Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
  • Products & Services

    Products

    Support

    • Production Support
    • Development Support
    • Product Life Cycles

    Services

    • Consulting
    • Technical Account Management
    • Training & Certifications

    Documentation

    • Red Hat Enterprise Linux
    • Red Hat JBoss Enterprise Application Platform
    • Red Hat OpenStack Platform
    • Red Hat OpenShift Container Platform
    All Documentation

    Ecosystem Catalog

    • Red Hat Partner Ecosystem
    • Partner Resources
  • Tools

    Tools

    • Troubleshoot a product issue
    • Packages
    • Errata

    Customer Portal Labs

    • Configuration
    • Deployment
    • Security
    • Troubleshoot
    All labs

    Red Hat Insights

    Increase visibility into IT operations to detect and resolve technical issues before they impact your business.

    Learn More
    Go to Insights
  • Security

    Red Hat Product Security Center

    Engage with our Red Hat Product Security team, access security updates, and ensure your environments are not exposed to any known security vulnerabilities.

    Product Security Center

    Security Updates

    • Security Advisories
    • Red Hat CVE Database
    • Security Labs

    Keep your systems secure with Red Hat's specialized responses to security vulnerabilities.

    View Responses

    Resources

    • Security Blog
    • Security Measurement
    • Severity Ratings
    • Backporting Policies
    • Product Signing (GPG) Keys
  • Community

    Customer Portal Community

    • Discussions
    • Private Groups
    Community Activity

    Customer Events

    • Red Hat Convergence
    • Red Hat Summit

    Stories

    • Red Hat Subscription Value
    • You Asked. We Acted.
    • Open Source Communities
Or troubleshoot an issue.

Select Your Language

  • English
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Virtualization
  • Red Hat Identity Management
  • Red Hat Directory Server
  • Red Hat Certificate System
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Update Infrastructure
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat CloudForms
  • Red Hat OpenStack Platform
  • Red Hat OpenShift Container Platform
  • Red Hat OpenShift Data Science
  • Red Hat OpenShift Online
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat Single Sign On
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Thorntail
  • Red Hat build of Eclipse Vert.x
  • Red Hat build of OpenJDK
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Integration
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
  • Red Hat JBoss Data Virtualization
  • Red Hat Process Automation
  • Red Hat Process Automation Manager
  • Red Hat Decision Manager
All Products
Red Hat Product Errata RHSA-2010:0396 - Security Advisory
Issued:
2010-05-05
Updated:
2010-05-05

RHSA-2010:0396 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Moderate: httpd and httpd22 security and enhancement update

Type/Severity

Security Advisory: Moderate

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Updated httpd and httpd22 packages that fix two security issues and add one
enhancement are now available for JBoss Enterprise Web Server 1.0.1 for Red
Hat Enterprise Linux 4 and 5.

The Red Hat Security Response Team has rated this update as having moderate
security impact. Common Vulnerability Scoring System (CVSS) base scores,
which give detailed severity ratings, are available for each vulnerability
from the CVE links in the References section.

Description

The Apache HTTP Server is a popular web server.

It was discovered that mod_proxy_ajp incorrectly returned an "Internal
Server Error" response when processing certain malformed requests, which
caused the back-end server to be marked as failed in configurations where
mod_proxy is used in load balancer mode. A remote attacker could cause
mod_proxy to not send requests to back-end AJP (Apache JServ Protocol)
servers for the retry timeout period (60 seconds by default) by sending
specially-crafted requests. (CVE-2010-0408)

A use-after-free flaw was discovered in the way the Apache HTTP Server
handled request headers in subrequests. In configurations where subrequests
are used, a multithreaded MPM (Multi-Processing Module) could possibly leak
information from other requests in request replies. (CVE-2010-0434)

This update also adds the following enhancement:

  • with the updated openssl packages from RHSA-2010:0162 or RHSA-2010:0163

installed, mod_ssl will refuse to renegotiate a TLS/SSL connection with an
unpatched client that does not support RFC 5746. This update adds the
"SSLInsecureRenegotiation" configuration directive. If this directive is
enabled, mod_ssl will renegotiate insecurely with unpatched clients.

Refer to the following Red Hat Knowledgebase article for more details about
the changed mod_ssl behavior: http://kbase.redhat.com/faq/docs/DOC-20491

All users of JBoss Enterprise Web Server 1.0.1 should upgrade to these
updated packages, which contain backported patches to correct these issues
and add this enhancement. After installing the updated packages, Red Hat
Enterprise Linux 4 users must restart the httpd22 service, and Red Hat
Enterprise Linux 5 users must restart the httpd service, for the update to
take effect.

Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259

Affected Products

  • JBoss Enterprise Web Server 1 for RHEL 5 x86_64
  • JBoss Enterprise Web Server 1 for RHEL 5 i386

Fixes

  • BZ - 569905 - CVE-2010-0408 httpd: mod_proxy_ajp remote temporary DoS
  • BZ - 570171 - CVE-2010-0434 httpd: request header information leak

CVEs

  • CVE-2010-0408
  • CVE-2010-0434

References

  • http://www.redhat.com/security/updates/classification/#moderate
  • http://kbase.redhat.com/faq/docs/DOC-20491
Note: More recent versions of these packages may be available. Click a package name for more details.

JBoss Enterprise Web Server 1 for RHEL 5

SRPM
httpd-2.2.14-1.2.6.jdk6.ep5.el5.src.rpm SHA-256: 9fdd9564f6b8023014faa58df38eaae9f4fb800f9b75e8945ad71ec2c5175628
x86_64
httpd-2.2.14-1.2.6.jdk6.ep5.el5.x86_64.rpm SHA-256: 21459f5c9819e10e951eea7e812af6cd00729d7a3cf280cf8767c6b985ea68bd
httpd-devel-2.2.14-1.2.6.jdk6.ep5.el5.x86_64.rpm SHA-256: 29136c870d3fc2126de8f678b0ce2b377d6aa29bd8d870449d45435661eadcf2
httpd-manual-2.2.14-1.2.6.jdk6.ep5.el5.x86_64.rpm SHA-256: a7d14c676cffde88dbfb281393c4001a6770c7682122c4d557b10efcdab335a7
mod_ssl-2.2.14-1.2.6.jdk6.ep5.el5.x86_64.rpm SHA-256: 5aa773b7f850a9624709fd31b57c68a961cec259ac082a4af058363384795cc7
i386
httpd-2.2.14-1.2.6.jdk6.ep5.el5.i386.rpm SHA-256: 671b27901f31af49d042d72117f33abb726595aec353882488f11127064f0325
httpd-devel-2.2.14-1.2.6.jdk6.ep5.el5.i386.rpm SHA-256: 842a5afb4a52c44b70c594c406aa26b712b5b1d3816b2dd2858d03c03b47e319
httpd-manual-2.2.14-1.2.6.jdk6.ep5.el5.i386.rpm SHA-256: 76d6703c8f445cd270a2c3e88a2ffa71b1a935c6e79ce5430b6447370702b711
mod_ssl-2.2.14-1.2.6.jdk6.ep5.el5.i386.rpm SHA-256: a7c400578ba1cdb8e80955abb75f99b3aa03a2166a1f2064aac2de557a0205a0

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

About

  • Red Hat Subscription Value
  • About Red Hat
  • Red Hat Jobs
Copyright © 2023 Red Hat, Inc.
  • Privacy Statement
  • Customer Portal Terms of Use
  • All Policies and Guidelines
Red Hat Summit
Twitter