CVE-2026-6861

NameCVE-2026-6861
DescriptionA flaw was found in GNU Emacs. This vulnerability, a memory corruption issue, occurs when Emacs processes specially crafted SVG (Scalable Vector Graphics) CSS (Cascading Style Sheets) data. A local user could exploit this by convincing a victim to open a malicious SVG file, which may lead to a denial of service (DoS) or potentially information disclosure.
SourceCVE (at NVD; CERT, ENISA, LWN, oss-sec, fulldisc, Debian ELTS, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
Debian Bugs1134692

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
emacs (PTS)bullseye1:27.1+1-3.1+deb11u5vulnerable
bullseye (security)1:27.1+1-3.1+deb11u6vulnerable
bookworm, bookworm (security)1:28.2+1-15+deb12u4vulnerable
trixie1:30.1+1-6vulnerable
forky1:30.2+1-2vulnerable
sid1:30.2+1-3fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
emacssource(unstable)1:30.2+1-31134692

Notes

[trixie] - emacs <no-dsa> (Minor issue)
[bookworm] - emacs <no-dsa> (Minor issue)
[bullseye] - emacs <postponed> (Minor issue; can be fixed in next update)
https://bugzilla.redhat.com/show_bug.cgi?id=2459992
https://debbugs.gnu.org/80851
Fixed by: https://cgit.git.savannah.gnu.org/cgit/emacs.git/commit/?h=emacs-30&id=8f535370b9efbc91673b20c6987a5cae4f6dc562

Search for package or bug name: Reporting problems