Author: markt
Date: Tue May 12 15:06:05 2026
New Revision: 1934143

Log:
Add CVEs fixed in May releases

Modified:
   tomcat/site/trunk/docs/security-10.html
   tomcat/site/trunk/docs/security-11.html
   tomcat/site/trunk/docs/security-9.html
   tomcat/site/trunk/xdocs/security-10.xml
   tomcat/site/trunk/xdocs/security-11.xml
   tomcat/site/trunk/xdocs/security-9.xml

Modified: tomcat/site/trunk/docs/security-10.html
==============================================================================
--- tomcat/site/trunk/docs/security-10.html     Tue May 12 14:11:24 2026        
(r1934142)
+++ tomcat/site/trunk/docs/security-10.html     Tue May 12 15:06:05 2026        
(r1934143)
@@ -42,7 +42,117 @@
     </p>
 
   </div><h3 id="Table_of_Contents">Table of Contents</h3><div class="text">
-    <ul><li><a href="#Fixed_in_Apache_Tomcat_10.1.54">Fixed in Apache Tomcat 
10.1.54</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.53">Fixed in Apache 
Tomcat 10.1.53</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.52">Fixed in 
Apache Tomcat 10.1.52</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_10.1.50">Fixed in Apache Tomcat 
10.1.50</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.47">Fixed in Apache 
Tomcat 10.1.47</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.45">Fixed in 
Apache Tomcat 10.1.45</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_10.1.44">Fixed in Apache Tomcat 
10.1.44</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.43">Fixed in Apache 
Tomcat 10.1.43</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.42">Fixed in 
Apache Tomcat 10.1.42</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_10.1.41">Fixed in Apache Tomcat 
10.1.41</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.40">Fixed in Apache 
Tomcat 10.1.40</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.35">Fixed in
  Apache Tomcat 10.1.35</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_10.1.34">Fixed in Apache Tomcat 
10.1.34</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.33">Fixed in Apache 
Tomcat 10.1.33</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.31">Fixed in 
Apache Tomcat 10.1.31</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_10.1.25">Fixed in Apache Tomcat 
10.1.25</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.19">Fixed in Apache 
Tomcat 10.1.19</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.16">Fixed in 
Apache Tomcat 10.1.16</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_10.1.14">Fixed in Apache Tomcat 
10.1.14</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.13">Fixed in Apache 
Tomcat 10.1.13</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.9">Fixed in 
Apache Tomcat 10.1.9</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.8">Fixed 
in Apache Tomcat 10.1.8</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_10.1.6">Fixed in Apache Tomcat 
10.1.6</a></li><li><a href="#Fixed_in_Apache_Tomcat_
 10.1.5">Fixed in Apache Tomcat 10.1.5</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_10.1.2">Fixed in Apache Tomcat 
10.1.2</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.1">Fixed in Apache 
Tomcat 10.1.1</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.27">Fixed in 
Apache Tomcat 10.0.27</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_10.0.23">Fixed in Apache Tomcat 
10.0.23</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.0-M17">Fixed in 
Apache Tomcat 10.1.0-M17</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_10.0.21">Fixed in Apache Tomcat 
10.0.21</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.0-M15">Fixed in 
Apache Tomcat 10.1.0-M15</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_10.0.20">Fixed in Apache Tomcat 
10.0.20</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.0-M14">Fixed in 
Apache Tomcat 10.1.0-M14</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_10.0.16">Fixed in Apache Tomcat 
10.0.16</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.0-M10">Fixed in 
Apache Tomcat 10.1.0-M10</a><
 /li><li><a href="#Fixed_in_Apache_Tomcat_10.0.12">Fixed in Apache Tomcat 
10.0.12</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.0-M6">Fixed in Apache 
Tomcat 10.1.0-M6</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.7">Fixed in 
Apache Tomcat 10.0.7</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.6">Fixed 
in Apache Tomcat 10.0.6</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_10.0.5">Fixed in Apache Tomcat 
10.0.5</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.4">Fixed in Apache 
Tomcat 10.0.4</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.2">Fixed in 
Apache Tomcat 10.0.2</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_10.0.0-M10">Fixed in Apache Tomcat 
10.0.0-M10</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.0-M8">Fixed in 
Apache Tomcat 10.0.0-M8</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_10.0.0-M7">Fixed in Apache Tomcat 
10.0.0-M7</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.0-M6">Fixed in 
Apache Tomcat 10.0.0-M6</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.0-M5
 ">Fixed in Apache Tomcat 10.0.0-M5</a></li><li><a 
href="#Not_a_vulnerability_in_Tomcat">Not a vulnerability in 
Tomcat</a></li></ul>
+    <ul><li><a href="#Fixed_in_Apache_Tomcat_10.1.55">Fixed in Apache Tomcat 
10.1.55</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.54">Fixed in Apache 
Tomcat 10.1.54</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.53">Fixed in 
Apache Tomcat 10.1.53</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_10.1.52">Fixed in Apache Tomcat 
10.1.52</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.50">Fixed in Apache 
Tomcat 10.1.50</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.47">Fixed in 
Apache Tomcat 10.1.47</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_10.1.45">Fixed in Apache Tomcat 
10.1.45</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.44">Fixed in Apache 
Tomcat 10.1.44</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.43">Fixed in 
Apache Tomcat 10.1.43</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_10.1.42">Fixed in Apache Tomcat 
10.1.42</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.41">Fixed in Apache 
Tomcat 10.1.41</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.40">Fixed in
  Apache Tomcat 10.1.40</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_10.1.35">Fixed in Apache Tomcat 
10.1.35</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.34">Fixed in Apache 
Tomcat 10.1.34</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.33">Fixed in 
Apache Tomcat 10.1.33</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_10.1.31">Fixed in Apache Tomcat 
10.1.31</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.25">Fixed in Apache 
Tomcat 10.1.25</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.19">Fixed in 
Apache Tomcat 10.1.19</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_10.1.16">Fixed in Apache Tomcat 
10.1.16</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.14">Fixed in Apache 
Tomcat 10.1.14</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.13">Fixed in 
Apache Tomcat 10.1.13</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_10.1.9">Fixed in Apache Tomcat 
10.1.9</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.8">Fixed in Apache 
Tomcat 10.1.8</a></li><li><a href="#Fixed_in_Apache_Tomca
 t_10.1.6">Fixed in Apache Tomcat 10.1.6</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_10.1.5">Fixed in Apache Tomcat 
10.1.5</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.2">Fixed in Apache 
Tomcat 10.1.2</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.1">Fixed in 
Apache Tomcat 10.1.1</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_10.0.27">Fixed in Apache Tomcat 
10.0.27</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.23">Fixed in Apache 
