Author: markt
Date: Thu Apr 9 19:03:04 2026
New Revision: 1932933
Log:
Update security pages for March/April release issues
Modified:
tomcat/site/trunk/docs/security-10.html
tomcat/site/trunk/docs/security-11.html
tomcat/site/trunk/docs/security-9.html
tomcat/site/trunk/docs/security-native.html
tomcat/site/trunk/xdocs/security-10.xml
tomcat/site/trunk/xdocs/security-11.xml
tomcat/site/trunk/xdocs/security-9.xml
tomcat/site/trunk/xdocs/security-native.xml
Modified: tomcat/site/trunk/docs/security-10.html
==============================================================================
--- tomcat/site/trunk/docs/security-10.html Thu Apr 9 18:34:58 2026
(r1932932)
+++ tomcat/site/trunk/docs/security-10.html Thu Apr 9 19:03:04 2026
(r1932933)
@@ -42,7 +42,160 @@
</p>
</div><h3 id="Table_of_Contents">Table of Contents</h3><div class="text">
- <ul><li><a href="#Fixed_in_Apache_Tomcat_10.1.52">Fixed in Apache Tomcat
10.1.52</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.50">Fixed in Apache
Tomcat 10.1.50</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.47">Fixed in
Apache Tomcat 10.1.47</a></li><li><a
href="#Fixed_in_Apache_Tomcat_10.1.45">Fixed in Apache Tomcat
10.1.45</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.44">Fixed in Apache
Tomcat 10.1.44</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.43">Fixed in
Apache Tomcat 10.1.43</a></li><li><a
href="#Fixed_in_Apache_Tomcat_10.1.42">Fixed in Apache Tomcat
10.1.42</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.41">Fixed in Apache
Tomcat 10.1.41</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.40">Fixed in
Apache Tomcat 10.1.40</a></li><li><a
href="#Fixed_in_Apache_Tomcat_10.1.35">Fixed in Apache Tomcat
10.1.35</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.34">Fixed in Apache
Tomcat 10.1.34</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.33">Fixed in
Apache Tomcat 10.1.33</a></li><li><a
href="#Fixed_in_Apache_Tomcat_10.1.31">Fixed in Apache Tomcat
10.1.31</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.25">Fixed in Apache
Tomcat 10.1.25</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.19">Fixed in
Apache Tomcat 10.1.19</a></li><li><a
href="#Fixed_in_Apache_Tomcat_10.1.16">Fixed in Apache Tomcat
10.1.16</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.14">Fixed in Apache
Tomcat 10.1.14</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.13">Fixed in
Apache Tomcat 10.1.13</a></li><li><a
href="#Fixed_in_Apache_Tomcat_10.1.9">Fixed in Apache Tomcat
10.1.9</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.8">Fixed in Apache
Tomcat 10.1.8</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.6">Fixed in
Apache Tomcat 10.1.6</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.5">Fixed
in Apache Tomcat 10.1.5</a></li><li><a
href="#Fixed_in_Apache_Tomcat_10.1.2">Fixed in Apache Tomcat
10.1.2</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1
.1">Fixed in Apache Tomcat 10.1.1</a></li><li><a
href="#Fixed_in_Apache_Tomcat_10.0.27">Fixed in Apache Tomcat
10.0.27</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.23">Fixed in Apache
Tomcat 10.0.23</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.0-M17">Fixed
in Apache Tomcat 10.1.0-M17</a></li><li><a
href="#Fixed_in_Apache_Tomcat_10.0.21">Fixed in Apache Tomcat
10.0.21</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.0-M15">Fixed in
Apache Tomcat 10.1.0-M15</a></li><li><a
href="#Fixed_in_Apache_Tomcat_10.0.20">Fixed in Apache Tomcat
10.0.20</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.0-M14">Fixed in
Apache Tomcat 10.1.0-M14</a></li><li><a
href="#Fixed_in_Apache_Tomcat_10.0.16">Fixed in Apache Tomcat
10.0.16</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.0-M10">Fixed in
Apache Tomcat 10.1.0-M10</a></li><li><a
href="#Fixed_in_Apache_Tomcat_10.0.12">Fixed in Apache Tomcat
10.0.12</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.0-M6">Fixed in Apache
Tomcat 10.1.0-M6<
/a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.7">Fixed in Apache Tomcat
10.0.7</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.6">Fixed in Apache
Tomcat 10.0.6</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.5">Fixed in
Apache Tomcat 10.0.5</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.4">Fixed
in Apache Tomcat 10.0.4</a></li><li><a
href="#Fixed_in_Apache_Tomcat_10.0.2">Fixed in Apache Tomcat
10.0.2</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.0-M10">Fixed in Apache
Tomcat 10.0.0-M10</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.0-M8">Fixed
in Apache Tomcat 10.0.0-M8</a></li><li><a
href="#Fixed_in_Apache_Tomcat_10.0.0-M7">Fixed in Apache Tomcat
10.0.0-M7</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.0-M6">Fixed in
Apache Tomcat 10.0.0-M6</a></li><li><a
href="#Fixed_in_Apache_Tomcat_10.0.0-M5">Fixed in Apache Tomcat
10.0.0-M5</a></li><li><a href="#Not_a_vulnerability_in_Tomcat">Not a
vulnerability in Tomcat</a></li></ul>
+ <ul><li><a href="#Fixed_in_Apache_Tomcat_10.1.54">Fixed in Apache Tomcat
10.1.54</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.53">Fixed in Apache
Tomcat 10.1.53</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.52">Fixed in
Apache Tomcat 10.1.52</a></li><li><a
href="#Fixed_in_Apache_Tomcat_10.1.50">Fixed in Apache Tomcat
10.1.50</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.47">Fixed in Apache
Tomcat 10.1.47</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.45">Fixed in
Apache Tomcat 10.1.45</a></li><li><a
href="#Fixed_in_Apache_Tomcat_10.1.44">Fixed in Apache Tomcat
10.1.44</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.43">Fixed in Apache
Tomcat 10.1.43</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.42">Fixed in
Apache Tomcat 10.1.42</a></li><li><a
href="#Fixed_in_Apache_Tomcat_10.1.41">Fixed in Apache Tomcat
10.1.41</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.40">Fixed in Apache
Tomcat 10.1.40</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.35">Fixed in
Apache Tomcat 10.1.35</a></li><li><a
href="#Fixed_in_Apache_Tomcat_10.1.34">Fixed in Apache Tomcat
10.1.34</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.33">Fixed in Apache
Tomcat 10.1.33</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.31">Fixed in
Apache Tomcat 10.1.31</a></li><li><a
href="#Fixed_in_Apache_Tomcat_10.1.25">Fixed in Apache Tomcat
10.1.25</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.19">Fixed in Apache
Tomcat 10.1.19</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.16">Fixed in
Apache Tomcat 10.1.16</a></li><li><a
href="#Fixed_in_Apache_Tomcat_10.1.14">Fixed in Apache Tomcat
10.1.14</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.13">Fixed in Apache
Tomcat 10.1.13</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.9">Fixed in
Apache Tomcat 10.1.9</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.8">Fixed
in Apache Tomcat 10.1.8</a></li><li><a
href="#Fixed_in_Apache_Tomcat_10.1.6">Fixed in Apache Tomcat
10.1.6</a></li><li><a href="#Fixed_in_Apache_Tomcat_
10.1.5">Fixed in Apache Tomcat 10.1.5</a></li><li><a
href="#Fixed_in_Apache_Tomcat_10.1.2">Fixed in Apache Tomcat
10.1.2</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.1">Fixed in Apache
Tomcat 10.1.1</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.27">Fixed in
Apache Tomcat 10.0.27</a></li><li><a
href="#Fixed_in_Apache_Tomcat_10.0.23">Fixed in Apache Tomcat
10.0.23</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.0-M17">Fixed in
Apache Tomcat 10.1.0-M17</a></li><li><a
href="#Fixed_in_Apache_Tomcat_10.0.21">Fixed in Apache Tomcat
10.0.21</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.0-M15">Fixed in
Apache Tomcat 10.1.0-M15</a></li><li><a
href="#Fixed_in_Apache_Tomcat_10.0.20">Fixed in Apache Tomcat
10.0.20</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.0-M14">Fixed in
Apache Tomcat 10.1.0-M14</a></li><li><a
href="#Fixed_in_Apache_Tomcat_10.0.16">Fixed in Apache Tomcat
10.0.16</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.0-M10">Fixed in
Apache Tomcat 10.1.0-M10</a><
/li><li><a href="#Fixed_in_Apache_Tomcat_10.0.12">Fixed in Apache Tomcat
10.0.12</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.0-M6">Fixed in Apache
Tomcat 10.1.0-M6</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.7">Fixed in
Apache Tomcat 10.0.7</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.6">Fixed
in Apache Tomcat 10.0.6</a></li><li><a
href="#Fixed_in_Apache_Tomcat_10.0.5">Fixed in Apache Tomcat
10.0.5</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.4">Fixed in Apache
Tomcat 10.0.4</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.2">Fixed in
Apache Tomcat 10.0.2</a></li><li><a
href="#Fixed_in_Apache_Tomcat_10.0.0-M10">Fixed in Apache Tomcat
10.0.0-M10</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.0-M8">Fixed in
Apache Tomcat 10.0.0-M8</a></li><li><a
href="#Fixed_in_Apache_Tomcat_10.0.0-M7">Fixed in Apache Tomcat
10.0.0-M7</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.0-M6">Fixed in
Apache Tomcat 10.0.0-M6</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.0-M5
">Fixed in Apache Tomcat 10.0.0-M5</a></li><li><a
href="#Not_a_vulnerability_in_Tomcat">Not a vulnerability in
Tomcat</a></li></ul>
+ </div><h3 id="Fixed_in_Apache_Tomcat_10.1.54"><span
class="pull-right">2026-04-02</span> Fixed in Apache Tomcat 10.1.54</h3><div
class="text">
+
+ <p><strong>Moderate: OCSP checks sometimes soft-fail with FFM even when
+ soft-fail is disabled</strong>
+ <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-34500"
rel="nofollow">CVE-2026-34500</a></p>
+
+ <p>CLIENT_CERT authentication does not fail as expected for some scenarios
+ when soft fail is disabled and FFM is used.</p>
+
+ <p>This was fixed with commit
+ <a
href="https://github.com/apache/tomcat/commit/29b56a56ce9e7d044b6162a99af0f38529b3a208">29b56a56</a>.</p>
+
+ <p>This issue was reported to the Tomcat security team on 25 March 2026.
+ The issue was made public on 9 April 2026.</p>
+
+ <p>Affects: 10.1.22 to 10.1.53</p>
+
+ <p><strong>Low: Cloud membership for clustering component exposed the
+ Kubernetes bearer token</strong>
+ <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-34487"
rel="nofollow">CVE-2026-34487</a></p>
+
+ <p>The cloud membership for clustering component exposed the Kubernetes
+ bearer token in log messages.</p>
+
+ <p>This was fixed with commit
+ <a
href="https://github.com/apache/tomcat/commit/5eff2a773b8b728083e5195b3183df1b9e12a03d">5eff2a77</a>.</p>
+
+ <p>This issue was reported to the Tomcat security team on 25 March 2026.
