Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:deb/debian/tomcat10@0?distro=trixie
purl pkg:deb/debian/tomcat10@0?distro=trixie
Vulnerabilities affecting this package (0)
Vulnerability Summary Fixed by
This package is not known to be affected by vulnerabilities.
Vulnerabilities fixed by this package (7)
Vulnerability Summary Aliases
VCID-2x42-6dsd-tuap tomcat: Escalation to root from tomcat user via %post script CVE-2024-22029
VCID-5732-xnx7-tkfy A regression in the fix for bug 66512 in Apache Tomcat 11.0.0-M5, 10.1.8, 9.0.74 and 8.5.88 meant that, if a response did not include any HTTP headers no AJP SEND_HEADERS messare woudl be sent for the response which in turn meant that at least one AJP proxy (mod_proxy_ajp) would use the response headers from the previous request leading to an information leak. CVE-2023-34981
GHSA-mppv-79ch-vw6q
VCID-6kcx-vptm-zbds Incomplete Cleanup vulnerability in Apache Tomcat. The internal fork of Commons FileUpload packaged with Apache Tomcat 9.0.70 through 9.0.80 and 8.5.85 through 8.5.93 included an unreleased, in progress refactoring that exposed a potential denial of service on Windows if a web application opened a stream for an uploaded file but failed to close the stream. The file would never be deleted from disk creating the possibility of an eventual denial of service due to the disk being full. Other, EOL versions may also be affected. Users are recommended to upgrade to version 9.0.81 onwards or 8.5.94 onwards, which fixes the issue. CVE-2023-42794
GHSA-jm7m-8jh6-29hp
VCID-9qgr-t27j-y7d3 Incorrect object re-cycling and re-use vulnerability in Apache Tomcat. Incorrect recycling of the request and response used by HTTP/2 requests could lead to request and/or response mix-up between users. This issue affects Apache Tomcat: from 11.0.0-M23 through 11.0.0-M26, from 10.1.27 through 10.1.30, from 9.0.92 through 9.0.95. Users are recommended to upgrade to version 11.0.0, 10.1.31 or 9.0.96, which fixes the issue. CVE-2024-52317
GHSA-qvf5-hvjx-wm27
VCID-abt4-b2cv-eygv CVE-2026-34486
GHSA-69r9-qgr7-g2wj
VCID-bks8-nvm9-vbgy Untrusted Search Path vulnerability in Apache Tomcat installer for Windows. During installation, the Tomcat installer for Windows used icacls.exe without specifying a full path. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.7, from 10.1.0 through 10.1.41, from 9.0.23 through 9.0.105. The following versions were EOL at the time the CVE was created but are known to be affected: 8.5.0 through 8.5.100 and 7.0.95 through 7.0.109. Other EOL versions may also be affected. Users are recommended to upgrade to version 11.0.8, 10.1.42 or 9.0.106, which fix the issue. CVE-2025-49124
GHSA-42wg-hm62-jcwg
VCID-s24s-sbsx-b3f5 Incorrect object recycling and reuse vulnerability in Apache Tomcat. This issue affects Apache Tomcat: 11.0.0, 10.1.31, 9.0.96. Users are recommended to upgrade to version 11.0.1, 10.1.32 or 9.0.97, which fixes the issue. CVE-2024-52318
GHSA-f632-9449-3j4w

Date Actor Action Vulnerability Source VulnerableCode Version
2026-04-16T12:17:13.199316+00:00 Debian Importer Fixing VCID-abt4-b2cv-eygv https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:03:02.124741+00:00 Debian Importer Fixing VCID-bks8-nvm9-vbgy https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:01:17.444353+00:00 Debian Importer Fixing VCID-6kcx-vptm-zbds https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:43:19.619466+00:00 Debian Importer Fixing VCID-9qgr-t27j-y7d3 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:33:54.011808+00:00 Debian Importer Fixing VCID-5732-xnx7-tkfy https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:52:14.193991+00:00 Debian Importer Fixing VCID-2x42-6dsd-tuap https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:12:39.112932+00:00 Debian Importer Fixing VCID-s24s-sbsx-b3f5 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-13T08:58:55.663327+00:00 Debian Importer Fixing VCID-6kcx-vptm-zbds https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:38:52.539882+00:00 Debian Importer Fixing VCID-5732-xnx7-tkfy https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:31:30.348054+00:00 Debian Importer Fixing VCID-bks8-nvm9-vbgy https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:30:17.275914+00:00 Debian Importer Fixing VCID-9qgr-t27j-y7d3 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:19:37.135025+00:00 Debian Importer Fixing VCID-s24s-sbsx-b3f5 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:13:34.462245+00:00 Debian Importer Fixing VCID-2x42-6dsd-tuap https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-12T18:15:48.494068+00:00 Debian Importer Fixing VCID-abt4-b2cv-eygv https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-03T07:55:21.950616+00:00 Debian Importer Fixing VCID-bks8-nvm9-vbgy https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:55:21.463482+00:00 Debian Importer Fixing VCID-s24s-sbsx-b3f5 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:55:21.412487+00:00 Debian Importer Fixing VCID-9qgr-t27j-y7d3 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:55:21.064534+00:00 Debian Importer Fixing VCID-2x42-6dsd-tuap https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:55:20.822260+00:00 Debian Importer Fixing VCID-6kcx-vptm-zbds https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:55:20.728570+00:00 Debian Importer Fixing VCID-5732-xnx7-tkfy https://security-tracker.debian.org/tracker/data/json 38.1.0