Modify Rule S5485: Fix Typos

This commit is contained in:
Philipp Dominik Schubert 2023-12-06 12:19:40 +01:00 committed by GitHub
parent da1eb8d6bb
commit 02ac884d27
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23

View File

@ -38,7 +38,7 @@ Besides affecting the application's availability, NULL pointer dereferences may
If NULL is equivalent to the 0x0 memory address that can be accessed by privileged code, writing and reading memory is possible, which compromises the integrity and confidentiality of the application.
== Hot to fix it
== How to fix it
Ensure that the ``++FILE*++``-typed pointer parameters passed to the standard C library's I/O stream handling functions are non-``++NULL++`` and also any other parameters such as the third argument of ``++fseek++`` carry appropriate values, namely any of ``++SEEK_SET++``, ``++SEEK_END++``, or ``++SEEK_CUR++``.