Отправить #698113: nnn v5.1 Double FreeИнформация

Названиеnnn v5.1 Double Free
ОписаниеThe code contains a double-free vulnerability in the show_content_in_floating_window function. If the newwin() call fails (returns NULL), the function explicitly frees the content buffer before returning FALSE. However, the caller function also attempts to free the same content pointer unconditionally after the function returns(the return value is false, the loop will exit). This results in the same memory region being freed twice, which can lead to memory corruption or a program crash.
Источник⚠️ https://github.com/jarun/nnn/issues/2091#issue-3635886658
Пользователь
 micromilo (UID 84159)
Представление19.11.2025 15:19 (5 месяцы назад)
Модерация22.11.2025 18:38 (3 days later)
Статуспринято
Запись VulDB333330 [jarun nnn до 5.1 nnn/src/nnn.c show_content_in_floating_window/run_cmd_as_plugin повреждение памяти]
Баллы19

Want to know what is going to be exploited?

We predict KEV entries!