libbabl 0.1.62 contains a broken double free detection vulnerability that allows attackers to bypass memory safety checks by exploiting signature overwriting in freed chunks. Attackers can call babl_free() twice on the same pointer without triggering detection, as libc's malloc metadata overwrites babl's signature field upon freeing, enabling potential memory corruption and code execution.
Metrics
Affected Vendors & Products
References
History
Sat, 16 May 2026 15:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | libbabl 0.1.62 contains a broken double free detection vulnerability that allows attackers to bypass memory safety checks by exploiting signature overwriting in freed chunks. Attackers can call babl_free() twice on the same pointer without triggering detection, as libc's malloc metadata overwrites babl's signature field upon freeing, enabling potential memory corruption and code execution. | |
| Title | libbabl 0.1.62 Broken Double Free Detection Memory Safety | |
| First Time appeared |
Gegl
Gegl gegl |
|
| Weaknesses | CWE-415 | |
| CPEs | cpe:2.3:a:gegl:gegl:0.1.62:*:*:*:*:*:*:* | |
| Vendors & Products |
Gegl
Gegl gegl |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-05-16T15:25:55.585Z
Reserved: 2026-05-15T14:52:46.405Z
Link: CVE-2020-37239
No data.
Status : Received
Published: 2026-05-16T16:16:20.097
Modified: 2026-05-16T16:16:20.097
Link: CVE-2020-37239
No data.
OpenCVE Enrichment
Updated: 2026-05-16T18:00:12Z