Author: markt
Date: Thu Apr  9 19:03:04 2026
New Revision: 1932933

Log:
Update security pages for March/April release issues

Modified:
   tomcat/site/trunk/docs/security-10.html
   tomcat/site/trunk/docs/security-11.html
   tomcat/site/trunk/docs/security-9.html
   tomcat/site/trunk/docs/security-native.html
   tomcat/site/trunk/xdocs/security-10.xml
   tomcat/site/trunk/xdocs/security-11.xml
   tomcat/site/trunk/xdocs/security-9.xml
   tomcat/site/trunk/xdocs/security-native.xml

Modified: tomcat/site/trunk/docs/security-10.html
==============================================================================
--- tomcat/site/trunk/docs/security-10.html     Thu Apr  9 18:34:58 2026        
(r1932932)
+++ tomcat/site/trunk/docs/security-10.html     Thu Apr  9 19:03:04 2026        
(r1932933)
@@ -42,7 +42,160 @@
     </p>
 
   </div><h3 id="Table_of_Contents">Table of Contents</h3><div class="text">
-    <ul><li><a href="#Fixed_in_Apache_Tomcat_10.1.52">Fixed in Apache Tomcat 
10.1.52</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.50">Fixed in Apache 
Tomcat 10.1.50</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.47">Fixed in 
Apache Tomcat 10.1.47</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_10.1.45">Fixed in Apache Tomcat 
10.1.45</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.44">Fixed in Apache 
Tomcat 10.1.44</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.43">Fixed in 
Apache Tomcat 10.1.43</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_10.1.42">Fixed in Apache Tomcat 
10.1.42</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.41">Fixed in Apache 
Tomcat 10.1.41</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.40">Fixed in 
Apache Tomcat 10.1.40</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_10.1.35">Fixed in Apache Tomcat 
10.1.35</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.34">Fixed in Apache 
Tomcat 10.1.34</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.33">Fixed in
  Apache Tomcat 10.1.33</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_10.1.31">Fixed in Apache Tomcat 
10.1.31</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.25">Fixed in Apache 
Tomcat 10.1.25</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.19">Fixed in 
Apache Tomcat 10.1.19</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_10.1.16">Fixed in Apache Tomcat 
10.1.16</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.14">Fixed in Apache 
Tomcat 10.1.14</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.13">Fixed in 
Apache Tomcat 10.1.13</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_10.1.9">Fixed in Apache Tomcat 
10.1.9</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.8">Fixed in Apache 
Tomcat 10.1.8</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.6">Fixed in 
Apache Tomcat 10.1.6</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.5">Fixed 
in Apache Tomcat 10.1.5</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_10.1.2">Fixed in Apache Tomcat 
10.1.2</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1
 .1">Fixed in Apache Tomcat 10.1.1</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_10.0.27">Fixed in Apache Tomcat 
10.0.27</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.23">Fixed in Apache 
Tomcat 10.0.23</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.0-M17">Fixed 
in Apache Tomcat 10.1.0-M17</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_10.0.21">Fixed in Apache Tomcat 
10.0.21</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.0-M15">Fixed in 
Apache Tomcat 10.1.0-M15</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_10.0.20">Fixed in Apache Tomcat 
10.0.20</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.0-M14">Fixed in 
Apache Tomcat 10.1.0-M14</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_10.0.16">Fixed in Apache Tomcat 
10.0.16</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.0-M10">Fixed in 
Apache Tomcat 10.1.0-M10</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_10.0.12">Fixed in Apache Tomcat 
10.0.12</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.0-M6">Fixed in Apache 
Tomcat 10.1.0-M6<
 /a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.7">Fixed in Apache Tomcat 
10.0.7</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.6">Fixed in Apache 
Tomcat 10.0.6</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.5">Fixed in 
Apache Tomcat 10.0.5</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.4">Fixed 
in Apache Tomcat 10.0.4</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_10.0.2">Fixed in Apache Tomcat 
10.0.2</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.0-M10">Fixed in Apache 
Tomcat 10.0.0-M10</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.0-M8">Fixed 
in Apache Tomcat 10.0.0-M8</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_10.0.0-M7">Fixed in Apache Tomcat 
10.0.0-M7</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.0-M6">Fixed in 
Apache Tomcat 10.0.0-M6</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_10.0.0-M5">Fixed in Apache Tomcat 
10.0.0-M5</a></li><li><a href="#Not_a_vulnerability_in_Tomcat">Not a 
vulnerability in Tomcat</a></li></ul>
+    <ul><li><a href="#Fixed_in_Apache_Tomcat_10.1.54">Fixed in Apache Tomcat 
10.1.54</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.53">Fixed in Apache 
Tomcat 10.1.53</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.52">Fixed in 
Apache Tomcat 10.1.52</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_10.1.50">Fixed in Apache Tomcat 
10.1.50</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.47">Fixed in Apache 
Tomcat 10.1.47</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.45">Fixed in 
Apache Tomcat 10.1.45</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_10.1.44">Fixed in Apache Tomcat 
10.1.44</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.43">Fixed in Apache 
Tomcat 10.1.43</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.42">Fixed in 
Apache Tomcat 10.1.42</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_10.1.41">Fixed in Apache Tomcat 
10.1.41</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.40">Fixed in Apache 
Tomcat 10.1.40</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.35">Fixed in
  Apache Tomcat 10.1.35</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_10.1.34">Fixed in Apache Tomcat 
10.1.34</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.33">Fixed in Apache 
Tomcat 10.1.33</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.31">Fixed in 
Apache Tomcat 10.1.31</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_10.1.25">Fixed in Apache Tomcat 
10.1.25</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.19">Fixed in Apache 
Tomcat 10.1.19</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.16">Fixed in 
Apache Tomcat 10.1.16</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_10.1.14">Fixed in Apache Tomcat 
10.1.14</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.13">Fixed in Apache 
Tomcat 10.1.13</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.9">Fixed in 
Apache Tomcat 10.1.9</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.8">Fixed 
in Apache Tomcat 10.1.8</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_10.1.6">Fixed in Apache Tomcat 
10.1.6</a></li><li><a href="#Fixed_in_Apache_Tomcat_
 10.1.5">Fixed in Apache Tomcat 10.1.5</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_10.1.2">Fixed in Apache Tomcat 
10.1.2</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.1">Fixed in Apache 
Tomcat 10.1.1</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.27">Fixed in 
Apache Tomcat 10.0.27</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_10.0.23">Fixed in Apache Tomcat 
10.0.23</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.0-M17">Fixed in 
Apache Tomcat 10.1.0-M17</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_10.0.21">Fixed in Apache Tomcat 
10.0.21</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.0-M15">Fixed in 
Apache Tomcat 10.1.0-M15</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_10.0.20">Fixed in Apache Tomcat 
10.0.20</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.0-M14">Fixed in 
Apache Tomcat 10.1.0-M14</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_10.0.16">Fixed in Apache Tomcat 
10.0.16</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.0-M10">Fixed in 
Apache Tomcat 10.1.0-M10</a><
 /li><li><a href="#Fixed_in_Apache_Tomcat_10.0.12">Fixed in Apache Tomcat 
10.0.12</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.0-M6">Fixed in Apache 
Tomcat 10.1.0-M6</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.7">Fixed in 
Apache Tomcat 10.0.7</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.6">Fixed 
