зеркало из https://github.com/github/codeql.git
Release preparation for version 2.16.2
This commit is contained in:
Родитель
525f27173d
Коммит
c1b35fbf47
|
@ -1,3 +1,10 @@
|
||||||
|
## 0.12.5
|
||||||
|
|
||||||
|
### New Features
|
||||||
|
|
||||||
|
* Added the `PreprocBlock.qll` library to this repository. This library offers a view of `#if`, `#elif`, `#else` and similar directives as a tree with navigable parent-child relationships.
|
||||||
|
* Added a new `ThrowingFunction` abstract class that can be used to model an external function that may throw an exception.
|
||||||
|
|
||||||
## 0.12.4
|
## 0.12.4
|
||||||
|
|
||||||
### Minor Analysis Improvements
|
### Minor Analysis Improvements
|
||||||
|
|
|
@ -1,4 +0,0 @@
|
||||||
---
|
|
||||||
category: feature
|
|
||||||
---
|
|
||||||
* Added a new `ThrowingFunction` abstract class that can be used to model an external function that may throw an exception.
|
|
|
@ -1,4 +1,6 @@
|
||||||
---
|
## 0.12.5
|
||||||
category: feature
|
|
||||||
---
|
### New Features
|
||||||
|
|
||||||
* Added the `PreprocBlock.qll` library to this repository. This library offers a view of `#if`, `#elif`, `#else` and similar directives as a tree with navigable parent-child relationships.
|
* Added the `PreprocBlock.qll` library to this repository. This library offers a view of `#if`, `#elif`, `#else` and similar directives as a tree with navigable parent-child relationships.
|
||||||
|
* Added a new `ThrowingFunction` abstract class that can be used to model an external function that may throw an exception.
|
|
@ -1,2 +1,2 @@
|
||||||
---
|
---
|
||||||
lastReleaseVersion: 0.12.4
|
lastReleaseVersion: 0.12.5
|
||||||
|
|
|
@ -1,5 +1,5 @@
|
||||||
name: codeql/cpp-all
|
name: codeql/cpp-all
|
||||||
version: 0.12.5-dev
|
version: 0.12.5
|
||||||
groups: cpp
|
groups: cpp
|
||||||
dbscheme: semmlecode.cpp.dbscheme
|
dbscheme: semmlecode.cpp.dbscheme
|
||||||
extractor: cpp
|
extractor: cpp
|
||||||
|
|
|
@ -1,3 +1,14 @@
|
||||||
|
## 0.9.4
|
||||||
|
|
||||||
|
### Minor Analysis Improvements
|
||||||
|
|
||||||
|
* Corrected 2 false positive with `cpp/incorrect-string-type-conversion`: conversion of byte arrays to wchar and new array allocations converted to wchar.
|
||||||
|
* The "Incorrect return-value check for a 'scanf'-like function" query (`cpp/incorrectly-checked-scanf`) no longer reports an alert when an explicit check for EOF is added.
|
||||||
|
* The "Incorrect return-value check for a 'scanf'-like function" query (`cpp/incorrectly-checked-scanf`) now recognizes more EOF checks.
|
||||||
|
* The "Potentially uninitialized local variable" query (`cpp/uninitialized-local`) no longer reports an alert when the local variable is used as a qualifier to a static member function call.
|
||||||
|
* ```
|
||||||
|
* The diagnostic query `cpp/diagnostics/successfully-extracted-files` now considers any C/C++ file seen during extraction, even one with some errors, to be extracted / scanned. This affects the Code Scanning UI measure of scanned C/C++ files.
|
||||||
|
|
||||||
## 0.9.3
|
## 0.9.3
|
||||||
|
|
||||||
### Minor Analysis Improvements
|
### Minor Analysis Improvements
|
||||||
|
|
|
@ -1,4 +0,0 @@
|
||||||
---
|
|
||||||
category: minorAnalysis
|
|
||||||
---
|
|
||||||
* The diagnostic query `cpp/diagnostics/successfully-extracted-files` now considers any C/C++ file seen during extraction, even one with some errors, to be extracted / scanned. This affects the Code Scanning UI measure of scanned C/C++ files.
|
|
|
@ -1,4 +0,0 @@
|
||||||
---
|
|
||||||
category: minorAnalysis
|
|
||||||
---
|
|
||||||
* Corrected 2 false positive with `cpp/incorrect-string-type-conversion`: conversion of byte arrays to wchar and new array allocations converted to wchar.
|
|
|
@ -1,4 +0,0 @@
|
||||||
---
|
|
||||||
category: minorAnalysis
|
|
||||||
---
|
|
||||||
* The "Incorrect return-value check for a 'scanf'-like function" query (`cpp/incorrectly-checked-scanf`) now recognizes more EOF checks.
