You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 4 Next »

A simple, yet effective way to avoid double-free and access-freed-memory vulnerabilities is to set pointers to NULL after they have been freed. Calling free() on a NULL pointer incurs no action. As a result, freed pointers can be safely set to NULL to help eliminate memory related vulnerabilities.

References

  • No labels