Bug 2430673 (CVE-2025-15537) - CVE-2025-15537 mapnik: Mapnik: Heap-based buffer overflow via string_value function manipulation
Summary: CVE-2025-15537 mapnik: Mapnik: Heap-based buffer overflow via string_value fu...
Keywords:
Status: NEW
Alias: CVE-2025-15537
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Product Security DevOps Team
QA Contact:
URL:
Whiteboard:
Depends On: 2430812 2430813 2430814 2430815
Blocks:
TreeView+ depends on / blocked
 
Reported: 2026-01-18 11:01 UTC by OSIDB Bzimport
Modified: 2026-01-19 10:26 UTC (History)
0 users

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)

Description OSIDB Bzimport 2026-01-18 11:01:15 UTC
A security vulnerability has been detected in Mapnik up to 4.2.0. This issue affects the function mapnik::dbf_file::string_value of the file plugins/input/shape/dbfile.cpp. Such manipulation leads to heap-based buffer overflow. The attack must be carried out locally. The exploit has been disclosed publicly and may be used. The project was informed of the problem early through an issue report but has not responded yet.


Note You need to log in before you can comment on or make changes to this bug.