in Apache Tomcat 10.0.6</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_10.0.5">Fixed in Apache Tomcat 
10.0.5</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.4">Fixed in Apache 
Tomcat 10.0.4</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.2">Fixed in 
Apache Tomcat 10.0.2</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_10.0.0-M10">Fixed in Apache Tomcat 
10.0.0-M10</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.0-M8">Fixed in 
Apache Tomcat 10.0.0-M8</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_10.0.0-M7">Fixed in Apache Tomcat 
10.0.0-M7</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.0-M6">Fixed in 
Apache Tomcat 10.0.0-M6</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.0-M5
 ">Fixed in Apache Tomcat 10.0.0-M5</a></li><li><a 
href="#Not_a_vulnerability_in_Tomcat">Not a vulnerability in 
Tomcat</a></li></ul>
+  </div><h3 id="Fixed_in_Apache_Tomcat_10.1.54"><span 
class="pull-right">2026-04-02</span> Fixed in Apache Tomcat 10.1.54</h3><div 
class="text">
+
+    <p><strong>Moderate: OCSP checks sometimes soft-fail with FFM even when
+       soft-fail is disabled</strong>
+       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-34500"; 
rel="nofollow">CVE-2026-34500</a></p>
+
+    <p>CLIENT_CERT authentication does not fail as expected for some scenarios
+       when soft fail is disabled and FFM is used.</p>
+
+    <p>This was fixed with commit
+       <a 
href="https://github.com/apache/tomcat/commit/29b56a56ce9e7d044b6162a99af0f38529b3a208";>29b56a56</a>.</p>
+
+    <p>This issue was reported to the Tomcat security team on 25 March 2026.
+       The issue was made public on 9 April 2026.</p>
+
+    <p>Affects: 10.1.22 to 10.1.53</p>
+
+    <p><strong>Low: Cloud membership for clustering component exposed the
+       Kubernetes bearer token</strong>
+       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-34487"; 
rel="nofollow">CVE-2026-34487</a></p>
+
+    <p>The cloud membership for clustering component exposed the Kubernetes
+       bearer token in log messages.</p>
+
+    <p>This was fixed with commit
+       <a 
href="https://github.com/apache/tomcat/commit/5eff2a773b8b728083e5195b3183df1b9e12a03d";>5eff2a77</a>.</p>
+
+    <p>This issue was reported to the Tomcat security team on 25 March 2026.
+       The issue was made public on 9 April 2026.</p>
+
+    <p>Affects: 10.1.0-M1 to 10.1.53</p>
+
+    <p><strong>Important: The fix for <a 
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-29146"; 
rel="nofollow">CVE-2026-29146</a> allowed the
+       bypass of the EncryptInterceptor</strong>
+       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-34486"; 
rel="nofollow">CVE-2026-34486</a></p>
+
+    <p>An error in the fix for <a 
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-29146"; 
rel="nofollow">CVE-2026-29146</a> allowed the
+       EncryptInterceptor to be bypassed.</p>
+
+    <p>This was fixed with commit
+       <a 
href="https://github.com/apache/tomcat/commit/55f3eb9148233054fccfdf761141c6894a050be1";>55f3eb91</a>.</p>
+
+    <p>This issue was reported to the Tomcat security team on 26 March 2026.
+       The issue was made public on 9 April 2026.</p>
+
+    <p>Affects: 10.1.53</p>
+
+    <p><strong>Low: Incomplete escaping of JSON access logs</strong>
+       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-34483"; 
rel="nofollow">CVE-2026-34483</a></p>
+
+    <p>Incomplete escaping when non-default values were used for the Connector
+       attributes relaxedPathChars and/or relaxedQueryChars allowed the
+       injection of arbitrary JSON into the JSON access log.</p>
+
+    <p>This was fixed with commit
+       <a 
href="https://github.com/apache/tomcat/commit/f22dc2ce6cfda8609ed86816c0d78e1a9cbadb06";>f22dc2ce</a>.</p>
+
+    <p>This issue was reported to the Tomcat security team on 25 March 2026.
+       The issue was made public on 9 April 2026.</p>
+
+    <p>Affects: 10.1.0-M1 to 10.1.53</p>
+
+  </div><h3 id="Fixed_in_Apache_Tomcat_10.1.53"><span 
class="pull-right">2026-03-23</span> Fixed in Apache Tomcat 10.1.53</h3><div 
class="text">
+  
+    <p><strong>Moderate: The fix for <a 
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-66614"; 
rel="nofollow">CVE-2025-66614</a> was
+       incomplete</strong>
+       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-32990"; 
rel="nofollow">CVE-2026-32990</a></p>
+
+    <p>The validation of SNI name and host name did not take account of 
possible
+       differences in case allowing the strict SNI checks to be bypassed.</p>
+
+    <p>This was fixed with commit
+       <a 
href="https://github.com/apache/tomcat/commit/4d0615a5c718c260d6d4e0b944a050f09a490c02";>4d0615a5</a>.</p>
+
+    <p>This issue was reported to the Tomcat security team on 13 March 2026.
+       The issue was made public on 9 April 2026.</p>
+
+    <p>Affects: 10.1.50 to 10.1.52</p>
+
+    <p><strong>Important: EncryptInterceptor vulnerable to padding oracle 
attack
+       by default</strong>
+       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-29146"; 
rel="nofollow">CVE-2026-29146</a></p>
+
+    <p>The EncryptInterceptor used CBC by default which is vulnerable to a
+       padding Oracle attack.</p>
+
+    <p>This was fixed with commit
+       <a 
href="https://github.com/apache/tomcat/commit/607ebc0fa522bd9e8c05517baa2d179bbd1e659c";>607ebc0f</a>.</p>
+
+    <p>This issue was reported to the Tomcat security team on 22 February 2026.
+       The issue was made public on 9 April 2026.</p>
+
+    <p>Affects: 10.0.0-M1 to 10.1.52</p>
+
+    <p><strong>Moderate: OCSP checks sometimes soft-fail even when soft-fail is
+       disabled</strong>
+       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-29145"; 
rel="nofollow">CVE-2026-29145</a></p>
+
+    <p>CLIENT_CERT authentication did not fail OCSP checks as expected for some
+       scenarios when soft fail was disabled.</p>
+
+    <p>This was fixed with commit
+       <a 
href="https://github.com/apache/tomcat/commit/fe26667cd2385045ac73f4dea086cc9971209b90";>fe26667c</a>.</p>
+
+    <p>This issue was reported to the Tomcat security team on 26 February 2026.
+       The issue was made public on 9 April 2026.</p>
+
+    <p><strong>Low: Configured TLS cipher preference order not 
preserved</strong>
+       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-29129"; 
rel="nofollow">CVE-2026-29129</a></p>
+
+    <p>The additional of the ability to configure TLS 1.3 cipher suites did not
+       preserve the order of the configured cipher suites and ciphers.</p>
+
+    <p>This was fixed with commit
+       <a 
href="https://github.com/apache/tomcat/commit/8d69b33764dba81dce89e3a768de6093a35620ae";>8d69b337</a>.</p>
+
+    <p>This was reported as a bug on 20 February 026 and the security
+       implications identified by the Tomcat security team the same day.
+       The issue was made public on 9 April 2026.</p>
+
+    <p>Affects: 10.1.51 to 10.1.52</p>
+
+    <p><strong>Low: Occasionally open redirect</strong>
+       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-25854"; 
rel="nofollow">CVE-2026-25854</a></p>
+
+    <p>When a Tomcat node in a cluster with the LoadBalancerDrainingValve was 
in
+       the disabled (draining) state, a specially crafted URL could be used to
+       trigger a redirect to a URI of the attackers choice.</p>
+
+    <p>This was fixed with commit
+       <a 
href="https://github.com/apache/tomcat/commit/5fb910f9a9dafa37a0c0965a1bd62a21dcf437f2";>5fb910f9</a>.</p>
+
+    <p>This issue was reported to the Tomcat security team on 30 January 2026.
+       The issue was made public on 9 April 2026.</p>
+
+    <p>Affects: 10.1.0-M1 to 10.1.52</p>
+
+    <p><strong>Low: Request smuggling via invalid chunk extension</strong>
+       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-24880"; 
rel="nofollow">CVE-2026-24880</a></p>
+
+    <p>Tomcat did not validate that contents of HTTP/1.1 chunk extensions. This
+       enabled a request smuggling attack if a reverse proxy in front of Tomcat
+       allowed CRLF sequences in an otherwise valid chunk extension.</p>
+
+    <p>This was fixed with commits
+       <a 
href="https://github.com/apache/tomcat/commit/f07df938d00f7419b40fa65aa912966d0efac522";>f07df938</a>
 and
+       <a 
href="https://github.com/apache/tomcat/commit/1e71441a15972f56e661b0b549fb9e5d838b83bb";>1e71441a</a>.</p>
+
+    <p>This issue was reported to the Tomcat security team on 19 January 2026.
+       The issue was made public on 9 April 2026.</p>
+
+    <p>Affects: 10.1.0-M1 to 10.1.52</p>
+
   </div><h3 id="Fixed_in_Apache_Tomcat_10.1.52"><span 
class="pull-right">2026-01-27</span> Fixed in Apache Tomcat 10.1.52</h3><div 
class="text">
 
