libbabl 0.1.62 contains a broken double free detection vulnerability that allows attackers to bypass memory safety checks by exploiting signature overwriting in freed chunks. Attackers can call babl_free() twice on the same pointer without triggering detection, as libc's malloc metadata overwrites babl's signature field upon freeing, enabling potential memory corruption and code execution.
History

Sat, 16 May 2026 15:45:00 +0000

Type Values Removed Values Added
Description libbabl 0.1.62 contains a broken double free detection vulnerability that allows attackers to bypass memory safety checks by exploiting signature overwriting in freed chunks. Attackers can call babl_free() twice on the same pointer without triggering detection, as libc's malloc metadata overwrites babl's signature field upon freeing, enabling potential memory corruption and code execution.
Title libbabl 0.1.62 Broken Double Free Detection Memory Safety
First Time appeared Gegl
Gegl gegl
Weaknesses CWE-415
CPEs cpe:2.3:a:gegl:gegl:0.1.62:*:*:*:*:*:*:*
Vendors & Products Gegl
Gegl gegl
References
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}

cvssV4_0

{'score': 9.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-05-16T15:25:55.585Z

Reserved: 2026-05-15T14:52:46.405Z

Link: CVE-2020-37239

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-16T16:16:20.097

Modified: 2026-05-16T16:16:20.097

Link: CVE-2020-37239

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-16T18:00:12Z