Broken Double Free Vulnerability in libbabl by GEGL
CVE-2020-37239

9.3CRITICAL

Key Information:

Vendor

Gegl

Status
Vendor
CVE Published:
16 May 2026

Badges

๐Ÿ‘พ Exploit Exists๐ŸŸก Public PoC

What is CVE-2020-37239?

libbabl version 0.1.62 contains a significant vulnerability related to broken double free detection. By exploiting the flaw, attackers can manipulate memory safety checks through signature overwriting in freed chunks, enabling them to invoke the babl_free() function multiple times on the same pointer without detection. This occurs because the memory allocation library's metadata overwrites libbabl's signature field during the freeing process. As a result, this oversight can potentially lead to memory corruption and allow remote code execution, posing a serious threat to application security.

Affected Version(s)

libbabl 0.1.62

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

References

CVSS V4

Score:
9.3
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • ๐ŸŸก

    Public PoC available

  • ๐Ÿ‘พ

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

Credit

Carter Yagemann
.