Release preparation for version 2.9.3

This commit is contained in:
github-actions[bot]
2022-05-25 07:46:48 +00:00
parent efda248bea
commit 1f1b364feb
74 changed files with 194 additions and 94 deletions

View File

@@ -1,3 +1,14 @@
## 0.2.2
### Deprecated APIs
* The QL class `FloatingPointLiteral` has been renamed to `FloatLiteral`.
### Minor Analysis Improvements
Fixed a sanitizer of the query `java/android/intent-redirection`. Now, for an intent to be considered
safe against intent redirection, both its package name and class name must be checked.
## 0.2.1
### New Features

View File

@@ -1,4 +0,0 @@
---
category: deprecated
---
* The QL class `FloatingPointLiteral` has been renamed to `FloatLiteral`.

View File

@@ -1,5 +1,10 @@
---
category: minorAnalysis
---
## 0.2.2
### Deprecated APIs
* The QL class `FloatingPointLiteral` has been renamed to `FloatLiteral`.
### Minor Analysis Improvements
Fixed a sanitizer of the query `java/android/intent-redirection`. Now, for an intent to be considered
safe against intent redirection, both its package name and class name must be checked.
safe against intent redirection, both its package name and class name must be checked.

View File

@@ -1,2 +1,2 @@
---
lastReleaseVersion: 0.2.1
lastReleaseVersion: 0.2.2

View File

@@ -1,5 +1,5 @@
name: codeql/java-all
version: 0.2.2-dev
version: 0.2.2
groups: java
dbscheme: config/semmlecode.dbscheme
extractor: java

View File

@@ -1,3 +1,17 @@
## 0.1.3
### New Queries
* Two new queries "Inefficient regular expression" (`java/redos`) and "Polynomial regular expression used on uncontrolled data" (`java/polynomial-redos`) have been added.
These queries help find instances of Regular Expression Denial of Service vulnerabilities.
### Minor Analysis Improvements
* Query `java/sensitive-log` has received several improvements.
* It no longer considers usernames as sensitive information.
* The conditions to consider a variable a constant (and therefore exclude it as user-provided sensitive information) have been tightened.
* A sanitizer has been added to handle certain elements introduced by a Kotlin compiler plugin that have deceptive names.
## 0.1.2
### Query Metadata Changes
@@ -39,7 +53,7 @@ this respect.
### Minor Analysis Improvements
* Updated "Local information disclosure in a temporary directory" (`java/local-temp-file-or-directory-information-disclosure`) to remove false-positives when OS is properly used as logical guard.
* Updated "Local information disclosure in a temporary directory" (`java/local-temp-file-or-directory-information-disclosure`) to remove false-positives when OS is properly used as logical guard.
## 0.0.11

View File

@@ -1,6 +0,0 @@
---
category: newQuery
---
* Two new queries "Inefficient regular expression" (`java/redos`) and "Polynomial regular expression used on uncontrolled data" (`java/polynomial-redos`) have been added.
These queries help find instances of Regular Expression Denial of Service vulnerabilities.

View File

@@ -1,6 +1,12 @@
---
category: minorAnalysis
---
## 0.1.3
### New Queries
* Two new queries "Inefficient regular expression" (`java/redos`) and "Polynomial regular expression used on uncontrolled data" (`java/polynomial-redos`) have been added.
These queries help find instances of Regular Expression Denial of Service vulnerabilities.
### Minor Analysis Improvements
* Query `java/sensitive-log` has received several improvements.
* It no longer considers usernames as sensitive information.
* The conditions to consider a variable a constant (and therefore exclude it as user-provided sensitive information) have been tightened.

View File

@@ -1,2 +1,2 @@
---
lastReleaseVersion: 0.1.2
lastReleaseVersion: 0.1.3

View File

@@ -1,5 +1,5 @@
name: codeql/java-queries
version: 0.1.3-dev
version: 0.1.3
groups:
- java
- queries