First published: Thu Mar 25 2010(Updated: )
The Apache HTTP Server is a popular web server.<br>A use-after-free flaw was discovered in the way the Apache HTTP Server<br>handled request headers in subrequests. In configurations where subrequests<br>are used, a multithreaded MPM (Multi-Processing Module) could possibly leak<br>information from other requests in request replies. (CVE-2010-0434)<br>This update also fixes the following bug:<br><li> a bug was found in the mod_dav module. If a PUT request for an existing</li> file failed, that file would be unexpectedly deleted and a "Could not get<br>next bucket brigade" error logged. With this update, failed PUT requests no<br>longer cause mod_dav to delete files, which resolves this issue.<br>(BZ#572932)<br>As well, this update adds the following enhancement:<br><li> with the updated openssl packages from RHSA-2010:0163 installed, mod_ssl</li> will refuse to renegotiate a TLS/SSL connection with an unpatched client<br>that does not support RFC 5746. This update adds the<br>"SSLInsecureRenegotiation" configuration directive. If this directive is<br>enabled, mod_ssl will renegotiate insecurely with unpatched clients.<br>(BZ#575805)<br>Refer to the following Red Hat Knowledgebase article for more details about<br>the changed mod_ssl behavior: <a href="http://kbase.redhat.com/faq/docs/DOC-20491" target="_blank">http://kbase.redhat.com/faq/docs/DOC-20491</a> All httpd users should upgrade to these updated packages, which contain<br>backported patches to correct these issues and add this enhancement. After<br>installing the updated packages, the httpd daemon must be restarted for the<br>update to take effect.
Affected Software | Affected Version | How to fix |
---|---|---|
Apache Http Server |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2010:0175 is classified as moderate due to the potential for data leaks in specific configurations of the Apache HTTP Server.
To fix RHSA-2010:0175, you should update your Apache HTTP Server to the latest version that addresses this use-after-free vulnerability.
The vulnerability type of RHSA-2010:0175 is a use-after-free flaw in the handling of request headers.
RHSA-2010:0175 affects specific versions of the Apache HTTP Server that utilize multithreaded MPM configurations.
The potential impact of RHSA-2010:0175 includes data leaks and possible exposure of sensitive information during subrequest handling.