+ The issue was made public on 9 April 2026.</p>
+
+ <p>Affects: 10.1.0-M1 to 10.1.53</p>
+
+ <p><strong>Important: The fix for <a
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-29146"
rel="nofollow">CVE-2026-29146</a> allowed the
+ bypass of the EncryptInterceptor</strong>
+ <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-34486"
rel="nofollow">CVE-2026-34486</a></p>
+
+ <p>An error in the fix for <a
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-29146"
rel="nofollow">CVE-2026-29146</a> allowed the
+ EncryptInterceptor to be bypassed.</p>
+
+ <p>This was fixed with commit
+ <a
href="https://github.com/apache/tomcat/commit/55f3eb9148233054fccfdf761141c6894a050be1">55f3eb91</a>.</p>
+
+ <p>This issue was reported to the Tomcat security team on 26 March 2026.
+ The issue was made public on 9 April 2026.</p>
+
+ <p>Affects: 10.1.53</p>
+
+ <p><strong>Low: Incomplete escaping of JSON access logs</strong>
+ <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-34483"
rel="nofollow">CVE-2026-34483</a></p>
+
+ <p>Incomplete escaping when non-default values were used for the Connector
+ attributes relaxedPathChars and/or relaxedQueryChars allowed the
+ injection of arbitrary JSON into the JSON access log.</p>
+
+ <p>This was fixed with commit
+ <a
href="https://github.com/apache/tomcat/commit/f22dc2ce6cfda8609ed86816c0d78e1a9cbadb06">f22dc2ce</a>.</p>
+
+ <p>This issue was reported to the Tomcat security team on 25 March 2026.
+ The issue was made public on 9 April 2026.</p>
+
+ <p>Affects: 10.1.0-M1 to 10.1.53</p>
+
+ </div><h3 id="Fixed_in_Apache_Tomcat_10.1.53"><span
class="pull-right">2026-03-23</span> Fixed in Apache Tomcat 10.1.53</h3><div
class="text">
+
+ <p><strong>Moderate: The fix for <a
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-66614"
rel="nofollow">CVE-2025-66614</a> was
+ incomplete</strong>
+ <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-32990"
rel="nofollow">CVE-2026-32990</a></p>
+
+ <p>The validation of SNI name and host name did not take account of
possible
+ differences in case allowing the strict SNI checks to be bypassed.</p>
+
+ <p>This was fixed with commit
+ <a
href="https://github.com/apache/tomcat/commit/4d0615a5c718c260d6d4e0b944a050f09a490c02">4d0615a5</a>.</p>
+
+ <p>This issue was reported to the Tomcat security team on 13 March 2026.
+ The issue was made public on 9 April 2026.</p>
+
+ <p>Affects: 10.1.50 to 10.1.52</p>
+
+ <p><strong>Important: EncryptInterceptor vulnerable to padding oracle
attack
+ by default</strong>
+ <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-29146"
rel="nofollow">CVE-2026-29146</a></p>
+
+ <p>The EncryptInterceptor used CBC by default which is vulnerable to a
+ padding Oracle attack.</p>
+
+ <p>This was fixed with commit
+ <a
href="https://github.com/apache/tomcat/commit/607ebc0fa522bd9e8c05517baa2d179bbd1e659c">607ebc0f</a>.</p>
+
+ <p>This issue was reported to the Tomcat security team on 22 February 2026.
+ The issue was made public on 9 April 2026.</p>
+
+ <p>Affects: 10.0.0-M1 to 10.1.52</p>
+
+ <p><strong>Moderate: OCSP checks sometimes soft-fail even when soft-fail is
+ disabled</strong>
+ <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-29145"
rel="nofollow">CVE-2026-29145</a></p>
+
+ <p>CLIENT_CERT authentication did not fail OCSP checks as expected for some
+ scenarios when soft fail was disabled.</p>
+
+ <p>This was fixed with commit
+ <a
href="https://github.com/apache/tomcat/commit/fe26667cd2385045ac73f4dea086cc9971209b90">fe26667c</a>.</p>
+
+ <p>This issue was reported to the Tomcat security team on 26 February 2026.
+ The issue was made public on 9 April 2026.</p>
+
+ <p><strong>Low: Configured TLS cipher preference order not
preserved</strong>
+ <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-29129"
rel="nofollow">CVE-2026-29129</a></p>
+
+ <p>The additional of the ability to configure TLS 1.3 cipher suites did not
+ preserve the order of the configured cipher suites and ciphers.</p>
+
+ <p>This was fixed with commit
+ <a
href="https://github.com/apache/tomcat/commit/8d69b33764dba81dce89e3a768de6093a35620ae">8d69b337</a>.</p>
+
+ <p>This was reported as a bug on 20 February 026 and the security
+ implications identified by the Tomcat security team the same day.
+ The issue was made public on 9 April 2026.</p>
+
+ <p>Affects: 10.1.51 to 10.1.52</p>
+
+ <p><strong>Low: Occasionally open redirect</strong>
+ <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-25854"
rel="nofollow">CVE-2026-25854</a></p>
+
+ <p>When a Tomcat node in a cluster with the LoadBalancerDrainingValve was
in
+ the disabled (draining) state, a specially crafted URL could be used to
+ trigger a redirect to a URI of the attackers choice.</p>
+
+ <p>This was fixed with commit
+ <a
href="https://github.com/apache/tomcat/commit/5fb910f9a9dafa37a0c0965a1bd62a21dcf437f2">5fb910f9</a>.</p>
+
+ <p>This issue was reported to the Tomcat security team on 30 January 2026.
+ The issue was made public on 9 April 2026.</p>
+
+ <p>Affects: 10.1.0-M1 to 10.1.52</p>
+
+ <p><strong>Low: Request smuggling via invalid chunk extension</strong>
+ <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-24880"
rel="nofollow">CVE-2026-24880</a></p>
+
+ <p>Tomcat did not validate that contents of HTTP/1.1 chunk extensions. This
+ enabled a request smuggling attack if a reverse proxy in front of Tomcat
+ allowed CRLF sequences in an otherwise valid chunk extension.</p>
+
+ <p>This was fixed with commits
+ <a
href="https://github.com/apache/tomcat/commit/f07df938d00f7419b40fa65aa912966d0efac522">f07df938</a>
and
+ <a
href="https://github.com/apache/tomcat/commit/1e71441a15972f56e661b0b549fb9e5d838b83bb">1e71441a</a>.</p>
+
+ <p>This issue was reported to the Tomcat security team on 19 January 2026.
+ The issue was made public on 9 April 2026.</p>
+
+ <p>Affects: 10.1.0-M1 to 10.1.52</p>
+
</div><h3 id="Fixed_in_Apache_Tomcat_10.1.52"><span
class="pull-right">2026-01-27</span> Fixed in Apache Tomcat 10.1.52</h3><div
class="text">
<p><strong>Moderate: Incomplete OCSP verification checks</strong>
Modified: tomcat/site/trunk/docs/security-11.html
==============================================================================
--- tomcat/site/trunk/docs/security-11.html Thu Apr 9 18:34:58 2026
(r1932932)
+++ tomcat/site/trunk/docs/security-11.html Thu Apr 9 19:03:04 2026
(r1932933)
@@ -36,7 +36,168 @@
</p>
</div><h3 id="Table_of_Contents">Table of Contents</h3><div class="text">
- <ul><li><a href="#Fixed_in_Apache_Tomcat_11.0.18">Fixed in Apache Tomcat
11.0.18</a></li><li><a href="#Fixed_in_Apache_Tomcat_11.0.15">Fixed in Apache
Tomcat 11.0.15</a></li><li><a href="#Fixed_in_Apache_Tomcat_11.0.12">Fixed in
Apache Tomcat 11.0.12</a></li><li><a
href="#Fixed_in_Apache_Tomcat_11.0.11">Fixed in Apache Tomcat
11.0.11</a></li><li><a href="#Fixed_in_Apache_Tomcat_11.0.10">Fixed in Apache
Tomcat 11.0.10</a></li><li><a href="#Fixed_in_Apache_Tomcat_11.0.9">Fixed in
Apache Tomcat 11.0.9</a></li><li><a href="#Fixed_in_Apache_Tomcat_11.0.8">Fixed
in Apache Tomcat 11.0.8</a></li><li><a
href="#Fixed_in_Apache_Tomcat_11.0.7">Fixed in Apache Tomcat
11.0.7</a></li><li><a href="#Fixed_in_Apache_Tomcat_11.0.6">Fixed in Apache
Tomcat 11.0.6</a></li><li><a href="#Fixed_in_Apache_Tomcat_11.0.3">Fixed in
Apache Tomcat 11.0.3</a></li><li><a href="#Fixed_in_Apache_Tomcat_11.0.2">Fixed
in Apache Tomcat 11.0.2</a></li><li><a
href="#Fixed_in_Apache_Tomcat_11.0.1">Fixed in Apache Tomca
t 11.0.1</a></li><li><a href="#Fixed_in_Apache_Tomcat_11.0.0">Fixed in Apache
Tomcat 11.0.0</a></li><li><a href="#Fixed_in_Apache_Tomcat_11.0.0-M21">Fixed in
Apache Tomcat 11.0.0-M21</a></li><li><a
href="#Fixed_in_Apache_Tomcat_11.0.0-M17">Fixed in Apache Tomcat
11.0.0-M17</a></li><li><a href="#Fixed_in_Apache_Tomcat_11.0.0-M12">Fixed in
Apache Tomcat 11.0.0-M12</a></li><li><a
href="#Fixed_in_Apache_Tomcat_11.0.0-M11">Fixed in Apache Tomcat
11.0.0-M11</a></li><li><a href="#Fixed_in_Apache_Tomcat_11.0.0-M6">Fixed in
Apache Tomcat 11.0.0-M6</a></li><li><a
href="#Fixed_in_Apache_Tomcat_11.0.0-M5">Fixed in Apache Tomcat
11.0.0-M5</a></li><li><a href="#Fixed_in_Apache_Tomcat_11.0.0-M3">Fixed in
Apache Tomcat 11.0.0-M3</a></li></ul>
+ <ul><li><a href="#Fixed_in_Apache_Tomcat_11.0.21">Fixed in Apache Tomcat
11.0.21</a></li><li><a href="#Fixed_in_Apache_Tomcat_11.0.20">Fixed in Apache
Tomcat 11.0.20</a></li><li><a href="#Fixed_in_Apache_Tomcat_11.0.18">Fixed in
Apache Tomcat 11.0.18</a></li><li><a
href="#Fixed_in_Apache_Tomcat_11.0.15">Fixed in Apache Tomcat
11.0.15</a></li><li><a href="#Fixed_in_Apache_Tomcat_11.0.12">Fixed in Apache
Tomcat 11.0.12</a></li><li><a href="#Fixed_in_Apache_Tomcat_11.0.11">Fixed in
Apache Tomcat 11.0.11</a></li><li><a
href="#Fixed_in_Apache_Tomcat_11.0.10">Fixed in Apache Tomcat
11.0.10</a></li><li><a href="#Fixed_in_Apache_Tomcat_11.0.9">Fixed in Apache
Tomcat 11.0.9</a></li><li><a href="#Fixed_in_Apache_Tomcat_11.0.8">Fixed in
Apache Tomcat 11.0.8</a></li><li><a href="#Fixed_in_Apache_Tomcat_11.0.7">Fixed
in Apache Tomcat 11.0.7</a></li><li><a
href="#Fixed_in_Apache_Tomcat_11.0.6">Fixed in Apache Tomcat
11.0.6</a></li><li><a href="#Fixed_in_Apache_Tomcat_11.0.3">Fixed in Apache T
omcat 11.0.3</a></li><li><a href="#Fixed_in_Apache_Tomcat_11.0.2">Fixed in
Apache Tomcat 11.0.2</a></li><li><a href="#Fixed_in_Apache_Tomcat_11.0.1">Fixed
in Apache Tomcat 11.0.1</a></li><li><a
href="#Fixed_in_Apache_Tomcat_11.0.0">Fixed in Apache Tomcat
11.0.0</a></li><li><a href="#Fixed_in_Apache_Tomcat_11.0.0-M21">Fixed in Apache
Tomcat 11.0.0-M21</a></li><li><a
href="#Fixed_in_Apache_Tomcat_11.0.0-M17">Fixed in Apache Tomcat
11.0.0-M17</a></li><li><a href="#Fixed_in_Apache_Tomcat_11.0.0-M12">Fixed in
Apache Tomcat 11.0.0-M12</a></li><li><a
href="#Fixed_in_Apache_Tomcat_11.0.0-M11">Fixed in Apache Tomcat
11.0.0-M11</a></li><li><a href="#Fixed_in_Apache_Tomcat_11.0.0-M6">Fixed in
Apache Tomcat 11.0.0-M6</a></li><li><a
href="#Fixed_in_Apache_Tomcat_11.0.0-M5">Fixed in Apache Tomcat
11.0.0-M5</a></li><li><a href="#Fixed_in_Apache_Tomcat_11.0.0-M3">Fixed in
Apache Tomcat 11.0.0-M3</a></li></ul>
+ </div><h3 id="Fixed_in_Apache_Tomcat_11.0.21"><span
class="pull-right">2026-04-04</span> Fixed in Apache Tomcat 11.0.21</h3><div
class="text">
+
+ <p><strong>Moderate: OCSP checks sometimes soft-fail with FFM even when
+ soft-fail is disabled</strong>
+ <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-34500"
rel="nofollow">CVE-2026-34500</a></p>
+
+ <p>CLIENT_CERT authentication did not fail as expected for some scenarios
+ when soft fail was disabled and FFM was used.</p>
+
+ <p>This was fixed with commit
+ <a
href="https://github.com/apache/tomcat/commit/c13e60e732ea6d07087293a41ad1866c20848271">c13e60e7</a>.</p>
+
+ <p>This issue was reported to the Tomcat security team on 25 March 2026.
