libbabl 0.1.62 contains a broken double free detection...
Critical severity
Unreviewed
Published
May 16, 2026
to the GitHub Advisory Database
•
Updated May 16, 2026
Description
Published by the National Vulnerability Database
May 16, 2026
Published to the GitHub Advisory Database
May 16, 2026
Last updated
May 16, 2026
libbabl 0.1.62 contains a broken double free detection vulnerability that allows attackers to bypass memory safety checks by exploiting signature overwriting in freed chunks. Attackers can call babl_free() twice on the same pointer without triggering detection, as libc's malloc metadata overwrites babl's signature field upon freeing, enabling potential memory corruption and code execution.
References