     <p><strong>Moderate: Incomplete OCSP verification checks</strong>

Modified: tomcat/site/trunk/docs/security-11.html
==============================================================================
--- tomcat/site/trunk/docs/security-11.html     Thu Apr  9 18:34:58 2026        
(r1932932)
+++ tomcat/site/trunk/docs/security-11.html     Thu Apr  9 19:03:04 2026        
(r1932933)
@@ -36,7 +36,168 @@
     </p>
 
   </div><h3 id="Table_of_Contents">Table of Contents</h3><div class="text">
-    <ul><li><a href="#Fixed_in_Apache_Tomcat_11.0.18">Fixed in Apache Tomcat 
11.0.18</a></li><li><a href="#Fixed_in_Apache_Tomcat_11.0.15">Fixed in Apache 
Tomcat 11.0.15</a></li><li><a href="#Fixed_in_Apache_Tomcat_11.0.12">Fixed in 
Apache Tomcat 11.0.12</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_11.0.11">Fixed in Apache Tomcat 
11.0.11</a></li><li><a href="#Fixed_in_Apache_Tomcat_11.0.10">Fixed in Apache 
Tomcat 11.0.10</a></li><li><a href="#Fixed_in_Apache_Tomcat_11.0.9">Fixed in 
Apache Tomcat 11.0.9</a></li><li><a href="#Fixed_in_Apache_Tomcat_11.0.8">Fixed 
in Apache Tomcat 11.0.8</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_11.0.7">Fixed in Apache Tomcat 
11.0.7</a></li><li><a href="#Fixed_in_Apache_Tomcat_11.0.6">Fixed in Apache 
Tomcat 11.0.6</a></li><li><a href="#Fixed_in_Apache_Tomcat_11.0.3">Fixed in 
Apache Tomcat 11.0.3</a></li><li><a href="#Fixed_in_Apache_Tomcat_11.0.2">Fixed 
in Apache Tomcat 11.0.2</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_11.0.1">Fixed in Apache Tomca
 t 11.0.1</a></li><li><a href="#Fixed_in_Apache_Tomcat_11.0.0">Fixed in Apache 
Tomcat 11.0.0</a></li><li><a href="#Fixed_in_Apache_Tomcat_11.0.0-M21">Fixed in 
Apache Tomcat 11.0.0-M21</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_11.0.0-M17">Fixed in Apache Tomcat 
11.0.0-M17</a></li><li><a href="#Fixed_in_Apache_Tomcat_11.0.0-M12">Fixed in 
Apache Tomcat 11.0.0-M12</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_11.0.0-M11">Fixed in Apache Tomcat 
11.0.0-M11</a></li><li><a href="#Fixed_in_Apache_Tomcat_11.0.0-M6">Fixed in 
Apache Tomcat 11.0.0-M6</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_11.0.0-M5">Fixed in Apache Tomcat 
11.0.0-M5</a></li><li><a href="#Fixed_in_Apache_Tomcat_11.0.0-M3">Fixed in 
Apache Tomcat 11.0.0-M3</a></li></ul>
+    <ul><li><a href="#Fixed_in_Apache_Tomcat_11.0.21">Fixed in Apache Tomcat 
11.0.21</a></li><li><a href="#Fixed_in_Apache_Tomcat_11.0.20">Fixed in Apache 
Tomcat 11.0.20</a></li><li><a href="#Fixed_in_Apache_Tomcat_11.0.18">Fixed in 
Apache Tomcat 11.0.18</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_11.0.15">Fixed in Apache Tomcat 
11.0.15</a></li><li><a href="#Fixed_in_Apache_Tomcat_11.0.12">Fixed in Apache 
Tomcat 11.0.12</a></li><li><a href="#Fixed_in_Apache_Tomcat_11.0.11">Fixed in 
Apache Tomcat 11.0.11</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_11.0.10">Fixed in Apache Tomcat 
11.0.10</a></li><li><a href="#Fixed_in_Apache_Tomcat_11.0.9">Fixed in Apache 
Tomcat 11.0.9</a></li><li><a href="#Fixed_in_Apache_Tomcat_11.0.8">Fixed in 
Apache Tomcat 11.0.8</a></li><li><a href="#Fixed_in_Apache_Tomcat_11.0.7">Fixed 
in Apache Tomcat 11.0.7</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_11.0.6">Fixed in Apache Tomcat 
11.0.6</a></li><li><a href="#Fixed_in_Apache_Tomcat_11.0.3">Fixed in Apache T
 omcat 11.0.3</a></li><li><a href="#Fixed_in_Apache_Tomcat_11.0.2">Fixed in 
Apache Tomcat 11.0.2</a></li><li><a href="#Fixed_in_Apache_Tomcat_11.0.1">Fixed 
in Apache Tomcat 11.0.1</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_11.0.0">Fixed in Apache Tomcat 
11.0.0</a></li><li><a href="#Fixed_in_Apache_Tomcat_11.0.0-M21">Fixed in Apache 
Tomcat 11.0.0-M21</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_11.0.0-M17">Fixed in Apache Tomcat 
11.0.0-M17</a></li><li><a href="#Fixed_in_Apache_Tomcat_11.0.0-M12">Fixed in 
Apache Tomcat 11.0.0-M12</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_11.0.0-M11">Fixed in Apache Tomcat 
11.0.0-M11</a></li><li><a href="#Fixed_in_Apache_Tomcat_11.0.0-M6">Fixed in 
Apache Tomcat 11.0.0-M6</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_11.0.0-M5">Fixed in Apache Tomcat 
11.0.0-M5</a></li><li><a href="#Fixed_in_Apache_Tomcat_11.0.0-M3">Fixed in 
Apache Tomcat 11.0.0-M3</a></li></ul>
+  </div><h3 id="Fixed_in_Apache_Tomcat_11.0.21"><span 
class="pull-right">2026-04-04</span> Fixed in Apache Tomcat 11.0.21</h3><div 
class="text">
+
+    <p><strong>Moderate: OCSP checks sometimes soft-fail with FFM even when
+       soft-fail is disabled</strong>
+       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-34500"; 
rel="nofollow">CVE-2026-34500</a></p>
+
+    <p>CLIENT_CERT authentication did not fail as expected for some scenarios
+       when soft fail was disabled and FFM was used.</p>
+
+    <p>This was fixed with commit
+       <a 
href="https://github.com/apache/tomcat/commit/c13e60e732ea6d07087293a41ad1866c20848271";>c13e60e7</a>.</p>
+
+    <p>This issue was reported to the Tomcat security team on 25 March 2026.
+       The issue was made public on 9 April 2026.</p>
+
+    <p>Affects: 11.0.0-M14 to 11.0.20</p>
+
+    <p><strong>Low: Cloud membership for clustering component exposed the
+       Kubernetes bearer token</strong>
+       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-34487"; 
rel="nofollow">CVE-2026-34487</a></p>
+
+    <p>The cloud membership for clustering component exposed the Kubernetes
+       bearer token in log messages.</p>
+
+    <p>This was fixed with commit
+       <a 
href="https://github.com/apache/tomcat/commit/301bc6efbf72feb14dacfdfa3f50372182736150";>301bc6ef</a>.</p>
+
+    <p>This issue was reported to the Tomcat security team on 25 March 2026.
+       The issue was made public on 9 April 2026.</p>
+
+    <p>Affects: 11.0.0-M1 to 11.0.20</p>
+
+    <p><strong>Important: The fix for <a 
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-29146"; 
rel="nofollow">CVE-2026-29146</a> allowed the
+       bypass of the EncryptInterceptor</strong>
+       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-34486"; 
rel="nofollow">CVE-2026-34486</a></p>
+
+    <p>An error in the fix for <a 
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-29146"; 
rel="nofollow">CVE-2026-29146</a> allowed the
+       EncryptInterceptor to be bypassed.</p>
+
+    <p>This was fixed with commit
+       <a 
href="https://github.com/apache/tomcat/commit/1fab40ccc752e22639eccfe290d5624afad7eccd";>1fab40cc</a>.</p>
+
+    <p>This issue was reported to the Tomcat security team on 26 March 2026.
+       The issue was made public on 9 April 2026.</p>
+
+    <p>Affects: 11.0.20</p>
+
+    <p><strong>Low: Incomplete escaping of JSON access logs</strong>
+       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-34483"; 
rel="nofollow">CVE-2026-34483</a></p>
+
+    <p>Incomplete escaping when non-default values were used for the Connector
+       attributes relaxedPathChars and/or relaxedQueryChars allowed the
+       injection of arbitrary JSON into the JSON access log.</p>
+
+    <p>This was fixed with commit
+       <a 
href="https://github.com/apache/tomcat/commit/f9ddc24fcfcdfaea4a6953198d8636aca3e957bc";>f9ddc24f</a>.</p>
+
+    <p>This issue was reported to the Tomcat security team on 25 March 2026.
+       The issue was made public on 9 April 2026.</p>
+
+    <p>Affects: 11.0.0-M1 to 11.0.20</p>
+
+  </div><h3 id="Fixed_in_Apache_Tomcat_11.0.20"><span 
class="pull-right">2026-03-20</span> Fixed in Apache Tomcat 11.0.20</h3><div 
class="text">
+  
+    <p><strong>Moderate: The fix for <a 
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-66614"; 
rel="nofollow">CVE-2025-66614</a> was
+       incomplete</strong>
+       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-32990"; 
rel="nofollow">CVE-2026-32990</a></p>
+
+    <p>The validation of SNI name and host name did not take account of 
possible
+       differences in case allowing the strict SNI checks to be bypassed.</p>
+
+    <p>This was fixed with commit
+       <a 
href="https://github.com/apache/tomcat/commit/021d1f833e38b683a44688f7b28f1f27e8e37c36";>021d1f83</a>.</p>
+
+    <p>This issue was reported to the Tomcat security team on 13 March 2026.
+       The issue was made public on 9 April 2026.</p>
+
+    <p>Affects: 11.0.15 to 11.0.19</p>
+
+    <p><i>Note: The issues below were fixed in Apache Tomcat 11.0.19 but the
+       release vote for the 11.0.19 release candidate did not pass. Therefore,
+       although users must download 11.0.20 to obtain a version that includes
+       a fix for these issues, version 11.0.19 is not included in the list of 
+       affected versions.</i></p>
+
+    <p><strong>Important: EncryptInterceptor vulnerable to padding oracle 
attack
+       by default</strong>
+       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-29146"; 
rel="nofollow">CVE-2026-29146</a></p>
+
+    <p>The EncryptInterceptor used CBC by default which is vulnerable to a
+       padding Oracle attack.</p>
+
+    <p>This was fixed with commit
+       <a 
href="https://github.com/apache/tomcat/commit/6d955cceca841f2eabf2d6c46b59a8c7e1cd6eaa";>6d955cce</a>.</p>
+
+    <p>This issue was reported to the Tomcat security team on 22 February 2026.
+       The issue was made public on 9 April 2026.</p>
+
+    <p>Affects: 11.0.0-M1 to 11.0.18</p>
+
+    <p><strong>Moderate: OCSP checks sometimes soft-fail even when soft-fail is
+       disabled</strong>
+       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-29145"; 
rel="nofollow">CVE-2026-29145</a></p>
+
+    <p>CLIENT_CERT authentication did not fail OCSP checks as expected for some
+       scenarios when soft fail was disabled.</p>
+
+    <p>This was fixed with commit
+       <a 
href="https://github.com/apache/tomcat/commit/721591f7bff424c693f26adc18ae9b9abac3655b";>721591f7</a>.</p>
+
+    <p>This issue was reported to the Tomcat security team on 26 February 2026.
+       The issue was made public on 9 April 2026.</p>
+
+    <p>Affects: 11.0.0-M1 to 11.0.18</p>
+
+    <p><strong>Low: Configured TLS cipher preference order not 
preserved</strong>
+       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-29129"; 
rel="nofollow">CVE-2026-29129</a></p>
+
+    <p>The additional of the ability to configure TLS 1.3 cipher suites did not
+       preserve the order of the configured cipher suites and ciphers.</p>
+
+    <p>This was fixed with commit
+       <a 
href="https://github.com/apache/tomcat/commit/5cfa876d73f1ff5f4dc8309c4320f684cbeff74e";>5cfa876d</a>.</p>
+
+    <p>This was reported as a bug on 20 February 026 and the security
+       implications identified by the Tomcat security team the same day.
+       The issue was made public on 9 April 2026.</p>
+
+    <p>Affects: 11.0.16 to 11.0.18</p>
+
+    <p><strong>Low: Occasionally open redirect</strong>
+       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-25854"; 
rel="nofollow">CVE-2026-25854</a></p>
+
+    <p>When a Tomcat node in a cluster with the LoadBalancerDrainingValve was 
in
+       the disabled (draining) state, a specially crafted URL could be used to
+       trigger a redirect to a URI of the attackers choice.</p>
+
+    <p>This was fixed with commit
+       <a 
href="https://github.com/apache/tomcat/commit/4c5d306001b780c9316aea5ff6502c524fb20695";>4c5d3060</a>.</p>
+
+    <p>This issue was reported to the Tomcat security team on 30 January 2026.
+       The issue was made public on 9 April 2026.</p>
+
+    <p>Affects: 11.0.0-M1 to 11.0.18</p>
+
+    <p><strong>Low: Request smuggling via invalid chunk extension</strong>
+       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-24880"; 
rel="nofollow">CVE-2026-24880</a></p>
+
+    <p>Tomcat did not validate that contents of HTTP/1.1 chunk extensions. This
+       enabled a request smuggling attack if a reverse proxy in front of Tomcat
+       allowed CRLF sequences in an otherwise valid chunk extension.</p>
+
+    <p>This was fixed with commits
+       <a 
href="https://github.com/apache/tomcat/commit/fde1a8235fb73125217bd41e162aa0a113f33552";>fde1a823</a>
 and
+       <a 
href="https://github.com/apache/tomcat/commit/2cb06c34f661ca42f7570bbcc21e99806184bcc5";>2cb06c34</a>.</p>
+
+    <p>This issue was reported to the Tomcat security team on 19 January 2026.
+       The issue was made public on 9 April 2026.</p>
+
+    <p>Affects: 11.0.0-M1 to 11.0.18</p>
+
   </div><h3 id="Fixed_in_Apache_Tomcat_11.0.18"><span 
class="pull-right">2026-01-26</span> Fixed in Apache Tomcat 11.0.18</h3><div 
class="text">
 
     <p><strong>Moderate: Incomplete OCSP verification checks</strong>

Modified: tomcat/site/trunk/docs/security-9.html
==============================================================================
--- tomcat/site/trunk/docs/security-9.html      Thu Apr  9 18:34:58 2026        
(r1932932)
+++ tomcat/site/trunk/docs/security-9.html      Thu Apr  9 19:03:04 2026        
(r1932933)
@@ -36,7 +36,160 @@
     </p>
 