+ The issue was made public on 9 April 2026.</p>
+
+ <p>Affects: 11.0.0-M14 to 11.0.20</p>
+
+ <p><strong>Low: Cloud membership for clustering component exposed the
+ Kubernetes bearer token</strong>
+ <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-34487"
rel="nofollow">CVE-2026-34487</a></p>
+
+ <p>The cloud membership for clustering component exposed the Kubernetes
+ bearer token in log messages.</p>
+
+ <p>This was fixed with commit
+ <a
href="https://github.com/apache/tomcat/commit/301bc6efbf72feb14dacfdfa3f50372182736150">301bc6ef</a>.</p>
+
+ <p>This issue was reported to the Tomcat security team on 25 March 2026.
+ The issue was made public on 9 April 2026.</p>
+
+ <p>Affects: 11.0.0-M1 to 11.0.20</p>
+
+ <p><strong>Important: The fix for <a
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-29146"
rel="nofollow">CVE-2026-29146</a> allowed the
+ bypass of the EncryptInterceptor</strong>
+ <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-34486"
rel="nofollow">CVE-2026-34486</a></p>
+
+ <p>An error in the fix for <a
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-29146"
rel="nofollow">CVE-2026-29146</a> allowed the
+ EncryptInterceptor to be bypassed.</p>
+
+ <p>This was fixed with commit
+ <a
href="https://github.com/apache/tomcat/commit/1fab40ccc752e22639eccfe290d5624afad7eccd">1fab40cc</a>.</p>
+
+ <p>This issue was reported to the Tomcat security team on 26 March 2026.
+ The issue was made public on 9 April 2026.</p>
+
+ <p>Affects: 11.0.20</p>
+
+ <p><strong>Low: Incomplete escaping of JSON access logs</strong>
+ <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-34483"
rel="nofollow">CVE-2026-34483</a></p>
+
+ <p>Incomplete escaping when non-default values were used for the Connector
+ attributes relaxedPathChars and/or relaxedQueryChars allowed the
+ injection of arbitrary JSON into the JSON access log.</p>
+
+ <p>This was fixed with commit
+ <a
href="https://github.com/apache/tomcat/commit/f9ddc24fcfcdfaea4a6953198d8636aca3e957bc">f9ddc24f</a>.</p>
+
+ <p>This issue was reported to the Tomcat security team on 25 March 2026.
+ The issue was made public on 9 April 2026.</p>
+
+ <p>Affects: 11.0.0-M1 to 11.0.20</p>
+
+ </div><h3 id="Fixed_in_Apache_Tomcat_11.0.20"><span
class="pull-right">2026-03-20</span> Fixed in Apache Tomcat 11.0.20</h3><div
class="text">
+
+ <p><strong>Moderate: The fix for <a
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-66614"
rel="nofollow">CVE-2025-66614</a> was
+ incomplete</strong>
+ <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-32990"
rel="nofollow">CVE-2026-32990</a></p>
+
+ <p>The validation of SNI name and host name did not take account of
possible
+ differences in case allowing the strict SNI checks to be bypassed.</p>
+
+ <p>This was fixed with commit
+ <a
href="https://github.com/apache/tomcat/commit/021d1f833e38b683a44688f7b28f1f27e8e37c36">021d1f83</a>.</p>
+
+ <p>This issue was reported to the Tomcat security team on 13 March 2026.
+ The issue was made public on 9 April 2026.</p>
+
+ <p>Affects: 11.0.15 to 11.0.19</p>
+
+ <p><i>Note: The issues below were fixed in Apache Tomcat 11.0.19 but the
+ release vote for the 11.0.19 release candidate did not pass. Therefore,
+ although users must download 11.0.20 to obtain a version that includes
+ a fix for these issues, version 11.0.19 is not included in the list of
+ affected versions.</i></p>
+
+ <p><strong>Important: EncryptInterceptor vulnerable to padding oracle
attack
+ by default</strong>
+ <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-29146"
rel="nofollow">CVE-2026-29146</a></p>
+
+ <p>The EncryptInterceptor used CBC by default which is vulnerable to a
+ padding Oracle attack.</p>
+
+ <p>This was fixed with commit
+ <a
href="https://github.com/apache/tomcat/commit/6d955cceca841f2eabf2d6c46b59a8c7e1cd6eaa">6d955cce</a>.</p>
+
+ <p>This issue was reported to the Tomcat security team on 22 February 2026.
+ The issue was made public on 9 April 2026.</p>
+
+ <p>Affects: 11.0.0-M1 to 11.0.18</p>
+
+ <p><strong>Moderate: OCSP checks sometimes soft-fail even when soft-fail is
+ disabled</strong>
+ <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-29145"
rel="nofollow">CVE-2026-29145</a></p>
+
+ <p>CLIENT_CERT authentication did not fail OCSP checks as expected for some
+ scenarios when soft fail was disabled.</p>
+
+ <p>This was fixed with commit
+ <a
href="https://github.com/apache/tomcat/commit/721591f7bff424c693f26adc18ae9b9abac3655b">721591f7</a>.</p>
+
+ <p>This issue was reported to the Tomcat security team on 26 February 2026.
+ The issue was made public on 9 April 2026.</p>
+
+ <p>Affects: 11.0.0-M1 to 11.0.18</p>
+
+ <p><strong>Low: Configured TLS cipher preference order not
preserved</strong>
+ <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-29129"
rel="nofollow">CVE-2026-29129</a></p>
+
+ <p>The additional of the ability to configure TLS 1.3 cipher suites did not
+ preserve the order of the configured cipher suites and ciphers.</p>
+
+ <p>This was fixed with commit
+ <a
href="https://github.com/apache/tomcat/commit/5cfa876d73f1ff5f4dc8309c4320f684cbeff74e">5cfa876d</a>.</p>
+
+ <p>This was reported as a bug on 20 February 026 and the security
+ implications identified by the Tomcat security team the same day.
+ The issue was made public on 9 April 2026.</p>
+
+ <p>Affects: 11.0.16 to 11.0.18</p>
+
+ <p><strong>Low: Occasionally open redirect</strong>
+ <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-25854"
rel="nofollow">CVE-2026-25854</a></p>
+
+ <p>When a Tomcat node in a cluster with the LoadBalancerDrainingValve was
in
+ the disabled (draining) state, a specially crafted URL could be used to
+ trigger a redirect to a URI of the attackers choice.</p>
+
+ <p>This was fixed with commit
+ <a
href="https://github.com/apache/tomcat/commit/4c5d306001b780c9316aea5ff6502c524fb20695">4c5d3060</a>.</p>
+
+ <p>This issue was reported to the Tomcat security team on 30 January 2026.
+ The issue was made public on 9 April 2026.</p>
+
+ <p>Affects: 11.0.0-M1 to 11.0.18</p>
+
+ <p><strong>Low: Request smuggling via invalid chunk extension</strong>
+ <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-24880"
rel="nofollow">CVE-2026-24880</a></p>
+
+ <p>Tomcat did not validate that contents of HTTP/1.1 chunk extensions. This
+ enabled a request smuggling attack if a reverse proxy in front of Tomcat
+ allowed CRLF sequences in an otherwise valid chunk extension.</p>
+
+ <p>This was fixed with commits
+ <a
href="https://github.com/apache/tomcat/commit/fde1a8235fb73125217bd41e162aa0a113f33552">fde1a823</a>
and
+ <a
href="https://github.com/apache/tomcat/commit/2cb06c34f661ca42f7570bbcc21e99806184bcc5">2cb06c34</a>.</p>
+
+ <p>This issue was reported to the Tomcat security team on 19 January 2026.
