Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Insights
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2010:0396 - Security Advisory
Issued:
2010-05-05
Updated:
2010-05-05

RHSA-2010:0396 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Moderate: httpd and httpd22 security and enhancement update

Type/Severity

Security Advisory: Moderate

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Updated httpd and httpd22 packages that fix two security issues and add one
enhancement are now available for JBoss Enterprise Web Server 1.0.1 for Red
Hat Enterprise Linux 4 and 5.

The Red Hat Security Response Team has rated this update as having moderate
security impact. Common Vulnerability Scoring System (CVSS) base scores,
which give detailed severity ratings, are available for each vulnerability
from the CVE links in the References section.

Description

The Apache HTTP Server is a popular web server.

It was discovered that mod_proxy_ajp incorrectly returned an "Internal
Server Error" response when processing certain malformed requests, which
caused the back-end server to be marked as failed in configurations where
mod_proxy is used in load balancer mode. A remote attacker could cause
mod_proxy to not send requests to back-end AJP (Apache JServ Protocol)
servers for the retry timeout period (60 seconds by default) by sending
specially-crafted requests. (CVE-2010-0408)

A use-after-free flaw was discovered in the way the Apache HTTP Server
handled request headers in subrequests. In configurations where subrequests
are used, a multithreaded MPM (Multi-Processing Module) could possibly leak
information from other requests in request replies. (CVE-2010-0434)

This update also adds the following enhancement:

  • with the updated openssl packages from RHSA-2010:0162 or RHSA-2010:0163

installed, mod_ssl will refuse to renegotiate a TLS/SSL connection with an
unpatched client that does not support RFC 5746. This update adds the
"SSLInsecureRenegotiation" configuration directive. If this directive is
enabled, mod_ssl will renegotiate insecurely with unpatched clients.

Refer to the following Red Hat Knowledgebase article for more details about
the changed mod_ssl behavior: http://kbase.redhat.com/faq/docs/DOC-20491

All users of JBoss Enterprise Web Server 1.0.1 should upgrade to these
updated packages, which contain backported patches to correct these issues
and add this enhancement. After installing the updated packages, Red Hat
Enterprise Linux 4 users must restart the httpd22 service, and Red Hat
Enterprise Linux 5 users must restart the httpd service, for the update to
take effect.

Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259

Affected Products

  • JBoss Enterprise Web Server 1 for RHEL 5 x86_64
  • JBoss Enterprise Web Server 1 for RHEL 5 i386

Fixes

  • BZ - 569905 - CVE-2010-0408 httpd: mod_proxy_ajp remote temporary DoS
  • BZ - 570171 - CVE-2010-0434 httpd: request header information leak

CVEs

  • CVE-2010-0408
  • CVE-2010-0434

References

  • http://www.redhat.com/security/updates/classification/#moderate
  • http://kbase.redhat.com/faq/docs/DOC-20491
Note: More recent versions of these packages may be available. Click a package name for more details.

JBoss Enterprise Web Server 1 for RHEL 5

SRPM
httpd-2.2.14-1.2.6.jdk6.ep5.el5.src.rpm SHA-256: 9fdd9564f6b8023014faa58df38eaae9f4fb800f9b75e8945ad71ec2c5175628
x86_64
httpd-2.2.14-1.2.6.jdk6.ep5.el5.x86_64.rpm SHA-256: 21459f5c9819e10e951eea7e812af6cd00729d7a3cf280cf8767c6b985ea68bd
httpd-devel-2.2.14-1.2.6.jdk6.ep5.el5.x86_64.rpm SHA-256: 29136c870d3fc2126de8f678b0ce2b377d6aa29bd8d870449d45435661eadcf2
httpd-manual-2.2.14-1.2.6.jdk6.ep5.el5.x86_64.rpm SHA-256: a7d14c676cffde88dbfb281393c4001a6770c7682122c4d557b10efcdab335a7
mod_ssl-2.2.14-1.2.6.jdk6.ep5.el5.x86_64.rpm SHA-256: 5aa773b7f850a9624709fd31b57c68a961cec259ac082a4af058363384795cc7
i386
httpd-2.2.14-1.2.6.jdk6.ep5.el5.i386.rpm SHA-256: 671b27901f31af49d042d72117f33abb726595aec353882488f11127064f0325
httpd-devel-2.2.14-1.2.6.jdk6.ep5.el5.i386.rpm SHA-256: 842a5afb4a52c44b70c594c406aa26b712b5b1d3816b2dd2858d03c03b47e319
httpd-manual-2.2.14-1.2.6.jdk6.ep5.el5.i386.rpm SHA-256: 76d6703c8f445cd270a2c3e88a2ffa71b1a935c6e79ce5430b6447370702b711
mod_ssl-2.2.14-1.2.6.jdk6.ep5.el5.i386.rpm SHA-256: a7c400578ba1cdb8e80955abb75f99b3aa03a2166a1f2064aac2de557a0205a0

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility