From 2cfa14b91ff86e3d60bf5c1336e1fc5351bc94ce Mon Sep 17 00:00:00 2001 From: Mathias Vorreiter Pedersen Date: Tue, 25 Jul 2023 10:30:44 +0200 Subject: [PATCH] Update cpp/ql/src/experimental/Security/CWE/CWE-193/InvalidPointerDeref.ql Co-authored-by: Jeroen Ketema <93738568+jketema@users.noreply.github.com> --- .../experimental/Security/CWE/CWE-193/InvalidPointerDeref.ql | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/cpp/ql/src/experimental/Security/CWE/CWE-193/InvalidPointerDeref.ql b/cpp/ql/src/experimental/Security/CWE/CWE-193/InvalidPointerDeref.ql index 51c953a5446..9d8d75ecaf3 100644 --- a/cpp/ql/src/experimental/Security/CWE/CWE-193/InvalidPointerDeref.ql +++ b/cpp/ql/src/experimental/Security/CWE/CWE-193/InvalidPointerDeref.ql @@ -34,7 +34,7 @@ * Step 1 is implemented in `AllocationToInvalidPointer.qll`, and step 2 is implemented by * `InvalidPointerToDereference.qll`. See those files for the description of these. * - * This file imports both libraries and define a final dataflow configuration that constructs the full path from + * This file imports both libraries and defines a final dataflow configuration that constructs the full path from * the allocation to the dereference of the out-of-bounds pointer. This is done for several reasons: * 1. It means the user is able to inspect the entire path from the allocation to the dereference, which can be useful * to understand the problem highlighted.