No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Mon, 18 May 2026 18:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Sun, 17 May 2026 18:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Gegl libbabl
|
|
| Vendors & Products |
Gegl libbabl
|
Sat, 16 May 2026 15:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | libbabl 0.1.62 contains a broken double free detection vulnerability that allows attackers to bypass memory safety checks by exploiting signature overwriting in freed chunks. Attackers can call babl_free() twice on the same pointer without triggering detection, as libc's malloc metadata overwrites babl's signature field upon freeing, enabling potential memory corruption and code execution. | |
| Title | libbabl 0.1.62 Broken Double Free Detection Memory Safety | |
| First Time appeared |
Gegl
Gegl gegl |
|
| Weaknesses | CWE-415 | |
| CPEs | cpe:2.3:a:gegl:gegl:0.1.62:*:*:*:*:*:*:* | |
| Vendors & Products |
Gegl
Gegl gegl |
|
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-05-18T18:09:18.610Z
Reserved: 2026-05-15T14:52:46.405Z
Link: CVE-2020-37239
Updated: 2026-05-18T18:08:58.869Z
Status : Deferred
Published: 2026-05-16T16:16:20.097
Modified: 2026-05-18T20:16:36.607
Link: CVE-2020-37239
No data.
OpenCVE Enrichment
Updated: 2026-05-17T17:00:51Z