Tomcat 10.0.23</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.0-M17">Fixed 
in Apache Tomcat 10.1.0-M17</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_10.0.21">Fixed in Apache Tomcat 
10.0.21</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.0-M15">Fixed in 
Apache Tomcat 10.1.0-M15</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_10.0.20">Fixed in Apache Tomcat 
10.0.20</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.0-M14">Fixed in 
Apache Tomcat 10.1.0-M14</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_10.0.16">Fixed in Apache Tomcat 10.0.16</a></li><l
 i><a href="#Fixed_in_Apache_Tomcat_10.1.0-M10">Fixed in Apache Tomcat 
10.1.0-M10</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.12">Fixed in 
Apache Tomcat 10.0.12</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_10.1.0-M6">Fixed in Apache Tomcat 
10.1.0-M6</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.7">Fixed in Apache 
Tomcat 10.0.7</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.6">Fixed in 
Apache Tomcat 10.0.6</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.5">Fixed 
in Apache Tomcat 10.0.5</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_10.0.4">Fixed in Apache Tomcat 
10.0.4</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.2">Fixed in Apache 
Tomcat 10.0.2</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.0-M10">Fixed in 
Apache Tomcat 10.0.0-M10</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_10.0.0-M8">Fixed in Apache Tomcat 
10.0.0-M8</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.0-M7">Fixed in 
Apache Tomcat 10.0.0-M7</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_10.0.0-M6">Fi
 xed in Apache Tomcat 10.0.0-M6</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_10.0.0-M5">Fixed in Apache Tomcat 
10.0.0-M5</a></li><li><a href="#Not_a_vulnerability_in_Tomcat">Not a 
vulnerability in Tomcat</a></li></ul>
+  </div><h3 id="Fixed_in_Apache_Tomcat_10.1.55"><span 
class="pull-right">2026-05-11</span> Fixed in Apache Tomcat 10.1.55</h3><div 
class="text">
+
+    <p><strong>Moderate: Security constraints not correctly applied</strong>
+       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-43515"; 
rel="nofollow">CVE-2026-43515</a></p>
+
+    <p>When multiple security constraints defined an HTTP method constraint for
+       the same extension pattern, only the first method constraint was
+       applied.</p>
+
+    <p>This was fixed with commit
+       <a 
href="https://github.com/apache/tomcat/commit/c621317382682206fb58ab92ebd3e1b6fdd10ce9";>c6213173</a>.</p>
+
+    <p>This issue was reported to the Tomcat security team on 20 April 2026.
+       The issue was made public on 12 May 2026.</p>
+
+    <p>Affects: 10.1.0-M1 to 10.1.54</p>
+
+    <p><strong>Low: AJP secret compared in non-constant time</strong>
+       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-43514"; 
rel="nofollow">CVE-2026-43514</a></p>
+
+    <p>The AJP secret was compared in non-constant time allowing an attacker on
+       the local network to mount a timing attack to determine the AJP
+       secret.</p>
+
+    <p>This was fixed with commit
+       <a 
href="https://github.com/apache/tomcat/commit/a102a2a157868ca51d83eaf5a119ccd9976a113e";>a102a2a1</a>.</p>
+
+    <p>This issue was reported to the Tomcat security team on 20 April 2026.
+       The issue was made public on 12 May 2026.</p>
+
+    <p>Affects: 10.1.0-M1 to 10.1.54</p>
+
+    <p><strong>Low: LockOutRealm treats user names as case-sensitive</strong>
+       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-43513"; 
rel="nofollow">CVE-2026-43513</a></p>
+
+    <p>The LockOut Realm treated user names as case sensitive meaning that, for
+       Realms where the user name was case insensitive, the LockOut Realm was
+       not as effective at blocking brute force attacks against a user's
+       password.</p>
+
+    <p>This was fixed with commit
+       <a 
href="https://github.com/apache/tomcat/commit/4a90d3fa93988c447cd5bb7482f76ff70d7f15c2";>4a90d3fa</a>.</p>
+
+    <p>This issue was reported to the Tomcat security team on 20 April 2026.
+       The issue was made public on 12 May 2026.</p>
+
+    <p>Affects: 10.1.0-M1 to 10.1.54</p>
+
+    <p><strong>Moderate: Digest authenticator will authenticate any unknown 
user</strong>
+       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-43512"; 
rel="nofollow">CVE-2026-43512</a></p>
+
+    <p>When DIGEST authentication was configured, any user not known to the
+       configured Realm would be authenticated if they presented the password
+       "null".</p>
+
+    <p>This was fixed with commit
+       <a 
href="https://github.com/apache/tomcat/commit/3d4d3fae07a6cd9c2eb193c5491001740ec64448";>3d4d3fae</a>.</p>
+
+    <p>This issue was reported to the Tomcat security team on 20 April 2026.
+       The issue was made public on 12 May 2026.</p>
+
+    <p>Affects: 10.1.0-M1 to 10.1.54</p>
+
+    <p><strong>Low: WebSocket authentication header exposure</strong>
+       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-42498"; 
rel="nofollow">CVE-2026-42498</a></p>
+
+    <p>If a WebSocket request was redirected after authentication, Tomcat's
+       WebSocket client would present the most recent authentication header to
+       the redirect target host.</p>
+
+    <p>This was fixed with commit
+       <a 
href="https://github.com/apache/tomcat/commit/6cbe274592ef2d11607b5b188e1df649de52f8d5";>6cbe2745</a>.</p>
+
+    <p>This issue was reported to the Tomcat security team on 21 April 2026.
+       The issue was made public on 12 May 2026.</p>
+
+    <p>Affects: 10.1.0-M1 to 10.1.54</p>
+
+    <p><strong>Low: HTTP/2 request headers not validated</strong>
+       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-41293"; 
rel="nofollow">CVE-2026-41293</a></p>
+
+    <p>HTTP/2 request headers were not validated which may have triggered
+       unexpected application behaviour if the application (quite reasonably)
+       assumed that header value exposed through the Servlet API would be
+       specification compliant.</p>
+
+    <p>This was fixed with commits
+       <a 
href="https://github.com/apache/tomcat/commit/19f17a257797e8d139b33ff9c88d362a273be148";>19f17a25</a>,
+       <a 
href="https://github.com/apache/tomcat/commit/f72a6174ab1f0f5a053435f80448b4f6837fe6d7";>f72a6174</a>
 and
+       <a 
href="https://github.com/apache/tomcat/commit/2a2476460e823789f530a22207873ea8cd6eff3b";>2a247646</a>.</p>
+
+    <p>This issue was reported to the Tomcat security team on 15 April 2026.
+       The issue was made public on 12 May 2026.</p>
+
+    <p>Affects: 10.1.0-M1 to 10.1.54</p>
+
+    <p><strong>Low: Unbounded read in WebDAV LOCK and PROPFIND 
handling</strong>
+       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-41284"; 
rel="nofollow">CVE-2026-41284</a></p>
+
+    <p>No limit was enforced on the request body for WebDAV LOCK or PROPFIND
+       requests which were available to unauthenticated users.</p>
+
+    <p>This was fixed with commit
+       <a 
href="https://github.com/apache/tomcat/commit/b3d1c1c239142e806be0b7329d304b94a58913ed";>b3d1c1c2</a>.</p>
+
+    <p>This issue was reported to the Tomcat security team on 11 April 2026.
+       The issue was made public on 12 May 2026.</p>
+
+    <p>Affects: 10.1.0-M1 to 10.1.54</p>
+
   </div><h3 id="Fixed_in_Apache_Tomcat_10.1.54"><span 
class="pull-right">2026-04-02</span> Fixed in Apache Tomcat 10.1.54</h3><div 
class="text">
 
     <p><strong>Moderate: OCSP checks sometimes soft-fail with FFM even when

Modified: tomcat/site/trunk/docs/security-11.html
==============================================================================
--- tomcat/site/trunk/docs/security-11.html     Tue May 12 14:11:24 2026        
(r1934142)
+++ tomcat/site/trunk/docs/security-11.html     Tue May 12 15:06:05 2026        
(r1934143)
@@ -36,7 +36,117 @@
     </p>
 
