Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

A simple, yet effective way to avoid double-free and access-freed-memory vulnerabilities is to set pointers to NULL once after they have been freed. The specification of the free function states that calling free Calling free() on a NULL pointer incurs no action. As a result, if a pointer is freed pointers can be safely set to NULL after it is freed, the chances of introducing vulnerabilities related to free are eliminated to help eliminate memory related vulnerabilities.

References