3.3 LOW
- CVSS version: 3.1
- Attack vector (AV):
- Attack complexity (AC):
- Privileges required (PR):
- User interaction (UI):
- Scope (S):
- Confidentiality impact (C):
- Integrity impact (I):
- Availability impact (A):
Mapnik value.cpp operator divide by zero
A vulnerability has been found in Mapnik up to 4.2.0. This vulnerability affects the function mapnik::detail::mod<...>::operator of the file src/value.cpp. The manipulation leads to divide by zero. The attack needs to be performed locally. The exploit has been disclosed to the public and may be used. The project was informed of the problem early through an issue report but has not responded yet.
References
-
-
-
Submit #743386 | mapnik Mapnik v4.2.0 and master branch Divide By Zero third-party-advisory
-
https://github.com/mapnik/mapnik/issues/4545 issue-tracking
Affected products
- ==4.1
- ==4.0
- ==4.2.0
Matching in nixpkgs
pkgs.mapnik
Open source toolkit for developing mapping applications
pkgs.python312Packages.python-mapnik
Python bindings for Mapnik
-
nixos-unstable 3.0.16-unstable-2024-02-22
pkgs.python313Packages.python-mapnik
Python bindings for Mapnik
-
nixos-unstable 3.0.16-unstable-2024-02-22
Package maintainers
-
@autra Augustin Trancart <augustin.trancart@gmail.com>
-
@sikmir Nikolay Korotkiy <sikmir@disroot.org>
-
@l0b0 Victor Engmark <victor@engmark.name>
-
@nialov Nikolas Ovaskainen <nikolasovaskainen@gmail.com>
-
@imincik Ivan Mincik <ivan.mincik@gmail.com>
-
@hummeltech David Hummel <hummeltech@sherpaguru.com>
-
@willcohen Will Cohen
-
@nh2 Niklas Hambüchen <mail@nh2.me>
-
@hrdinka Christoph Hrdinka <c.nix@hrdinka.at>