   </div><h3 id="Table_of_Contents">Table of Contents</h3><div class="text">
-    <ul><li><a href="#Fixed_in_Apache_Tomcat_11.0.21">Fixed in Apache Tomcat 
11.0.21</a></li><li><a href="#Fixed_in_Apache_Tomcat_11.0.20">Fixed in Apache 
Tomcat 11.0.20</a></li><li><a href="#Fixed_in_Apache_Tomcat_11.0.18">Fixed in 
Apache Tomcat 11.0.18</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_11.0.15">Fixed in Apache Tomcat 
11.0.15</a></li><li><a href="#Fixed_in_Apache_Tomcat_11.0.12">Fixed in Apache 
Tomcat 11.0.12</a></li><li><a href="#Fixed_in_Apache_Tomcat_11.0.11">Fixed in 
Apache Tomcat 11.0.11</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_11.0.10">Fixed in Apache Tomcat 
11.0.10</a></li><li><a href="#Fixed_in_Apache_Tomcat_11.0.9">Fixed in Apache 
Tomcat 11.0.9</a></li><li><a href="#Fixed_in_Apache_Tomcat_11.0.8">Fixed in 
Apache Tomcat 11.0.8</a></li><li><a href="#Fixed_in_Apache_Tomcat_11.0.7">Fixed 
in Apache Tomcat 11.0.7</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_11.0.6">Fixed in Apache Tomcat 
11.0.6</a></li><li><a href="#Fixed_in_Apache_Tomcat_11.0.3">Fixed in Apache T
 omcat 11.0.3</a></li><li><a href="#Fixed_in_Apache_Tomcat_11.0.2">Fixed in 
Apache Tomcat 11.0.2</a></li><li><a href="#Fixed_in_Apache_Tomcat_11.0.1">Fixed 
in Apache Tomcat 11.0.1</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_11.0.0">Fixed in Apache Tomcat 
11.0.0</a></li><li><a href="#Fixed_in_Apache_Tomcat_11.0.0-M21">Fixed in Apache 
Tomcat 11.0.0-M21</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_11.0.0-M17">Fixed in Apache Tomcat 
11.0.0-M17</a></li><li><a href="#Fixed_in_Apache_Tomcat_11.0.0-M12">Fixed in 
Apache Tomcat 11.0.0-M12</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_11.0.0-M11">Fixed in Apache Tomcat 
11.0.0-M11</a></li><li><a href="#Fixed_in_Apache_Tomcat_11.0.0-M6">Fixed in 
Apache Tomcat 11.0.0-M6</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_11.0.0-M5">Fixed in Apache Tomcat 
11.0.0-M5</a></li><li><a href="#Fixed_in_Apache_Tomcat_11.0.0-M3">Fixed in 
Apache Tomcat 11.0.0-M3</a></li></ul>
+    <ul><li><a href="#Fixed_in_Apache_Tomcat_11.0.22">Fixed in Apache Tomcat 
11.0.22</a></li><li><a href="#Fixed_in_Apache_Tomcat_11.0.21">Fixed in Apache 
Tomcat 11.0.21</a></li><li><a href="#Fixed_in_Apache_Tomcat_11.0.20">Fixed in 
Apache Tomcat 11.0.20</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_11.0.18">Fixed in Apache Tomcat 
11.0.18</a></li><li><a href="#Fixed_in_Apache_Tomcat_11.0.15">Fixed in Apache 
Tomcat 11.0.15</a></li><li><a href="#Fixed_in_Apache_Tomcat_11.0.12">Fixed in 
Apache Tomcat 11.0.12</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_11.0.11">Fixed in Apache Tomcat 
11.0.11</a></li><li><a href="#Fixed_in_Apache_Tomcat_11.0.10">Fixed in Apache 
Tomcat 11.0.10</a></li><li><a href="#Fixed_in_Apache_Tomcat_11.0.9">Fixed in 
Apache Tomcat 11.0.9</a></li><li><a href="#Fixed_in_Apache_Tomcat_11.0.8">Fixed 
in Apache Tomcat 11.0.8</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_11.0.7">Fixed in Apache Tomcat 
11.0.7</a></li><li><a href="#Fixed_in_Apache_Tomcat_11.0.6">Fixed in Apache
  Tomcat 11.0.6</a></li><li><a href="#Fixed_in_Apache_Tomcat_11.0.3">Fixed in 
Apache Tomcat 11.0.3</a></li><li><a href="#Fixed_in_Apache_Tomcat_11.0.2">Fixed 
in Apache Tomcat 11.0.2</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_11.0.1">Fixed in Apache Tomcat 
11.0.1</a></li><li><a href="#Fixed_in_Apache_Tomcat_11.0.0">Fixed in Apache 
Tomcat 11.0.0</a></li><li><a href="#Fixed_in_Apache_Tomcat_11.0.0-M21">Fixed in 
Apache Tomcat 11.0.0-M21</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_11.0.0-M17">Fixed in Apache Tomcat 
11.0.0-M17</a></li><li><a href="#Fixed_in_Apache_Tomcat_11.0.0-M12">Fixed in 
Apache Tomcat 11.0.0-M12</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_11.0.0-M11">Fixed in Apache Tomcat 
11.0.0-M11</a></li><li><a href="#Fixed_in_Apache_Tomcat_11.0.0-M6">Fixed in 
Apache Tomcat 11.0.0-M6</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_11.0.0-M5">Fixed in Apache Tomcat 
11.0.0-M5</a></li><li><a href="#Fixed_in_Apache_Tomcat_11.0.0-M3">Fixed in 
Apache Tomcat 11.0.0-M3</a></li></ul>
+  </div><h3 id="Fixed_in_Apache_Tomcat_11.0.22"><span 
class="pull-right">2026-05-05</span> Fixed in Apache Tomcat 11.0.22</h3><div 
class="text">
+
+    <p><strong>Moderate: Security constraints not correctly applied</strong>
+       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-43515"; 
rel="nofollow">CVE-2026-43515</a></p>
+
+    <p>When multiple security constraints defined an HTTP method constraint for
+       the same extension pattern, only the first method constraint was
+       applied.</p>
+
+    <p>This was fixed with commit
+       <a 
href="https://github.com/apache/tomcat/commit/276087d9c7abbcecc6c4fb4e4b08cf64780c6e36";>276087d9</a>.</p>
+
+    <p>This issue was reported to the Tomcat security team on 20 April 2026.