   </div><h3 id="Table_of_Contents">Table of Contents</h3><div class="text">
-    <ul><li><a href="#Fixed_in_Apache_Tomcat_9.0.115">Fixed in Apache Tomcat 
9.0.115</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.113">Fixed in Apache 
Tomcat 9.0.113</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.110">Fixed in 
Apache Tomcat 9.0.110</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_9.0.109">Fixed in Apache Tomcat 
9.0.109</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.108">Fixed in Apache 
Tomcat 9.0.108</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.107">Fixed in 
Apache Tomcat 9.0.107</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_9.0.106">Fixed in Apache Tomcat 
9.0.106</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.105">Fixed in Apache 
Tomcat 9.0.105</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.104">Fixed in 
Apache Tomcat 9.0.104</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_9.0.99">Fixed in Apache Tomcat 
9.0.99</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.98">Fixed in Apache 
Tomcat 9.0.98</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.97">Fixed in Apac
 he Tomcat 9.0.97</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.96">Fixed in 
Apache Tomcat 9.0.96</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.90">Fixed 
in Apache Tomcat 9.0.90</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_9.0.86">Fixed in Apache Tomcat 
9.0.86</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.83">Fixed in Apache 
Tomcat 9.0.83</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.81">Fixed in 
Apache Tomcat 9.0.81</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.80">Fixed 
in Apache Tomcat 9.0.80</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_9.0.75">Fixed in Apache Tomcat 
9.0.75</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.74">Fixed in Apache 
Tomcat 9.0.74</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.72">Fixed in 
Apache Tomcat 9.0.72</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.71">Fixed 
in Apache Tomcat 9.0.71</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_9.0.69">Fixed in Apache Tomcat 
9.0.69</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.68">Fixed in Apach
 e Tomcat 9.0.68</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.65">Fixed in 
Apache Tomcat 9.0.65</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.63">Fixed 
in Apache Tomcat 9.0.63</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_9.0.62">Fixed in Apache Tomcat 
9.0.62</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.58">Fixed in Apache 
Tomcat 9.0.58</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.54">Fixed in 
Apache Tomcat 9.0.54</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.48">Fixed 
in Apache Tomcat 9.0.48</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_9.0.46">Fixed in Apache Tomcat 
9.0.46</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.45">Fixed in Apache 
Tomcat 9.0.45</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.44">Fixed in 
Apache Tomcat 9.0.44</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.43">Fixed 
in Apache Tomcat 9.0.43</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_9.0.40">Fixed in Apache Tomcat 
9.0.40</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.38">Fixed in Apache
  Tomcat 9.0.38</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.37">Fixed in 
Apache Tomcat 9.0.37</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.36">Fixed 
in Apache Tomcat 9.0.36</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_9.0.35">Fixed in Apache Tomcat 
9.0.35</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.31">Fixed in Apache 
Tomcat 9.0.31</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.30">Fixed in 
Apache Tomcat 9.0.30</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.29">Fixed 
in Apache Tomcat 9.0.29</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_9.0.21">Fixed in Apache Tomcat 
9.0.21</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.20">Fixed in Apache 
Tomcat 9.0.20</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.19">Fixed in 
Apache Tomcat 9.0.19</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.16">Fixed 
in Apache Tomcat 9.0.16</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_9.0.12">Fixed in Apache Tomcat 
9.0.12</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.10">Fixed in Apache 
 Tomcat 9.0.10</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.9">Fixed in 
Apache Tomcat 9.0.9</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.8">Fixed 
in Apache Tomcat 9.0.8</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_9.0.5">Fixed in Apache Tomcat 
9.0.5</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.2">Fixed in Apache 
Tomcat 9.0.2</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.1">Fixed in 
Apache Tomcat 9.0.1</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_9.0.0.M22">Fixed in Apache Tomcat 
9.0.0.M22</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.0.M21">Fixed in 
Apache Tomcat 9.0.0.M21</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_9.0.0.M19">Fixed in Apache Tomcat 
9.0.0.M19</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.0.M18">Fixed in 
Apache Tomcat 9.0.0.M18</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_9.0.0.M17">Fixed in Apache Tomcat 
9.0.0.M17</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.0.M15">Fixed in 
Apache Tomcat 9.0.0.M15</a></li><li><a href="#Fixed_in_Apache_Tomcat
 _9.0.0.M13">Fixed in Apache Tomcat 9.0.0.M13</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_9.0.0.M10">Fixed in Apache Tomcat 
9.0.0.M10</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.0.M8">Fixed in 
Apache Tomcat 9.0.0.M8</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_9.0.0.M3">Fixed in Apache Tomcat 
9.0.0.M3</a></li><li><a href="#Not_a_vulnerability_in_Tomcat">Not a 
vulnerability in Tomcat</a></li></ul>
+    <ul><li><a href="#Fixed_in_Apache_Tomcat_9.0.117">Fixed in Apache Tomcat 
9.0.117</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.116">Fixed in Apache 
Tomcat 9.0.116</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.115">Fixed in 
Apache Tomcat 9.0.115</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_9.0.113">Fixed in Apache Tomcat 
9.0.113</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.110">Fixed in Apache 
Tomcat 9.0.110</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.109">Fixed in 
Apache Tomcat 9.0.109</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_9.0.108">Fixed in Apache Tomcat 
9.0.108</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.107">Fixed in Apache 
Tomcat 9.0.107</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.106">Fixed in 
Apache Tomcat 9.0.106</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_9.0.105">Fixed in Apache Tomcat 
9.0.105</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.104">Fixed in Apache 
Tomcat 9.0.104</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.99">Fixed in 
 Apache Tomcat 9.0.99</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_9.0.98">Fixed in Apache Tomcat 
9.0.98</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.97">Fixed in Apache 
Tomcat 9.0.97</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.96">Fixed in 
Apache Tomcat 9.0.96</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.90">Fixed 
in Apache Tomcat 9.0.90</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_9.0.86">Fixed in Apache Tomcat 
9.0.86</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.83">Fixed in Apache 
Tomcat 9.0.83</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.81">Fixed in 
Apache Tomcat 9.0.81</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.80">Fixed 
in Apache Tomcat 9.0.80</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_9.0.75">Fixed in Apache Tomcat 
9.0.75</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.74">Fixed in Apache 
Tomcat 9.0.74</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.72">Fixed in 
Apache Tomcat 9.0.72</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.71">Fixed 
in A
 pache Tomcat 9.0.71</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.69">Fixed 
in Apache Tomcat 9.0.69</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_9.0.68">Fixed in Apache Tomcat 
9.0.68</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.65">Fixed in Apache 
Tomcat 9.0.65</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.63">Fixed in 
Apache Tomcat 9.0.63</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.62">Fixed 
in Apache Tomcat 9.0.62</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_9.0.58">Fixed in Apache Tomcat 
9.0.58</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.54">Fixed in Apache 
Tomcat 9.0.54</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.48">Fixed in 
Apache Tomcat 9.0.48</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.46">Fixed 
in Apache Tomcat 9.0.46</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_9.0.45">Fixed in Apache Tomcat 
9.0.45</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.44">Fixed in Apache 
Tomcat 9.0.44</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.43">Fixed in Ap
 ache Tomcat 9.0.43</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.40">Fixed 
in Apache Tomcat 9.0.40</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_9.0.38">Fixed in Apache Tomcat 
9.0.38</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.37">Fixed in Apache 
Tomcat 9.0.37</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.36">Fixed in 
Apache Tomcat 9.0.36</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.35">Fixed 
in Apache Tomcat 9.0.35</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_9.0.31">Fixed in Apache Tomcat 
9.0.31</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.30">Fixed in Apache 
Tomcat 9.0.30</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.29">Fixed in 
