[Bug sanitizer/95279] UBSan doesn't seem to detect pointer overflow in certain cases

joseph at codesourcery dot com gcc-bugzilla@gcc.gnu.org
Wed Jun 3 16:19:42 GMT 2020


https://gcc.gnu.org/bugzilla/show_bug.cgi?id=95279

--- Comment #14 from joseph at codesourcery dot com <joseph at codesourcery dot com> ---
I think it's invalid to refer to element (size_t)-1 of an array; that the 
actual integer value used has to be within the range of available array 
elements.

It's entirely possible that such an invalid usage is nevertheless 
widespread in practice.


More information about the Gcc-bugs mailing list