| Name | CVE-2026-40460 |
| Description | When NGINX Plus or NGINX Open Source are configured to use the HTTP/3 QUIC module, an attacker may be able to spoof their source IP address allowing for bypass of authorization or bypass of rate limiting. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated. |
| Source | CVE (at NVD; CERT, ENISA, LWN, oss-sec, fulldisc, Debian ELTS, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
Vulnerable and fixed packages
The table below lists information on source packages.
| Source Package | Release | Version | Status |
|---|
| nginx (PTS) | bullseye | 1.18.0-6.1+deb11u3 | fixed |
| bullseye (security) | 1.18.0-6.1+deb11u5 | fixed |
| bookworm | 1.22.1-9+deb12u6 | fixed |
| bookworm (security) | 1.22.1-9+deb12u7 | fixed |
| trixie | 1.26.3-3+deb13u4 | vulnerable |
| trixie (security) | 1.26.3-3+deb13u5 | fixed |
| forky | 1.30.0-2 | vulnerable |
| sid | 1.30.0-4 | fixed |
The information below is based on the following data on fixed versions.
| Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
|---|
| nginx | source | bullseye | (not affected) | | | |
| nginx | source | bookworm | (not affected) | | | |
| nginx | source | trixie | 1.26.3-3+deb13u5 | | | |
| nginx | source | (unstable) | 1.30.0-4 | | | |
Notes
[bookworm] - nginx <not-affected> (Vulnerable code not present, introduced in 1.25.0)
[bullseye] - nginx <not-affected> (Vulnerable code not present, introduced in 1.25.0)
https://my.f5.com/manage/s/article/K000161068
https://nginx.org/en/security_advisories.html
https://github.com/nginx/nginx/commit/5461e8bbc09230a4cf8e3d7737c176ae69b091f1 (release-1.30.1)