+ The issue was made public on 9 April 2026.</p>
+
+ <p>Affects: 11.0.0-M1 to 11.0.18</p>
+
</div><h3 id="Fixed_in_Apache_Tomcat_11.0.18"><span
class="pull-right">2026-01-26</span> Fixed in Apache Tomcat 11.0.18</h3><div
class="text">
<p><strong>Moderate: Incomplete OCSP verification checks</strong>
Modified: tomcat/site/trunk/docs/security-9.html
==============================================================================
--- tomcat/site/trunk/docs/security-9.html Thu Apr 9 18:34:58 2026
(r1932932)
+++ tomcat/site/trunk/docs/security-9.html Thu Apr 9 19:03:04 2026
(r1932933)
@@ -36,7 +36,160 @@
</p>
</div><h3 id="Table_of_Contents">Table of Contents</h3><div class="text">
- <ul><li><a href="#Fixed_in_Apache_Tomcat_9.0.115">Fixed in Apache Tomcat
9.0.115</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.113">Fixed in Apache
Tomcat 9.0.113</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.110">Fixed in
Apache Tomcat 9.0.110</a></li><li><a
href="#Fixed_in_Apache_Tomcat_9.0.109">Fixed in Apache Tomcat
9.0.109</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.108">Fixed in Apache
Tomcat 9.0.108</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.107">Fixed in
Apache Tomcat 9.0.107</a></li><li><a
href="#Fixed_in_Apache_Tomcat_9.0.106">Fixed in Apache Tomcat
9.0.106</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.105">Fixed in Apache
Tomcat 9.0.105</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.104">Fixed in
Apache Tomcat 9.0.104</a></li><li><a
href="#Fixed_in_Apache_Tomcat_9.0.99">Fixed in Apache Tomcat
9.0.99</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.98">Fixed in Apache
Tomcat 9.0.98</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.97">Fixed in Apac
he Tomcat 9.0.97</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.96">Fixed in
Apache Tomcat 9.0.96</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.90">Fixed
in Apache Tomcat 9.0.90</a></li><li><a
href="#Fixed_in_Apache_Tomcat_9.0.86">Fixed in Apache Tomcat
9.0.86</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.83">Fixed in Apache
Tomcat 9.0.83</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.81">Fixed in
Apache Tomcat 9.0.81</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.80">Fixed
in Apache Tomcat 9.0.80</a></li><li><a
href="#Fixed_in_Apache_Tomcat_9.0.75">Fixed in Apache Tomcat
9.0.75</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.74">Fixed in Apache
Tomcat 9.0.74</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.72">Fixed in
Apache Tomcat 9.0.72</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.71">Fixed
in Apache Tomcat 9.0.71</a></li><li><a
href="#Fixed_in_Apache_Tomcat_9.0.69">Fixed in Apache Tomcat
9.0.69</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.68">Fixed in Apach
e Tomcat 9.0.68</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.65">Fixed in
Apache Tomcat 9.0.65</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.63">Fixed
in Apache Tomcat 9.0.63</a></li><li><a
href="#Fixed_in_Apache_Tomcat_9.0.62">Fixed in Apache Tomcat
9.0.62</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.58">Fixed in Apache
Tomcat 9.0.58</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.54">Fixed in
Apache Tomcat 9.0.54</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.48">Fixed
in Apache Tomcat 9.0.48</a></li><li><a
href="#Fixed_in_Apache_Tomcat_9.0.46">Fixed in Apache Tomcat
9.0.46</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.45">Fixed in Apache
Tomcat 9.0.45</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.44">Fixed in
Apache Tomcat 9.0.44</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.43">Fixed
in Apache Tomcat 9.0.43</a></li><li><a
href="#Fixed_in_Apache_Tomcat_9.0.40">Fixed in Apache Tomcat
9.0.40</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.38">Fixed in Apache
Tomcat 9.0.38</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.37">Fixed in
Apache Tomcat 9.0.37</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.36">Fixed
in Apache Tomcat 9.0.36</a></li><li><a
href="#Fixed_in_Apache_Tomcat_9.0.35">Fixed in Apache Tomcat
9.0.35</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.31">Fixed in Apache
Tomcat 9.0.31</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.30">Fixed in
Apache Tomcat 9.0.30</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.29">Fixed
in Apache Tomcat 9.0.29</a></li><li><a
href="#Fixed_in_Apache_Tomcat_9.0.21">Fixed in Apache Tomcat
9.0.21</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.20">Fixed in Apache
Tomcat 9.0.20</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.19">Fixed in
Apache Tomcat 9.0.19</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.16">Fixed
in Apache Tomcat 9.0.16</a></li><li><a
href="#Fixed_in_Apache_Tomcat_9.0.12">Fixed in Apache Tomcat
9.0.12</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.10">Fixed in Apache
Tomcat 9.0.10</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.9">Fixed in
Apache Tomcat 9.0.9</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.8">Fixed
in Apache Tomcat 9.0.8</a></li><li><a
href="#Fixed_in_Apache_Tomcat_9.0.5">Fixed in Apache Tomcat
9.0.5</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.2">Fixed in Apache
Tomcat 9.0.2</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.1">Fixed in
Apache Tomcat 9.0.1</a></li><li><a
href="#Fixed_in_Apache_Tomcat_9.0.0.M22">Fixed in Apache Tomcat
9.0.0.M22</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.0.M21">Fixed in
Apache Tomcat 9.0.0.M21</a></li><li><a
href="#Fixed_in_Apache_Tomcat_9.0.0.M19">Fixed in Apache Tomcat
9.0.0.M19</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.0.M18">Fixed in
Apache Tomcat 9.0.0.M18</a></li><li><a
href="#Fixed_in_Apache_Tomcat_9.0.0.M17">Fixed in Apache Tomcat
9.0.0.M17</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.0.M15">Fixed in
Apache Tomcat 9.0.0.M15</a></li><li><a href="#Fixed_in_Apache_Tomcat
_9.0.0.M13">Fixed in Apache Tomcat 9.0.0.M13</a></li><li><a
href="#Fixed_in_Apache_Tomcat_9.0.0.M10">Fixed in Apache Tomcat
9.0.0.M10</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.0.M8">Fixed in
Apache Tomcat 9.0.0.M8</a></li><li><a
href="#Fixed_in_Apache_Tomcat_9.0.0.M3">Fixed in Apache Tomcat
9.0.0.M3</a></li><li><a href="#Not_a_vulnerability_in_Tomcat">Not a
vulnerability in Tomcat</a></li></ul>
+ <ul><li><a href="#Fixed_in_Apache_Tomcat_9.0.117">Fixed in Apache Tomcat
9.0.117</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.116">Fixed in Apache
Tomcat 9.0.116</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.115">Fixed in
Apache Tomcat 9.0.115</a></li><li><a
href="#Fixed_in_Apache_Tomcat_9.0.113">Fixed in Apache Tomcat
9.0.113</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.110">Fixed in Apache
Tomcat 9.0.110</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.109">Fixed in
Apache Tomcat 9.0.109</a></li><li><a
href="#Fixed_in_Apache_Tomcat_9.0.108">Fixed in Apache Tomcat
9.0.108</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.107">Fixed in Apache
Tomcat 9.0.107</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.106">Fixed in
Apache Tomcat 9.0.106</a></li><li><a
href="#Fixed_in_Apache_Tomcat_9.0.105">Fixed in Apache Tomcat
9.0.105</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.104">Fixed in Apache
Tomcat 9.0.104</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.99">Fixed in
Apache Tomcat 9.0.99</a></li><li><a
href="#Fixed_in_Apache_Tomcat_9.0.98">Fixed in Apache Tomcat
9.0.98</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.97">Fixed in Apache
Tomcat 9.0.97</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.96">Fixed in
Apache Tomcat 9.0.96</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.90">Fixed
in Apache Tomcat 9.0.90</a></li><li><a
href="#Fixed_in_Apache_Tomcat_9.0.86">Fixed in Apache Tomcat
9.0.86</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.83">Fixed in Apache
Tomcat 9.0.83</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.81">Fixed in
Apache Tomcat 9.0.81</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.80">Fixed
in Apache Tomcat 9.0.80</a></li><li><a
href="#Fixed_in_Apache_Tomcat_9.0.75">Fixed in Apache Tomcat
9.0.75</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.74">Fixed in Apache
Tomcat 9.0.74</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.72">Fixed in
Apache Tomcat 9.0.72</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.71">Fixed
in A
pache Tomcat 9.0.71</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.69">Fixed
in Apache Tomcat 9.0.69</a></li><li><a
href="#Fixed_in_Apache_Tomcat_9.0.68">Fixed in Apache Tomcat
9.0.68</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.65">Fixed in Apache
Tomcat 9.0.65</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.63">Fixed in
Apache Tomcat 9.0.63</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.62">Fixed
in Apache Tomcat 9.0.62</a></li><li><a
href="#Fixed_in_Apache_Tomcat_9.0.58">Fixed in Apache Tomcat
9.0.58</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.54">Fixed in Apache
Tomcat 9.0.54</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.48">Fixed in
Apache Tomcat 9.0.48</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.46">Fixed
in Apache Tomcat 9.0.46</a></li><li><a
href="#Fixed_in_Apache_Tomcat_9.0.45">Fixed in Apache Tomcat
9.0.45</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.44">Fixed in Apache
Tomcat 9.0.44</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.43">Fixed in Ap
ache Tomcat 9.0.43</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.40">Fixed
in Apache Tomcat 9.0.40</a></li><li><a
href="#Fixed_in_Apache_Tomcat_9.0.38">Fixed in Apache Tomcat
9.0.38</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.37">Fixed in Apache
Tomcat 9.0.37</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.36">Fixed in
Apache Tomcat 9.0.36</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.35">Fixed
in Apache Tomcat 9.0.35</a></li><li><a
href="#Fixed_in_Apache_Tomcat_9.0.31">Fixed in Apache Tomcat
9.0.31</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.30">Fixed in Apache
Tomcat 9.0.30</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.29">Fixed in
Apache Tomcat 9.0.29</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.21">Fixed
in Apache Tomcat 9.0.21</a></li><li><a
href="#Fixed_in_Apache_Tomcat_9.0.20">Fixed in Apache Tomcat
9.0.20</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.19">Fixed in Apache
Tomcat 9.0.19</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.16">Fixed in Apa
che Tomcat 9.0.16</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.12">Fixed
in Apache Tomcat 9.0.12</a></li><li><a
href="#Fixed_in_Apache_Tomcat_9.0.10">Fixed in Apache Tomcat
9.0.10</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.9">Fixed in Apache
Tomcat 9.0.9</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.8">Fixed in
Apache Tomcat 9.0.8</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.5">Fixed
in Apache Tomcat 9.0.5</a></li><li><a
href="#Fixed_in_Apache_Tomcat_9.0.2">Fixed in Apache Tomcat
9.0.2</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.1">Fixed in Apache
Tomcat 9.0.1</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.0.M22">Fixed in
Apache Tomcat 9.0.0.M22</a></li><li><a
href="#Fixed_in_Apache_Tomcat_9.0.0.M21">Fixed in Apache Tomcat
9.0.0.M21</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.0.M19">Fixed in
Apache Tomcat 9.0.0.M19</a></li><li><a
href="#Fixed_in_Apache_Tomcat_9.0.0.M18">Fixed in Apache Tomcat
9.0.0.M18</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.0.M
17">Fixed in Apache Tomcat 9.0.0.M17</a></li><li><a
href="#Fixed_in_Apache_Tomcat_9.0.0.M15">Fixed in Apache Tomcat
9.0.0.M15</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.0.M13">Fixed in
Apache Tomcat 9.0.0.M13</a></li><li><a
href="#Fixed_in_Apache_Tomcat_9.0.0.M10">Fixed in Apache Tomcat
9.0.0.M10</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.0.M8">Fixed in
Apache Tomcat 9.0.0.M8</a></li><li><a
href="#Fixed_in_Apache_Tomcat_9.0.0.M3">Fixed in Apache Tomcat
9.0.0.M3</a></li><li><a href="#Not_a_vulnerability_in_Tomcat">Not a
vulnerability in Tomcat</a></li></ul>
+ </div><h3 id="Fixed_in_Apache_Tomcat_9.0.117"><span
class="pull-right">2026-04-03</span> Fixed in Apache Tomcat 9.0.117</h3><div
class="text">
+
+ <p><strong>Moderate: OCSP checks sometimes soft-fail with FFM even when
+ soft-fail is disabled</strong>
+ <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-34500"
rel="nofollow">CVE-2026-34500</a></p>
+
+ <p>CLIENT_CERT authentication does not fail as expected for some scenarios
+ when soft fail is disabled and FFM is used.</p>
+
+ <p>This was fixed with commit
+ <a
href="https://github.com/apache/tomcat/commit/ff589ab26e8250a2ca4286d986305318c033ff9f">ff589ab2</a>.</p>
+
+ <p>This issue was reported to the Tomcat security team on 25 March 2026.