+       The issue was made public on 12 May 2026.</p>
+
+    <p>Affects: 11.0.0-M1 to 11.0.21</p>
+
+    <p><strong>Low: AJP secret compared in non-constant time</strong>
+       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-43514"; 
rel="nofollow">CVE-2026-43514</a></p>
+
+    <p>The AJP secret was compared in non-constant time allowing an attacker on
+       the local network to mount a timing attack to determine the AJP
+       secret.</p>
+
+    <p>This was fixed with commit
+       <a 
href="https://github.com/apache/tomcat/commit/d35d9d23263c8e4af561f615c960c91697ff200e";>d35d9d23</a>.</p>
+
+    <p>This issue was reported to the Tomcat security team on 20 April 2026.
+       The issue was made public on 12 May 2026.</p>
+
+    <p>Affects: 11.0.0-M1 to 11.0.21</p>
+
+    <p><strong>Low: LockOutRealm treats user names as case-sensitive</strong>
+       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-43513"; 
rel="nofollow">CVE-2026-43513</a></p>
+
+    <p>The LockOut Realm treated user names as case sensitive meaning that, for
+       Realms where the user name was case insensitive, the LockOut Realm was
+       not as effective at blocking brute force attacks against a user's
+       password.</p>
+
+    <p>This was fixed with commit
+       <a 
href="https://github.com/apache/tomcat/commit/83f3e51df7b87f5f6e626951c575ded1a512e8ef";>83f3e51d</a>.</p>
+
+    <p>This issue was reported to the Tomcat security team on 20 April 2026.
+       The issue was made public on 12 May 2026.</p>
+
+    <p>Affects: 11.0.0-M1 to 11.0.21</p>
+
+    <p><strong>Moderate: Digest authenticator will authenticate any unknown 
user</strong>
+       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-43512"; 
rel="nofollow">CVE-2026-43512</a></p>
+
+    <p>When DIGEST authentication was configured, any user not known to the
+       configured Realm would be authenticated if they presented the password
+       "null".</p>
+
+    <p>This was fixed with commit
+       <a 
href="https://github.com/apache/tomcat/commit/a99c355e8199adbfd67c9a1fffbd85b810b196cd";>a99c355e</a>.</p>
+
+    <p>This issue was reported to the Tomcat security team on 20 April 2026.
+       The issue was made public on 12 May 2026.</p>
+
+    <p>Affects: 11.0.0-M1 to 11.0.21</p>
+
+    <p><strong>Low: WebSocket authentication header exposure</strong>
+       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-42498"; 
rel="nofollow">CVE-2026-42498</a></p>
+
+    <p>If a WebSocket request was redirected after authentication, Tomcat's
+       WebSocket client would present the most recent authentication header to
+       the redirect target host.</p>
+
+    <p>This was fixed with commit
+       <a 
href="https://github.com/apache/tomcat/commit/b7b173694d588ddcfa432f079baf763cbbbaa5c4";>b7b17369</a>.</p>
+
+    <p>This issue was reported to the Tomcat security team on 21 April 2026.
+       The issue was made public on 12 May 2026.</p>
+
+    <p>Affects: 11.0.0-M1 to 11.0.21</p>
+
+    <p><strong>Low: HTTP/2 request headers not validated</strong>
+       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-41293"; 
rel="nofollow">CVE-2026-41293</a></p>
+
+    <p>HTTP/2 request headers were not validated which may have triggered
+       unexpected application behaviour if the application (quite reasonably)
+       assumed that header value exposed through the Servlet API would be
+       specification compliant.</p>
+
+    <p>This was fixed with commits
+       <a 
href="https://github.com/apache/tomcat/commit/e5cef9618c3f4fd31bd6fb1e83f0f18022280dac";>e5cef961</a>,
+       <a 
href="https://github.com/apache/tomcat/commit/3915fd27e6810b14ccd21e3d900bd8faef44d3df";>3915fd27</a>
 and
+       <a 
href="https://github.com/apache/tomcat/commit/c2925554c677da57390f940d856871e18daaacab";>c2925554</a>.</p>
+
+    <p>This issue was reported to the Tomcat security team on 15 April 2026.
+       The issue was made public on 12 May 2026.</p>
+
+    <p>Affects: 11.0.0-M1 to 11.0.21</p>
+
+    <p><strong>Low: Unbounded read in WebDAV LOCK and PROPFIND 
handling</strong>
+       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-41284"; 
rel="nofollow">CVE-2026-41284</a></p>
+
+    <p>No limit was enforced on the request body for WebDAV LOCK or PROPFIND
+       requests which were available to unauthenticated users.</p>
+
+    <p>This was fixed with commit
+       <a 
href="https://github.com/apache/tomcat/commit/a96fffd18487a29c0a30d36f00cb2b2d91f6d42c";>a96fffd1</a>.</p>
+
+    <p>This issue was reported to the Tomcat security team on 11 April 2026.
+       The issue was made public on 12 May 2026.</p>
+
+    <p>Affects: 11.0.0-M1 to 11.0.21</p>
+
   </div><h3 id="Fixed_in_Apache_Tomcat_11.0.21"><span 
class="pull-right">2026-04-04</span> Fixed in Apache Tomcat 11.0.21</h3><div 
class="text">
 