|
|
|
@ -1,4 +0,0 @@
|
||||||
---
|
|
||||||
category: minorAnalysis
|
|
||||||
---
|
|
||||||
* The "Incorrect return-value check for a 'scanf'-like function" query (`cpp/incorrectly-checked-scanf`) no longer reports an alert when an explicit check for EOF is added.
|
|
|
@ -1,5 +0,0 @@
|
||||||
---
|
|
||||||
category: minorAnalysis
|
|
||||||
---
|
|
||||||
* The "Potentially uninitialized local variable" query (`cpp/uninitialized-local`) no longer reports an alert when the local variable is used as a qualifier to a static member function call.
|
|
||||||
* ```
|
|
|
@ -0,0 +1,10 @@
|
||||||
|
## 0.9.4
|
||||||
|
|
||||||
|
### Minor Analysis Improvements
|
||||||
|
|
||||||
|
* Corrected 2 false positive with `cpp/incorrect-string-type-conversion`: conversion of byte arrays to wchar and new array allocations converted to wchar.
|
||||||
|
* The "Incorrect return-value check for a 'scanf'-like function" query (`cpp/incorrectly-checked-scanf`) no longer reports an alert when an explicit check for EOF is added.
|
||||||
|
* The "Incorrect return-value check for a 'scanf'-like function" query (`cpp/incorrectly-checked-scanf`) now recognizes more EOF checks.
|
||||||
|
* The "Potentially uninitialized local variable" query (`cpp/uninitialized-local`) no longer reports an alert when the local variable is used as a qualifier to a static member function call.
|
||||||
|
* ```
|
||||||
|
* The diagnostic query `cpp/diagnostics/successfully-extracted-files` now considers any C/C++ file seen during extraction, even one with some errors, to be extracted / scanned. This affects the Code Scanning UI measure of scanned C/C++ files.
|
|
@ -1,2 +1,2 @@
|
||||||
---
|
---
|
||||||
lastReleaseVersion: 0.9.3
|
lastReleaseVersion: 0.9.4
|
||||||
|
|
|
@ -1,5 +1,5 @@
|
||||||
name: codeql/cpp-queries
|
name: codeql/cpp-queries
|
||||||
version: 0.9.4-dev
|
version: 0.9.4
|
||||||
groups:
|
groups:
|
||||||
- cpp
|
- cpp
|
||||||
- queries
|
- queries
|
||||||
|
|
|
@ -1,3 +1,7 @@
|
||||||
|
## 1.7.8
|
||||||
|
|
||||||
|
No user-facing changes.
|
||||||
|
|
||||||
## 1.7.7
|
## 1.7.7
|
||||||
|
|
||||||
No user-facing changes.
|
No user-facing changes.
|
||||||
|
|
|
@ -0,0 +1,3 @@
|
||||||
|
## 1.7.8
|
||||||
|
|
||||||
|
No user-facing changes.
|
|
@ -1,2 +1,2 @@
|
||||||
---
|
---
|
||||||
lastReleaseVersion: 1.7.7
|
lastReleaseVersion: 1.7.8
|
||||||
|
|
|
@ -1,5 +1,5 @@
|
||||||
name: codeql/csharp-solorigate-all
|
name: codeql/csharp-solorigate-all
|
||||||
version: 1.7.8-dev
|
version: 1.7.8
|
||||||
groups:
|
groups:
|
||||||
- csharp
|
- csharp
|
||||||
- solorigate
|
- solorigate
|
||||||
|
|
|
@ -1,3 +1,7 @@
|
||||||
|
## 1.7.8
|
||||||
|
|
||||||
|
No user-facing changes.
|
||||||
|
|
||||||
## 1.7.7
|
## 1.7.7
|
||||||
|
|
||||||
No user-facing changes.
|
No user-facing changes.
|
||||||
|
|
|
@ -0,0 +1,3 @@
|
||||||
|
## 1.7.8
|
||||||
|
|
||||||
|
No user-facing changes.
|
|
@ -1,2 +1,2 @@
|
||||||
---
|
---
|
||||||
lastReleaseVersion: 1.7.7
|
lastReleaseVersion: 1.7.8
|
||||||
|
|
|
@ -1,5 +1,5 @@
|
||||||
name: codeql/csharp-solorigate-queries
|
name: codeql/csharp-solorigate-queries
|
||||||
version: 1.7.8-dev
|
version: 1.7.8
|
||||||
groups:
|
groups:
|
||||||
- csharp
|
- csharp
|
||||||
- solorigate
|
- solorigate
|
||||||
|
|
|
@ -1,3 +1,14 @@
|
||||||
|
## 0.8.8
|
||||||
|
|
||||||
|
### Minor Analysis Improvements
|
||||||
|
|
||||||
|
* Added a new database relation to store compiler arguments specified inside `@[...].rsp` file arguments. The arguments
|
||||||
|
are returned by `Compilation::getExpandedArgument/1` and `Compilation::getExpandedArguments/0`.
