Skip to content

Commit 0d116a0

Browse files
MathiasVPjketema
andauthored
Update cpp/ql/lib/semmle/code/cpp/security/InvalidPointerDereference/InvalidPointerToDereference.qll
Co-authored-by: Jeroen Ketema <[email protected]>
1 parent 1612ee3 commit 0d116a0

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

cpp/ql/lib/semmle/code/cpp/security/InvalidPointerDereference/InvalidPointerToDereference.qll

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@
1717
* on line 4).
1818
*
1919
* Merely _constructing_ a pointer that's out-of-bounds is fine if the pointer is never dereferenced (in reality, the
20-
* standard only guarentees that it's safe to move the pointer one element past the last element. But we ignore that
20+
* standard only guarantees that it is safe to move the pointer one element past the last element, but we ignore that
2121
* here). So this step is about identifying which of those out-of-bounds pointers found by `pointerAddInstructionHasBounds`
2222
* in `AllocationToInvalidPointer.qll` that are actually being dereferenced. We do this using a regular dataflow
2323
* configuration (see `InvalidPointerToDerefConfig`).

0 commit comments

Comments
 (0)