     <p><strong>Moderate: OCSP checks sometimes soft-fail with FFM even when

Modified: tomcat/site/trunk/docs/security-9.html
==============================================================================
--- tomcat/site/trunk/docs/security-9.html      Tue May 12 14:11:24 2026        
(r1934142)
+++ tomcat/site/trunk/docs/security-9.html      Tue May 12 15:06:05 2026        
(r1934143)
@@ -36,7 +36,117 @@
     </p>
 
   </div><h3 id="Table_of_Contents">Table of Contents</h3><div class="text">
-    <ul><li><a href="#Fixed_in_Apache_Tomcat_9.0.117">Fixed in Apache Tomcat 
9.0.117</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.116">Fixed in Apache 
Tomcat 9.0.116</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.115">Fixed in 
Apache Tomcat 9.0.115</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_9.0.113">Fixed in Apache Tomcat 
9.0.113</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.110">Fixed in Apache 
Tomcat 9.0.110</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.109">Fixed in 
Apache Tomcat 9.0.109</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_9.0.108">Fixed in Apache Tomcat 
9.0.108</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.107">Fixed in Apache 
Tomcat 9.0.107</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.106">Fixed in 
Apache Tomcat 9.0.106</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_9.0.105">Fixed in Apache Tomcat 
9.0.105</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.104">Fixed in Apache 
Tomcat 9.0.104</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.99">Fixed in 
 Apache Tomcat 9.0.99</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_9.0.98">Fixed in Apache Tomcat 
9.0.98</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.97">Fixed in Apache 
Tomcat 9.0.97</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.96">Fixed in 
Apache Tomcat 9.0.96</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.90">Fixed 
in Apache Tomcat 9.0.90</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_9.0.86">Fixed in Apache Tomcat 
9.0.86</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.83">Fixed in Apache 
Tomcat 9.0.83</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.81">Fixed in 
Apache Tomcat 9.0.81</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.80">Fixed 
in Apache Tomcat 9.0.80</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_9.0.75">Fixed in Apache Tomcat 
9.0.75</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.74">Fixed in Apache 
Tomcat 9.0.74</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.72">Fixed in 
Apache Tomcat 9.0.72</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.71">Fixed 
in A
 pache Tomcat 9.0.71</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.69">Fixed 
in Apache Tomcat 9.0.69</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_9.0.68">Fixed in Apache Tomcat 
9.0.68</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.65">Fixed in Apache 
Tomcat 9.0.65</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.63">Fixed in 
Apache Tomcat 9.0.63</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.62">Fixed 
in Apache Tomcat 9.0.62</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_9.0.58">Fixed in Apache Tomcat 
9.0.58</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.54">Fixed in Apache 
Tomcat 9.0.54</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.48">Fixed in 
Apache Tomcat 9.0.48</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.46">Fixed 
in Apache Tomcat 9.0.46</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_9.0.45">Fixed in Apache Tomcat 
9.0.45</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.44">Fixed in Apache 
Tomcat 9.0.44</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.43">Fixed in Ap
 ache Tomcat 9.0.43</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.40">Fixed 
in Apache Tomcat 9.0.40</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_9.0.38">Fixed in Apache Tomcat 
9.0.38</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.37">Fixed in Apache 
Tomcat 9.0.37</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.36">Fixed in 
Apache Tomcat 9.0.36</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.35">Fixed 
in Apache Tomcat 9.0.35</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_9.0.31">Fixed in Apache Tomcat 
9.0.31</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.30">Fixed in Apache 
Tomcat 9.0.30</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.29">Fixed in 
Apache Tomcat 9.0.29</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.21">Fixed 
in Apache Tomcat 9.0.21</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_9.0.20">Fixed in Apache Tomcat 
9.0.20</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.19">Fixed in Apache 
Tomcat 9.0.19</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.16">Fixed in Apa
 che Tomcat 9.0.16</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.12">Fixed 
in Apache Tomcat 9.0.12</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_9.0.10">Fixed in Apache Tomcat 
9.0.10</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.9">Fixed in Apache 
Tomcat 9.0.9</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.8">Fixed in 
Apache Tomcat 9.0.8</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.5">Fixed 
in Apache Tomcat 9.0.5</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_9.0.2">Fixed in Apache Tomcat 
9.0.2</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.1">Fixed in Apache 
Tomcat 9.0.1</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.0.M22">Fixed in 
Apache Tomcat 9.0.0.M22</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_9.0.0.M21">Fixed in Apache Tomcat 
9.0.0.M21</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.0.M19">Fixed in 
Apache Tomcat 9.0.0.M19</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_9.0.0.M18">Fixed in Apache Tomcat 
9.0.0.M18</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.0.M
 17">Fixed in Apache Tomcat 9.0.0.M17</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_9.0.0.M15">Fixed in Apache Tomcat 
9.0.0.M15</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.0.M13">Fixed in 
Apache Tomcat 9.0.0.M13</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_9.0.0.M10">Fixed in Apache Tomcat 
9.0.0.M10</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.0.M8">Fixed in 
Apache Tomcat 9.0.0.M8</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_9.0.0.M3">Fixed in Apache Tomcat 
9.0.0.M3</a></li><li><a href="#Not_a_vulnerability_in_Tomcat">Not a 
vulnerability in Tomcat</a></li></ul>
+    <ul><li><a href="#Fixed_in_Apache_Tomcat_9.0.118">Fixed in Apache Tomcat 
9.0.118</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.117">Fixed in Apache 
Tomcat 9.0.117</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.116">Fixed in 
Apache Tomcat 9.0.116</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_9.0.115">Fixed in Apache Tomcat 
9.0.115</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.113">Fixed in Apache 
Tomcat 9.0.113</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.110">Fixed in 
Apache Tomcat 9.0.110</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_9.0.109">Fixed in Apache Tomcat 
9.0.109</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.108">Fixed in Apache 
Tomcat 9.0.108</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.107">Fixed in 
Apache Tomcat 9.0.107</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_9.0.106">Fixed in Apache Tomcat 
9.0.106</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.105">Fixed in Apache 
Tomcat 9.0.105</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.104">Fixed in
  Apache Tomcat 9.0.104</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_9.0.99">Fixed in Apache Tomcat 
9.0.99</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.98">Fixed in Apache 
Tomcat 9.0.98</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.97">Fixed in 
Apache Tomcat 9.0.97</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.96">Fixed 
in Apache Tomcat 9.0.96</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_9.0.90">Fixed in Apache Tomcat 
9.0.90</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.86">Fixed in Apache 
Tomcat 9.0.86</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.83">Fixed in 
Apache Tomcat 9.0.83</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.81">Fixed 
in Apache Tomcat 9.0.81</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_9.0.80">Fixed in Apache Tomcat 
9.0.80</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.75">Fixed in Apache 
Tomcat 9.0.75</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.74">Fixed in 
Apache Tomcat 9.0.74</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.72">Fixed 
in
  Apache Tomcat 9.0.72</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_9.0.71">Fixed in Apache Tomcat 
9.0.71</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.69">Fixed in Apache 
Tomcat 9.0.69</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.68">Fixed in 
Apache Tomcat 9.0.68</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.65">Fixed 
