提交 #698113: nnn v5.1 Double Free信息

标题nnn v5.1 Double Free
描述The code contains a double-free vulnerability in the show_content_in_floating_window function. If the newwin() call fails (returns NULL), the function explicitly frees the content buffer before returning FALSE. However, the caller function also attempts to free the same content pointer unconditionally after the function returns(the return value is false, the loop will exit). This results in the same memory region being freed twice, which can lead to memory corruption or a program crash.
来源⚠️ https://github.com/jarun/nnn/issues/2091#issue-3635886658
用户
 micromilo (UID 84159)
提交2025-11-19 15時19分 (5 月前)
管理2025-11-22 18時38分 (3 days later)
状态已接受
VulDB条目333330 [jarun nnn 直到 5.1 nnn/src/nnn.c show_content_in_floating_window/run_cmd_as_plugin 内存损坏]
积分19

Do you want to use VulDB in your project?

Use the official API to access entries easily!