this post was submitted on 13 Jul 2025
140 points (94.9% liked)
memes
16207 readers
2739 users here now
Community rules
1. Be civil
No trolling, bigotry or other insulting / annoying behaviour
2. No politics
This is non-politics community. For political memes please go to !politicalmemes@lemmy.world
3. No recent reposts
Check for reposts when posting a meme, you can only repost after 1 month
4. No bots
No bots without the express approval of the mods or the admins
5. No Spam/Ads
No advertisements or spam. This is an instance rule and the only way to live.
A collection of some classic Lemmy memes for your enjoyment
Sister communities
- !tenforward@lemmy.world : Star Trek memes, chat and shitposts
- !lemmyshitpost@lemmy.world : Lemmy Shitposts, anything and everything goes.
- !linuxmemes@lemmy.world : Linux themed memes
- !comicstrips@lemmy.world : for those who love comic stories.
founded 2 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
What is the use after one?
"Use-after-free" refers to a security vulnerability that occurs when a program continues to use a pointer to a memory location after that memory has been freed (deallocated).
From Google's AI based on Frauenhofer Article,
An important detail that is missing here is how deallocation works.
When an application tells the system that it no longer needs a chunk of memory, the system does not erase the data from that region. It instead allows other applications to take control of that chunk.
Imagine it like renting a room, but you keep a copy of the key before checking out. You have supposedly left the room, but you still have access to it.
In the software world, this is unintentional behavior. In the real world, it would look like you accidentally return to that room.
Or, like you checkout, but your friend still has a key. Without knowing that you checked out, they return to take a bath. If a 3rd person knows about this miscommunication, they can rent that room, and steal your friend's money during the bath.
Use after free is a form of programming vulnerability.