CVE-2026-40701

NameCVE-2026-40701
DescriptionNGINX Plus and NGINX Open Source have a vulnerability in the ngx_http_ssl_module module when the ssl_verify_client directive is set to "on" or "optional," and the ssl_ocsp directive is set to "on" or the leaf parameters are configured with a resolver. With this configuration, an unauthenticated attacker can send requests along with conditions beyond its control that may cause a heap-use-after-free error in the NGINX worker process. This vulnerability may result in limited modification of data or the NGINX worker process restarting.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
SourceCVE (at NVD; CERT, ENISA, LWN, oss-sec, fulldisc, Debian ELTS, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDSA-6278-1

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
nginx (PTS)bullseye1.18.0-6.1+deb11u3vulnerable
bullseye (security)1.18.0-6.1+deb11u5vulnerable
bookworm1.22.1-9+deb12u6vulnerable
bookworm (security)1.22.1-9+deb12u7fixed
trixie1.26.3-3+deb13u4vulnerable
trixie (security)1.26.3-3+deb13u5fixed
forky1.30.0-2vulnerable
sid1.30.0-4fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
nginxsourcebookworm1.22.1-9+deb12u7DSA-6278-1
nginxsourcetrixie1.26.3-3+deb13u5DSA-6278-1
nginxsource(unstable)1.30.0-4

Notes

https://my.f5.com/manage/s/article/K000161021
https://nginx.org/en/security_advisories.html
https://github.com/nginx/nginx/commit/d2b8d47741820c9fb134c6731ecb40b21f3085b1 (release-1.30.1)

Search for package or bug name: Reporting problems