Apache Tomcat 9.0.29</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.21">Fixed 
in Apache Tomcat 9.0.21</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_9.0.20">Fixed in Apache Tomcat 
9.0.20</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.19">Fixed in Apache 
Tomcat 9.0.19</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.16">Fixed in Apa
 che Tomcat 9.0.16</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.12">Fixed 
in Apache Tomcat 9.0.12</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_9.0.10">Fixed in Apache Tomcat 
9.0.10</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.9">Fixed in Apache 
Tomcat 9.0.9</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.8">Fixed in 
Apache Tomcat 9.0.8</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.5">Fixed 
in Apache Tomcat 9.0.5</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_9.0.2">Fixed in Apache Tomcat 
9.0.2</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.1">Fixed in Apache 
Tomcat 9.0.1</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.0.M22">Fixed in 
Apache Tomcat 9.0.0.M22</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_9.0.0.M21">Fixed in Apache Tomcat 
9.0.0.M21</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.0.M19">Fixed in 
Apache Tomcat 9.0.0.M19</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_9.0.0.M18">Fixed in Apache Tomcat 
9.0.0.M18</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.0.M
 17">Fixed in Apache Tomcat 9.0.0.M17</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_9.0.0.M15">Fixed in Apache Tomcat 
9.0.0.M15</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.0.M13">Fixed in 
Apache Tomcat 9.0.0.M13</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_9.0.0.M10">Fixed in Apache Tomcat 
9.0.0.M10</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.0.M8">Fixed in 
Apache Tomcat 9.0.0.M8</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_9.0.0.M3">Fixed in Apache Tomcat 
9.0.0.M3</a></li><li><a href="#Not_a_vulnerability_in_Tomcat">Not a 
vulnerability in Tomcat</a></li></ul>
+  </div><h3 id="Fixed_in_Apache_Tomcat_9.0.117"><span 
class="pull-right">2026-04-03</span> Fixed in Apache Tomcat 9.0.117</h3><div 
class="text">
+
+    <p><strong>Moderate: OCSP checks sometimes soft-fail with FFM even when
+       soft-fail is disabled</strong>
+       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-34500"; 
rel="nofollow">CVE-2026-34500</a></p>
+
+    <p>CLIENT_CERT authentication does not fail as expected for some scenarios
+       when soft fail is disabled and FFM is used.</p>
+
+    <p>This was fixed with commit
+       <a 
href="https://github.com/apache/tomcat/commit/ff589ab26e8250a2ca4286d986305318c033ff9f";>ff589ab2</a>.</p>
+
+    <p>This issue was reported to the Tomcat security team on 25 March 2026.
+       The issue was made public on 9 April 2026.</p>
+
+    <p>Affects: 9.0.92 to 9.0.116</p>
+
+    <p><strong>Low: Cloud membership for clustering component exposed the
+       Kubernetes bearer token</strong>
+       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-34487"; 
rel="nofollow">CVE-2026-34487</a></p>
+
+    <p>The cloud membership for clustering component exposed the Kubernetes
+       bearer token in log messages.</p>
+
+    <p>This was fixed with commit
+       <a 
href="https://github.com/apache/tomcat/commit/f593292a082e5ef9336a8db2b4b522f7f3e36976";>f593292a</a>.</p>
+
+    <p>This issue was reported to the Tomcat security team on 25 March 2026.
+       The issue was made public on 9 April 2026.</p>
+
+    <p>Affects: 9.0.13 to 9.0.116</p>
+
+    <p><strong>Important: The fix for <a 
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-29146"; 
rel="nofollow">CVE-2026-29146</a> allowed the
+       bypass of the EncryptInterceptor</strong>
+       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-34486"; 
rel="nofollow">CVE-2026-34486</a></p>
+
+    <p>An error in the fix for <a 
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-29146"; 
rel="nofollow">CVE-2026-29146</a> allowed the
+       EncryptInterceptor to be bypassed.</p>
+
+    <p>This was fixed with commit
+       <a 
href="https://github.com/apache/tomcat/commit/776e12b3e2b0b4507b8a3b62c187ceb0b74bf418";>776e12b3</a>.</p>
+
+    <p>This issue was reported to the Tomcat security team on 26 March 2026.
+       The issue was made public on 9 April 2026.</p>
+
+    <p>Affects: 9.0.116</p>
+
+    <p><strong>Low: Incomplete escaping of JSON access logs</strong>
+       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-34483"; 
rel="nofollow">CVE-2026-34483</a></p>
+
+    <p>Incomplete escaping when non-default values were used for the Connector
+       attributes relaxedPathChars and/or relaxedQueryChars allowed the
+       injection of arbitrary JSON into the JSON access log.</p>
+
+    <p>This was fixed with commit
+       <a 
href="https://github.com/apache/tomcat/commit/97566842589d0b80de138ca719378861fd017d68";>97566842</a>.</p>
+
+    <p>This issue was reported to the Tomcat security team on 25 March 2026.
+       The issue was made public on 9 April 2026.</p>
+
+    <p>Affects: 9.0.40 to 9.0.116</p>
+
+  </div><h3 id="Fixed_in_Apache_Tomcat_9.0.116"><span 
class="pull-right">2026-03-20</span> Fixed in Apache Tomcat 9.0.116</h3><div 
class="text">
+  
+    <p><strong>Moderate: The fix for <a 
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-66614"; 
rel="nofollow">CVE-2025-66614</a> was
+       incomplete</strong>
+       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-32990"; 
rel="nofollow">CVE-2026-32990</a></p>
+
+    <p>The validation of SNI name and host name did not take account of 
possible
+       differences in case allowing the strict SNI checks to be bypassed.</p>
+
+    <p>This was fixed with commit
+       <a 
href="https://github.com/apache/tomcat/commit/95f7778248cac46d03e6af04de9c72a598be3a53";>95f77782</a>.</p>
+
+    <p>This issue was reported to the Tomcat security team on 13 March 2026.
+       The issue was made public on 9 April 2026.</p>
+
+    <p>Affects: 9.0.113 to 9.0.115</p>
+
+    <p><strong>Important: EncryptInterceptor vulnerable to padding oracle 
attack
+       by default</strong>
+       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-29146"; 
rel="nofollow">CVE-2026-29146</a></p>
+
+    <p>The EncryptInterceptor used CBC by default which is vulnerable to a
+       padding Oracle attack.</p>
+
+    <p>This was fixed with commit
+       <a 
href="https://github.com/apache/tomcat/commit/0112ed22abfccc3d54e44d91eb08804d0886acd1";>0112ed22</a>.</p>
+
+    <p>This issue was reported to the Tomcat security team on 22 February 2026.
+       The issue was made public on 9 April 2026.</p>
+
+    <p>Affects: 9.0.13 to 9.0.115</p>
+
+    <p><strong>Moderate: OCSP checks sometimes soft-fail even when soft-fail is
+       disabled</strong>
+       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-29145"; 
rel="nofollow">CVE-2026-29145</a></p>
+
+    <p>CLIENT_CERT authentication did not fail OCSP checks as expected for some
+       scenarios when soft fail was disabled.</p>
+
+    <p>This was fixed with commit
+       <a 
href="https://github.com/apache/tomcat/commit/d1406df5ae0326f39f54c3f64ac30d8fca55cd5b";>d1406df5</a>.</p>
+
+    <p>This issue was reported to the Tomcat security team on 26 February 2026.
+       The issue was made public on 9 April 2026.</p>
+
+    <p><strong>Low: Configured TLS cipher preference order not 
preserved</strong>
+       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-29129"; 
rel="nofollow">CVE-2026-29129</a></p>
+
+    <p>The additional of the ability to configure TLS 1.3 cipher suites did not
+       preserve the order of the configured cipher suites and ciphers.</p>
+
+    <p>This was fixed with commit
+       <a 
href="https://github.com/apache/tomcat/commit/6db238562ec36ab1106db4d04843f8b33e7a0c06";>6db23856</a>.</p>
+
+    <p>This was reported as a bug on 20 February 026 and the security
+       implications identified by the Tomcat security team the same day.
+       The issue was made public on 9 April 2026.</p>
+
+    <p>Affects: 9.0.114 to 9.0.115</p>
+
+    <p><strong>Low: Occasionally open redirect</strong>
+       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-25854"; 
rel="nofollow">CVE-2026-25854</a></p>
+
+    <p>When a Tomcat node in a cluster with the LoadBalancerDrainingValve was 
in
+       the disabled (draining) state, a specially crafted URL could be used to
+       trigger a redirect to a URI of the attackers choice.</p>
+
+    <p>This was fixed with commit
+       <a 
href="https://github.com/apache/tomcat/commit/c5a45ae68d07f7a07be2a875e5b6772d66c4e5d0";>c5a45ae6</a>.</p>
+
+    <p>This issue was reported to the Tomcat security team on 30 January 2026.
+       The issue was made public on 9 April 2026.</p>
+
+    <p>Affects: 9.0.0.M23 to 9.0.115</p>
+
+    <p><strong>Low: Request smuggling via invalid chunk extension</strong>
+       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-24880"; 
rel="nofollow">CVE-2026-24880</a></p>
+
+    <p>Tomcat did not validate that contents of HTTP/1.1 chunk extensions. This
+       enabled a request smuggling attack if a reverse proxy in front of Tomcat
+       allowed CRLF sequences in an otherwise valid chunk extension.</p>
+
+    <p>This was fixed with commits
+       <a 
href="https://github.com/apache/tomcat/commit/1b586d6aa8ae65726da5fa8799427b5d4718478a";>1b586d6a</a>
 and
+       <a 
href="https://github.com/apache/tomcat/commit/6d478dbe18b7c4bb671c30fedf130309b0dab77c";>6d478dbe</a>.</p>
+
+    <p>This issue was reported to the Tomcat security team on 19 January 2026.
+       The issue was made public on 9 April 2026.</p>
+
+    <p>Affects: 9.0.0.M1 to 9.0.115</p>
+
   </div><h3 id="Fixed_in_Apache_Tomcat_9.0.115"><span 
class="pull-right">2026-01-23</span> Fixed in Apache Tomcat 9.0.115</h3><div 
class="text">
 
