CVE-2026-42946

NameCVE-2026-42946
DescriptionA vulnerability exists in the ngx_http_scgi_module and ngx_http_uwsgi_module modules that may result in excessive memory allocation or an over-read of data. When scgi_pass or uwsgi_pass is configured, an unauthenticated attacker with man-in-the-middle (MITM) ability to control responses from an upstream server may be able to read the memory of the NGINX worker process or restart it.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
SourceCVE (at NVD; CERT, ENISA, LWN, oss-sec, fulldisc, Debian ELTS, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDSA-6278-1

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
nginx (PTS)bullseye1.18.0-6.1+deb11u3vulnerable
bullseye (security)1.18.0-6.1+deb11u5vulnerable
bookworm1.22.1-9+deb12u6vulnerable
bookworm (security)1.22.1-9+deb12u7fixed
trixie1.26.3-3+deb13u4vulnerable
trixie (security)1.26.3-3+deb13u5fixed
forky1.30.0-2vulnerable
sid1.30.0-4fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
nginxsourcebookworm1.22.1-9+deb12u7DSA-6278-1
nginxsourcetrixie1.26.3-3+deb13u5DSA-6278-1
nginxsource(unstable)1.30.0-4

Notes

https://my.f5.com/manage/s/article/K000161027
https://nginx.org/en/security_advisories.html
https://github.com/nginx/nginx/commit/baef7fdac28e4e1fe26509b50b8d15603393e28e (release-1.30.1)
https://github.com/nginx/nginx/commit/39d7d0ba0799fcff6baee52b6525f45739593cfd (release-1.30.1)

Search for package or bug name: Reporting problems