Search for packages
| purl | pkg:rpm/redhat/httpd22@2.2.14-11.jdk6.ep5?arch=el4 |
| Next non-vulnerable version | None. |
| Latest non-vulnerable version | None. |
| Risk | 2.4 |
| Vulnerability | Summary | Fixed by |
|---|---|---|
|
VCID-pdtf-5zv7-2qaf
Aliases: CVE-2010-0408 |
mod_proxy_ajp would return the wrong status code if it encountered an error, causing a backend server to be put into an error state until the retry timeout expired. A remote attacker could send malicious requests to trigger this issue, resulting in denial of service. | There are no reported fixed by versions. |
|
VCID-wycq-jwzz-q7hf
Aliases: CVE-2010-0434 |
A flaw in the core subrequest process code was fixed, to always provide a shallow copy of the headers_in array to the subrequest, instead of a pointer to the parent request's array as it had for requests without request bodies. This meant all modules such as mod_headers which may manipulate the input headers for a subrequest would poison the parent request in two ways, one by modifying the parent request, which might not be intended, and second by leaving pointers to modified header fields in memory allocated to the subrequest scope, which could be freed before the main request processing was finished, resulting in a segfault or in revealing data from another request on threaded servers, such as the worker or winnt MPMs. | There are no reported fixed by versions. |
| Vulnerability | Summary | Aliases |
|---|---|---|
| This package is not known to fix vulnerabilities. | ||
| Date | Actor | Action | Vulnerability | Source | VulnerableCode Version |
|---|---|---|---|---|---|
| 2026-04-01T14:57:28.184983+00:00 | RedHat Importer | Affected by | VCID-wycq-jwzz-q7hf | https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-0434.json | 38.0.0 |
| 2026-04-01T14:57:23.358302+00:00 | RedHat Importer | Affected by | VCID-pdtf-5zv7-2qaf | https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-0408.json | 38.0.0 |