in Apache Tomcat 9.0.65</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_9.0.63">Fixed in Apache Tomcat 
9.0.63</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.62">Fixed in Apache 
Tomcat 9.0.62</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.58">Fixed in 
Apache Tomcat 9.0.58</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.54">Fixed 
in Apache Tomcat 9.0.54</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_9.0.48">Fixed in Apache Tomcat 
9.0.48</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.46">Fixed in Apache 
Tomcat 9.0.46</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.45">Fixed in 
Apache Tomcat 9.0.45</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.44">Fixed 
in 
 Apache Tomcat 9.0.44</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_9.0.43">Fixed in Apache Tomcat 
9.0.43</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.40">Fixed in Apache 
Tomcat 9.0.40</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.38">Fixed in 
Apache Tomcat 9.0.38</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.37">Fixed 
in Apache Tomcat 9.0.37</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_9.0.36">Fixed in Apache Tomcat 
9.0.36</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.35">Fixed in Apache 
Tomcat 9.0.35</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.31">Fixed in 
Apache Tomcat 9.0.31</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.30">Fixed 
in Apache Tomcat 9.0.30</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_9.0.29">Fixed in Apache Tomcat 
9.0.29</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.21">Fixed in Apache 
Tomcat 9.0.21</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.20">Fixed in 
Apache Tomcat 9.0.20</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.19">Fixed 
in A
 pache Tomcat 9.0.19</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.16">Fixed 
in Apache Tomcat 9.0.16</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_9.0.12">Fixed in Apache Tomcat 
9.0.12</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.10">Fixed in Apache 
Tomcat 9.0.10</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.9">Fixed in 
Apache Tomcat 9.0.9</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.8">Fixed 
in Apache Tomcat 9.0.8</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_9.0.5">Fixed in Apache Tomcat 
9.0.5</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.2">Fixed in Apache 
Tomcat 9.0.2</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.1">Fixed in 
Apache Tomcat 9.0.1</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_9.0.0.M22">Fixed in Apache Tomcat 
9.0.0.M22</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.0.M21">Fixed in 
Apache Tomcat 9.0.0.M21</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_9.0.0.M19">Fixed in Apache Tomcat 
9.0.0.M19</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.0.M18">
 Fixed in Apache Tomcat 9.0.0.M18</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_9.0.0.M17">Fixed in Apache Tomcat 
9.0.0.M17</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.0.M15">Fixed in 
Apache Tomcat 9.0.0.M15</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_9.0.0.M13">Fixed in Apache Tomcat 
9.0.0.M13</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.0.M10">Fixed in 
Apache Tomcat 9.0.0.M10</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_9.0.0.M8">Fixed in Apache Tomcat 
9.0.0.M8</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.0.M3">Fixed in Apache 
Tomcat 9.0.0.M3</a></li><li><a href="#Not_a_vulnerability_in_Tomcat">Not a 
vulnerability in Tomcat</a></li></ul>
+  </div><h3 id="Fixed_in_Apache_Tomcat_9.0.118"><span 
class="pull-right">2026-05-10</span> Fixed in Apache Tomcat 9.0.118</h3><div 
class="text">
+
+    <p><strong>Moderate: Security constraints not correctly applied</strong>
+       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-43515"; 
rel="nofollow">CVE-2026-43515</a></p>
+
+    <p>When multiple security constraints defined an HTTP method constraint for
+       the same extension pattern, only the first method constraint was
+       applied.</p>
+
+    <p>This was fixed with commit
+       <a 
href="https://github.com/apache/tomcat/commit/db919ff9912b4d61d1b702a1342b8bde39270031";>db919ff9</a>.</p>
+
+    <p>This issue was reported to the Tomcat security team on 20 April 2026.
+       The issue was made public on 12 May 2026.</p>
+
+    <p>Affects: 9.0.0.M1 to 9.0.117</p>
+
+    <p><strong>Low: AJP secret compared in non-constant time</strong>
+       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-43514"; 
rel="nofollow">CVE-2026-43514</a></p>
+
+    <p>The AJP secret was compared in non-constant time allowing an attacker on
+       the local network to mount a timing attack to determine the AJP
+       secret.</p>
+
+    <p>This was fixed with commit
+       <a 
href="https://github.com/apache/tomcat/commit/933dcdbf2515972280002929e7e597dead2e9ffa";>933dcdbf</a>.</p>
+
+    <p>This issue was reported to the Tomcat security team on 20 April 2026.
+       The issue was made public on 12 May 2026.</p>
+
+    <p>Affects: 9.0.0.M1 to 9.0.117</p>
+
+    <p><strong>Low: LockOutRealm treats user names as case-sensitive</strong>
+       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-43513"; 
rel="nofollow">CVE-2026-43513</a></p>
+
+    <p>The LockOut Realm treated user names as case sensitive meaning that, for
+       Realms where the user name was case insensitive, the LockOut Realm was
+       not as effective at blocking brute force attacks against a user's
+       password.</p>
+
+    <p>This was fixed with commit
+       <a 
href="https://github.com/apache/tomcat/commit/6dd75beb55bd42fc5f78e929596b25018cd17717";>6dd75beb</a>.</p>
+
+    <p>This issue was reported to the Tomcat security team on 20 April 2026.
+       The issue was made public on 12 May 2026.</p>
+
+    <p>Affects: 9.0.0.M1 to 9.0.117</p>
+
+    <p><strong>Moderate: Digest authenticator will authenticate any unknown 
user</strong>
+       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-43512"; 
rel="nofollow">CVE-2026-43512</a></p>
+
+    <p>When DIGEST authentication was configured, any user not known to the
+       configured Realm would be authenticated if they presented the password
+       "null".</p>
+
+    <p>This was fixed with commit
+       <a 
href="https://github.com/apache/tomcat/commit/6565a6cb6499e56fe2f34457cec99f9d1c4f39e9";>6565a6cb</a>.</p>
+
+    <p>This issue was reported to the Tomcat security team on 20 April 2026.
+       The issue was made public on 12 May 2026.</p>
+
+    <p>Affects: 9.0.0.M1 to 9.0.117</p>
+
+    <p><strong>Low: WebSocket authentication header exposure</strong>
+       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-42498"; 
rel="nofollow">CVE-2026-42498</a></p>
+
+    <p>If a WebSocket request was redirected after authentication, Tomcat's
+       WebSocket client would present the most recent authentication header to
+       the redirect target host.</p>
+
+    <p>This was fixed with commit
+       <a 
href="https://github.com/apache/tomcat/commit/169d725788ea6aec217ecac70fe4161c837ba423";>169d7257</a>.</p>
+
+    <p>This issue was reported to the Tomcat security team on 21 April 2026.
+       The issue was made public on 12 May 2026.</p>
+
+    <p>Affects: 9.0.2 to 9.0.117</p>
+
+    <p><strong>Low: HTTP/2 request headers not validated</strong>
+       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-41293"; 
rel="nofollow">CVE-2026-41293</a></p>
+
+    <p>HTTP/2 request headers were not validated which may have triggered
+       unexpected application behaviour if the application (quite reasonably)
+       assumed that header value exposed through the Servlet API would be
+       specification compliant.</p>
+
+    <p>This was fixed with commits
+       <a 
href="https://github.com/apache/tomcat/commit/cf9452443bcbf3b1a4b435ef7d624364f1b65ca3";>cf945244</a>,
+       <a 
href="https://github.com/apache/tomcat/commit/1c70480466572c9192ed412ebefcd43fc63137fd";>1c704804</a>
 and
+       <a 
href="https://github.com/apache/tomcat/commit/57c2b3bfd62792631e1df24cf4237b990a0b36fa";>57c2b3bf</a>.</p>
+
+    <p>This issue was reported to the Tomcat security team on 15 April 2026.
+       The issue was made public on 12 May 2026.</p>
+
+    <p>Affects: 9.0.0.M1 to 9.0.117</p>
+
+    <p><strong>Low: Unbounded read in WebDAV LOCK and PROPFIND 
handling</strong>
+       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-41284"; 
rel="nofollow">CVE-2026-41284</a></p>
+
+    <p>No limit was enforced on the request body for WebDAV LOCK or PROPFIND
+       requests which were available to unauthenticated users.</p>
+
+    <p>This was fixed with commit
+       <a 
href="https://github.com/apache/tomcat/commit/17dacd9aa48628da2eba37a9ab743c0b6c71685c";>17dacd9a</a>.</p>
+
+    <p>This issue was reported to the Tomcat security team on 11 April 2026.
+       The issue was made public on 12 May 2026.</p>
+
+    <p>Affects: 9.0.0.M1 to 9.0.117</p>
+
   </div><h3 id="Fixed_in_Apache_Tomcat_9.0.117"><span 
class="pull-right">2026-04-03</span> Fixed in Apache Tomcat 9.0.117</h3><div 
class="text">
 