|
||||||
|
* C# 12: Added extractor, QL library and data flow support for collection expressions like `[1, y, 4, .. x]`.
|
||||||
|
* The C# extractor now accepts an extractor option `logging.verbosity` that specifies the verbosity of the logs. The
|
||||||
|
option is added via `codeql database create --language=csharp -Ologging.verbosity=debug ...` or by setting the
|
||||||
|
corresponding environment variable `CODEQL_EXTRACTOR_CSHARP_OPTION_LOGGING_VERBOSITY`.
|
||||||
|
|
||||||
## 0.8.7
|
## 0.8.7
|
||||||
|
|
||||||
### Minor Analysis Improvements
|
### Minor Analysis Improvements
|
||||||
|
|
|
@ -1,6 +0,0 @@
|
||||||
---
|
|
||||||
category: minorAnalysis
|
|
||||||
---
|
|
||||||
* The C# extractor now accepts an extractor option `logging.verbosity` that specifies the verbosity of the logs. The
|
|
||||||
option is added via `codeql database create --language=csharp -Ologging.verbosity=debug ...` or by setting the
|
|
||||||
corresponding environment variable `CODEQL_EXTRACTOR_CSHARP_OPTION_LOGGING_VERBOSITY`.
|
|
|
@ -1,4 +0,0 @@
|
||||||
---
|
|
||||||
category: minorAnalysis
|
|
||||||
---
|
|
||||||
* C# 12: Added extractor, QL library and data flow support for collection expressions like `[1, y, 4, .. x]`.
|
|
|
@ -1,5 +0,0 @@
|
||||||
---
|
|
||||||
category: minorAnalysis
|
|
||||||
---
|
|
||||||
* Added a new database relation to store compiler arguments specified inside `@[...].rsp` file arguments. The arguments
|
|
||||||
are returned by `Compilation::getExpandedArgument/1` and `Compilation::getExpandedArguments/0`.
|
|
|
@ -0,0 +1,10 @@
|
||||||
|
## 0.8.8
|
||||||
|
|
||||||
|
### Minor Analysis Improvements
|
||||||
|
|
||||||
|
* Added a new database relation to store compiler arguments specified inside `@[...].rsp` file arguments. The arguments
|
||||||
|
are returned by `Compilation::getExpandedArgument/1` and `Compilation::getExpandedArguments/0`.
|
||||||
|
* C# 12: Added extractor, QL library and data flow support for collection expressions like `[1, y, 4, .. x]`.
|
||||||
|
* The C# extractor now accepts an extractor option `logging.verbosity` that specifies the verbosity of the logs. The
|
||||||
|
option is added via `codeql database create --language=csharp -Ologging.verbosity=debug ...` or by setting the
|
||||||
|
corresponding environment variable `CODEQL_EXTRACTOR_CSHARP_OPTION_LOGGING_VERBOSITY`.
|
|
@ -1,2 +1,2 @@
|
||||||
---
|
---
|
||||||
lastReleaseVersion: 0.8.7
|
lastReleaseVersion: 0.8.8
|
||||||
|
|
|
@ -1,5 +1,5 @@
|
||||||
name: codeql/csharp-all
|
name: codeql/csharp-all
|
||||||
version: 0.8.8-dev
|
version: 0.8.8
|
||||||
groups: csharp
|
groups: csharp
|
||||||
dbscheme: semmlecode.csharp.dbscheme
|
dbscheme: semmlecode.csharp.dbscheme
|
||||||
extractor: csharp
|
extractor: csharp
|
||||||
|
|
|
@ -1,3 +1,9 @@
|
||||||
|
## 0.8.8
|
||||||
|
|
||||||
|
### Minor Analysis Improvements
|
||||||
|
|
||||||
|
* Added string interpolation expressions and `string.Format` as possible sanitizers for the `cs/web/unvalidated-url-redirection` query.
|
||||||
|
|
||||||
## 0.8.7
|
## 0.8.7
|
||||||
|
|
||||||
### Minor Analysis Improvements
|
### Minor Analysis Improvements
|
||||||
|
|
|
@ -1,4 +1,5 @@
|
||||||
---
|
## 0.8.8
|
||||||
category: minorAnalysis
|
|
||||||
---
|
### Minor Analysis Improvements
|
||||||
|
|
||||||
* Added string interpolation expressions and `string.Format` as possible sanitizers for the `cs/web/unvalidated-url-redirection` query.
|
* Added string interpolation expressions and `string.Format` as possible sanitizers for the `cs/web/unvalidated-url-redirection` query.
