CVE-2026-6210

NameCVE-2026-6210
DescriptionA type confusion vulnerability in Qt SVG allows an attacker to cause an application crash via a crafted SVG image. When processing SVG marker references, the renderer retrieves a node by its id attribute and casts it to QSvgMarker* without verifying the node type. A non-marker element (such as a <line> element) that references itself as a marker triggers an out-of-bounds heap read due to the object size difference between QSvgLine and QSvgMarker, followed by an endless recursion that bypasses the marker recursion guard through incorrect virtual dispatch. The result is an application crash (denial of service). This issue affects Qt SVG:  from 6.7.0 before 6.8.8, from 6.9.0 before 6.11.1.
SourceCVE (at NVD; CERT, ENISA, LWN, oss-sec, fulldisc, Debian ELTS, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
qt6-svg (PTS)bookworm6.4.2-2vulnerable
trixie6.8.2-3vulnerable
forky, sid6.10.2-5vulnerable
qtsvg-opensource-src (PTS)bullseye5.15.2-3vulnerable
bookworm5.15.8-3vulnerable
trixie5.15.15-2vulnerable
forky, sid5.15.17-3vulnerable

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
qt6-svgsource(unstable)(unfixed)
qtsvg-opensource-srcsource(unstable)(unfixed)

Notes

https://codereview.qt-project.org/c/qt/qtsvg/+/724887

Search for package or bug name: Reporting problems