+ The issue was made public on 9 April 2026.</p>
+
+ <p>Affects: 9.0.92 to 9.0.116</p>
+
+ <p><strong>Low: Cloud membership for clustering component exposed the
+ Kubernetes bearer token</strong>
+ <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-34487"
rel="nofollow">CVE-2026-34487</a></p>
+
+ <p>The cloud membership for clustering component exposed the Kubernetes
+ bearer token in log messages.</p>
+
+ <p>This was fixed with commit
+ <a
href="https://github.com/apache/tomcat/commit/f593292a082e5ef9336a8db2b4b522f7f3e36976">f593292a</a>.</p>
+
+ <p>This issue was reported to the Tomcat security team on 25 March 2026.
+ The issue was made public on 9 April 2026.</p>
+
+ <p>Affects: 9.0.13 to 9.0.116</p>
+
+ <p><strong>Important: The fix for <a
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-29146"
rel="nofollow">CVE-2026-29146</a> allowed the
+ bypass of the EncryptInterceptor</strong>
+ <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-34486"
rel="nofollow">CVE-2026-34486</a></p>
+
+ <p>An error in the fix for <a
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-29146"
rel="nofollow">CVE-2026-29146</a> allowed the
+ EncryptInterceptor to be bypassed.</p>
+
+ <p>This was fixed with commit
+ <a
href="https://github.com/apache/tomcat/commit/776e12b3e2b0b4507b8a3b62c187ceb0b74bf418">776e12b3</a>.</p>
+
+ <p>This issue was reported to the Tomcat security team on 26 March 2026.
+ The issue was made public on 9 April 2026.</p>
+
+ <p>Affects: 9.0.116</p>
+
+ <p><strong>Low: Incomplete escaping of JSON access logs</strong>
+ <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-34483"
rel="nofollow">CVE-2026-34483</a></p>
+
+ <p>Incomplete escaping when non-default values were used for the Connector
+ attributes relaxedPathChars and/or relaxedQueryChars allowed the
+ injection of arbitrary JSON into the JSON access log.</p>
+
+ <p>This was fixed with commit
+ <a
href="https://github.com/apache/tomcat/commit/97566842589d0b80de138ca719378861fd017d68">97566842</a>.</p>
+
+ <p>This issue was reported to the Tomcat security team on 25 March 2026.
+ The issue was made public on 9 April 2026.</p>
+
+ <p>Affects: 9.0.40 to 9.0.116</p>
+
+ </div><h3 id="Fixed_in_Apache_Tomcat_9.0.116"><span
class="pull-right">2026-03-20</span> Fixed in Apache Tomcat 9.0.116</h3><div
class="text">
+
+ <p><strong>Moderate: The fix for <a
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-66614"
rel="nofollow">CVE-2025-66614</a> was
+ incomplete</strong>
+ <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-32990"
rel="nofollow">CVE-2026-32990</a></p>
+
+ <p>The validation of SNI name and host name did not take account of
possible
+ differences in case allowing the strict SNI checks to be bypassed.</p>
+
+ <p>This was fixed with commit
+ <a
href="https://github.com/apache/tomcat/commit/95f7778248cac46d03e6af04de9c72a598be3a53">95f77782</a>.</p>
+
+ <p>This issue was reported to the Tomcat security team on 13 March 2026.
+ The issue was made public on 9 April 2026.</p>
+
+ <p>Affects: 9.0.113 to 9.0.115</p>
+
+ <p><strong>Important: EncryptInterceptor vulnerable to padding oracle
attack
+ by default</strong>
+ <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-29146"
rel="nofollow">CVE-2026-29146</a></p>
+
+ <p>The EncryptInterceptor used CBC by default which is vulnerable to a
+ padding Oracle attack.</p>
+
+ <p>This was fixed with commit
+ <a
href="https://github.com/apache/tomcat/commit/0112ed22abfccc3d54e44d91eb08804d0886acd1">0112ed22</a>.</p>
+
+ <p>This issue was reported to the Tomcat security team on 22 February 2026.
+ The issue was made public on 9 April 2026.</p>
+
+ <p>Affects: 9.0.13 to 9.0.115</p>
+
+ <p><strong>Moderate: OCSP checks sometimes soft-fail even when soft-fail is
+ disabled</strong>
+ <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-29145"
rel="nofollow">CVE-2026-29145</a></p>
+
+ <p>CLIENT_CERT authentication did not fail OCSP checks as expected for some
+ scenarios when soft fail was disabled.</p>
+
+ <p>This was fixed with commit
+ <a
href="https://github.com/apache/tomcat/commit/d1406df5ae0326f39f54c3f64ac30d8fca55cd5b">d1406df5</a>.</p>
+
+ <p>This issue was reported to the Tomcat security team on 26 February 2026.
+ The issue was made public on 9 April 2026.</p>
+
+ <p><strong>Low: Configured TLS cipher preference order not
preserved</strong>
+ <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-29129"
rel="nofollow">CVE-2026-29129</a></p>
+
+ <p>The additional of the ability to configure TLS 1.3 cipher suites did not
+ preserve the order of the configured cipher suites and ciphers.</p>
+
+ <p>This was fixed with commit
+ <a
href="https://github.com/apache/tomcat/commit/6db238562ec36ab1106db4d04843f8b33e7a0c06">6db23856</a>.</p>
+
+ <p>This was reported as a bug on 20 February 026 and the security
+ implications identified by the Tomcat security team the same day.
+ The issue was made public on 9 April 2026.</p>
+
+ <p>Affects: 9.0.114 to 9.0.115</p>
+
+ <p><strong>Low: Occasionally open redirect</strong>
+ <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-25854"
rel="nofollow">CVE-2026-25854</a></p>
+
+ <p>When a Tomcat node in a cluster with the LoadBalancerDrainingValve was
in
+ the disabled (draining) state, a specially crafted URL could be used to
+ trigger a redirect to a URI of the attackers choice.</p>
+
+ <p>This was fixed with commit
+ <a
href="https://github.com/apache/tomcat/commit/c5a45ae68d07f7a07be2a875e5b6772d66c4e5d0">c5a45ae6</a>.</p>
+
+ <p>This issue was reported to the Tomcat security team on 30 January 2026.
+ The issue was made public on 9 April 2026.</p>
+
+ <p>Affects: 9.0.0.M23 to 9.0.115</p>
+
+ <p><strong>Low: Request smuggling via invalid chunk extension</strong>
+ <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-24880"
rel="nofollow">CVE-2026-24880</a></p>
+
+ <p>Tomcat did not validate that contents of HTTP/1.1 chunk extensions. This
+ enabled a request smuggling attack if a reverse proxy in front of Tomcat
+ allowed CRLF sequences in an otherwise valid chunk extension.</p>
+
+ <p>This was fixed with commits
+ <a
href="https://github.com/apache/tomcat/commit/1b586d6aa8ae65726da5fa8799427b5d4718478a">1b586d6a</a>
and
+ <a
href="https://github.com/apache/tomcat/commit/6d478dbe18b7c4bb671c30fedf130309b0dab77c">6d478dbe</a>.</p>
+
+ <p>This issue was reported to the Tomcat security team on 19 January 2026.
+ The issue was made public on 9 April 2026.</p>
+
+ <p>Affects: 9.0.0.M1 to 9.0.115</p>
+
</div><h3 id="Fixed_in_Apache_Tomcat_9.0.115"><span
class="pull-right">2026-01-23</span> Fixed in Apache Tomcat 9.0.115</h3><div
class="text">
<p><strong>Moderate: Incomplete OCSP verification checks</strong>
Modified: tomcat/site/trunk/docs/security-native.html
==============================================================================
--- tomcat/site/trunk/docs/security-native.html Thu Apr 9 18:34:58 2026
(r1932932)
+++ tomcat/site/trunk/docs/security-native.html Thu Apr 9 19:03:04 2026
(r1932933)
@@ -1,6 +1,6 @@
<!DOCTYPE html SYSTEM "about:legacy-compat">
<html lang="en"><head><META http-equiv="Content-Type" content="text/html;
charset=UTF-8"><meta name="viewport" content="width=device-width,
initial-scale=1"><link href="res/css/tomcat.css" rel="stylesheet"
type="text/css"><link href="res/css/fonts/fonts.css" rel="stylesheet"
type="text/css"><title>Apache Tomcat® - Apache Tomcat APR/native Connector
vulnerabilities</title><meta name="author" content="Apache Tomcat
Project"><script
src="https://www.apachecon.com/event-images/snippet.js"></script></head><body><div
id="wrapper"><header id="header"><div class="clearfix"><div
class="menu-toggler pull-left" tabindex="1"><div
class="hamburger"></div></div><a href="http://tomcat.apache.org/"><img
class="tomcat-logo pull-left noPrint" alt="Tomcat Home"
src="res/images/tomcat.png"></a><h1 class="pull-left">Apache
Tomcat<sup>®</sup></h1><div class="asf-logos pull-right"><a
href="https://www.apache.org/foundation/contributing.html" target="_blank"
class="pull-left"><img src="https://www.