|
|
@ -1,2 +1,2 @@
|
||||||
---
|
---
|
||||||
lastReleaseVersion: 0.8.7
|
lastReleaseVersion: 0.8.8
|
||||||
|
|
|
@ -1,5 +1,5 @@
|
||||||
name: codeql/csharp-queries
|
name: codeql/csharp-queries
|
||||||
version: 0.8.8-dev
|
version: 0.8.8
|
||||||
groups:
|
groups:
|
||||||
- csharp
|
- csharp
|
||||||
- queries
|
- queries
|
||||||
|
|
|
@ -1,3 +1,7 @@
|
||||||
|
## 0.0.7
|
||||||
|
|
||||||
|
No user-facing changes.
|
||||||
|
|
||||||
## 0.0.6
|
## 0.0.6
|
||||||
|
|
||||||
No user-facing changes.
|
No user-facing changes.
|
||||||
|
|
|
@ -0,0 +1,3 @@
|
||||||
|
## 0.0.7
|
||||||
|
|
||||||
|
No user-facing changes.
|
|
@ -1,2 +1,2 @@
|
||||||
---
|
---
|
||||||
lastReleaseVersion: 0.0.6
|
lastReleaseVersion: 0.0.7
|
||||||
|
|
|
@ -1,5 +1,5 @@
|
||||||
name: codeql-go-consistency-queries
|
name: codeql-go-consistency-queries
|
||||||
version: 0.0.7-dev
|
version: 0.0.7
|
||||||
groups:
|
groups:
|
||||||
- go
|
- go
|
||||||
- queries
|
- queries
|
||||||
|
|
|
@ -1,3 +1,7 @@
|
||||||
|
## 0.7.8
|
||||||
|
|
||||||
|
No user-facing changes.
|
||||||
|
|
||||||
## 0.7.7
|
## 0.7.7
|
||||||
|
|
||||||
### Deprecated APIs
|
### Deprecated APIs
|
||||||
|
|
|
@ -0,0 +1,3 @@
|
||||||
|
## 0.7.8
|
||||||
|
|
||||||
|
No user-facing changes.
|
|
@ -1,2 +1,2 @@
|
||||||
---
|
---
|
||||||
lastReleaseVersion: 0.7.7
|
lastReleaseVersion: 0.7.8
|
||||||
|
|
|
@ -1,5 +1,5 @@
|
||||||
name: codeql/go-all
|
name: codeql/go-all
|
||||||
version: 0.7.8-dev
|
version: 0.7.8
|
||||||
groups: go
|
groups: go
|
||||||
dbscheme: go.dbscheme
|
dbscheme: go.dbscheme
|
||||||
extractor: go
|
extractor: go
|
||||||
|
|
|
@ -1,3 +1,7 @@
|
||||||
|
## 0.7.8
|
||||||
|
|
||||||
|
No user-facing changes.
|
||||||
|
|
||||||
## 0.7.7
|
## 0.7.7
|
||||||
|
|
||||||
### Minor Analysis Improvements
|
### Minor Analysis Improvements
|
||||||
|
|
|
@ -0,0 +1,3 @@
|
||||||
|
## 0.7.8
|
||||||
|
|
||||||
|
No user-facing changes.
|
|
@ -1,2 +1,2 @@
|
||||||
---
|
---
|
||||||
lastReleaseVersion: 0.7.7
|
lastReleaseVersion: 0.7.8
|
||||||
|
|
|
@ -1,5 +1,5 @@
|
||||||
name: codeql/go-queries
|
name: codeql/go-queries
|
||||||
version: 0.7.8-dev
|
version: 0.7.8
|
||||||
groups:
|
groups:
|
||||||
- go
|
- go
|
||||||
- queries
|
- queries
|
||||||
|
|
|
@ -1,3 +1,7 @@
|
||||||
|
## 0.0.14
|
||||||
|
|
||||||
|
No user-facing changes.
|
||||||
|
|
||||||
## 0.0.13
|
## 0.0.13
|
||||||
|
|
||||||
No user-facing changes.
|
No user-facing changes.
|
||||||
|
|
|
@ -0,0 +1,3 @@
|
||||||
|
## 0.0.14
|
||||||
|
|
||||||
|
No user-facing changes.
|
|
@ -1,2 +1,2 @@
|
||||||
---
|
---
|
||||||
lastReleaseVersion: 0.0.13
|
lastReleaseVersion: 0.0.14
|
||||||
|
|
|
@ -1,5 +1,5 @@
|
||||||
name: codeql/java-automodel-queries
|
name: codeql/java-automodel-queries
|
||||||
version: 0.0.14-dev
|
version: 0.0.14
|
||||||
groups:
|
groups:
|
||||||
- java
|
- java
|
||||||
- automodel
|
- automodel
|
||||||
|
|
|
@ -1,3 +1,13 @@
|
||||||
|
## 0.8.8
|
||||||
|
|
||||||
|
### Minor Analysis Improvements
|
||||||
|
|
||||||
|
* Added models for the following packages:
|
||||||
|
|
||||||
|
* com.fasterxml.jackson.databind
|
||||||
|
* javax.servlet
|
||||||
|
* Added the `java.util.Date` and `java.util.UUID` classes to the list of types in the `SimpleTypeSanitizer` class in `semmle.code.java.security.Sanitizers`.