     <p><strong>Moderate: Incomplete OCSP verification checks</strong>

Modified: tomcat/site/trunk/docs/security-native.html
==============================================================================
--- tomcat/site/trunk/docs/security-native.html Thu Apr  9 18:34:58 2026        
(r1932932)
+++ tomcat/site/trunk/docs/security-native.html Thu Apr  9 19:03:04 2026        
(r1932933)
@@ -1,6 +1,6 @@
 <!DOCTYPE html SYSTEM "about:legacy-compat">
 <html lang="en"><head><META http-equiv="Content-Type" content="text/html; 
charset=UTF-8"><meta name="viewport" content="width=device-width, 
initial-scale=1"><link href="res/css/tomcat.css" rel="stylesheet" 
type="text/css"><link href="res/css/fonts/fonts.css" rel="stylesheet" 
type="text/css"><title>Apache Tomcat&reg; - Apache Tomcat APR/native Connector 
vulnerabilities</title><meta name="author" content="Apache Tomcat 
Project"><script 
src="https://www.apachecon.com/event-images/snippet.js";></script></head><body><div
 id="wrapper"><header id="header"><div class="clearfix"><div 
class="menu-toggler pull-left" tabindex="1"><div 
class="hamburger"></div></div><a href="http://tomcat.apache.org/";><img 
class="tomcat-logo pull-left noPrint" alt="Tomcat Home" 
src="res/images/tomcat.png"></a><h1 class="pull-left">Apache 
Tomcat<sup>&reg;</sup></h1><div class="asf-logos pull-right"><a 
href="https://www.apache.org/foundation/contributing.html"; target="_blank" 
class="pull-left"><img src="https://www.
 apache.org/images/SupportApache-small.png" class="support-asf" alt="Support 
Apache"></a><a href="http://www.apache.org/"; target="_blank" 
class="pull-left"><img src="res/images/asf_logo_wide.svg" class="asf-logo" 
alt="The Apache Software Foundation"></a></div></div></header><main 
id="middle"><div><div id="mainLeft"><div id="nav-wrapper"><form 
action="https://www.google.com/search"; method="get"><div 
class="searchbox"><input value="tomcat.apache.org" name="sitesearch" 
type="hidden"><input aria-label="Search text" placeholder="Search&hellip;" 
required="required" name="q" id="query" 
type="search"><button>GO</button></div></form><div class="asfevents"><a 
class="acevent" data-format="square" 
data-width="150"></a></div><nav><div><h2>Apache Tomcat</h2><ul><li><a 
href="./index.html">Home</a></li><li><a 
href="./taglibs.html">Taglibs</a></li><li><a href="./maven-plugin.html">Maven 
Plugin</a></li></ul></div><div><h2>Download</h2><ul><li><a 
href="./whichversion.html">Which version?</a></li><li><a
  href="https://tomcat.apache.org/download-11.cgi";>Tomcat 11</a></li><li><a 
href="https://tomcat.apache.org/download-10.cgi";>Tomcat 10</a></li><li><a 
href="https://tomcat.apache.org/download-90.cgi";>Tomcat 9</a></li><li><a 
href="https://tomcat.apache.org/download-migration.cgi";>Tomcat Migration Tool 
for Jakarta EE</a></li><li><a 
href="https://tomcat.apache.org/download-connectors.cgi";>Tomcat 
Connectors</a></li><li><a 
href="https://tomcat.apache.org/download-native.cgi";>Tomcat 
Native</a></li><li><a 
href="https://tomcat.apache.org/download-taglibs.cgi";>Taglibs</a></li><li><a 
href="https://archive.apache.org/dist/tomcat/";>Archives</a></li></ul></div><div><h2>Documentation</h2><ul><li><a
 href="./tomcat-11.0-doc/index.html">Tomcat 11.0</a></li><li><a 
href="./tomcat-10.1-doc/index.html">Tomcat 10.1</a></li><li><a 
href="./tomcat-9.0-doc/index.html">Tomcat 9.0</a></li><li><a 
href="./upgrading.html">Upgrading</a></li><li><a 
href="./connectors-doc/index.html">Tomcat Connectors</a></li><li><a h
 ref="./native-doc/index.html">Tomcat Native 2</a></li><li><a 
href="./native-1.3-doc/index.html">Tomcat Native 1.3</a></li><li><a 
href="https://cwiki.apache.org/confluence/display/TOMCAT";>Wiki</a></li><li><a 
href="./migration.html">Migration Guide</a></li><li><a 
href="./presentations.html">Presentations</a></li><li><a 
href="https://cwiki.apache.org/confluence/x/Bi8lBg";>Specifications</a></li></ul></div><div><h2>Problems?</h2><ul><li><a
 href="./security.html">Security Reports</a></li><li><a 
href="./findhelp.html">Find help</a></li><li><a 
href="https://cwiki.apache.org/confluence/display/TOMCAT/FAQ";>FAQ</a></li><li><a
 href="./lists.html">Mailing Lists</a></li><li><a href="./bugreport.html">Bug 
Database</a></li></ul></div><div><h2>Get Involved</h2><ul><li><a 
href="./getinvolved.html">Overview</a></li><li><a href="./source.html">Source 
code</a></li><li><a href="./ci.html">Buildbot</a></li><li><a 
href="./tools.html">Tools</a></li></ul></div><div><h2>Media</h2><ul><li><a 
href="https://twit
 ter.com/theapachetomcat">Twitter</a></li><li><a 
href="https://www.youtube.com/c/ApacheTomcatOfficial";>YouTube</a></li><li><a 
href="https://blogs.apache.org/tomcat/";>Blog</a></li></ul></div><div><h2>Misc</h2><ul><li><a
 href="./whoweare.html">Who We Are</a></li><li><a 
href="https://www.redbubble.com/people/comdev/works/30885254-apache-tomcat";>Swag</a></li><li><a
 href="./heritage.html">Heritage</a></li><li><a 
href="http://www.apache.org";>Apache Home</a></li><li><a 
href="./resources.html">Resources</a></li><li><a 
href="./contact.html">Contact</a></li><li><a 
href="./legal.html">Legal</a></li><li><a 
href="https://privacy.apache.org/policies/privacy-policy-public.html";>Privacy</a></li><li><a
 href="https://www.apache.org/foundation/contributing.html";>Support 
Apache</a></li><li><a 
href="https://www.apache.org/foundation/sponsorship.html";>Sponsorship</a></li><li><a
 href="http://www.apache.org/foundation/thanks.html";>Thanks</a></li><li><a 
href="http://www.apache.org/licenses/";>License</a></li>
 </ul></div></nav></div></div><div id="mainRight"><div id="content"><h2 
style="display: none;">Content</h2><h3 id="Table_of_Contents">Table of 
Contents</h3><div class="text">
-<ul><li><a href="#Apache_Tomcat_APR/native_Connector_vulnerabilities">Apache 
Tomcat APR/native Connector vulnerabilities</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_Native_Connector_2.0.12_/_1.3.5">Fixed in Apache 
Tomcat Native Connector 2.0.12 / 1.3.5</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_Native_Connector_1.2.17">Fixed in Apache Tomcat 
Native Connector 1.2.17</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_Native_Connector_1.2.16">Fixed in Apache Tomcat 
Native Connector 1.2.16</a></li><li><a 
href="#Not_a_vulnerability_in_the_Apache_Tomcat_APR/native_Connector">Not a 
vulnerability in the Apache Tomcat APR/native Connector</a></li></ul>
+<ul><li><a href="#Apache_Tomcat_APR/native_Connector_vulnerabilities">Apache 
Tomcat APR/native Connector vulnerabilities</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_Native_Connector_2.0.14_/_1.3.7">Fixed in Apache 
Tomcat Native Connector 2.0.14 / 1.3.7</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_Native_Connector_2.0.12_/_1.3.5">Fixed in Apache 
Tomcat Native Connector 2.0.12 / 1.3.5</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_Native_Connector_1.2.17">Fixed in Apache Tomcat 
Native Connector 1.2.17</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_Native_Connector_1.2.16">Fixed in Apache Tomcat 
Native Connector 1.2.16</a></li><li><a 
href="#Not_a_vulnerability_in_the_Apache_Tomcat_APR/native_Connector">Not a 
vulnerability in the Apache Tomcat APR/native Connector</a></li></ul>
 </div><h3 id="Apache_Tomcat_APR/native_Connector_vulnerabilities">Apache 
Tomcat APR/native Connector vulnerabilities</h3><div class="text">
     <p>This page lists all security vulnerabilities fixed in released versions
        of Apache Tomcat APR/native Connector. Each vulnerability is given a
@@ -19,6 +19,26 @@
        vulnerabilities to the <a href="security.html">Tomcat
        Security Team</a>.</p>
 
+  </div><h3 id="Fixed_in_Apache_Tomcat_Native_Connector_2.0.14_/_1.3.7">Fixed 
in Apache Tomcat Native Connector 2.0.14 / 1.3.7</h3><div class="text">
+
+    <p><strong>Moderate: OCSP checks sometimes soft-fail even when soft-fail is
+       disabled</strong>
+       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-29145"; 
rel="nofollow">CVE-2026-29145</a></p>
+
+    <p>CLIENT_CERT authentication did not fail OCSP checks as expected for some
+       scenarios when soft fail was disabled.</p>
+
+    <p>This was fixed with commit
+       <a 
href="https://github.com/apache/tomcat-native/commit/bcea0ac214cae14fd1c2517d759a72465cfc62d3";>bcea0ac2</a>
+       ()2.0.x) and
+       <a 
href="https://github.com/apache/tomcat-native/commit/204f7f8a09adffce7ad02998dbc902f2b8c87253";>204f7f8a</a>
+       (1.3.x).</p>
+
+    <p>This issue was reported to the Tomcat security team on 26 February 2026.
+       The issue was made public on 9 April 2026.</p>
+
+    <p>Affects: 1.3.0 to 1.3.6 and 2.0.0 to 2.0.13</p>
+
   </div><h3 id="Fixed_in_Apache_Tomcat_Native_Connector_2.0.12_/_1.3.5">Fixed 
in Apache Tomcat Native Connector 2.0.12 / 1.3.5</h3><div class="text">
 
     <p><strong>Moderate: Incomplete OCSP verification checks</strong>

Modified: tomcat/site/trunk/xdocs/security-10.xml
==============================================================================
--- tomcat/site/trunk/xdocs/security-10.xml     Thu Apr  9 18:34:58 2026        
(r1932932)
+++ tomcat/site/trunk/xdocs/security-10.xml     Thu Apr  9 19:03:04 2026        
(r1932933)
@@ -56,6 +56,163 @@
     <toc/>
   </section>
 
