| Name | CVE-2025-15564 |
| Description | A vulnerability has been found in Mapnik up to 4.2.0. This vulnerability affects the function mapnik::detail::mod<...>::operator of the file src/value.cpp. The manipulation leads to divide by zero. The attack needs to be performed locally. The exploit has been disclosed to the public and may be used. The project was informed of the problem early through an issue report but has not responded yet. |
| Source | CVE (at NVD; CERT, ENISA, LWN, oss-sec, fulldisc, Debian ELTS, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
Vulnerable and fixed packages
The table below lists information on source packages.
| Source Package | Release | Version | Status |
|---|
| mapnik (PTS) | bullseye | 3.1.0+ds-1 | vulnerable |
| bookworm | 3.1.0+ds-3 | vulnerable |
| trixie | 4.0.7+ds-1 | vulnerable |
| forky, sid | 4.2.1+ds-2 | fixed |
The information below is based on the following data on fixed versions.
| Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
|---|
| mapnik | source | (unstable) | 4.2.1+ds-2 | | | |
Notes
[trixie] - mapnik <no-dsa> (Minor issue)
[bookworm] - mapnik <no-dsa> (Minor issue)
[bullseye] - mapnik <postponed> (Minor issue)
https://github.com/mapnik/mapnik/issues/4545
Fixed by: https://github.com/mapnik/mapnik/commit/fd54b92004f29e223345ddcbcc36257abd94952b
Tests: https://github.com/mapnik/mapnik/commit/e82980257651ec472561ccb9f78678ef58c75f83