From fa5ed04286d76bba9d5c785956eb6ec8f7857a3a Mon Sep 17 00:00:00 2001 From: Mathias Vorreiter Pedersen Date: Mon, 17 Apr 2023 07:40:01 +0100 Subject: [PATCH] Update cpp/ql/src/Critical/DoubleFree.qhelp Co-authored-by: mc <42146119+mchammer01@users.noreply.github.com> --- cpp/ql/src/Critical/DoubleFree.qhelp | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/cpp/ql/src/Critical/DoubleFree.qhelp b/cpp/ql/src/Critical/DoubleFree.qhelp index 72aa7e60269..0b38858eae4 100644 --- a/cpp/ql/src/Critical/DoubleFree.qhelp +++ b/cpp/ql/src/Critical/DoubleFree.qhelp @@ -8,7 +8,7 @@

Deallocating memory more than once can lead to a double-free vulnerability. This can be exploited to corrupt the allocator's internal data structures, which can lead to denial-of-service attacks by crashing -the program, or to security vulnerabilities by allowing an attacker to overwrite arbitrary memory locations. +the program, or security vulnerabilities, by allowing an attacker to overwrite arbitrary memory locations.