|
||||||
|
|
||||||
## 0.8.7
|
## 0.8.7
|
||||||
|
|
||||||
### New Features
|
### New Features
|
||||||
|
|
|
@ -1,7 +0,0 @@
|
||||||
---
|
|
||||||
category: minorAnalysis
|
|
||||||
---
|
|
||||||
* Added models for the following packages:
|
|
||||||
|
|
||||||
* com.fasterxml.jackson.databind
|
|
||||||
* javax.servlet
|
|
|
@ -1,4 +1,9 @@
|
||||||
---
|
## 0.8.8
|
||||||
category: minorAnalysis
|
|
||||||
---
|
### Minor Analysis Improvements
|
||||||
|
|
||||||
|
* Added models for the following packages:
|
||||||
|
|
||||||
|
* com.fasterxml.jackson.databind
|
||||||
|
* javax.servlet
|
||||||
* Added the `java.util.Date` and `java.util.UUID` classes to the list of types in the `SimpleTypeSanitizer` class in `semmle.code.java.security.Sanitizers`.
|
* Added the `java.util.Date` and `java.util.UUID` classes to the list of types in the `SimpleTypeSanitizer` class in `semmle.code.java.security.Sanitizers`.
|
|
@ -1,2 +1,2 @@
|
||||||
---
|
---
|
||||||
lastReleaseVersion: 0.8.7
|
lastReleaseVersion: 0.8.8
|
||||||
|
|
|
@ -1,5 +1,5 @@
|
||||||
name: codeql/java-all
|
name: codeql/java-all
|
||||||
version: 0.8.8-dev
|
version: 0.8.8
|
||||||
groups: java
|
groups: java
|
||||||
dbscheme: config/semmlecode.dbscheme
|
dbscheme: config/semmlecode.dbscheme
|
||||||
extractor: java
|
extractor: java
|
||||||
|
|
|
@ -1,3 +1,10 @@
|
||||||
|
## 0.8.8
|
||||||
|
|
||||||
|
### New Queries
|
||||||
|
|
||||||
|
* Added a new query `java/android/sensitive-text` to detect instances of sensitive data being exposed through text fields without being properly masked.
|
||||||
|
* Added a new query `java/android/sensitive-notification` to detect instances of sensitive data being exposed through Android notifications.
|
||||||
|
|
||||||
## 0.8.7
|
## 0.8.7
|
||||||
|
|
||||||
### New Queries
|
### New Queries
|
||||||
|
@ -10,10 +17,6 @@
|
||||||
|
|
||||||
## 0.8.6
|
## 0.8.6
|
||||||
|
|
||||||
### Deprecated Queries
|
|
||||||
|
|
||||||
* The three queries `java/insufficient-key-size`, `java/server-side-template-injection`, and `java/android/implicit-pendingintents` had accidentally general extension points allowing arbitrary string-based flow state. This has been fixed and the old extension points have been deprecated where possible, and otherwise updated.
|
|
||||||
|
|
||||||
### New Queries
|
### New Queries
|
||||||
|
|
||||||
* Added the `java/insecure-randomness` query to detect uses of weakly random values which an attacker may be able to predict. Also added the `crypto-parameter` sink kind for sinks which represent the parameters and keys of cryptographic operations.
|
* Added the `java/insecure-randomness` query to detect uses of weakly random values which an attacker may be able to predict. Also added the `crypto-parameter` sink kind for sinks which represent the parameters and keys of cryptographic operations.
|
||||||
|
@ -24,6 +27,10 @@
|
||||||
* The query `java/android/missing-certificate-pinning` should no longer alert about requests pointing to the local filesystem.
|
* The query `java/android/missing-certificate-pinning` should no longer alert about requests pointing to the local filesystem.
|
||||||
* Removed some spurious sinks related to `com.opensymphony.xwork2.TextProvider.getText` from the query `java/ognl-injection`.
|
* Removed some spurious sinks related to `com.opensymphony.xwork2.TextProvider.getText` from the query `java/ognl-injection`.
|
||||||
|
|
||||||
|
### Bug Fixes
|
||||||
|
|
||||||
|
* The three queries `java/insufficient-key-size`, `java/server-side-template-injection`, and `java/android/implicit-pendingintents` had accidentally general extension points allowing arbitrary string-based flow state. This has been fixed and the old extension points have been deprecated where possible, and otherwise updated.
|
||||||
|
|
||||||
## 0.8.5
|
## 0.8.5
|
||||||
|
|
||||||
No user-facing changes.
