[Bug sanitizer/95279] UBSan doesn't seem to detect pointer overflow in certain cases
joseph at codesourcery dot com
gcc-bugzilla@gcc.gnu.org
Wed Jun 3 16:19:42 GMT 2020
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=95279
--- Comment #14 from joseph at codesourcery dot com <joseph at codesourcery dot com> ---
I think it's invalid to refer to element (size_t)-1 of an array; that the
actual integer value used has to be within the range of available array
elements.
It's entirely possible that such an invalid usage is nevertheless
widespread in practice.
More information about the Gcc-bugs
mailing list