Skip to content

Commit 6ebd5ab

Browse files
MathiasVPjketema
andauthored
Update cpp/ql/lib/semmle/code/cpp/security/InvalidPointerDereference/InvalidPointerToDereference.qll
Co-authored-by: Jeroen Ketema <[email protected]>
1 parent 0d116a0 commit 6ebd5ab

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

cpp/ql/lib/semmle/code/cpp/security/InvalidPointerDereference/InvalidPointerToDereference.qll

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@
1818
*
1919
* Merely _constructing_ a pointer that's out-of-bounds is fine if the pointer is never dereferenced (in reality, the
2020
* standard only guarantees that it is safe to move the pointer one element past the last element, but we ignore that
21-
* here). So this step is about identifying which of those out-of-bounds pointers found by `pointerAddInstructionHasBounds`
21+
* here). So this step is about identifying which of the out-of-bounds pointers found by `pointerAddInstructionHasBounds`
2222
* in `AllocationToInvalidPointer.qll` that are actually being dereferenced. We do this using a regular dataflow
2323
* configuration (see `InvalidPointerToDerefConfig`).
2424
*

0 commit comments

Comments
 (0)