apache.org/images/SupportApache-small.png" class="support-asf" alt="Support
Apache"></a><a href="http://www.apache.org/" target="_blank"
class="pull-left"><img src="res/images/asf_logo_wide.svg" class="asf-logo"
alt="The Apache Software Foundation"></a></div></div></header><main
id="middle"><div><div id="mainLeft"><div id="nav-wrapper"><form
action="https://www.google.com/search" method="get"><div
class="searchbox"><input value="tomcat.apache.org" name="sitesearch"
type="hidden"><input aria-label="Search text" placeholder="Search…"
required="required" name="q" id="query"
type="search"><button>GO</button></div></form><div class="asfevents"><a
class="acevent" data-format="square"
data-width="150"></a></div><nav><div><h2>Apache Tomcat</h2><ul><li><a
href="./index.html">Home</a></li><li><a
href="./taglibs.html">Taglibs</a></li><li><a href="./maven-plugin.html">Maven
Plugin</a></li></ul></div><div><h2>Download</h2><ul><li><a
href="./whichversion.html">Which version?</a></li><li><a
href="https://tomcat.apache.org/download-11.cgi">Tomcat 11</a></li><li><a
href="https://tomcat.apache.org/download-10.cgi">Tomcat 10</a></li><li><a
href="https://tomcat.apache.org/download-90.cgi">Tomcat 9</a></li><li><a
href="https://tomcat.apache.org/download-migration.cgi">Tomcat Migration Tool
for Jakarta EE</a></li><li><a
href="https://tomcat.apache.org/download-connectors.cgi">Tomcat
Connectors</a></li><li><a
href="https://tomcat.apache.org/download-native.cgi">Tomcat
Native</a></li><li><a
href="https://tomcat.apache.org/download-taglibs.cgi">Taglibs</a></li><li><a
href="https://archive.apache.org/dist/tomcat/">Archives</a></li></ul></div><div><h2>Documentation</h2><ul><li><a
href="./tomcat-11.0-doc/index.html">Tomcat 11.0</a></li><li><a
href="./tomcat-10.1-doc/index.html">Tomcat 10.1</a></li><li><a
href="./tomcat-9.0-doc/index.html">Tomcat 9.0</a></li><li><a
href="./upgrading.html">Upgrading</a></li><li><a
href="./connectors-doc/index.html">Tomcat Connectors</a></li><li><a h
ref="./native-doc/index.html">Tomcat Native 2</a></li><li><a
href="./native-1.3-doc/index.html">Tomcat Native 1.3</a></li><li><a
href="https://cwiki.apache.org/confluence/display/TOMCAT">Wiki</a></li><li><a
href="./migration.html">Migration Guide</a></li><li><a
href="./presentations.html">Presentations</a></li><li><a
href="https://cwiki.apache.org/confluence/x/Bi8lBg">Specifications</a></li></ul></div><div><h2>Problems?</h2><ul><li><a
href="./security.html">Security Reports</a></li><li><a
href="./findhelp.html">Find help</a></li><li><a
href="https://cwiki.apache.org/confluence/display/TOMCAT/FAQ">FAQ</a></li><li><a
href="./lists.html">Mailing Lists</a></li><li><a href="./bugreport.html">Bug
Database</a></li></ul></div><div><h2>Get Involved</h2><ul><li><a
href="./getinvolved.html">Overview</a></li><li><a href="./source.html">Source
code</a></li><li><a href="./ci.html">Buildbot</a></li><li><a
href="./tools.html">Tools</a></li></ul></div><div><h2>Media</h2><ul><li><a
href="https://twit
ter.com/theapachetomcat">Twitter</a></li><li><a
href="https://www.youtube.com/c/ApacheTomcatOfficial">YouTube</a></li><li><a
href="https://blogs.apache.org/tomcat/">Blog</a></li></ul></div><div><h2>Misc</h2><ul><li><a
href="./whoweare.html">Who We Are</a></li><li><a
href="https://www.redbubble.com/people/comdev/works/30885254-apache-tomcat">Swag</a></li><li><a
href="./heritage.html">Heritage</a></li><li><a
href="http://www.apache.org">Apache Home</a></li><li><a
href="./resources.html">Resources</a></li><li><a
href="./contact.html">Contact</a></li><li><a
href="./legal.html">Legal</a></li><li><a
href="https://privacy.apache.org/policies/privacy-policy-public.html">Privacy</a></li><li><a
href="https://www.apache.org/foundation/contributing.html">Support
Apache</a></li><li><a
href="https://www.apache.org/foundation/sponsorship.html">Sponsorship</a></li><li><a
href="http://www.apache.org/foundation/thanks.html">Thanks</a></li><li><a
href="http://www.apache.org/licenses/">License</a></li>
</ul></div></nav></div></div><div id="mainRight"><div id="content"><h2
style="display: none;">Content</h2><h3 id="Table_of_Contents">Table of
Contents</h3><div class="text">
-<ul><li><a href="#Apache_Tomcat_APR/native_Connector_vulnerabilities">Apache
Tomcat APR/native Connector vulnerabilities</a></li><li><a
href="#Fixed_in_Apache_Tomcat_Native_Connector_2.0.12_/_1.3.5">Fixed in Apache
Tomcat Native Connector 2.0.12 / 1.3.5</a></li><li><a
href="#Fixed_in_Apache_Tomcat_Native_Connector_1.2.17">Fixed in Apache Tomcat
Native Connector 1.2.17</a></li><li><a
href="#Fixed_in_Apache_Tomcat_Native_Connector_1.2.16">Fixed in Apache Tomcat
Native Connector 1.2.16</a></li><li><a
href="#Not_a_vulnerability_in_the_Apache_Tomcat_APR/native_Connector">Not a
vulnerability in the Apache Tomcat APR/native Connector</a></li></ul>
+<ul><li><a href="#Apache_Tomcat_APR/native_Connector_vulnerabilities">Apache
Tomcat APR/native Connector vulnerabilities</a></li><li><a
href="#Fixed_in_Apache_Tomcat_Native_Connector_2.0.14_/_1.3.7">Fixed in Apache
Tomcat Native Connector 2.0.14 / 1.3.7</a></li><li><a
href="#Fixed_in_Apache_Tomcat_Native_Connector_2.0.12_/_1.3.5">Fixed in Apache
Tomcat Native Connector 2.0.12 / 1.3.5</a></li><li><a
href="#Fixed_in_Apache_Tomcat_Native_Connector_1.2.17">Fixed in Apache Tomcat
Native Connector 1.2.17</a></li><li><a
href="#Fixed_in_Apache_Tomcat_Native_Connector_1.2.16">Fixed in Apache Tomcat
Native Connector 1.2.16</a></li><li><a
href="#Not_a_vulnerability_in_the_Apache_Tomcat_APR/native_Connector">Not a
vulnerability in the Apache Tomcat APR/native Connector</a></li></ul>
</div><h3 id="Apache_Tomcat_APR/native_Connector_vulnerabilities">Apache
Tomcat APR/native Connector vulnerabilities</h3><div class="text">
<p>This page lists all security vulnerabilities fixed in released versions
of Apache Tomcat APR/native Connector. Each vulnerability is given a
@@ -19,6 +19,26 @@
vulnerabilities to the <a href="security.html">Tomcat
Security Team</a>.</p>
+ </div><h3 id="Fixed_in_Apache_Tomcat_Native_Connector_2.0.14_/_1.3.7">Fixed
in Apache Tomcat Native Connector 2.0.14 / 1.3.7</h3><div class="text">
+
+ <p><strong>Moderate: OCSP checks sometimes soft-fail even when soft-fail is
+ disabled</strong>
+ <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-29145"
rel="nofollow">CVE-2026-29145</a></p>
+
+ <p>CLIENT_CERT authentication did not fail OCSP checks as expected for some
+ scenarios when soft fail was disabled.</p>
+
+ <p>This was fixed with commit
+ <a
href="https://github.com/apache/tomcat-native/commit/bcea0ac214cae14fd1c2517d759a72465cfc62d3">bcea0ac2</a>
+ ()2.0.x) and
+ <a
href="https://github.com/apache/tomcat-native/commit/204f7f8a09adffce7ad02998dbc902f2b8c87253">204f7f8a</a>
+ (1.3.x).</p>
+
+ <p>This issue was reported to the Tomcat security team on 26 February 2026.
+ The issue was made public on 9 April 2026.</p>
+
+ <p>Affects: 1.3.0 to 1.3.6 and 2.0.0 to 2.0.13</p>
+
</div><h3 id="Fixed_in_Apache_Tomcat_Native_Connector_2.0.12_/_1.3.5">Fixed
in Apache Tomcat Native Connector 2.0.12 / 1.3.5</h3><div class="text">
<p><strong>Moderate: Incomplete OCSP verification checks</strong>
Modified: tomcat/site/trunk/xdocs/security-10.xml
==============================================================================
--- tomcat/site/trunk/xdocs/security-10.xml Thu Apr 9 18:34:58 2026
(r1932932)
+++ tomcat/site/trunk/xdocs/security-10.xml Thu Apr 9 19:03:04 2026
(r1932933)
@@ -56,6 +56,163 @@
<toc/>
</section>
+ <section name="Fixed in Apache Tomcat 10.1.54" rtext="2026-04-02">
+
+ <p><strong>Moderate: OCSP checks sometimes soft-fail with FFM even when
+ soft-fail is disabled</strong>
+ <cve>CVE-2026-34500</cve></p>
+
+ <p>CLIENT_CERT authentication does not fail as expected for some scenarios
+ when soft fail is disabled and FFM is used.</p>
+
+ <p>This was fixed with commit
+ <hashlink hash="29b56a56ce9e7d044b6162a99af0f38529b3a208"/>.</p>
+
+ <p>This issue was reported to the Tomcat security team on 25 March 2026.
+ The issue was made public on 9 April 2026.</p>
+
+ <p>Affects: 10.1.22 to 10.1.53</p>
+
+ <p><strong>Low: Cloud membership for clustering component exposed the
+ Kubernetes bearer token</strong>
+ <cve>CVE-2026-34487</cve></p>
+
+ <p>The cloud membership for clustering component exposed the Kubernetes
+ bearer token in log messages.</p>
+
+ <p>This was fixed with commit
+ <hashlink hash="5eff2a773b8b728083e5195b3183df1b9e12a03d"/>.</p>
+
+ <p>This issue was reported to the Tomcat security team on 25 March 2026.
+ The issue was made public on 9 April 2026.</p>
+
+ <p>Affects: 10.1.0-M1 to 10.1.53</p>
+
+ <p><strong>Important: The fix for <cve>CVE-2026-29146</cve> allowed the
+ bypass of the EncryptInterceptor</strong>
+ <cve>CVE-2026-34486</cve></p>
+
+ <p>An error in the fix for <cve>CVE-2026-29146</cve> allowed the
+ EncryptInterceptor to be bypassed.</p>
+
+ <p>This was fixed with commit
+ <hashlink hash="55f3eb9148233054fccfdf761141c6894a050be1"/>.</p>
+
+ <p>This issue was reported to the Tomcat security team on 26 March 2026.
+ The issue was made public on 9 April 2026.</p>
+
+ <p>Affects: 10.1.53</p>
+
+ <p><strong>Low: Incomplete escaping of JSON access logs</strong>
+ <cve>CVE-2026-34483</cve></p>
+
+ <p>Incomplete escaping when non-default values were used for the Connector
+ attributes relaxedPathChars and/or relaxedQueryChars allowed the
+ injection of arbitrary JSON into the JSON access log.</p>
+
+ <p>This was fixed with commit
+ <hashlink hash="f22dc2ce6cfda8609ed86816c0d78e1a9cbadb06"/>.</p>
+
+ <p>This issue was reported to the Tomcat security team on 25 March 2026.
