إرسال #698113: nnn v5.1 Double Freeالمعلومات

عنوانnnn v5.1 Double Free
الوصفThe code contains a double-free vulnerability in the show_content_in_floating_window function. If the newwin() call fails (returns NULL), the function explicitly frees the content buffer before returning FALSE. However, the caller function also attempts to free the same content pointer unconditionally after the function returns(the return value is false, the loop will exit). This results in the same memory region being freed twice, which can lead to memory corruption or a program crash.
المصدر⚠️ https://github.com/jarun/nnn/issues/2091#issue-3635886658
المستخدم
 micromilo (UID 84159)
ارسال19/11/2025 03:19 PM (5 أشهر منذ)
الاعتدال22/11/2025 06:38 PM (3 days later)
الحالةتمت الموافقة
إدخال VulDB333330 [jarun nnn حتى 5.1 nnn/src/nnn.c show_content_in_floating_window/run_cmd_as_plugin تلف الذاكرة]
النقاط19

Do you want to use VulDB in your project?

Use the official API to access entries easily!