|
No user-facing changes.
|
||||||
|
|
|
@ -1,4 +0,0 @@
|
||||||
---
|
|
||||||
category: newQuery
|
|
||||||
---
|
|
||||||
* Added a new query `java/android/sensitive-notification` to detect instances of sensitive data being exposed through Android notifications.
|
|
|
@ -1,4 +0,0 @@
|
||||||
---
|
|
||||||
category: newQuery
|
|
||||||
---
|
|
||||||
* Added a new query `java/android/sensitive-text` to detect instances of sensitive data being exposed through text fields without being properly masked.
|
|
|
@ -0,0 +1,6 @@
|
||||||
|
## 0.8.8
|
||||||
|
|
||||||
|
### New Queries
|
||||||
|
|
||||||
|
* Added a new query `java/android/sensitive-text` to detect instances of sensitive data being exposed through text fields without being properly masked.
|
||||||
|
* Added a new query `java/android/sensitive-notification` to detect instances of sensitive data being exposed through Android notifications.
|
|
@ -1,2 +1,2 @@
|
||||||
---
|
---
|
||||||
lastReleaseVersion: 0.8.7
|
lastReleaseVersion: 0.8.8
|
||||||
|
|
|
@ -1,5 +1,5 @@
|
||||||
name: codeql/java-queries
|
name: codeql/java-queries
|
||||||
version: 0.8.8-dev
|
version: 0.8.8
|
||||||
groups:
|
groups:
|
||||||
- java
|
- java
|
||||||
- queries
|
- queries
|
||||||
|
|
|
@ -1,3 +1,7 @@
|
||||||
|
## 0.8.8
|
||||||
|
|
||||||
|
No user-facing changes.
|
||||||
|
|
||||||
## 0.8.7
|
## 0.8.7
|
||||||
|
|
||||||
### Minor Analysis Improvements
|
### Minor Analysis Improvements
|
||||||
|
|
|
@ -0,0 +1,3 @@
|
||||||
|
## 0.8.8
|
||||||
|
|
||||||
|
No user-facing changes.
|
|
@ -1,2 +1,2 @@
|
||||||
---
|
---
|
||||||
lastReleaseVersion: 0.8.7
|
lastReleaseVersion: 0.8.8
|
||||||
|
|
|
@ -1,5 +1,5 @@
|
||||||
name: codeql/javascript-all
|
name: codeql/javascript-all
|
||||||
version: 0.8.8-dev
|
version: 0.8.8
|
||||||
groups: javascript
|
groups: javascript
|
||||||
dbscheme: semmlecode.javascript.dbscheme
|
dbscheme: semmlecode.javascript.dbscheme
|
||||||
extractor: javascript
|
extractor: javascript
|
||||||
|
|
|
@ -1,3 +1,7 @@
|
||||||
|
## 0.8.8
|
||||||
|
|
||||||
|
No user-facing changes.
|
||||||
|
|
||||||
## 0.8.7
|
## 0.8.7
|
||||||
|
|
||||||
### Minor Analysis Improvements
|
### Minor Analysis Improvements
|
||||||
|
|
|
@ -0,0 +1,3 @@
|
||||||
|
## 0.8.8
|
||||||
|
|
||||||
|
No user-facing changes.
|
|
@ -1,2 +1,2 @@
|
||||||
---
|
---
|
||||||
lastReleaseVersion: 0.8.7
|
lastReleaseVersion: 0.8.8
|
||||||
|
|
|
@ -1,5 +1,5 @@
|
||||||
name: codeql/javascript-queries
|
name: codeql/javascript-queries
|
||||||
version: 0.8.8-dev
|
version: 0.8.8
|
||||||
groups:
|
groups:
|
||||||
- javascript
|
- javascript
|
||||||
- queries
|
- queries
|
||||||
|
|
|
@ -1,3 +1,7 @@
|
||||||
|
## 0.7.8
|
||||||
|
|
||||||
|
No user-facing changes.
|
||||||
|
|
||||||
## 0.7.7
|
## 0.7.7
|
||||||
|
|
||||||
No user-facing changes.
|
No user-facing changes.
|
||||||
|
|
|
@ -0,0 +1,3 @@
|
||||||
|
## 0.7.8
|
||||||
|
|
||||||
|
No user-facing changes.
|
|
@ -1,2 +1,2 @@
|
||||||
---
|
---
|
||||||
lastReleaseVersion: 0.7.7
|
lastReleaseVersion: 0.7.8
|
||||||
|
|
|
@ -1,4 +1,4 @@
|
||||||
name: codeql/suite-helpers
|
name: codeql/suite-helpers
|
||||||
version: 0.7.8-dev
|
version: 0.7.8
|
||||||
groups: shared
|
groups: shared
|
||||||
warnOnImplicitThis: true
|
warnOnImplicitThis: true
|
||||||
|
|
|
@ -1,3 +1,13 @@
|
||||||
|
## 0.11.8
|
||||||
|
|
||||||
|
### Minor Analysis Improvements
|
||||||
|
|
||||||
|
* Added `html.escape` as a sanitizer for HTML.
