trak(mp4);
+
+ if (trak->out[NGX_HTTP_MP4_MDHD_ATOM].buf) {
+ ngx_log_error(NGX_LOG_ERR, mp4->file.log, 0,
+ "duplicate mp4 mdhd atom in \"%s\"", mp4->file.name.data);
+ return NGX_ERROR;
+ }
+
trak->mdhd_size = atom_size;
trak->timescale = timescale;
@@ -1789,6 +1833,12 @@ ngx_http_mp4_read_hdlr_atom(ngx_http_mp4_file_t *mp4, uint64_t atom_data_size)
trak = ngx_mp4_last_trak(mp4);
+ if (trak->out[NGX_HTTP_MP4_HDLR_ATOM].buf) {
+ ngx_log_error(NGX_LOG_ERR, mp4->file.log, 0,
+ "duplicate mp4 hdlr atom in \"%s\"", mp4->file.name.data);
+ return NGX_ERROR;
+ }
+
atom = &trak->hdlr_atom_buf;
atom->temporary = 1;
atom->pos = atom_header;
@@ -1817,6 +1867,12 @@ ngx_http_mp4_read_minf_atom(ngx_http_mp4_file_t *mp4, uint64_t atom_data_size)
trak = ngx_mp4_last_trak(mp4);
+ if (trak->out[NGX_HTTP_MP4_MINF_ATOM].buf) {
+ ngx_log_error(NGX_LOG_ERR, mp4->file.log, 0,
+ "duplicate mp4 minf atom in \"%s\"", mp4->file.name.data);
+ return NGX_ERROR;
+ }
+
atom = &trak->minf_atom_buf;
atom->temporary = 1;
atom->pos = atom_header;
@@ -1860,6 +1916,15 @@ ngx_http_mp4_read_vmhd_atom(ngx_http_mp4_file_t *mp4, uint64_t atom_data_size)
trak = ngx_mp4_last_trak(mp4);
+ if (trak->out[NGX_HTTP_MP4_VMHD_ATOM].buf
+ || trak->out[NGX_HTTP_MP4_SMHD_ATOM].buf)
+ {
+ ngx_log_error(NGX_LOG_ERR, mp4->file.log, 0,
+ "duplicate mp4 vmhd/smhd atom in \"%s\"",
+ mp4->file.name.data);
+ return NGX_ERROR;
+ }
+
atom = &trak->vmhd_atom_buf;
atom->temporary = 1;
atom->pos = atom_header;
@@ -1891,6 +1956,15 @@ ngx_http_mp4_read_smhd_atom(ngx_http_mp4_file_t *mp4, uint64_t atom_data_size)
trak = ngx_mp4_last_trak(mp4);
+ if (trak->out[NGX_HTTP_MP4_VMHD_ATOM].buf
+ || trak->out[NGX_HTTP_MP4_SMHD_ATOM].buf)
+ {
+ ngx_log_error(NGX_LOG_ERR, mp4->file.log, 0,
+ "duplicate mp4 vmhd/smhd atom in \"%s\"",
+ mp4->file.name.data);
+ return NGX_ERROR;
+ }
+
atom = &trak->smhd_atom_buf;
atom->temporary = 1;
atom->pos = atom_header;
@@ -1922,6 +1996,12 @@ ngx_http_mp4_read_dinf_atom(ngx_http_mp4_file_t *mp4, uint64_t atom_data_size)
trak = ngx_mp4_last_trak(mp4);
+ if (trak->out[NGX_HTTP_MP4_DINF_ATOM].buf) {
+ ngx_log_error(NGX_LOG_ERR, mp4->file.log, 0,
+ "duplicate mp4 dinf atom in \"%s\"", mp4->file.name.data);
+ return NGX_ERROR;
+ }
+
atom = &trak->dinf_atom_buf;
atom->temporary = 1;
atom->pos = atom_header;
@@ -1950,6 +2030,12 @@ ngx_http_mp4_read_stbl_atom(ngx_http_mp4_file_t *mp4, uint64_t atom_data_size)
trak = ngx_mp4_last_trak(mp4);
+ if (trak->out[NGX_HTTP_MP4_STBL_ATOM].buf) {
+ ngx_log_error(NGX_LOG_ERR, mp4->file.log, 0,
+ "duplicate mp4 stbl atom in \"%s\"", mp4->file.name.data);
+ return NGX_ERROR;
+ }
+
atom = &trak->stbl_atom_buf;
atom->temporary = 1;
atom->pos = atom_header;
@@ -2018,6 +2104,12 @@ ngx_http_mp4_read_stsd_atom(ngx_http_mp4_file_t *mp4, uint64_t atom_data_size)
trak = ngx_mp4_last_trak(mp4);
+ if (trak->out[NGX_HTTP_MP4_STSD_ATOM].buf) {
+ ngx_log_error(NGX_LOG_ERR, mp4->file.log, 0,
+ "duplicate mp4 stsd atom in \"%s\"", mp4->file.name.data);
+ return NGX_ERROR;
+ }
+
atom = &trak->stsd_atom_buf;
atom->temporary = 1;
atom->pos = atom_header;
@@ -2086,6 +2178,13 @@ ngx_http_mp4_read_stts_atom(ngx_http_mp4_file_t *mp4, uint64_t atom_data_size)
atom_end = atom_table + entries * sizeof(ngx_mp4_stts_entry_t);
trak = ngx_mp4_last_trak(mp4);
+
+ if (trak->out[NGX_HTTP_MP4_STTS_ATOM].buf) {
+ ngx_log_error(NGX_LOG_ERR, mp4->file.log, 0,
+ "duplicate mp4 stts atom in \"%s\"", mp4->file.name.data);
+ return NGX_ERROR;
+ }
+
trak->time_to_sample_entries = entries;
atom = &trak->stts_atom_buf;
@@ -2291,6 +2390,13 @@ ngx_http_mp4_read_stss_atom(ngx_http_mp4_file_t *mp4, uint64_t atom_data_size)
