Impact
The vulnerability is a double free bug in the LE loader of the Rizin reverse‑engineering framework. The le_load_fixup_record() function may release the same relocation entry more than once when parsing malformed or circular LE fixup chains. This double free can corrupt heap metadata, leading to an application crash that manifests as a denial of service.
Affected Systems
The affected product is Rizin version 0.8.1, as indicated by the CPE string provided. The issue resides specifically in the librz/bin/format/le/le.c source file. No other vendors or products are listed. An attacker would need to supply a malicious LE binary to the tool.
Risk and Exploitability
The CVSS score of 6.2 denotes a moderate severity, while the EPSS score of less than 1% suggests limited evidence of exploitation. The vulnerability is not currently catalogued in CISA's KEV list. Exploitation requires the attacker to control the binary that is parsed, so the attack vector is more likely local or within a service pipeline that automatically processes user‑supplied binaries. In the absence of the patch, the risk stays low but could grow if the tool is run unattended.
OpenCVE Enrichment