Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:deb/debian/tomcat9@9.0.43-2~deb11u6?distro=trixie
purl pkg:deb/debian/tomcat9@9.0.43-2~deb11u6?distro=trixie
Vulnerabilities affecting this package (0)
Vulnerability Summary Fixed by
This package is not known to be affected by vulnerabilities.
Vulnerabilities fixed by this package (3)
Vulnerability Summary Aliases
VCID-nmq2-8ysj-4fbc If Apache Tomcat 8.5.0 to 8.5.82, 9.0.0-M1 to 9.0.67, 10.0.0-M1 to 10.0.26 or 10.1.0-M1 to 10.1.0 was configured to ignore invalid HTTP headers via setting rejectIllegalHeader to false (the default for 8.5.x only), Tomcat did not reject a request containing an invalid Content-Length header making a request smuggling attack possible if Tomcat was located behind a reverse proxy that also failed to reject the request with the invalid header. CVE-2022-42252
GHSA-p22x-g9px-3945
VCID-stds-vw5z-auhp The JsonErrorReportValve in Apache Tomcat 8.5.83, 9.0.40 to 9.0.68 and 10.1.0-M1 to 10.1.1 did not escape the type, message or description values. In some circumstances these are constructed from user provided data and it was therefore possible for users to supply values that invalidated or manipulated the JSON output. CVE-2022-45143
GHSA-rq2w-37h9-vg94
VCID-v7tp-1t4h-zqeg When using the RemoteIpFilter with requests received from a reverse proxy via HTTP that include the X-Forwarded-Proto header set to https, session cookies created by Apache Tomcat 11.0.0-M1 to 11.0.0.-M2, 10.1.0-M1 to 10.1.5, 9.0.0-M1 to 9.0.71 and 8.5.0 to 8.5.85 did not include the secure attribute. This could result in the user agent transmitting the session cookie over an insecure channel. Older, EOL versions may also be affected. CVE-2023-28708
GHSA-2c9m-w27f-53rm

Date Actor Action Vulnerability Source VulnerableCode Version
2026-04-16T11:32:34.467436+00:00 Debian Importer Fixing VCID-nmq2-8ysj-4fbc https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:32:22.542531+00:00 Debian Importer Fixing VCID-v7tp-1t4h-zqeg https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:01:30.356434+00:00 Debian Importer Fixing VCID-stds-vw5z-auhp https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-13T07:52:04.765452+00:00 Debian Importer Fixing VCID-nmq2-8ysj-4fbc https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:51:57.083072+00:00 Debian Importer Fixing VCID-v7tp-1t4h-zqeg https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:03:04.888950+00:00 Debian Importer Fixing VCID-stds-vw5z-auhp https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-03T07:55:25.497046+00:00 Debian Importer Fixing VCID-v7tp-1t4h-zqeg https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:55:25.413249+00:00 Debian Importer Fixing VCID-stds-vw5z-auhp https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:55:25.365210+00:00 Debian Importer Fixing VCID-nmq2-8ysj-4fbc https://security-tracker.debian.org/tracker/data/json 38.1.0