| Name | CVE-2026-42946 |
| Description | A vulnerability exists in the ngx_http_scgi_module and ngx_http_uwsgi_module modules that may result in excessive memory allocation or an over-read of data. When scgi_pass or uwsgi_pass is configured, an unauthenticated attacker with man-in-the-middle (MITM) ability to control responses from an upstream server may be able to read the memory of the NGINX worker process or restart it. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated. |
| Source | CVE (at NVD; CERT, ENISA, LWN, oss-sec, fulldisc, Debian ELTS, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
| References | DSA-6278-1 |
The table below lists information on source packages.
| Source Package | Release | Version | Status |
|---|---|---|---|
| nginx (PTS) | bullseye | 1.18.0-6.1+deb11u3 | vulnerable |
| bullseye (security) | 1.18.0-6.1+deb11u5 | vulnerable | |
| bookworm | 1.22.1-9+deb12u6 | vulnerable | |
| bookworm (security) | 1.22.1-9+deb12u7 | fixed | |
| trixie | 1.26.3-3+deb13u4 | vulnerable | |
| trixie (security) | 1.26.3-3+deb13u5 | fixed | |
| forky | 1.30.0-2 | vulnerable | |
| sid | 1.30.0-4 | fixed |
The information below is based on the following data on fixed versions.
| Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
|---|---|---|---|---|---|---|
| nginx | source | bookworm | 1.22.1-9+deb12u7 | DSA-6278-1 | ||
| nginx | source | trixie | 1.26.3-3+deb13u5 | DSA-6278-1 | ||
| nginx | source | (unstable) | 1.30.0-4 |
https://my.f5.com/manage/s/article/K000161027
https://nginx.org/en/security_advisories.html
https://github.com/nginx/nginx/commit/baef7fdac28e4e1fe26509b50b8d15603393e28e (release-1.30.1)
https://github.com/nginx/nginx/commit/39d7d0ba0799fcff6baee52b6525f45739593cfd (release-1.30.1)