Source: qt6-svg
Version: 6.10.2-5
Severity: important
Tags: security upstream
Forwarded: https://codereview.qt-project.org/c/qt/qtsvg/+/724887
X-Debbugs-Cc: [email protected], Debian Security Team <[email protected]>

Hi,

The following vulnerability was published for qt6-svg.

CVE-2026-6210[0]:
| A type confusion vulnerability in Qt SVG allows an attacker to cause
| an application crash via a crafted SVG image.    When processing SVG
| marker references, the renderer retrieves a node by its id attribute
| and casts it to QSvgMarker* without verifying the node type. A non-
| marker element (such as a <line> element) that references itself as
| a marker triggers an out-of-bounds heap read due to the object size
| difference between QSvgLine and QSvgMarker,  followed by an endless
| recursion that bypasses the marker recursion  guard through
| incorrect virtual dispatch. The result is an application  crash
| (denial of service).    This issue affects Qt SVG:  from 6.7.0
| before 6.8.8, from 6.9.0 before 6.11.1.


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2026-6210
    https://www.cve.org/CVERecord?id=CVE-2026-6210
[1] https://codereview.qt-project.org/c/qt/qtsvg/+/724887

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore

Reply via email to