Описание
A security vulnerability has been detected in jarun nnn up to 5.1. The impacted element is the function show_content_in_floating_window/run_cmd_as_plugin of the file nnn/src/nnn.c. The manipulation leads to double free. An attack has to be approached locally. The identifier of the patch is 2f07ccdf21e705377862e5f9dfa31e1694979ac7. It is suggested to install a patch to address this issue.
A security vulnerability has been detected in jarun nnn up to 5.1. The impacted element is the function show_content_in_floating_window/run_cmd_as_plugin of the file nnn/src/nnn.c. The manipulation leads to double free. An attack has to be approached locally. The identifier of the patch is 2f07ccdf21e705377862e5f9dfa31e1694979ac7. It is suggested to install a patch to address this issue.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2025-13566
- https://github.com/jarun/nnn/issues/2091#issue-3635886658
- https://github.com/jarun/nnn/issues/2091#issuecomment-3547591759
- https://github.com/jarun/nnn/commit/2f07ccdf21e705377862e5f9dfa31e1694979ac7
- https://vuldb.com/?ctiid.333330
- https://vuldb.com/?id.333330
- https://vuldb.com/?submit.698113
Связанные уязвимости
A security vulnerability has been detected in jarun nnn up to 5.1. The impacted element is the function show_content_in_floating_window/run_cmd_as_plugin of the file nnn/src/nnn.c. The manipulation leads to double free. An attack has to be approached locally. The identifier of the patch is 2f07ccdf21e705377862e5f9dfa31e1694979ac7. It is suggested to install a patch to address this issue.