+  <section name="Fixed in Apache Tomcat 10.1.54" rtext="2026-04-02">
+
+    <p><strong>Moderate: OCSP checks sometimes soft-fail with FFM even when
+       soft-fail is disabled</strong>
+       <cve>CVE-2026-34500</cve></p>
+
+    <p>CLIENT_CERT authentication does not fail as expected for some scenarios
+       when soft fail is disabled and FFM is used.</p>
+
+    <p>This was fixed with commit
+       <hashlink hash="29b56a56ce9e7d044b6162a99af0f38529b3a208"/>.</p>
+
+    <p>This issue was reported to the Tomcat security team on 25 March 2026.
+       The issue was made public on 9 April 2026.</p>
+
+    <p>Affects: 10.1.22 to 10.1.53</p>
+
+    <p><strong>Low: Cloud membership for clustering component exposed the
+       Kubernetes bearer token</strong>
+       <cve>CVE-2026-34487</cve></p>
+
+    <p>The cloud membership for clustering component exposed the Kubernetes
+       bearer token in log messages.</p>
+
+    <p>This was fixed with commit
+       <hashlink hash="5eff2a773b8b728083e5195b3183df1b9e12a03d"/>.</p>
+
+    <p>This issue was reported to the Tomcat security team on 25 March 2026.
+       The issue was made public on 9 April 2026.</p>
+
+    <p>Affects: 10.1.0-M1 to 10.1.53</p>
+
+    <p><strong>Important: The fix for <cve>CVE-2026-29146</cve> allowed the
+       bypass of the EncryptInterceptor</strong>
+       <cve>CVE-2026-34486</cve></p>
+
+    <p>An error in the fix for <cve>CVE-2026-29146</cve> allowed the
+       EncryptInterceptor to be bypassed.</p>
+
+    <p>This was fixed with commit
+       <hashlink hash="55f3eb9148233054fccfdf761141c6894a050be1"/>.</p>
+
+    <p>This issue was reported to the Tomcat security team on 26 March 2026.
+       The issue was made public on 9 April 2026.</p>
+
+    <p>Affects: 10.1.53</p>
+
+    <p><strong>Low: Incomplete escaping of JSON access logs</strong>
+       <cve>CVE-2026-34483</cve></p>
+
+    <p>Incomplete escaping when non-default values were used for the Connector
+       attributes relaxedPathChars and/or relaxedQueryChars allowed the
+       injection of arbitrary JSON into the JSON access log.</p>
+
+    <p>This was fixed with commit
+       <hashlink hash="f22dc2ce6cfda8609ed86816c0d78e1a9cbadb06"/>.</p>
+
+    <p>This issue was reported to the Tomcat security team on 25 March 2026.
+       The issue was made public on 9 April 2026.</p>
+
+    <p>Affects: 10.1.0-M1 to 10.1.53</p>
+
+  </section>
+  
+  <section name="Fixed in Apache Tomcat 10.1.53" rtext="2026-03-23">
+  
+    <p><strong>Moderate: The fix for <cve>CVE-2025-66614</cve> was
+       incomplete</strong>
+       <cve>CVE-2026-32990</cve></p>
+
+    <p>The validation of SNI name and host name did not take account of 
possible
+       differences in case allowing the strict SNI checks to be bypassed.</p>
+
+    <p>This was fixed with commit
+       <hashlink hash="4d0615a5c718c260d6d4e0b944a050f09a490c02"/>.</p>
+
+    <p>This issue was reported to the Tomcat security team on 13 March 2026.
+       The issue was made public on 9 April 2026.</p>
+
+    <p>Affects: 10.1.50 to 10.1.52</p>
+
+    <p><strong>Important: EncryptInterceptor vulnerable to padding oracle 
attack
+       by default</strong>
+       <cve>CVE-2026-29146</cve></p>
+
+    <p>The EncryptInterceptor used CBC by default which is vulnerable to a
+       padding Oracle attack.</p>
+
+    <p>This was fixed with commit
+       <hashlink hash="607ebc0fa522bd9e8c05517baa2d179bbd1e659c"/>.</p>
+
+    <p>This issue was reported to the Tomcat security team on 22 February 2026.
+       The issue was made public on 9 April 2026.</p>
+
+    <p>Affects: 10.0.0-M1 to 10.1.52</p>
+
+    <p><strong>Moderate: OCSP checks sometimes soft-fail even when soft-fail is
+       disabled</strong>
+       <cve>CVE-2026-29145</cve></p>
+
+    <p>CLIENT_CERT authentication did not fail OCSP checks as expected for some
+       scenarios when soft fail was disabled.</p>
+
+    <p>This was fixed with commit
+       <hashlink hash="fe26667cd2385045ac73f4dea086cc9971209b90"/>.</p>
+
+    <p>This issue was reported to the Tomcat security team on 26 February 2026.
+       The issue was made public on 9 April 2026.</p>
+
+    <p><strong>Low: Configured TLS cipher preference order not 
preserved</strong>
+       <cve>CVE-2026-29129</cve></p>
+
+    <p>The additional of the ability to configure TLS 1.3 cipher suites did not
+       preserve the order of the configured cipher suites and ciphers.</p>
+
+    <p>This was fixed with commit
+       <hashlink hash="8d69b33764dba81dce89e3a768de6093a35620ae"/>.</p>
+
+    <p>This was reported as a bug on 20 February 026 and the security
+       implications identified by the Tomcat security team the same day.
+       The issue was made public on 9 April 2026.</p>
+
+    <p>Affects: 10.1.51 to 10.1.52</p>
+
+    <p><strong>Low: Occasionally open redirect</strong>
+       <cve>CVE-2026-25854</cve></p>
+
+    <p>When a Tomcat node in a cluster with the LoadBalancerDrainingValve was 
in
+       the disabled (draining) state, a specially crafted URL could be used to
+       trigger a redirect to a URI of the attackers choice.</p>
+
+    <p>This was fixed with commit
+       <hashlink hash="5fb910f9a9dafa37a0c0965a1bd62a21dcf437f2"/>.</p>
+
+    <p>This issue was reported to the Tomcat security team on 30 January 2026.
+       The issue was made public on 9 April 2026.</p>
+
+    <p>Affects: 10.1.0-M1 to 10.1.52</p>
+
+    <p><strong>Low: Request smuggling via invalid chunk extension</strong>
+       <cve>CVE-2026-24880</cve></p>
+
+    <p>Tomcat did not validate that contents of HTTP/1.1 chunk extensions. This
+       enabled a request smuggling attack if a reverse proxy in front of Tomcat
+       allowed CRLF sequences in an otherwise valid chunk extension.</p>
+
+    <p>This was fixed with commits
+       <hashlink hash="f07df938d00f7419b40fa65aa912966d0efac522"/> and
+       <hashlink hash="1e71441a15972f56e661b0b549fb9e5d838b83bb"/>.</p>
+
+    <p>This issue was reported to the Tomcat security team on 19 January 2026.
+       The issue was made public on 9 April 2026.</p>
+
+    <p>Affects: 10.1.0-M1 to 10.1.52</p>
+
+  </section>
+
   <section name="Fixed in Apache Tomcat 10.1.52" rtext="2026-01-27">
 
     <p><strong>Moderate: Incomplete OCSP verification checks</strong>

Modified: tomcat/site/trunk/xdocs/security-11.xml
==============================================================================
--- tomcat/site/trunk/xdocs/security-11.xml     Thu Apr  9 18:34:58 2026        
(r1932932)
+++ tomcat/site/trunk/xdocs/security-11.xml     Thu Apr  9 19:03:04 2026        
(r1932933)
@@ -50,6 +50,171 @@
     <toc/>
   </section>
 
+  <section name="Fixed in Apache Tomcat 11.0.21" rtext="2026-04-04">
+
+    <p><strong>Moderate: OCSP checks sometimes soft-fail with FFM even when
+       soft-fail is disabled</strong>
+       <cve>CVE-2026-34500</cve></p>
+
+    <p>CLIENT_CERT authentication did not fail as expected for some scenarios
+       when soft fail was disabled and FFM was used.</p>
+
+    <p>This was fixed with commit
+       <hashlink hash="c13e60e732ea6d07087293a41ad1866c20848271"/>.</p>
+
+    <p>This issue was reported to the Tomcat security team on 25 March 2026.
+       The issue was made public on 9 April 2026.</p>
+
+    <p>Affects: 11.0.0-M14 to 11.0.20</p>
+
+    <p><strong>Low: Cloud membership for clustering component exposed the
+       Kubernetes bearer token</strong>
+       <cve>CVE-2026-34487</cve></p>
+
+    <p>The cloud membership for clustering component exposed the Kubernetes
+       bearer token in log messages.</p>
+
+    <p>This was fixed with commit
+       <hashlink hash="301bc6efbf72feb14dacfdfa3f50372182736150"/>.</p>
+
+    <p>This issue was reported to the Tomcat security team on 25 March 2026.
+       The issue was made public on 9 April 2026.</p>
+
+    <p>Affects: 11.0.0-M1 to 11.0.20</p>
+
+    <p><strong>Important: The fix for <cve>CVE-2026-29146</cve> allowed the
+       bypass of the EncryptInterceptor</strong>
+       <cve>CVE-2026-34486</cve></p>
+
+    <p>An error in the fix for <cve>CVE-2026-29146</cve> allowed the
+       EncryptInterceptor to be bypassed.</p>
+
+    <p>This was fixed with commit
+       <hashlink hash="1fab40ccc752e22639eccfe290d5624afad7eccd"/>.</p>
+
+    <p>This issue was reported to the Tomcat security team on 26 March 2026.
+       The issue was made public on 9 April 2026.</p>
+
+    <p>Affects: 11.0.20</p>
+
+    <p><strong>Low: Incomplete escaping of JSON access logs</strong>
+       <cve>CVE-2026-34483</cve></p>
+
+    <p>Incomplete escaping when non-default values were used for the Connector
+       attributes relaxedPathChars and/or relaxedQueryChars allowed the
+       injection of arbitrary JSON into the JSON access log.</p>
+
+    <p>This was fixed with commit
+       <hashlink hash="f9ddc24fcfcdfaea4a6953198d8636aca3e957bc"/>.</p>
+
+    <p>This issue was reported to the Tomcat security team on 25 March 2026.
+       The issue was made public on 9 April 2026.</p>
+
+    <p>Affects: 11.0.0-M1 to 11.0.20</p>
+
+  </section>
+  
+  <section name="Fixed in Apache Tomcat 11.0.20" rtext="2026-03-20">
+  
+    <p><strong>Moderate: The fix for <cve>CVE-2025-66614</cve> was
+       incomplete</strong>
+       <cve>CVE-2026-32990</cve></p>
+
+    <p>The validation of SNI name and host name did not take account of 
possible
+       differences in case allowing the strict SNI checks to be bypassed.</p>
+
+    <p>This was fixed with commit
+       <hashlink hash="021d1f833e38b683a44688f7b28f1f27e8e37c36"/>.</p>
+
+    <p>This issue was reported to the Tomcat security team on 13 March 2026.
+       The issue was made public on 9 April 2026.</p>
+
+    <p>Affects: 11.0.15 to 11.0.19</p>
+
+    <p><i>Note: The issues below were fixed in Apache Tomcat 11.0.19 but the
+       release vote for the 11.0.19 release candidate did not pass. Therefore,
+       although users must download 11.0.20 to obtain a version that includes
+       a fix for these issues, version 11.0.19 is not included in the list of 
+       affected versions.</i></p>
+
+    <p><strong>Important: EncryptInterceptor vulnerable to padding oracle 
attack
+       by default</strong>
+       <cve>CVE-2026-29146</cve></p>
+
+    <p>The EncryptInterceptor used CBC by default which is vulnerable to a
+       padding Oracle attack.</p>
+
+    <p>This was fixed with commit
+       <hashlink hash="6d955cceca841f2eabf2d6c46b59a8c7e1cd6eaa"/>.</p>
+
+    <p>This issue was reported to the Tomcat security team on 22 February 2026.
+       The issue was made public on 9 April 2026.</p>
+
+    <p>Affects: 11.0.0-M1 to 11.0.18</p>
+
+    <p><strong>Moderate: OCSP checks sometimes soft-fail even when soft-fail is
+       disabled</strong>
+       <cve>CVE-2026-29145</cve></p>
+
+    <p>CLIENT_CERT authentication did not fail OCSP checks as expected for some
+       scenarios when soft fail was disabled.</p>
+
+    <p>This was fixed with commit
+       <hashlink hash="721591f7bff424c693f26adc18ae9b9abac3655b"/>.</p>
+
+    <p>This issue was reported to the Tomcat security team on 26 February 2026.
+       The issue was made public on 9 April 2026.</p>
+
+    <p>Affects: 11.0.0-M1 to 11.0.18</p>
+
+    <p><strong>Low: Configured TLS cipher preference order not 
preserved</strong>
+       <cve>CVE-2026-29129</cve></p>
+
+    <p>The additional of the ability to configure TLS 1.3 cipher suites did not
+       preserve the order of the configured cipher suites and ciphers.</p>
+
+    <p>This was fixed with commit
+       <hashlink hash="5cfa876d73f1ff5f4dc8309c4320f684cbeff74e"/>.</p>
+
+    <p>This was reported as a bug on 20 February 026 and the security
+       implications identified by the Tomcat security team the same day.
+       The issue was made public on 9 April 2026.</p>
+
+    <p>Affects: 11.0.16 to 11.0.18</p>
+
+    <p><strong>Low: Occasionally open redirect</strong>
+       <cve>CVE-2026-25854</cve></p>
+
+    <p>When a Tomcat node in a cluster with the LoadBalancerDrainingValve was 
in
+       the disabled (draining) state, a specially crafted URL could be used to
+       trigger a redirect to a URI of the attackers choice.</p>
+
+    <p>This was fixed with commit
+       <hashlink hash="4c5d306001b780c9316aea5ff6502c524fb20695"/>.</p>
+
+    <p>This issue was reported to the Tomcat security team on 30 January 2026.
+       The issue was made public on 9 April 2026.</p>
+
+    <p>Affects: 11.0.0-M1 to 11.0.18</p>
+
+    <p><strong>Low: Request smuggling via invalid chunk extension</strong>
+       <cve>CVE-2026-24880</cve></p>
+
+    <p>Tomcat did not validate that contents of HTTP/1.1 chunk extensions. This
+       enabled a request smuggling attack if a reverse proxy in front of Tomcat
+       allowed CRLF sequences in an otherwise valid chunk extension.</p>
+
+    <p>This was fixed with commits
+       <hashlink hash="fde1a8235fb73125217bd41e162aa0a113f33552"/> and
+       <hashlink hash="2cb06c34f661ca42f7570bbcc21e99806184bcc5"/>.</p>
+
+    <p>This issue was reported to the Tomcat security team on 19 January 2026.
+       The issue was made public on 9 April 2026.</p>
+
+    <p>Affects: 11.0.0-M1 to 11.0.18</p>
+
+  </section>
+
   <section name="Fixed in Apache Tomcat 11.0.18" rtext="2026-01-26">
 