|
||||||
|
|
||||||
|
### Bug Fixes
|
||||||
|
|
||||||
|
* Fixed the `a` (ASCII) inline flag not being recognized by the regular expression library.
|
||||||
|
|
||||||
## 0.11.7
|
## 0.11.7
|
||||||
|
|
||||||
### Minor Analysis Improvements
|
### Minor Analysis Improvements
|
||||||
|
|
|
@ -1,4 +0,0 @@
|
||||||
---
|
|
||||||
category: fix
|
|
||||||
---
|
|
||||||
* Fixed the `a` (ASCII) inline flag not being recognized by the regular expression library.
|
|
|
@ -1,4 +0,0 @@
|
||||||
---
|
|
||||||
category: minorAnalysis
|
|
||||||
---
|
|
||||||
* Added `html.escape` as a sanitizer for HTML.
|
|
|
@ -0,0 +1,9 @@
|
||||||
|
## 0.11.8
|
||||||
|
|
||||||
|
### Minor Analysis Improvements
|
||||||
|
|
||||||
|
* Added `html.escape` as a sanitizer for HTML.
|
||||||
|
|
||||||
|
### Bug Fixes
|
||||||
|
|
||||||
|
* Fixed the `a` (ASCII) inline flag not being recognized by the regular expression library.
|
|
@ -1,2 +1,2 @@
|
||||||
---
|
---
|
||||||
lastReleaseVersion: 0.11.7
|
lastReleaseVersion: 0.11.8
|
||||||
|
|
|
@ -1,5 +1,5 @@
|
||||||
name: codeql/python-all
|
name: codeql/python-all
|
||||||
version: 0.11.8-dev
|
version: 0.11.8
|
||||||
groups: python
|
groups: python
|
||||||
dbscheme: semmlecode.python.dbscheme
|
dbscheme: semmlecode.python.dbscheme
|
||||||
extractor: python
|
extractor: python
|
||||||
|
|
|
@ -1,3 +1,7 @@
|
||||||
|
## 0.9.8
|
||||||
|
|
||||||
|
No user-facing changes.
|
||||||
|
|
||||||
## 0.9.7
|
## 0.9.7
|
||||||
|
|
||||||
### Minor Analysis Improvements
|
### Minor Analysis Improvements
|
||||||
|
|
|
@ -0,0 +1,3 @@
|
||||||
|
## 0.9.8
|
||||||
|
|
||||||
|
No user-facing changes.
|
|
@ -1,2 +1,2 @@
|
||||||
---
|
---
|
||||||
lastReleaseVersion: 0.9.7
|
lastReleaseVersion: 0.9.8
|
||||||
|
|
|
@ -1,5 +1,5 @@
|
||||||
name: codeql/python-queries
|
name: codeql/python-queries
|
||||||
version: 0.9.8-dev
|
version: 0.9.8
|
||||||
groups:
|
groups:
|
||||||
- python
|
- python
|
||||||
- queries
|
- queries
|
||||||
|
|
|
@ -1,3 +1,9 @@
|
||||||
|
## 0.8.8
|
||||||
|
|
||||||
|
### Minor Analysis Improvements
|
||||||
|
|
||||||
|
* Flow is now tracked through Rails `render` calls, when the argument is a `ViewComponent`. In this case, data flow is tracked into the accompanying `.html.erb` file.
|
||||||
|
|
||||||
## 0.8.7
|
## 0.8.7
|
||||||
|
|
||||||
### Minor Analysis Improvements
|
### Minor Analysis Improvements
|
||||||
|
|
|
@ -1,4 +1,5 @@
|
||||||
---
|
## 0.8.8
|
||||||
category: minorAnalysis
|
|
||||||
---
|
### Minor Analysis Improvements
|
||||||
|
|
||||||
* Flow is now tracked through Rails `render` calls, when the argument is a `ViewComponent`. In this case, data flow is tracked into the accompanying `.html.erb` file.
|
* Flow is now tracked through Rails `render` calls, when the argument is a `ViewComponent`. In this case, data flow is tracked into the accompanying `.html.erb` file.
