This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "Poor Style: Explicit call to finalize()"
Line 2: | Line 2: | ||
{{Template:Fortify}} | {{Template:Fortify}} | ||
− | [[ | + | __TOC__ |
+ | |||
+ | [[ASDR Table of Contents]] | ||
+ | |||
Last revision (mm/dd/yy): '''{{REVISIONMONTH}}/{{REVISIONDAY}}/{{REVISIONYEAR}}''' | Last revision (mm/dd/yy): '''{{REVISIONMONTH}}/{{REVISIONDAY}}/{{REVISIONYEAR}}''' | ||
− | [[ | + | [[Category:FIXME|This is the text from the old template. This needs to be rewritten using the new template.]] |
− | |||
− | |||
− | |||
Line 95: | Line 95: | ||
[[Category:Implementation]] | [[Category:Implementation]] | ||
[[Category:Code Snippet]] | [[Category:Code Snippet]] | ||
+ | [[Category:Vulnerability]] |
Revision as of 15:26, 5 November 2008
This is a Vulnerability. To view all vulnerabilities, please see the Vulnerability Category page.
Last revision (mm/dd/yy): 11/5/2008
Description
The finalize() method should only be called by the JVM after the object has been garbage collected.
While the Java Language Specification allows an object's finalize() method to be called from outside the finalizer, doing so is usually a bad idea. For example, calling finalize() explicitly means that finalize() will be called more than once: the first time will be the explicit call and the last time will be the call that is made after the object is garbage collected.
Risk Factors
TBD
Examples
The following code fragment calls finalize() explicitly:
// time to clean up widget.finalize();
Related Attacks
Related Vulnerabilities
Related Controls
Related Technical Impacts
References
TBD