     <p><strong>Moderate: Incomplete OCSP verification checks</strong>

Modified: tomcat/site/trunk/xdocs/security-9.xml
==============================================================================
--- tomcat/site/trunk/xdocs/security-9.xml      Thu Apr  9 18:34:58 2026        
(r1932932)
+++ tomcat/site/trunk/xdocs/security-9.xml      Thu Apr  9 19:03:04 2026        
(r1932933)
@@ -50,6 +50,162 @@
     <toc/>
   </section>
 
+  <section name="Fixed in Apache Tomcat 9.0.117" rtext="2026-04-03">
+
+    <p><strong>Moderate: OCSP checks sometimes soft-fail with FFM even when
+       soft-fail is disabled</strong>
+       <cve>CVE-2026-34500</cve></p>
+
+    <p>CLIENT_CERT authentication does not fail as expected for some scenarios
+       when soft fail is disabled and FFM is used.</p>
+
+    <p>This was fixed with commit
+       <hashlink hash="ff589ab26e8250a2ca4286d986305318c033ff9f"/>.</p>
+
+    <p>This issue was reported to the Tomcat security team on 25 March 2026.
+       The issue was made public on 9 April 2026.</p>
+
+    <p>Affects: 9.0.92 to 9.0.116</p>
+
+    <p><strong>Low: Cloud membership for clustering component exposed the
+       Kubernetes bearer token</strong>
+       <cve>CVE-2026-34487</cve></p>
+
+    <p>The cloud membership for clustering component exposed the Kubernetes
+       bearer token in log messages.</p>
+
+    <p>This was fixed with commit
+       <hashlink hash="f593292a082e5ef9336a8db2b4b522f7f3e36976"/>.</p>
+
+    <p>This issue was reported to the Tomcat security team on 25 March 2026.
+       The issue was made public on 9 April 2026.</p>
+
+    <p>Affects: 9.0.13 to 9.0.116</p>
+
+    <p><strong>Important: The fix for <cve>CVE-2026-29146</cve> allowed the
+       bypass of the EncryptInterceptor</strong>
+       <cve>CVE-2026-34486</cve></p>
+
+    <p>An error in the fix for <cve>CVE-2026-29146</cve> allowed the
+       EncryptInterceptor to be bypassed.</p>
+
+    <p>This was fixed with commit
+       <hashlink hash="776e12b3e2b0b4507b8a3b62c187ceb0b74bf418"/>.</p>
+
+    <p>This issue was reported to the Tomcat security team on 26 March 2026.
+       The issue was made public on 9 April 2026.</p>
+
+    <p>Affects: 9.0.116</p>
+
+    <p><strong>Low: Incomplete escaping of JSON access logs</strong>
+       <cve>CVE-2026-34483</cve></p>
+
+    <p>Incomplete escaping when non-default values were used for the Connector
+       attributes relaxedPathChars and/or relaxedQueryChars allowed the
+       injection of arbitrary JSON into the JSON access log.</p>
+
+    <p>This was fixed with commit
+       <hashlink hash="97566842589d0b80de138ca719378861fd017d68"/>.</p>
+
+    <p>This issue was reported to the Tomcat security team on 25 March 2026.
+       The issue was made public on 9 April 2026.</p>
+
+    <p>Affects: 9.0.40 to 9.0.116</p>
+
+  </section>
+  
+  <section name="Fixed in Apache Tomcat 9.0.116" rtext="2026-03-20">
+  
+    <p><strong>Moderate: The fix for <cve>CVE-2025-66614</cve> was
+       incomplete</strong>
+       <cve>CVE-2026-32990</cve></p>
+
+    <p>The validation of SNI name and host name did not take account of 
possible
+       differences in case allowing the strict SNI checks to be bypassed.</p>
+
+    <p>This was fixed with commit
+       <hashlink hash="95f7778248cac46d03e6af04de9c72a598be3a53"/>.</p>
+
+    <p>This issue was reported to the Tomcat security team on 13 March 2026.
+       The issue was made public on 9 April 2026.</p>
+
+    <p>Affects: 9.0.113 to 9.0.115</p>
+
+    <p><strong>Important: EncryptInterceptor vulnerable to padding oracle 
attack
+       by default</strong>
+       <cve>CVE-2026-29146</cve></p>
+
+    <p>The EncryptInterceptor used CBC by default which is vulnerable to a
+       padding Oracle attack.</p>
+
+    <p>This was fixed with commit
+       <hashlink hash="0112ed22abfccc3d54e44d91eb08804d0886acd1"/>.</p>
+
+    <p>This issue was reported to the Tomcat security team on 22 February 2026.
+       The issue was made public on 9 April 2026.</p>
+
+    <p>Affects: 9.0.13 to 9.0.115</p>
+
+    <p><strong>Moderate: OCSP checks sometimes soft-fail even when soft-fail is
+       disabled</strong>
+       <cve>CVE-2026-29145</cve></p>
+
+    <p>CLIENT_CERT authentication did not fail OCSP checks as expected for some
+       scenarios when soft fail was disabled.</p>
+
+    <p>This was fixed with commit
+       <hashlink hash="d1406df5ae0326f39f54c3f64ac30d8fca55cd5b"/>.</p>
+
+    <p>This issue was reported to the Tomcat security team on 26 February 2026.
+       The issue was made public on 9 April 2026.</p>
+
+    <p><strong>Low: Configured TLS cipher preference order not 
preserved</strong>
+       <cve>CVE-2026-29129</cve></p>
+
+    <p>The additional of the ability to configure TLS 1.3 cipher suites did not
+       preserve the order of the configured cipher suites and ciphers.</p>
+
+    <p>This was fixed with commit
+       <hashlink hash="6db238562ec36ab1106db4d04843f8b33e7a0c06"/>.</p>
+
+    <p>This was reported as a bug on 20 February 026 and the security
+       implications identified by the Tomcat security team the same day.
+       The issue was made public on 9 April 2026.</p>
+
+    <p>Affects: 9.0.114 to 9.0.115</p>
+
+    <p><strong>Low: Occasionally open redirect</strong>
+       <cve>CVE-2026-25854</cve></p>
+
+    <p>When a Tomcat node in a cluster with the LoadBalancerDrainingValve was 
in
+       the disabled (draining) state, a specially crafted URL could be used to
+       trigger a redirect to a URI of the attackers choice.</p>
+
+    <p>This was fixed with commit
+       <hashlink hash="c5a45ae68d07f7a07be2a875e5b6772d66c4e5d0"/>.</p>
+
+    <p>This issue was reported to the Tomcat security team on 30 January 2026.
+       The issue was made public on 9 April 2026.</p>
+
+    <p>Affects: 9.0.0.M23 to 9.0.115</p>
+
+    <p><strong>Low: Request smuggling via invalid chunk extension</strong>
+       <cve>CVE-2026-24880</cve></p>
+
+    <p>Tomcat did not validate that contents of HTTP/1.1 chunk extensions. This
+       enabled a request smuggling attack if a reverse proxy in front of Tomcat
+       allowed CRLF sequences in an otherwise valid chunk extension.</p>
+
+    <p>This was fixed with commits
+       <hashlink hash="1b586d6aa8ae65726da5fa8799427b5d4718478a"/> and
+       <hashlink hash="6d478dbe18b7c4bb671c30fedf130309b0dab77c"/>.</p>
+
+    <p>This issue was reported to the Tomcat security team on 19 January 2026.
+       The issue was made public on 9 April 2026.</p>
+
+    <p>Affects: 9.0.0.M1 to 9.0.115</p>
+
+  </section>
   <section name="Fixed in Apache Tomcat 9.0.115" rtext="2026-01-23">
 
     <p><strong>Moderate: Incomplete OCSP verification checks</strong>

Modified: tomcat/site/trunk/xdocs/security-native.xml
==============================================================================
--- tomcat/site/trunk/xdocs/security-native.xml Thu Apr  9 18:34:58 2026        
(r1932932)
+++ tomcat/site/trunk/xdocs/security-native.xml Thu Apr  9 19:03:04 2026        
(r1932933)
@@ -32,6 +32,28 @@
 
   </section>
 
+  <section name="Fixed in Apache Tomcat Native Connector 2.0.14 / 1.3.7">
+
+    <p><strong>Moderate: OCSP checks sometimes soft-fail even when soft-fail is
+       disabled</strong>
+       <cve>CVE-2026-29145</cve></p>
+
+    <p>CLIENT_CERT authentication did not fail OCSP checks as expected for some
+       scenarios when soft fail was disabled.</p>
+
+    <p>This was fixed with commit
+       <a 
href="https://github.com/apache/tomcat-native/commit/bcea0ac214cae14fd1c2517d759a72465cfc62d3";>bcea0ac2</a>
+       ()2.0.x) and
+       <a 
href="https://github.com/apache/tomcat-native/commit/204f7f8a09adffce7ad02998dbc902f2b8c87253";>204f7f8a</a>
+       (1.3.x).</p>
+
+    <p>This issue was reported to the Tomcat security team on 26 February 2026.
+       The issue was made public on 9 April 2026.</p>
+
+    <p>Affects: 1.3.0 to 1.3.6 and 2.0.0 to 2.0.13</p>
+
+  </section>
+
   <section name="Fixed in Apache Tomcat Native Connector 2.0.12 / 1.3.5">
 
     <p><strong>Moderate: Incomplete OCSP verification checks</strong>


---------------------------------------------------------------------
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]

Reply via email to