|
|
@ -1,2 +1,2 @@
|
||||||
---
|
---
|
||||||
lastReleaseVersion: 0.8.7
|
lastReleaseVersion: 0.8.8
|
||||||
|
|
|
@ -1,5 +1,5 @@
|
||||||
name: codeql/ruby-all
|
name: codeql/ruby-all
|
||||||
version: 0.8.8-dev
|
version: 0.8.8
|
||||||
groups: ruby
|
groups: ruby
|
||||||
extractor: ruby
|
extractor: ruby
|
||||||
dbscheme: ruby.dbscheme
|
dbscheme: ruby.dbscheme
|
||||||
|
|
|
@ -1,3 +1,14 @@
|
||||||
|
## 0.8.8
|
||||||
|
|
||||||
|
### New Queries
|
||||||
|
|
||||||
|
* Added a new experimental query, `rb/insecure-randomness`, to detect when application uses random values that are not cryptographically secure.
|
||||||
|
|
||||||
|
### Minor Analysis Improvements
|
||||||
|
|
||||||
|
* Added new unsafe deserialization sinks for the ox gem.
|
||||||
|
* Added an additional unsafe deserialization sink for the oj gem.
|
||||||
|
|
||||||
## 0.8.7
|
## 0.8.7
|
||||||
|
|
||||||
No user-facing changes.
|
No user-facing changes.
|
||||||
|
|
|
@ -1,4 +0,0 @@
|
||||||
---
|
|
||||||
category: newQuery
|
|
||||||
---
|
|
||||||
* Added a new experimental query, `rb/insecure-randomness`, to detect when application uses random values that are not cryptographically secure.
|
|
|
@ -1,5 +0,0 @@
|
||||||
---
|
|
||||||
category: minorAnalysis
|
|
||||||
---
|
|
||||||
* Added new unsafe deserialization sinks for the ox gem.
|
|
||||||
* Added an additional unsafe deserialization sink for the oj gem.
|
|
|
@ -0,0 +1,10 @@
|
||||||
|
## 0.8.8
|
||||||
|
|
||||||
|
### New Queries
|
||||||
|
|
||||||
|
* Added a new experimental query, `rb/insecure-randomness`, to detect when application uses random values that are not cryptographically secure.
|
||||||
|
|
||||||
|
### Minor Analysis Improvements
|
||||||
|
|
||||||
|
* Added new unsafe deserialization sinks for the ox gem.
|
||||||
|
* Added an additional unsafe deserialization sink for the oj gem.
|
|
@ -1,2 +1,2 @@
|
||||||
---
|
---
|
||||||
lastReleaseVersion: 0.8.7
|
lastReleaseVersion: 0.8.8
|
||||||
|
|
|
@ -1,5 +1,5 @@
|
||||||
name: codeql/ruby-queries
|
name: codeql/ruby-queries
|
||||||
version: 0.8.8-dev
|
version: 0.8.8
|
||||||
groups:
|
groups:
|
||||||
- ruby
|
- ruby
|
||||||
- queries
|
- queries
|
||||||
|
|
|
@ -1,3 +1,7 @@
|
||||||
|
## 0.1.8
|
||||||
|
|
||||||
|
No user-facing changes.
|
||||||
|
|
||||||
## 0.1.7
|
## 0.1.7
|
||||||
|
|
||||||
No user-facing changes.
|
No user-facing changes.
|
||||||
|
|
|
@ -0,0 +1,3 @@
|
||||||
|
## 0.1.8
|
||||||
|
|
||||||
|
No user-facing changes.
|
|
@ -1,2 +1,2 @@
|
||||||
---
|
---
|
||||||
lastReleaseVersion: 0.1.7
|
lastReleaseVersion: 0.1.8
|
||||||
|
|
|
@ -1,5 +1,5 @@
|
||||||
name: codeql/controlflow
|
name: codeql/controlflow
|
||||||
version: 0.1.8-dev
|
version: 0.1.8
|
||||||
groups: shared
|
groups: shared
|
||||||
library: true
|
library: true
|
||||||
dependencies:
|
dependencies:
|
||||||
|
|
|
@ -1,3 +1,7 @@
|
||||||
|
## 0.1.8
|
||||||
|
|
||||||
|
No user-facing changes.
|
||||||
|
|
||||||
## 0.1.7
|
## 0.1.7
|
||||||
|
|
||||||
No user-facing changes.
|
No user-facing changes.
|
||||||
|
|
|
@ -0,0 +1,3 @@
|
||||||
|
## 0.1.8
|
||||||
|
|
||||||
|
No user-facing changes.
|
|
@ -1,2 +1,2 @@
|
||||||
---
|
---
|
||||||
lastReleaseVersion: 0.1.7
|
lastReleaseVersion: 0.1.8
|
||||||
|
|
|
@ -1,5 +1,5 @@
|
||||||
name: codeql/dataflow
|
name: codeql/dataflow
|
||||||
version: 0.1.8-dev
|
version: 0.1.8
|
||||||
groups: shared
|
groups: shared
|
||||||
library: true
|
library: true
|
||||||
dependencies:
|
dependencies:
|
||||||
|
|
Некоторые файлы не были показаны из-за слишком большого количества измененных файлов Показать больше
Загрузка…
Ссылка в новой задаче