| Name | CVE-2026-29146 |
| Description | Padding Oracle vulnerability in Apache Tomcat's EncryptInterceptor with default configuration. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.18, from 10.0.0-M1 through 10.1.52, from 9.0.13 through 9..115, from 8.5.38 through 8.5.100, from 7.0.100 through 7.0.109. Users are recommended to upgrade to version 11.0.19, 10.1.53 and 9.0.116, which fixes the issue. |
| Source | CVE (at NVD; CERT, ENISA, LWN, oss-sec, fulldisc, Debian ELTS, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
The table below lists information on source packages.
| Source Package | Release | Version | Status |
|---|---|---|---|
| tomcat10 (PTS) | bookworm | 10.1.34-0+deb12u2 | vulnerable |
| bookworm (security) | 10.1.52-1~deb12u1 | vulnerable | |
| trixie (security), trixie | 10.1.52-1~deb13u1 | vulnerable | |
| forky | 10.1.52-1 | vulnerable | |
| sid | 10.1.52-2 | vulnerable | |
| tomcat11 (PTS) | trixie (security), trixie | 11.0.15-1~deb13u1 | vulnerable |
| forky, sid | 11.0.18-1 | vulnerable | |
| tomcat9 (PTS) | bullseye | 9.0.43-2~deb11u10 | vulnerable |
| bullseye (security) | 9.0.107-0+deb11u2 | fixed | |
| bookworm | 9.0.70-2 | fixed | |
| trixie | 9.0.95-1 | fixed | |
| forky, sid | 9.0.115-1 | fixed |
The information below is based on the following data on fixed versions.
| Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
|---|---|---|---|---|---|---|
| tomcat10 | source | (unstable) | (unfixed) | |||
| tomcat11 | source | (unstable) | (unfixed) | |||
| tomcat9 | source | (unstable) | 9.0.70-2 |
Starting with 9.0.70-2 src:tomcat9 no longer ships the server stack, using that as the fixed version
Fixed by: https://github.com/apache/tomcat/commit/6d955cceca841f2eabf2d6c46b59a8c7e1cd6eaa (11.0.19)
Fixed by: https://github.com/apache/tomcat/commit/607ebc0fa522bd9e8c05517baa2d179bbd1e659c (10.1.53)
Fixed by: https://github.com/apache/tomcat/commit/0112ed22abfccc3d54e44d91eb08804d0886acd1 (9.0.116)
Make su to make the fix complete to not open up CVE-2026-34486.
Followup for incomplete fix:
https://github.com/apache/tomcat/commit/1fab40ccc752e22639eccfe290d5624afad7eccd (11.0.21)
https://github.com/apache/tomcat/commit/55f3eb9148233054fccfdf761141c6894a050be1 (10.1.54)
https://github.com/apache/tomcat/commit/776e12b3e2b0b4507b8a3b62c187ceb0b74bf418 (9.0.117)