CVE-2026-29145

NameCVE-2026-29145
DescriptionCLIENT_CERT authentication does not fail as expected for some scenarios when soft fail is disabled vulnerability in Apache Tomcat, Apache Tomcat Native. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.18, from 10.1.0-M7 through 10.1.52, from 9.0.83 through 9.0.115; Apache Tomcat Native: from 1.1.23 through 1.1.34, from 1.2.0 through 1.2.39, from 1.3.0 through 1.3.6, from 2.0.0 through 2.0.13. Users are recommended to upgrade to version Tomcat Native 1.3.7 or 2.0.14 and Tomcat 11.0.20, 10.1.53 and 9.0.116, which fix the issue.
SourceCVE (at NVD; CERT, ENISA, LWN, oss-sec, fulldisc, Debian ELTS, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
tomcat10 (PTS)bookworm10.1.34-0+deb12u2vulnerable
bookworm (security)10.1.52-1~deb12u1vulnerable
trixie (security), trixie10.1.52-1~deb13u1vulnerable
forky10.1.52-1vulnerable
sid10.1.52-2vulnerable
tomcat11 (PTS)trixie (security), trixie11.0.15-1~deb13u1vulnerable
forky, sid11.0.18-1vulnerable
tomcat9 (PTS)bullseye9.0.43-2~deb11u10vulnerable
bullseye (security)9.0.107-0+deb11u2fixed
bookworm9.0.70-2fixed
trixie9.0.95-1fixed
forky, sid9.0.115-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
tomcat10source(unstable)(unfixed)
tomcat11source(unstable)(unfixed)
tomcat9source(unstable)9.0.70-2

Notes

Starting with 9.0.70-2 src:tomcat9 no longer ships the server stack, using that as the fixed version
Fixed by: https://github.com/apache/tomcat/commit/721591f7bff424c693f26adc18ae9b9abac3655b (11.0.19)
Fixed by: https://github.com/apache/tomcat/commit/fe26667cd2385045ac73f4dea086cc9971209b90 (10.1.53)
Fixed by: https://github.com/apache/tomcat/commit/d1406df5ae0326f39f54c3f64ac30d8fca55cd5b (9.0.116)

Search for package or bug name: Reporting problems