CVE-2026-42934

NameCVE-2026-42934
DescriptionNGINX Plus and NGINX Open Source have a vulnerability in the ngx_http_charset_module module. When charset, source_charset, and charset_map and proxy_pass with disabled buffering ("off") directives are configured, unauthenticated attackers can send requests that with conditions beyond the attackers' control to cause a heap buffer over-read in the NGINX worker process, leading to limited disclosure of memory or a restart.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
SourceCVE (at NVD; CERT, ENISA, LWN, oss-sec, fulldisc, Debian ELTS, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDSA-6278-1

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
nginx (PTS)bullseye1.18.0-6.1+deb11u3vulnerable
bullseye (security)1.18.0-6.1+deb11u5vulnerable
bookworm1.22.1-9+deb12u6vulnerable
bookworm (security)1.22.1-9+deb12u7fixed
trixie1.26.3-3+deb13u4vulnerable
trixie (security)1.26.3-3+deb13u5fixed
forky1.30.0-2vulnerable
sid1.30.0-4fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
nginxsourcebookworm1.22.1-9+deb12u7DSA-6278-1
nginxsourcetrixie1.26.3-3+deb13u5DSA-6278-1
nginxsource(unstable)1.30.0-4

Notes

https://my.f5.com/manage/s/article/K000161028
https://nginx.org/en/security_advisories.html
https://github.com/nginx/nginx/commit/54b7945961b2eaafc480d6b85d9635d0db1c126a (release-1.30.1)

Search for package or bug name: Reporting problems