     <p><strong>Moderate: OCSP checks sometimes soft-fail with FFM even when

Modified: tomcat/site/trunk/xdocs/security-10.xml
==============================================================================
--- tomcat/site/trunk/xdocs/security-10.xml     Tue May 12 14:11:24 2026        
(r1934142)
+++ tomcat/site/trunk/xdocs/security-10.xml     Tue May 12 15:06:05 2026        
(r1934143)
@@ -56,6 +56,118 @@
     <toc/>
   </section>
 
+  <section name="Fixed in Apache Tomcat 10.1.55" rtext="2026-05-11">
+
+    <p><strong>Moderate: Security constraints not correctly applied</strong>
+       <cve>CVE-2026-43515</cve></p>
+
+    <p>When multiple security constraints defined an HTTP method constraint for
+       the same extension pattern, only the first method constraint was
+       applied.</p>
+
+    <p>This was fixed with commit
+       <hashlink hash="c621317382682206fb58ab92ebd3e1b6fdd10ce9"/>.</p>
+
+    <p>This issue was reported to the Tomcat security team on 20 April 2026.
+       The issue was made public on 12 May 2026.</p>
+
+    <p>Affects: 10.1.0-M1 to 10.1.54</p>
+
+    <p><strong>Low: AJP secret compared in non-constant time</strong>
+       <cve>CVE-2026-43514</cve></p>
+
+    <p>The AJP secret was compared in non-constant time allowing an attacker on
+       the local network to mount a timing attack to determine the AJP
+       secret.</p>
+
+    <p>This was fixed with commit
+       <hashlink hash="a102a2a157868ca51d83eaf5a119ccd9976a113e"/>.</p>
+
+    <p>This issue was reported to the Tomcat security team on 20 April 2026.
+       The issue was made public on 12 May 2026.</p>
+
+    <p>Affects: 10.1.0-M1 to 10.1.54</p>
+
+    <p><strong>Low: LockOutRealm treats user names as case-sensitive</strong>
+       <cve>CVE-2026-43513</cve></p>
+
+    <p>The LockOut Realm treated user names as case sensitive meaning that, for
+       Realms where the user name was case insensitive, the LockOut Realm was
+       not as effective at blocking brute force attacks against a user's
+       password.</p>
+
+    <p>This was fixed with commit
+       <hashlink hash="4a90d3fa93988c447cd5bb7482f76ff70d7f15c2"/>.</p>
+
+    <p>This issue was reported to the Tomcat security team on 20 April 2026.
+       The issue was made public on 12 May 2026.</p>
+
+    <p>Affects: 10.1.0-M1 to 10.1.54</p>
+
+    <p><strong>Moderate: Digest authenticator will authenticate any unknown 
user</strong>
+       <cve>CVE-2026-43512</cve></p>
+
+    <p>When DIGEST authentication was configured, any user not known to the
+       configured Realm would be authenticated if they presented the password
+       "null".</p>
+
+    <p>This was fixed with commit
+       <hashlink hash="3d4d3fae07a6cd9c2eb193c5491001740ec64448"/>.</p>
+
+    <p>This issue was reported to the Tomcat security team on 20 April 2026.
+       The issue was made public on 12 May 2026.</p>
+
+    <p>Affects: 10.1.0-M1 to 10.1.54</p>
+
+    <p><strong>Low: WebSocket authentication header exposure</strong>
+       <cve>CVE-2026-42498</cve></p>
+
+    <p>If a WebSocket request was redirected after authentication, Tomcat's
+       WebSocket client would present the most recent authentication header to
+       the redirect target host.</p>
+
+    <p>This was fixed with commit
+       <hashlink hash="6cbe274592ef2d11607b5b188e1df649de52f8d5"/>.</p>
+
+    <p>This issue was reported to the Tomcat security team on 21 April 2026.
+       The issue was made public on 12 May 2026.</p>
+
+    <p>Affects: 10.1.0-M1 to 10.1.54</p>
+
+    <p><strong>Low: HTTP/2 request headers not validated</strong>
+       <cve>CVE-2026-41293</cve></p>
+
+    <p>HTTP/2 request headers were not validated which may have triggered
+       unexpected application behaviour if the application (quite reasonably)
+       assumed that header value exposed through the Servlet API would be
+       specification compliant.</p>
+
+    <p>This was fixed with commits
+       <hashlink hash="19f17a257797e8d139b33ff9c88d362a273be148"/>,
+       <hashlink hash="f72a6174ab1f0f5a053435f80448b4f6837fe6d7"/> and
+       <hashlink hash="2a2476460e823789f530a22207873ea8cd6eff3b"/>.</p>
+
+    <p>This issue was reported to the Tomcat security team on 15 April 2026.
+       The issue was made public on 12 May 2026.</p>
+
+    <p>Affects: 10.1.0-M1 to 10.1.54</p>
+
+    <p><strong>Low: Unbounded read in WebDAV LOCK and PROPFIND 
handling</strong>
+       <cve>CVE-2026-41284</cve></p>
+
+    <p>No limit was enforced on the request body for WebDAV LOCK or PROPFIND
+       requests which were available to unauthenticated users.</p>
+
+    <p>This was fixed with commit
+       <hashlink hash="b3d1c1c239142e806be0b7329d304b94a58913ed"/>.</p>
+
+    <p>This issue was reported to the Tomcat security team on 11 April 2026.
+       The issue was made public on 12 May 2026.</p>
+
+    <p>Affects: 10.1.0-M1 to 10.1.54</p>
+
+  </section>
+
   <section name="Fixed in Apache Tomcat 10.1.54" rtext="2026-04-02">
 
     <p><strong>Moderate: OCSP checks sometimes soft-fail with FFM even when

Modified: tomcat/site/trunk/xdocs/security-11.xml
==============================================================================
--- tomcat/site/trunk/xdocs/security-11.xml     Tue May 12 14:11:24 2026        
(r1934142)
+++ tomcat/site/trunk/xdocs/security-11.xml     Tue May 12 15:06:05 2026        
(r1934143)
@@ -50,6 +50,118 @@
     <toc/>
   </section>
 
+  <section name="Fixed in Apache Tomcat 11.0.22" rtext="2026-05-05">
+
+    <p><strong>Moderate: Security constraints not correctly applied</strong>
+       <cve>CVE-2026-43515</cve></p>
+
+    <p>When multiple security constraints defined an HTTP method constraint for
+       the same extension pattern, only the first method constraint was
+       applied.</p>
+
+    <p>This was fixed with commit
+       <hashlink hash="276087d9c7abbcecc6c4fb4e4b08cf64780c6e36"/>.</p>
+
+    <p>This issue was reported to the Tomcat security team on 20 April 2026.
+       The issue was made public on 12 May 2026.</p>
+
+    <p>Affects: 11.0.0-M1 to 11.0.21</p>
+
+    <p><strong>Low: AJP secret compared in non-constant time</strong>
+       <cve>CVE-2026-43514</cve></p>
+
+    <p>The AJP secret was compared in non-constant time allowing an attacker on
+       the local network to mount a timing attack to determine the AJP
+       secret.</p>
+
+    <p>This was fixed with commit
+       <hashlink hash="d35d9d23263c8e4af561f615c960c91697ff200e"/>.</p>
+
+    <p>This issue was reported to the Tomcat security team on 20 April 2026.
+       The issue was made public on 12 May 2026.</p>
+
+    <p>Affects: 11.0.0-M1 to 11.0.21</p>
+
+    <p><strong>Low: LockOutRealm treats user names as case-sensitive</strong>
+       <cve>CVE-2026-43513</cve></p>
+
+    <p>The LockOut Realm treated user names as case sensitive meaning that, for
+       Realms where the user name was case insensitive, the LockOut Realm was
+       not as effective at blocking brute force attacks against a user's
+       password.</p>
+
+    <p>This was fixed with commit
+       <hashlink hash="83f3e51df7b87f5f6e626951c575ded1a512e8ef"/>.</p>
+
+    <p>This issue was reported to the Tomcat security team on 20 April 2026.
+       The issue was made public on 12 May 2026.</p>
+
+    <p>Affects: 11.0.0-M1 to 11.0.21</p>
+
+    <p><strong>Moderate: Digest authenticator will authenticate any unknown 
user</strong>
+       <cve>CVE-2026-43512</cve></p>
+
+    <p>When DIGEST authentication was configured, any user not known to the
+       configured Realm would be authenticated if they presented the password
+       "null".</p>
+
+    <p>This was fixed with commit
+       <hashlink hash="a99c355e8199adbfd67c9a1fffbd85b810b196cd"/>.</p>
+
+    <p>This issue was reported to the Tomcat security team on 20 April 2026.
+       The issue was made public on 12 May 2026.</p>
+
+    <p>Affects: 11.0.0-M1 to 11.0.21</p>
+
+    <p><strong>Low: WebSocket authentication header exposure</strong>
+       <cve>CVE-2026-42498</cve></p>
+
+    <p>If a WebSocket request was redirected after authentication, Tomcat's
+       WebSocket client would present the most recent authentication header to
+       the redirect target host.</p>
+
+    <p>This was fixed with commit
+       <hashlink hash="b7b173694d588ddcfa432f079baf763cbbbaa5c4"/>.</p>
+
+    <p>This issue was reported to the Tomcat security team on 21 April 2026.
+       The issue was made public on 12 May 2026.</p>
+
+    <p>Affects: 11.0.0-M1 to 11.0.21</p>
+
+    <p><strong>Low: HTTP/2 request headers not validated</strong>
+       <cve>CVE-2026-41293</cve></p>
+
+    <p>HTTP/2 request headers were not validated which may have triggered
+       unexpected application behaviour if the application (quite reasonably)
+       assumed that header value exposed through the Servlet API would be
+       specification compliant.</p>
+
+    <p>This was fixed with commits
+       <hashlink hash="e5cef9618c3f4fd31bd6fb1e83f0f18022280dac"/>,
+       <hashlink hash="3915fd27e6810b14ccd21e3d900bd8faef44d3df"/> and
+       <hashlink hash="c2925554c677da57390f940d856871e18daaacab"/>.</p>
+
+    <p>This issue was reported to the Tomcat security team on 15 April 2026.
+       The issue was made public on 12 May 2026.</p>
+
+    <p>Affects: 11.0.0-M1 to 11.0.21</p>
+
+    <p><strong>Low: Unbounded read in WebDAV LOCK and PROPFIND 
handling</strong>
+       <cve>CVE-2026-41284</cve></p>
+
+    <p>No limit was enforced on the request body for WebDAV LOCK or PROPFIND
+       requests which were available to unauthenticated users.</p>
+
+    <p>This was fixed with commit
+       <hashlink hash="a96fffd18487a29c0a30d36f00cb2b2d91f6d42c"/>.</p>
+
+    <p>This issue was reported to the Tomcat security team on 11 April 2026.
+       The issue was made public on 12 May 2026.</p>
+
+    <p>Affects: 11.0.0-M1 to 11.0.21</p>
+
+  </section>
+
   <section name="Fixed in Apache Tomcat 11.0.21" rtext="2026-04-04">
 
