CRITICALVulnerability
Verified
Global

NVD CRITICAL: CVE-2020-37239 — libbabl 0.1.62 contains a broken double free detection vulnerability that allows...

·Source: NIST NVD

Updated:

Executive Summary

libbabl 0.1.62 contains a broken double free detection vulnerability that allows attackers to bypass memory safety checks by exploiting signature overwriting in freed chunks. Attackers can call babl_free() twice on the same pointer without triggering detection, as libc's malloc metadata overwrites babl's signature field upon freeing, enabling potential memory corruption and code execution.

Analysis

libbabl 0.1.62 contains a broken double free detection vulnerability that allows attackers to bypass memory safety checks by exploiting signature overwriting in freed chunks. Attackers can call babl_free() twice on the same pointer without triggering detection, as libc's malloc metadata overwrites babl's signature field upon freeing, enabling potential memory corruption and code execution. CVSS Score: 9.8. Published: 2026-05-16T16:16:20.097.

Indicators of Compromise (1)

CVE (1)
CVE-2020-37239
Source Attribution

Originally published by NIST NVD on May 16, 2026. Verified by: NIST.

Related Threats