Description
libbabl 0.1.62 contains a broken double free detection vulnerability that allows attackers to bypass memory safety checks by exploiting signature overwriting in freed chunks. Attackers can call babl_free() twice on the same pointer without triggering detection, as libc's malloc metadata overwrites babl's signature field upon freeing, enabling potential memory corruption and code execution.
Problem types
Product status
Credits
Carter Yagemann
References
www.exploit-db.com/exploits/49259 (ExploitDB-49259)
www.gegl.org (Official Product Homepage)
www.gegl.org/babl/ (Product Reference)
www.vulncheck.com/...ken-double-free-detection-memory-safety (VulnCheck Advisory: libbabl 0.1.62 Broken Double Free Detection Memory Safety)