{"document":{"aggregate_severity":{"namespace":"https://www.suse.com/support/security/rating/","text":"important"},"category":"csaf_vex","csaf_version":"2.0","distribution":{"text":"Copyright 2024 SUSE LLC. All rights reserved.","tlp":{"label":"WHITE","url":"https://www.first.org/tlp/"}},"lang":"en","notes":[{"category":"summary","text":"SUSE CVE-2026-25556","title":"Title"},{"category":"description","text":"MuPDF versions 1.23.0 through 1.27.0 contain a double-free vulnerability in fz_fill_pixmap_from_display_list() when an exception occurs during display list rendering. The function accepts a caller-owned fz_pixmap pointer but incorrectly drops the pixmap in its error handling path before rethrowing the exception. Callers (including the barcode decoding path in fz_decode_barcode_from_display_list) also drop the same pixmap in cleanup, resulting in a double-free that can corrupt the heap and crash the process. This issue affects applications that enable and use MuPDF barcode decoding and can be triggered by processing crafted input that causes a rendering-time error while decoding barcodes.","title":"Description of the CVE"},{"category":"legal_disclaimer","text":"CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).","title":"Terms of use"}],"publisher":{"category":"vendor","contact_details":"https://www.suse.com/support/security/contact/","name":"SUSE Product Security Team","namespace":"https://www.suse.com/"},"references":[{"category":"external","summary":"CVE-2026-25556","url":"https://www.suse.com/security/cve/CVE-2026-25556"},{"category":"external","summary":"SUSE Security Ratings","url":"https://www.suse.com/support/security/rating/"},{"category":"external","summary":"SUSE Bug 1257944 for CVE-2026-25556","url":"https://bugzilla.suse.com/1257944"}],"title":"SUSE CVE CVE-2026-25556","tracking":{"current_release_date":"2026-02-26T00:25:24Z","generator":{"date":"2026-02-10T00:24:00Z","engine":{"name":"cve-database.git:bin/generate-csaf-vex.pl","version":"1"}},"id":"CVE-2026-25556","initial_release_date":"2026-02-10T00:24:00Z","revision_history":[{"date":"2026-02-10T00:24:00Z","number":"2","summary":"references added,severity changed from  to moderate"},{"date":"2026-02-19T00:25:46Z","number":"3","summary":"vulnerabilities added"},{"date":"2026-02-26T00:25:24Z","number":"4","summary":"scores added,severity changed from moderate to important"}],"status":"interim","version":"4"}},"product_tree":{"branches":[{"branches":[{"branches":[{"category":"product_name","name":"openSUSE Tumbleweed","product":{"name":"openSUSE Tumbleweed","product_id":"openSUSE Tumbleweed","product_identification_helper":{"cpe":"cpe:/o:opensuse:tumbleweed"}}},{"category":"product_version","name":"mupdf-1.27.1-1.1","product":{"name":"mupdf-1.27.1-1.1","product_id":"mupdf-1.27.1-1.1","product_identification_helper":{"cpe":"cpe:2.3:a:artifex:mupdf:1.27.1:*:*:*:*:*:*:*","purl":"pkg:rpm/suse/mupdf@1.27.1-1.1"}}},{"category":"product_version","name":"mupdf-devel-static-1.27.1-1.1","product":{"name":"mupdf-devel-static-1.27.1-1.1","product_id":"mupdf-devel-static-1.27.1-1.1","product_identification_helper":{"purl":"pkg:rpm/suse/mupdf-devel-static@1.27.1-1.1"}}}],"category":"product_family","name":"SUSE Linux Enterprise"}],"category":"vendor","name":"SUSE"}],"relationships":[{"category":"default_component_of","full_product_name":{"name":"mupdf-1.27.1-1.1 as component of openSUSE Tumbleweed","product_id":"openSUSE Tumbleweed:mupdf-1.27.1-1.1"},"product_reference":"mupdf-1.27.1-1.1","relates_to_product_reference":"openSUSE Tumbleweed"},{"category":"default_component_of","full_product_name":{"name":"mupdf-devel-static-1.27.1-1.1 as component of openSUSE Tumbleweed","product_id":"openSUSE Tumbleweed:mupdf-devel-static-1.27.1-1.1"},"product_reference":"mupdf-devel-static-1.27.1-1.1","relates_to_product_reference":"openSUSE Tumbleweed"}]},"vulnerabilities":[{"cve":"CVE-2026-25556","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2026-25556"}],"notes":[{"category":"general","text":"MuPDF versions 1.23.0 through 1.27.0 contain a double-free vulnerability in fz_fill_pixmap_from_display_list() when an exception occurs during display list rendering. The function accepts a caller-owned fz_pixmap pointer but incorrectly drops the pixmap in its error handling path before rethrowing the exception. Callers (including the barcode decoding path in fz_decode_barcode_from_display_list) also drop the same pixmap in cleanup, resulting in a double-free that can corrupt the heap and crash the process. This issue affects applications that enable and use MuPDF barcode decoding and can be triggered by processing crafted input that causes a rendering-time error while decoding barcodes.","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:mupdf-1.27.1-1.1","openSUSE Tumbleweed:mupdf-devel-static-1.27.1-1.1"]},"references":[{"category":"external","summary":"CVE-2026-25556","url":"https://www.suse.com/security/cve/CVE-2026-25556"},{"category":"external","summary":"SUSE Security Ratings","url":"https://www.suse.com/support/security/rating/"},{"category":"external","summary":"SUSE Bug 1257944 for CVE-2026-25556","url":"https://bugzilla.suse.com/1257944"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:mupdf-1.27.1-1.1","openSUSE Tumbleweed:mupdf-devel-static-1.27.1-1.1"]}],"scores":[{"cvss_v3":{"baseScore":7.5,"baseSeverity":"HIGH","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","version":"3.1"},"products":["openSUSE Tumbleweed:mupdf-1.27.1-1.1","openSUSE Tumbleweed:mupdf-devel-static-1.27.1-1.1"]}],"threats":[{"category":"impact","date":"2026-02-06T19:03:46Z","details":"important"}],"title":"CVE-2026-25556"}]}