| Name | CVE-2025-15537 |
| Description | A security vulnerability has been detected in Mapnik up to 4.2.0. This issue affects the function mapnik::dbf_file::string_value of the file plugins/input/shape/dbfile.cpp. Such manipulation leads to heap-based buffer overflow. The attack must be carried out locally. The exploit has been disclosed publicly and may be used. The project was informed of the problem early through an issue report but has not responded yet. |
| Source | CVE (at NVD; CERT, ENISA, LWN, oss-sec, fulldisc, Debian ELTS, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
| Debian Bugs | 1126071 |
Vulnerable and fixed packages
The table below lists information on source packages.
| Source Package | Release | Version | Status |
|---|
| mapnik (PTS) | bullseye | 3.1.0+ds-1 | vulnerable |
| bookworm | 3.1.0+ds-3 | vulnerable |
| trixie | 4.0.7+ds-1 | vulnerable |
| forky, sid | 4.2.1+ds-1 | vulnerable |
The information below is based on the following data on fixed versions.
| Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
|---|
| mapnik | source | (unstable) | (unfixed) | | | 1126071 |
Notes
[trixie] - mapnik <postponed> (Minor issue, revisit when fixed upstream)
[bookworm] - mapnik <postponed> (Minor issue, revisit when fixed upstream)
[bullseye] - mapnik <postponed> (Minor issue, revisit when fixed upstream)
https://github.com/mapnik/mapnik/issues/4543