| Название | nnn v5.1 Double Free |
|---|
| Описание | The code contains a double-free vulnerability in the show_content_in_floating_window function. If the newwin() call fails (returns NULL), the function explicitly frees the content buffer before returning FALSE. However, the caller function also attempts to free the same content pointer unconditionally after the function returns(the return value is false, the loop will exit). This results in the same memory region being freed twice, which can lead to memory corruption or a program crash. |
|---|
| Источник | ⚠️ https://github.com/jarun/nnn/issues/2091#issue-3635886658 |
|---|
| Пользователь | micromilo (UID 84159) |
|---|
| Представление | 19.11.2025 15:19 (5 месяцы назад) |
|---|
| Модерация | 22.11.2025 18:38 (3 days later) |
|---|
| Статус | принято |
|---|
| Запись VulDB | 333330 [jarun nnn до 5.1 nnn/src/nnn.c show_content_in_floating_window/run_cmd_as_plugin повреждение памяти] |
|---|
| Баллы | 19 |
|---|