Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-2002: Double Free

0
High
VulnerabilityCVE-2024-2002cvecve-2024-2002
Published: Mon Mar 18 2024 (03/18/2024, 12:26:31 UTC)
Source: CVE Database V5

Description

A double-free vulnerability was found in libdwarf. In a multiply-corrupted DWARF object, libdwarf may try to dealloc(free) an allocation twice, potentially causing unpredictable and various results.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 10:37:38 UTC

Technical Analysis

CVE-2024-2002 identifies a double-free vulnerability in libdwarf version 0.1.0, a library used to read and write DWARF debugging information. The flaw arises when libdwarf encounters a multiply-corrupted DWARF object, causing it to attempt freeing the same memory allocation twice. Double-free vulnerabilities can corrupt the heap, leading to crashes, denial of service, or potentially enabling arbitrary code execution depending on the context. This vulnerability has a CVSS 3.1 score of 7.5, indicating high severity, with an attack vector that is network-based (AV:N), requiring no privileges (PR:N) or user interaction (UI:N). The scope is unchanged (S:U), and the impact affects availability (A:H) but not confidentiality or integrity. Although no exploits are currently known in the wild, the nature of the vulnerability means that crafted malicious DWARF objects could trigger instability or crashes in applications using libdwarf. This is particularly relevant for development tools, debuggers, and any software that processes DWARF data. The vulnerability was publicly disclosed on March 18, 2024, and no official patches have been linked yet. The issue was reserved by Red Hat, indicating vendor awareness and likely forthcoming fixes.

Potential Impact

The primary impact of CVE-2024-2002 is on the availability of systems and applications that use libdwarf 0.1.0. Exploitation can cause application crashes or denial of service, potentially disrupting development workflows or automated build systems. While it does not directly compromise confidentiality or integrity, the instability caused by double-free errors can be leveraged in complex attack chains to escalate privileges or execute arbitrary code, especially in environments where libdwarf is integrated into larger software stacks. Organizations relying on Linux distributions, embedded systems, or development environments that incorporate libdwarf are at risk of service interruptions. The vulnerability could also affect cloud-based CI/CD pipelines and software supply chains that parse DWARF debugging information. Although no active exploits are reported, the ease of remote exploitation without authentication or user interaction increases the urgency of mitigation.

Mitigation Recommendations

1. Monitor for official patches or updates to libdwarf from trusted vendors or maintainers and apply them promptly once available. 2. If patching is not immediately possible, implement input validation and sanitization to detect and reject corrupted or malformed DWARF objects before processing. 3. Employ sandboxing or containerization for applications that parse DWARF data to limit the impact of potential crashes or memory corruption. 4. Use memory protection mechanisms such as AddressSanitizer or similar tools during development and testing to detect double-free conditions early. 5. Restrict network exposure of services that process DWARF data to trusted sources only, reducing the attack surface. 6. Conduct code audits and fuzz testing on components that use libdwarf to identify other potential memory management issues. 7. Maintain up-to-date backups and incident response plans to quickly recover from denial of service events caused by exploitation.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
redhat
Date Reserved
2024-02-29T08:38:25.706Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 691f5eed11cb603d890ffb80

Added to database: 11/20/2025, 6:33:17 PM

Last enriched: 2/28/2026, 10:37:38 AM

Last updated: 3/25/2026, 1:23:12 AM

Views: 158

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses