Index index by Group index by Distribution index by Vendor index by creation date index by Name Mirrors Help Search

mod_session-2.4.62-7.el9_7.2 RPM for x86_64

From AlmaLinux 9.7 AppStream for x86_64

Name: mod_session Distribution: AlmaLinux
Version: 2.4.62 Vendor: AlmaLinux
Release: 7.el9_7.2 Build date: Thu Dec 18 15:54:09 2025
Group: Unspecified Build host: x64-builder01.almalinux.org
Size: 135981 Source RPM: httpd-2.4.62-7.el9_7.2.src.rpm
Packager: AlmaLinux Packaging Team <packager@almalinux.org>
Url: https://httpd.apache.org/
Summary: Session interface for the Apache HTTP Server
The mod_session module and associated backends provide an abstract
interface for storing and accessing per-user session data.

Provides

Requires

License

ASL 2.0

Changelog

* Wed Nov 12 2025 Luboš Uhliarik <luhliari@redhat.com> - 2.4.62-7.2
  - Resolves: RHEL-123850 - mod_proxy_hcheck may stop healthchecks after a child
    process is reclaimed
* Tue Nov 11 2025 Luboš Uhliarik <luhliari@redhat.com> - 2.4.62-7.1
  - Resolves: RHEL-125884 - mod_ssl: allow more fine grained SSL SNI vhost check
    to avoid unnecessary 421 errors after CVE-2025-23048 fix
  - mod_ssl: add conf.d/snipolicy.conf to set 'SSLVHostSNIPolicy authonly' default
* Sat Aug 16 2025 Luboš Uhliarik <luhliari@redhat.com> - 2.4.62-7
  - Resolves: RHEL-99815 - stickysession field does not work when specifying
    it in the query parameter after upgrade to 9.5
  - Resolves: RHEL-99953 - httpd: HTTP Session Hijack via a TLS
    upgrade (CVE-2025-49812)
  - Resolves: RHEL-99968 - httpd: access control bypass by trusted
    clients is possible using TLS 1.3 session resumption (CVE-2025-23048)
  - Resolves: RHEL-99977 - httpd: insufficient escaping of user-supplied
    data in mod_ssl (CVE-2024-47252)
* Tue Jul 29 2025 Luboš Uhliarik <luhliari@redhat.com> - 2.4.62-6
  - Resolves: RHEL-94562 - httpd 2.4.62: mod_proxy_connect prematurely closes
    connections
* Fri Jun 06 2025 Joe Orton  <jorton@redhat.com> - 2.4.62-5
  - mod_dav: add dav_get_base_path() API
  - Resolves: RHEL-41069
* Wed Jan 29 2025 Luboš Uhliarik <luhliari@redhat.com> - 2.4.62-4
  - Resolves: RHEL-66488 - Apache HTTPD no longer parse PHP files with unicode
    characters in the name
* Thu Jan 09 2025 Luboš Uhliarik <luhliari@redhat.com> - 2.4.62-3
  - Resolves: RHEL-68660 - RewriteRule proxying to UDS (unix domain socket)
    configured in .htaccess doesn't work on httpd-2.4.62-1
* Thu Sep 12 2024 Joe Orton <jorton@redhat.com> - 2.4.62-2
  - mod_ssl: fix loading keys via ENGINE API
    Resolves: RHEL-36755
* Sat Aug 03 2024 Luboš Uhliarik <luhliari@redhat.com> - 2.4.62-1
  - new version 2.4.62
  - Resolves: RHEL-52724 - Regression introduced by CVE-2024-38474 fix
* Fri Jul 19 2024 Luboš Uhliarik <luhliari@redhat.com> - 2.4.59-7
  - Resolves: RHEL-49856: htcacheclean.service missing [Install] section
* Thu May 30 2024 Joe Orton <jorton@redhat.com> - 2.4.59-6
  - mod_ssl: restore SSL_OP_NO_RENEGOTIATE support
    Related: RHEL-14668
* Tue May 21 2024 Joe Orton <jorton@redhat.com> - 2.4.59-5
  - mod_ssl: defer ENGINE_finish() calls to a cleanup
    Resolves: RHEL-36755
* Mon May 20 2024 Luboš Uhliarik <luhliari@redhat.com> - 2.4.59-4
  - Resolves: RHEL-6575 - [RFE] httpd use systemd-sysusers
* Wed May 08 2024 Luboš Uhliarik <luhliari@redhat.com> - 2.4.59-3
  - Related: RHEL-14668 - RFE: httpd rebase to 2.4.59
* Wed May 08 2024 Joe Orton <jorton@redhat.com> - 2.4.59-2
  - Resolves: RHEL-35870 - httpd mod_cgi/cgid unification
* Fri May 03 2024 Luboš Uhliarik <luhliari@redhat.com> - 2.4.59-1
  - new version 2.4.59
  - Resolves: RHEL-14668 - RFE: httpd rebase to 2.4.59
  - Resolves: RHEL-31856 - httpd: HTTP response splitting
    (CVE-2023-38709)
  - Resolves: RHEL-31859 - httpd: HTTP Response Splitting in multiple
    modules (CVE-2024-24795)
* Wed Feb 07 2024 Joe Orton <jorton@redhat.com> - 2.4.57-8
  - mod_xml2enc: fix media type handling
    Resolves: RHEL-17686
  - mod_dav: add DavBasePath
    Resolves: RHEL-6600
* Mon Feb 05 2024 Luboš Uhliarik <luhliari@redhat.com> - 2.4.57-7
  - Resolves: RHEL-14447 - httpd: mod_macro: out-of-bounds read
    vulnerability (CVE-2023-31122)

Files

/etc/httpd/conf.modules.d/01-session.conf
/usr/lib/.build-id
/usr/lib/.build-id/38/d9d225111fdb696d4558c2ad63215aa143e846
/usr/lib/.build-id/4f/07537af98412420446c965e586dee0901ba500
/usr/lib/.build-id/51/664a6dbb9159c9712361be70041414596bca93
/usr/lib/.build-id/9d/ebe1c6ce7c101cc3a76c3a5500be834065da65
/usr/lib/.build-id/da/fbec469773f621715a5461f2ff242c52243f8f
/usr/lib64/httpd/modules/mod_auth_form.so
/usr/lib64/httpd/modules/mod_session.so
/usr/lib64/httpd/modules/mod_session_cookie.so
/usr/lib64/httpd/modules/mod_session_crypto.so
/usr/lib64/httpd/modules/mod_session_dbd.so


Generated by rpm2html 1.8.1

Fabrice Bellet, Wed Dec 24 08:19:35 2025