|
|
Message-ID: <3b643c68-e595-4101-8b80-a5598cb793ca@apache.org> Date: Thu, 9 Apr 2026 20:50:44 +0100 From: Mark Thomas <markt@...che.org> To: oss-security@...ts.openwall.com Subject: CVE-2026-34486: Apache Tomcat: Fix for CVE-2026-29146 allowed bypass of EncryptInterceptor Severity: important Affected versions: - Apache Tomcat 11.0.20 - Apache Tomcat 10.1.53 - Apache Tomcat 9.0.116 Description: Missing Encryption of Sensitive Data vulnerability in Apache Tomcat due to the fix for CVE-2026-29146 allowing the bypass of the EncryptInterceptor. This issue affects Apache Tomcat: 11.0.20, 10.1.53, 9.0.116. Users are recommended to upgrade to version 11.0.21, 10.1.54 or 9.0.117, which fix the issue. Credit: Bartlomiej Dmitruk at striga.ai (finder) References: https://lists.apache.org/thread/9510k5p5zdvt9pkkgtyp85mvwxo2qrly https://tomcat.apache.org/ https://www.cve.org/CVERecord?id=CVE-2026-34486
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.