+ The issue was made public on 9 April 2026.</p>
+
+ <p>Affects: 10.1.0-M1 to 10.1.53</p>
+
+ </section>
+
+ <section name="Fixed in Apache Tomcat 10.1.53" rtext="2026-03-23">
+
+ <p><strong>Moderate: The fix for <cve>CVE-2025-66614</cve> was
+ incomplete</strong>
+ <cve>CVE-2026-32990</cve></p>
+
+ <p>The validation of SNI name and host name did not take account of
possible
+ differences in case allowing the strict SNI checks to be bypassed.</p>
+
+ <p>This was fixed with commit
+ <hashlink hash="4d0615a5c718c260d6d4e0b944a050f09a490c02"/>.</p>
+
+ <p>This issue was reported to the Tomcat security team on 13 March 2026.
+ The issue was made public on 9 April 2026.</p>
+
+ <p>Affects: 10.1.50 to 10.1.52</p>
+
+ <p><strong>Important: EncryptInterceptor vulnerable to padding oracle
attack
+ by default</strong>
+ <cve>CVE-2026-29146</cve></p>
+
+ <p>The EncryptInterceptor used CBC by default which is vulnerable to a
+ padding Oracle attack.</p>
+
+ <p>This was fixed with commit
+ <hashlink hash="607ebc0fa522bd9e8c05517baa2d179bbd1e659c"/>.</p>
+
+ <p>This issue was reported to the Tomcat security team on 22 February 2026.
+ The issue was made public on 9 April 2026.</p>
+
+ <p>Affects: 10.0.0-M1 to 10.1.52</p>
+
+ <p><strong>Moderate: OCSP checks sometimes soft-fail even when soft-fail is
+ disabled</strong>
+ <cve>CVE-2026-29145</cve></p>
+
+ <p>CLIENT_CERT authentication did not fail OCSP checks as expected for some
+ scenarios when soft fail was disabled.</p>
+
+ <p>This was fixed with commit
+ <hashlink hash="fe26667cd2385045ac73f4dea086cc9971209b90"/>.</p>
+
+ <p>This issue was reported to the Tomcat security team on 26 February 2026.
+ The issue was made public on 9 April 2026.</p>
+
+ <p><strong>Low: Configured TLS cipher preference order not
preserved</strong>
+ <cve>CVE-2026-29129</cve></p>
+
+ <p>The additional of the ability to configure TLS 1.3 cipher suites did not
+ preserve the order of the configured cipher suites and ciphers.</p>
+
+ <p>This was fixed with commit
+ <hashlink hash="8d69b33764dba81dce89e3a768de6093a35620ae"/>.</p>
+
+ <p>This was reported as a bug on 20 February 026 and the security
+ implications identified by the Tomcat security team the same day.
+ The issue was made public on 9 April 2026.</p>
+
+ <p>Affects: 10.1.51 to 10.1.52</p>
+
+ <p><strong>Low: Occasionally open redirect</strong>
+ <cve>CVE-2026-25854</cve></p>
+
+ <p>When a Tomcat node in a cluster with the LoadBalancerDrainingValve was
in
+ the disabled (draining) state, a specially crafted URL could be used to
+ trigger a redirect to a URI of the attackers choice.</p>
+
+ <p>This was fixed with commit
+ <hashlink hash="5fb910f9a9dafa37a0c0965a1bd62a21dcf437f2"/>.</p>
+
+ <p>This issue was reported to the Tomcat security team on 30 January 2026.
+ The issue was made public on 9 April 2026.</p>
+
+ <p>Affects: 10.1.0-M1 to 10.1.52</p>
+
+ <p><strong>Low: Request smuggling via invalid chunk extension</strong>
+ <cve>CVE-2026-24880</cve></p>
+
+ <p>Tomcat did not validate that contents of HTTP/1.1 chunk extensions. This
+ enabled a request smuggling attack if a reverse proxy in front of Tomcat
+ allowed CRLF sequences in an otherwise valid chunk extension.</p>
+
+ <p>This was fixed with commits
+ <hashlink hash="f07df938d00f7419b40fa65aa912966d0efac522"/> and
+ <hashlink hash="1e71441a15972f56e661b0b549fb9e5d838b83bb"/>.</p>
+
+ <p>This issue was reported to the Tomcat security team on 19 January 2026.
+ The issue was made public on 9 April 2026.</p>
+
+ <p>Affects: 10.1.0-M1 to 10.1.52</p>
+
+ </section>
+
<section name="Fixed in Apache Tomcat 10.1.52" rtext="2026-01-27">
<p><strong>Moderate: Incomplete OCSP verification checks</strong>
Modified: tomcat/site/trunk/xdocs/security-11.xml
==============================================================================
--- tomcat/site/trunk/xdocs/security-11.xml Thu Apr 9 18:34:58 2026
(r1932932)
+++ tomcat/site/trunk/xdocs/security-11.xml Thu Apr 9 19:03:04 2026
(r1932933)
@@ -50,6 +50,171 @@
<toc/>
</section>
+ <section name="Fixed in Apache Tomcat 11.0.21" rtext="2026-04-04">
+
+ <p><strong>Moderate: OCSP checks sometimes soft-fail with FFM even when
+ soft-fail is disabled</strong>
+ <cve>CVE-2026-34500</cve></p>
+
+ <p>CLIENT_CERT authentication did not fail as expected for some scenarios
+ when soft fail was disabled and FFM was used.</p>
+
+ <p>This was fixed with commit
+ <hashlink hash="c13e60e732ea6d07087293a41ad1866c20848271"/>.</p>
+
+ <p>This issue was reported to the Tomcat security team on 25 March 2026.
+ The issue was made public on 9 April 2026.</p>
+
+ <p>Affects: 11.0.0-M14 to 11.0.20</p>
+
+ <p><strong>Low: Cloud membership for clustering component exposed the
+ Kubernetes bearer token</strong>
+ <cve>CVE-2026-34487</cve></p>
+
+ <p>The cloud membership for clustering component exposed the Kubernetes
+ bearer token in log messages.</p>
+
+ <p>This was fixed with commit
+ <hashlink hash="301bc6efbf72feb14dacfdfa3f50372182736150"/>.</p>
+
+ <p>This issue was reported to the Tomcat security team on 25 March 2026.
+ The issue was made public on 9 April 2026.</p>
+
+ <p>Affects: 11.0.0-M1 to 11.0.20</p>
+
+ <p><strong>Important: The fix for <cve>CVE-2026-29146</cve> allowed the
+ bypass of the EncryptInterceptor</strong>
+ <cve>CVE-2026-34486</cve></p>
+
+ <p>An error in the fix for <cve>CVE-2026-29146</cve> allowed the
+ EncryptInterceptor to be bypassed.</p>
+
+ <p>This was fixed with commit
+ <hashlink hash="1fab40ccc752e22639eccfe290d5624afad7eccd"/>.</p>
+
+ <p>This issue was reported to the Tomcat security team on 26 March 2026.
+ The issue was made public on 9 April 2026.</p>
+
+ <p>Affects: 11.0.20</p>
+
+ <p><strong>Low: Incomplete escaping of JSON access logs</strong>
+ <cve>CVE-2026-34483</cve></p>
+
+ <p>Incomplete escaping when non-default values were used for the Connector
+ attributes relaxedPathChars and/or relaxedQueryChars allowed the
+ injection of arbitrary JSON into the JSON access log.</p>
+
+ <p>This was fixed with commit
+ <hashlink hash="f9ddc24fcfcdfaea4a6953198d8636aca3e957bc"/>.</p>
+
+ <p>This issue was reported to the Tomcat security team on 25 March 2026.
+ The issue was made public on 9 April 2026.</p>
+
+ <p>Affects: 11.0.0-M1 to 11.0.20</p>
+
+ </section>
+
+ <section name="Fixed in Apache Tomcat 11.0.20" rtext="2026-03-20">
+
+ <p><strong>Moderate: The fix for <cve>CVE-2025-66614</cve> was
+ incomplete</strong>
+ <cve>CVE-2026-32990</cve></p>
+
+ <p>The validation of SNI name and host name did not take account of
possible
+ differences in case allowing the strict SNI checks to be bypassed.</p>
+
+ <p>This was fixed with commit
+ <hashlink hash="021d1f833e38b683a44688f7b28f1f27e8e37c36"/>.</p>
+
+ <p>This issue was reported to the Tomcat security team on 13 March 2026.
+ The issue was made public on 9 April 2026.</p>
+
+ <p>Affects: 11.0.15 to 11.0.19</p>
+
+ <p><i>Note: The issues below were fixed in Apache Tomcat 11.0.19 but the
+ release vote for the 11.0.19 release candidate did not pass. Therefore,
+ although users must download 11.0.20 to obtain a version that includes
+ a fix for these issues, version 11.0.19 is not included in the list of
+ affected versions.</i></p>
+
+ <p><strong>Important: EncryptInterceptor vulnerable to padding oracle
attack
+ by default</strong>
+ <cve>CVE-2026-29146</cve></p>
+
+ <p>The EncryptInterceptor used CBC by default which is vulnerable to a
+ padding Oracle attack.</p>
+
+ <p>This was fixed with commit
+ <hashlink hash="6d955cceca841f2eabf2d6c46b59a8c7e1cd6eaa"/>.</p>
+
+ <p>This issue was reported to the Tomcat security team on 22 February 2026.
+ The issue was made public on 9 April 2026.</p>
+
+ <p>Affects: 11.0.0-M1 to 11.0.18</p>
+
+ <p><strong>Moderate: OCSP checks sometimes soft-fail even when soft-fail is
+ disabled</strong>
+ <cve>CVE-2026-29145</cve></p>
+
+ <p>CLIENT_CERT authentication did not fail OCSP checks as expected for some
+ scenarios when soft fail was disabled.</p>
+
+ <p>This was fixed with commit
+ <hashlink hash="721591f7bff424c693f26adc18ae9b9abac3655b"/>.</p>
+
+ <p>This issue was reported to the Tomcat security team on 26 February 2026.
+ The issue was made public on 9 April 2026.</p>
+
+ <p>Affects: 11.0.0-M1 to 11.0.18</p>
+
+ <p><strong>Low: Configured TLS cipher preference order not
preserved</strong>
+ <cve>CVE-2026-29129</cve></p>
+
+ <p>The additional of the ability to configure TLS 1.3 cipher suites did not
+ preserve the order of the configured cipher suites and ciphers.</p>
+
+ <p>This was fixed with commit
+ <hashlink hash="5cfa876d73f1ff5f4dc8309c4320f684cbeff74e"/>.</p>
+
+ <p>This was reported as a bug on 20 February 026 and the security
+ implications identified by the Tomcat security team the same day.
