The Apache HTTP Server is a popular web server.It was discovered that mod_proxy_ajp incorrectly returned an "InternalServer Error" response when processing certain malformed requests, whichcaused the back-end server to be marked as failed in configurations wheremod_proxy is used in load balancer mode. A remote attacker could causemod_proxy to not send requests to back-end AJP (Apache JServ Protocol)servers for the retry timeout period (60 seconds by default) by sendingspecially-crafted requests. (CVE-2010-0408)A use-after-free flaw was discovered in the way the Apache HTTP Serverhandled request headers in subrequests. In configurations where subrequestsare used, a multithreaded MPM (Multi-Processing Module) could possibly leakinformation from other requests in request replies. (CVE-2010-0434)This update also adds the following enhancement:Refer to the following Red Hat Knowledgebase article for more details aboutthe changed mod_ssl behavior: http://kbase.redhat.com/faq/docs/DOC-20491All httpd users should upgrade to these updated packages, which containbackported patches to correct these issues and add this enhancement. Afterinstalling the updated packages, the httpd daemon must be restarted for theupdate to take effect.