"sync sample entries:%uD", entries);
trak = ngx_mp4_last_trak(mp4);
+
+ if (trak->out[NGX_HTTP_MP4_STSS_ATOM].buf) {
+ ngx_log_error(NGX_LOG_ERR, mp4->file.log, 0,
+ "duplicate mp4 stss atom in \"%s\"", mp4->file.name.data);
+ return NGX_ERROR;
+ }
+
trak->sync_samples_entries = entries;
atom_table = atom_header + sizeof(ngx_http_mp4_stss_atom_t);
@@ -2489,6 +2595,13 @@ ngx_http_mp4_read_ctts_atom(ngx_http_mp4_file_t *mp4, uint64_t atom_data_size)
"composition offset entries:%uD", entries);
trak = ngx_mp4_last_trak(mp4);
+
+ if (trak->out[NGX_HTTP_MP4_CTTS_ATOM].buf) {
+ ngx_log_error(NGX_LOG_ERR, mp4->file.log, 0,
+ "duplicate mp4 ctts atom in \"%s\"", mp4->file.name.data);
+ return NGX_ERROR;
+ }
+
trak->composition_offset_entries = entries;
atom_table = atom_header + sizeof(ngx_mp4_ctts_atom_t);
@@ -2692,6 +2805,13 @@ ngx_http_mp4_read_stsc_atom(ngx_http_mp4_file_t *mp4, uint64_t atom_data_size)
atom_end = atom_table + entries * sizeof(ngx_mp4_stsc_entry_t);
trak = ngx_mp4_last_trak(mp4);
+
+ if (trak->out[NGX_HTTP_MP4_STSC_ATOM].buf) {
+ ngx_log_error(NGX_LOG_ERR, mp4->file.log, 0,
+ "duplicate mp4 stsc atom in \"%s\"", mp4->file.name.data);
+ return NGX_ERROR;
+ }
+
trak->sample_to_chunk_entries = entries;
atom = &trak->stsc_atom_buf;
@@ -3024,6 +3144,13 @@ ngx_http_mp4_read_stsz_atom(ngx_http_mp4_file_t *mp4, uint64_t atom_data_size)
"sample uniform size:%uD, entries:%uD", size, entries);
trak = ngx_mp4_last_trak(mp4);
+
+ if (trak->out[NGX_HTTP_MP4_STSZ_ATOM].buf) {
+ ngx_log_error(NGX_LOG_ERR, mp4->file.log, 0,
+ "duplicate mp4 stsz atom in \"%s\"", mp4->file.name.data);
+ return NGX_ERROR;
+ }
+
trak->sample_sizes_entries = entries;
atom_table = atom_header + sizeof(ngx_mp4_stsz_atom_t);
@@ -3207,6 +3334,16 @@ ngx_http_mp4_read_stco_atom(ngx_http_mp4_file_t *mp4, uint64_t atom_data_size)
atom_end = atom_table + entries * sizeof(uint32_t);
trak = ngx_mp4_last_trak(mp4);
+
+ if (trak->out[NGX_HTTP_MP4_STCO_ATOM].buf
+ || trak->out[NGX_HTTP_MP4_CO64_ATOM].buf)
+ {
+ ngx_log_error(NGX_LOG_ERR, mp4->file.log, 0,
+ "duplicate mp4 stco/co64 atom in \"%s\"",
+ mp4->file.name.data);
+ return NGX_ERROR;
+ }
+
trak->chunks = entries;
atom = &trak->stco_atom_buf;
@@ -3413,6 +3550,16 @@ ngx_http_mp4_read_co64_atom(ngx_http_mp4_file_t *mp4, uint64_t atom_data_size)
atom_end = atom_table + entries * sizeof(uint64_t);
trak = ngx_mp4_last_trak(mp4);
+
+ if (trak->out[NGX_HTTP_MP4_STCO_ATOM].buf
+ || trak->out[NGX_HTTP_MP4_CO64_ATOM].buf)
+ {
+ ngx_log_error(NGX_LOG_ERR, mp4->file.log, 0,
+ "duplicate mp4 stco/co64 atom in \"%s\"",
+ mp4->file.name.data);
+ return NGX_ERROR;
+ }
+
trak->chunks = entries;
atom = &trak->co64_atom_buf;
--
2.38.1

View File

@ -41,7 +41,7 @@
Name: nginx
Epoch: 1
Version: 1.20.1
Release: 9%{?dist}
Release: 10%{?dist}
Summary: A high performance web server and reverse proxy server
# BSD License (two clause)
@ -79,6 +79,9 @@ Patch1: 0002-fix-PIDFile-handling.patch
# Fix for CVE-2021-3618: ALPACA: Application Layer Protocol Confusion - Analyzing and Mitigating Cracks in TLS Authentication
Patch2: http://hg.nginx.org/nginx/raw-rev/ec1071830799
# Fix for CVE-2022-41741 and CVE-2022-41742: Memory corruption/disclosure in the ngx_http_mp4_module
Patch3: 0001-backport-fix-CVE-2022-41741-and-CVE-2022-41742.patch
BuildRequires: make
BuildRequires: gcc
BuildRequires: gnupg2
@ -578,6 +581,9 @@ fi
%changelog
* Thu Nov 10 2022 Felix Kaechele <felix@kaechele.ca> - 1:1.20.1-10
- backport fix for CVE-2022-41741 and CVE-2022-41742
* Mon Oct 18 2021 Felix Kaechele <heffer@fedoraproject.org> - 1:1.20.1-9
- fix installation of nginxmods.attr for EPEL 7