+ The issue was made public on 9 April 2026.</p>
+
+ <p>Affects: 11.0.16 to 11.0.18</p>
+
+ <p><strong>Low: Occasionally open redirect</strong>
+ <cve>CVE-2026-25854</cve></p>
+
+ <p>When a Tomcat node in a cluster with the LoadBalancerDrainingValve was
in
+ the disabled (draining) state, a specially crafted URL could be used to
+ trigger a redirect to a URI of the attackers choice.</p>
+
+ <p>This was fixed with commit
+ <hashlink hash="4c5d306001b780c9316aea5ff6502c524fb20695"/>.</p>
+
+ <p>This issue was reported to the Tomcat security team on 30 January 2026.
+ The issue was made public on 9 April 2026.</p>
+
+ <p>Affects: 11.0.0-M1 to 11.0.18</p>
+
+ <p><strong>Low: Request smuggling via invalid chunk extension</strong>
+ <cve>CVE-2026-24880</cve></p>
+
+ <p>Tomcat did not validate that contents of HTTP/1.1 chunk extensions. This
+ enabled a request smuggling attack if a reverse proxy in front of Tomcat
+ allowed CRLF sequences in an otherwise valid chunk extension.</p>
+
+ <p>This was fixed with commits
+ <hashlink hash="fde1a8235fb73125217bd41e162aa0a113f33552"/> and
+ <hashlink hash="2cb06c34f661ca42f7570bbcc21e99806184bcc5"/>.</p>
+
+ <p>This issue was reported to the Tomcat security team on 19 January 2026.
+ The issue was made public on 9 April 2026.</p>
+
+ <p>Affects: 11.0.0-M1 to 11.0.18</p>
+
+ </section>
+
<section name="Fixed in Apache Tomcat 11.0.18" rtext="2026-01-26">
<p><strong>Moderate: Incomplete OCSP verification checks</strong>
Modified: tomcat/site/trunk/xdocs/security-9.xml
==============================================================================
--- tomcat/site/trunk/xdocs/security-9.xml Thu Apr 9 18:34:58 2026
(r1932932)
+++ tomcat/site/trunk/xdocs/security-9.xml Thu Apr 9 19:03:04 2026
(r1932933)
@@ -50,6 +50,162 @@
<toc/>
</section>
+ <section name="Fixed in Apache Tomcat 9.0.117" rtext="2026-04-03">
+
+ <p><strong>Moderate: OCSP checks sometimes soft-fail with FFM even when
+ soft-fail is disabled</strong>
+ <cve>CVE-2026-34500</cve></p>
+
+ <p>CLIENT_CERT authentication does not fail as expected for some scenarios
+ when soft fail is disabled and FFM is used.</p>
+
+ <p>This was fixed with commit
+ <hashlink hash="ff589ab26e8250a2ca4286d986305318c033ff9f"/>.</p>
+
+ <p>This issue was reported to the Tomcat security team on 25 March 2026.
+ The issue was made public on 9 April 2026.</p>
+
+ <p>Affects: 9.0.92 to 9.0.116</p>
+
+ <p><strong>Low: Cloud membership for clustering component exposed the
+ Kubernetes bearer token</strong>
+ <cve>CVE-2026-34487</cve></p>
+
+ <p>The cloud membership for clustering component exposed the Kubernetes
+ bearer token in log messages.</p>
+
+ <p>This was fixed with commit
+ <hashlink hash="f593292a082e5ef9336a8db2b4b522f7f3e36976"/>.</p>
+
+ <p>This issue was reported to the Tomcat security team on 25 March 2026.
+ The issue was made public on 9 April 2026.</p>
+
+ <p>Affects: 9.0.13 to 9.0.116</p>
+
+ <p><strong>Important: The fix for <cve>CVE-2026-29146</cve> allowed the
+ bypass of the EncryptInterceptor</strong>
+ <cve>CVE-2026-34486</cve></p>
+
+ <p>An error in the fix for <cve>CVE-2026-29146</cve> allowed the
+ EncryptInterceptor to be bypassed.</p>
+
+ <p>This was fixed with commit
+ <hashlink hash="776e12b3e2b0b4507b8a3b62c187ceb0b74bf418"/>.</p>
+
+ <p>This issue was reported to the Tomcat security team on 26 March 2026.
+ The issue was made public on 9 April 2026.</p>
+
+ <p>Affects: 9.0.116</p>
+
+ <p><strong>Low: Incomplete escaping of JSON access logs</strong>
+ <cve>CVE-2026-34483</cve></p>
+
+ <p>Incomplete escaping when non-default values were used for the Connector
+ attributes relaxedPathChars and/or relaxedQueryChars allowed the
+ injection of arbitrary JSON into the JSON access log.</p>
+
+ <p>This was fixed with commit
+ <hashlink hash="97566842589d0b80de138ca719378861fd017d68"/>.</p>
+
+ <p>This issue was reported to the Tomcat security team on 25 March 2026.
+ The issue was made public on 9 April 2026.</p>
+
+ <p>Affects: 9.0.40 to 9.0.116</p>
+
+ </section>
+
+ <section name="Fixed in Apache Tomcat 9.0.116" rtext="2026-03-20">
+
+ <p><strong>Moderate: The fix for <cve>CVE-2025-66614</cve> was
+ incomplete</strong>
+ <cve>CVE-2026-32990</cve></p>
+
+ <p>The validation of SNI name and host name did not take account of
possible
+ differences in case allowing the strict SNI checks to be bypassed.</p>
+
+ <p>This was fixed with commit
+ <hashlink hash="95f7778248cac46d03e6af04de9c72a598be3a53"/>.</p>
+
+ <p>This issue was reported to the Tomcat security team on 13 March 2026.
+ The issue was made public on 9 April 2026.</p>
+
+ <p>Affects: 9.0.113 to 9.0.115</p>
+
+ <p><strong>Important: EncryptInterceptor vulnerable to padding oracle
attack
+ by default</strong>
+ <cve>CVE-2026-29146</cve></p>
+
+ <p>The EncryptInterceptor used CBC by default which is vulnerable to a
+ padding Oracle attack.</p>
+
+ <p>This was fixed with commit
+ <hashlink hash="0112ed22abfccc3d54e44d91eb08804d0886acd1"/>.</p>
+
+ <p>This issue was reported to the Tomcat security team on 22 February 2026.
+ The issue was made public on 9 April 2026.</p>
+
+ <p>Affects: 9.0.13 to 9.0.115</p>
+
+ <p><strong>Moderate: OCSP checks sometimes soft-fail even when soft-fail is
+ disabled</strong>
+ <cve>CVE-2026-29145</cve></p>
+
+ <p>CLIENT_CERT authentication did not fail OCSP checks as expected for some
+ scenarios when soft fail was disabled.</p>
+
+ <p>This was fixed with commit
+ <hashlink hash="d1406df5ae0326f39f54c3f64ac30d8fca55cd5b"/>.</p>
+
+ <p>This issue was reported to the Tomcat security team on 26 February 2026.
+ The issue was made public on 9 April 2026.</p>
+
+ <p><strong>Low: Configured TLS cipher preference order not
preserved</strong>
+ <cve>CVE-2026-29129</cve></p>
+
+ <p>The additional of the ability to configure TLS 1.3 cipher suites did not
+ preserve the order of the configured cipher suites and ciphers.</p>
+
+ <p>This was fixed with commit
+ <hashlink hash="6db238562ec36ab1106db4d04843f8b33e7a0c06"/>.</p>
+
+ <p>This was reported as a bug on 20 February 026 and the security
+ implications identified by the Tomcat security team the same day.
+ The issue was made public on 9 April 2026.</p>
+
+ <p>Affects: 9.0.114 to 9.0.115</p>
+
+ <p><strong>Low: Occasionally open redirect</strong>
+ <cve>CVE-2026-25854</cve></p>
+
+ <p>When a Tomcat node in a cluster with the LoadBalancerDrainingValve was
in
+ the disabled (draining) state, a specially crafted URL could be used to
+ trigger a redirect to a URI of the attackers choice.</p>
+
+ <p>This was fixed with commit
+ <hashlink hash="c5a45ae68d07f7a07be2a875e5b6772d66c4e5d0"/>.</p>
+
+ <p>This issue was reported to the Tomcat security team on 30 January 2026.
+ The issue was made public on 9 April 2026.</p>
+
+ <p>Affects: 9.0.0.M23 to 9.0.115</p>
+
+ <p><strong>Low: Request smuggling via invalid chunk extension</strong>
+ <cve>CVE-2026-24880</cve></p>
+
+ <p>Tomcat did not validate that contents of HTTP/1.1 chunk extensions. This
+ enabled a request smuggling attack if a reverse proxy in front of Tomcat
+ allowed CRLF sequences in an otherwise valid chunk extension.</p>
+
+ <p>This was fixed with commits
+ <hashlink hash="1b586d6aa8ae65726da5fa8799427b5d4718478a"/> and
+ <hashlink hash="6d478dbe18b7c4bb671c30fedf130309b0dab77c"/>.</p>
+
+ <p>This issue was reported to the Tomcat security team on 19 January 2026.
+ The issue was made public on 9 April 2026.</p>
+
+ <p>Affects: 9.0.0.M1 to 9.0.115</p>
+
+ </section>
<section name="Fixed in Apache Tomcat 9.0.115" rtext="2026-01-23">
<p><strong>Moderate: Incomplete OCSP verification checks</strong>
Modified: tomcat/site/trunk/xdocs/security-native.xml
==============================================================================
--- tomcat/site/trunk/xdocs/security-native.xml Thu Apr 9 18:34:58 2026
(r1932932)
+++ tomcat/site/trunk/xdocs/security-native.xml Thu Apr 9 19:03:04 2026
(r1932933)
@@ -32,6 +32,28 @@
</section>
+ <section name="Fixed in Apache Tomcat Native Connector 2.0.14 / 1.3.7">
+
+ <p><strong>Moderate: OCSP checks sometimes soft-fail even when soft-fail is
+ disabled</strong>
+ <cve>CVE-2026-29145</cve></p>
+
+ <p>CLIENT_CERT authentication did not fail OCSP checks as expected for some
+ scenarios when soft fail was disabled.</p>
+
+ <p>This was fixed with commit
+ <a
href="https://github.com/apache/tomcat-native/commit/bcea0ac214cae14fd1c2517d759a72465cfc62d3">bcea0ac2</a>
+ ()2.0.x) and
+ <a
href="https://github.com/apache/tomcat-native/commit/204f7f8a09adffce7ad02998dbc902f2b8c87253">204f7f8a</a>
+ (1.3.x).</p>
+
+ <p>This issue was reported to the Tomcat security team on 26 February 2026.
+ The issue was made public on 9 April 2026.</p>
+
+ <p>Affects: 1.3.0 to 1.3.6 and 2.0.0 to 2.0.13</p>
+
+ </section>
+
<section name="Fixed in Apache Tomcat Native Connector 2.0.12 / 1.3.5">
<p><strong>Moderate: Incomplete OCSP verification checks</strong>
---------------------------------------------------------------------
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]