     <p><strong>Moderate: OCSP checks sometimes soft-fail with FFM even when

Modified: tomcat/site/trunk/xdocs/security-9.xml
==============================================================================
--- tomcat/site/trunk/xdocs/security-9.xml      Tue May 12 14:11:24 2026        
(r1934142)
+++ tomcat/site/trunk/xdocs/security-9.xml      Tue May 12 15:06:05 2026        
(r1934143)
@@ -50,6 +50,118 @@
     <toc/>
   </section>
 
+  <section name="Fixed in Apache Tomcat 9.0.118" rtext="2026-05-10">
+
+    <p><strong>Moderate: Security constraints not correctly applied</strong>
+       <cve>CVE-2026-43515</cve></p>
+
+    <p>When multiple security constraints defined an HTTP method constraint for
+       the same extension pattern, only the first method constraint was
+       applied.</p>
+
+    <p>This was fixed with commit
+       <hashlink hash="db919ff9912b4d61d1b702a1342b8bde39270031"/>.</p>
+
+    <p>This issue was reported to the Tomcat security team on 20 April 2026.
+       The issue was made public on 12 May 2026.</p>
+
+    <p>Affects: 9.0.0.M1 to 9.0.117</p>
+
+    <p><strong>Low: AJP secret compared in non-constant time</strong>
+       <cve>CVE-2026-43514</cve></p>
+
+    <p>The AJP secret was compared in non-constant time allowing an attacker on
+       the local network to mount a timing attack to determine the AJP
+       secret.</p>
+
+    <p>This was fixed with commit
+       <hashlink hash="933dcdbf2515972280002929e7e597dead2e9ffa"/>.</p>
+
+    <p>This issue was reported to the Tomcat security team on 20 April 2026.
+       The issue was made public on 12 May 2026.</p>
+
+    <p>Affects: 9.0.0.M1 to 9.0.117</p>
+
+    <p><strong>Low: LockOutRealm treats user names as case-sensitive</strong>
+       <cve>CVE-2026-43513</cve></p>
+
+    <p>The LockOut Realm treated user names as case sensitive meaning that, for
+       Realms where the user name was case insensitive, the LockOut Realm was
+       not as effective at blocking brute force attacks against a user's
+       password.</p>
+
+    <p>This was fixed with commit
+       <hashlink hash="6dd75beb55bd42fc5f78e929596b25018cd17717"/>.</p>
+
+    <p>This issue was reported to the Tomcat security team on 20 April 2026.
+       The issue was made public on 12 May 2026.</p>
+
+    <p>Affects: 9.0.0.M1 to 9.0.117</p>
+
+    <p><strong>Moderate: Digest authenticator will authenticate any unknown 
user</strong>
+       <cve>CVE-2026-43512</cve></p>
+
+    <p>When DIGEST authentication was configured, any user not known to the
+       configured Realm would be authenticated if they presented the password
+       "null".</p>
+
+    <p>This was fixed with commit
+       <hashlink hash="6565a6cb6499e56fe2f34457cec99f9d1c4f39e9"/>.</p>
+
+    <p>This issue was reported to the Tomcat security team on 20 April 2026.
+       The issue was made public on 12 May 2026.</p>
+
+    <p>Affects: 9.0.0.M1 to 9.0.117</p>
+
+    <p><strong>Low: WebSocket authentication header exposure</strong>
+       <cve>CVE-2026-42498</cve></p>
+
+    <p>If a WebSocket request was redirected after authentication, Tomcat's
+       WebSocket client would present the most recent authentication header to
+       the redirect target host.</p>
+
+    <p>This was fixed with commit
+       <hashlink hash="169d725788ea6aec217ecac70fe4161c837ba423"/>.</p>
+
+    <p>This issue was reported to the Tomcat security team on 21 April 2026.
+       The issue was made public on 12 May 2026.</p>
+
+    <p>Affects: 9.0.2 to 9.0.117</p>
+
+    <p><strong>Low: HTTP/2 request headers not validated</strong>
+       <cve>CVE-2026-41293</cve></p>
+
+    <p>HTTP/2 request headers were not validated which may have triggered
+       unexpected application behaviour if the application (quite reasonably)
+       assumed that header value exposed through the Servlet API would be
+       specification compliant.</p>
+
+    <p>This was fixed with commits
+       <hashlink hash="cf9452443bcbf3b1a4b435ef7d624364f1b65ca3"/>,
+       <hashlink hash="1c70480466572c9192ed412ebefcd43fc63137fd"/> and
+       <hashlink hash="57c2b3bfd62792631e1df24cf4237b990a0b36fa"/>.</p>
+
+    <p>This issue was reported to the Tomcat security team on 15 April 2026.
+       The issue was made public on 12 May 2026.</p>
+
+    <p>Affects: 9.0.0.M1 to 9.0.117</p>
+
+    <p><strong>Low: Unbounded read in WebDAV LOCK and PROPFIND 
handling</strong>
+       <cve>CVE-2026-41284</cve></p>
+
+    <p>No limit was enforced on the request body for WebDAV LOCK or PROPFIND
+       requests which were available to unauthenticated users.</p>
+
+    <p>This was fixed with commit
+       <hashlink hash="17dacd9aa48628da2eba37a9ab743c0b6c71685c"/>.</p>
+
+    <p>This issue was reported to the Tomcat security team on 11 April 2026.
+       The issue was made public on 12 May 2026.</p>
+
+    <p>Affects: 9.0.0.M1 to 9.0.117</p>
+
+  </section>
+
   <section name="Fixed in Apache Tomcat 9.0.117" rtext="2026-04-03">
 
     <p><strong>Moderate: OCSP checks sometimes soft-fail with FFM even when


---------------------------------------------------------------------
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]

Reply via email to