Skip to content

Commit 99f6e68

Browse files
MathiasVPjketema
andauthored
Update cpp/ql/lib/semmle/code/cpp/security/InvalidPointerDereference/InvalidPointerToDereference.qll
Co-authored-by: Jeroen Ketema <[email protected]>
1 parent 54afed6 commit 99f6e68

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

cpp/ql/lib/semmle/code/cpp/security/InvalidPointerDereference/InvalidPointerToDereference.qll

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@
1919
* Merely _constructing_ a pointer that's out-of-bounds is fine if the pointer is never dereferenced (in reality, the
2020
* standard only guarantees that it is safe to move the pointer one element past the last element, but we ignore that
2121
* here). So this step is about identifying which of the out-of-bounds pointers found by `pointerAddInstructionHasBounds`
22-
* in `AllocationToInvalidPointer.qll` that are actually being dereferenced. We do this using a regular dataflow
22+
* in `AllocationToInvalidPointer.qll` are actually being dereferenced. We do this using a regular dataflow
2323
* configuration (see `InvalidPointerToDerefConfig`).
2424
*
2525
* This dataflow traversal defines the set of sources as any dataflow node `n` such that there exists a pointer-arithmetic

0 commit comments

Comments
 (0)