Description
A security vulnerability has been detected in jarun nnn up to 5.1. The impacted element is the function show_content_in_floating_window/run_cmd_as_plugin of the file nnn/src/nnn.c. The manipulation leads to double free. An attack has to be approached locally. The identifier of the patch is 2f07ccdf21e705377862e5f9dfa31e1694979ac7. It is suggested to install a patch to address this issue.
Problem types
Product status
5.1
Timeline
| 2025-11-22: | Advisory disclosed |
| 2025-11-22: | VulDB entry created |
| 2025-11-22: | VulDB entry last update |
Credits
micromilo (VulDB User)
References
vuldb.com/?id.333330 (VDB-333330 | jarun nnn nnn.c run_cmd_as_plugin double free)
vuldb.com/?ctiid.333330 (VDB-333330 | CTI Indicators (IOB, IOC, IOA))
vuldb.com/?submit.698113 (Submit #698113 | nnn v5.1 Double Free)
github.com/jarun/nnn/issues/2091
github.com/jarun/nnn/issues/2091
github.com/...ommit/2f07ccdf21e705377862e5f9dfa31e1694979ac7