mirror of
https://github.com/github/codeql.git
synced 2025-12-16 16:53:25 +01:00
Release preparation for version 2.8.2
This commit is contained in:
@@ -1,5 +1,12 @@
|
||||
## 0.0.10
|
||||
|
||||
### New Features
|
||||
|
||||
* Added a `isStructuredBinding` predicate to the `Variable` class which holds when the variable is declared as part of a structured binding declaration.
|
||||
|
||||
## 0.0.9
|
||||
|
||||
|
||||
## 0.0.8
|
||||
|
||||
### Deprecated APIs
|
||||
|
||||
@@ -1,4 +1,5 @@
|
||||
---
|
||||
category: feature
|
||||
---
|
||||
## 0.0.10
|
||||
|
||||
### New Features
|
||||
|
||||
* Added a `isStructuredBinding` predicate to the `Variable` class which holds when the variable is declared as part of a structured binding declaration.
|
||||
@@ -1,2 +1,2 @@
|
||||
---
|
||||
lastReleaseVersion: 0.0.9
|
||||
lastReleaseVersion: 0.0.10
|
||||
|
||||
@@ -1,5 +1,5 @@
|
||||
name: codeql/cpp-all
|
||||
version: 0.0.10-dev
|
||||
version: 0.0.10
|
||||
groups: cpp
|
||||
dbscheme: semmlecode.cpp.dbscheme
|
||||
extractor: cpp
|
||||
|
||||
@@ -1,3 +1,9 @@
|
||||
## 0.0.10
|
||||
|
||||
### Deprecated Queries
|
||||
|
||||
* The `CodeDuplication.Copy`, `CodeDuplication.DuplicateBlock`, and `CodeDuplication.SimilarBlock` classes have been deprecated.
|
||||
|
||||
## 0.0.9
|
||||
|
||||
### New Queries
|
||||
|
||||
@@ -1,4 +1,5 @@
|
||||
---
|
||||
category: deprecated
|
||||
---
|
||||
## 0.0.10
|
||||
|
||||
### Deprecated Queries
|
||||
|
||||
* The `CodeDuplication.Copy`, `CodeDuplication.DuplicateBlock`, and `CodeDuplication.SimilarBlock` classes have been deprecated.
|
||||
@@ -1,2 +1,2 @@
|
||||
---
|
||||
lastReleaseVersion: 0.0.9
|
||||
lastReleaseVersion: 0.0.10
|
||||
|
||||
@@ -1,5 +1,5 @@
|
||||
name: codeql/cpp-queries
|
||||
version: 0.0.10-dev
|
||||
version: 0.0.10
|
||||
groups:
|
||||
- cpp
|
||||
- queries
|
||||
|
||||
@@ -1,3 +1,5 @@
|
||||
## 1.0.4
|
||||
|
||||
## 1.0.3
|
||||
|
||||
## 1.0.2
|
||||
|
||||
@@ -0,0 +1 @@
|
||||
## 1.0.4
|
||||
@@ -1,2 +1,2 @@
|
||||
---
|
||||
lastReleaseVersion: 1.0.3
|
||||
lastReleaseVersion: 1.0.4
|
||||
|
||||
@@ -1,5 +1,5 @@
|
||||
name: codeql/csharp-solorigate-all
|
||||
version: 1.0.4-dev
|
||||
version: 1.0.4
|
||||
groups:
|
||||
- csharp
|
||||
- solorigate
|
||||
|
||||
@@ -1,3 +1,5 @@
|
||||
## 1.0.4
|
||||
|
||||
## 1.0.3
|
||||
|
||||
## 1.0.2
|
||||
|
||||
@@ -0,0 +1 @@
|
||||
## 1.0.4
|
||||
@@ -1,2 +1,2 @@
|
||||
---
|
||||
lastReleaseVersion: 1.0.3
|
||||
lastReleaseVersion: 1.0.4
|
||||
|
||||
@@ -1,5 +1,5 @@
|
||||
name: codeql/csharp-solorigate-queries
|
||||
version: 1.0.4-dev
|
||||
version: 1.0.4
|
||||
groups:
|
||||
- csharp
|
||||
- solorigate
|
||||
|
||||
@@ -1,3 +1,5 @@
|
||||
## 0.0.10
|
||||
|
||||
## 0.0.9
|
||||
|
||||
### Major Analysis Improvements
|
||||
|
||||
1
csharp/ql/lib/change-notes/released/0.0.10.md
Normal file
1
csharp/ql/lib/change-notes/released/0.0.10.md
Normal file
@@ -0,0 +1 @@
|
||||
## 0.0.10
|
||||
@@ -1,2 +1,2 @@
|
||||
---
|
||||
lastReleaseVersion: 0.0.9
|
||||
lastReleaseVersion: 0.0.10
|
||||
|
||||
@@ -1,5 +1,5 @@
|
||||
name: codeql/csharp-all
|
||||
version: 0.0.10-dev
|
||||
version: 0.0.10
|
||||
groups: csharp
|
||||
dbscheme: semmlecode.csharp.dbscheme
|
||||
extractor: csharp
|
||||
|
||||
@@ -1,3 +1,10 @@
|
||||
## 0.0.10
|
||||
|
||||
### Query Metadata Changes
|
||||
|
||||
The precision of hardcoded credentials queries (`cs/hardcoded-credentials` and
|
||||
`cs/hardcoded-connection-string-credentials`) have been downgraded to medium.
|
||||
|
||||
## 0.0.9
|
||||
|
||||
## 0.0.8
|
||||
|
||||
@@ -1,5 +1,6 @@
|
||||
---
|
||||
category: queryMetadata
|
||||
---
|
||||
## 0.0.10
|
||||
|
||||
### Query Metadata Changes
|
||||
|
||||
The precision of hardcoded credentials queries (`cs/hardcoded-credentials` and
|
||||
`cs/hardcoded-connection-string-credentials`) have been downgraded to medium.
|
||||
`cs/hardcoded-connection-string-credentials`) have been downgraded to medium.
|
||||
@@ -1,2 +1,2 @@
|
||||
---
|
||||
lastReleaseVersion: 0.0.9
|
||||
lastReleaseVersion: 0.0.10
|
||||
|
||||
@@ -1,5 +1,5 @@
|
||||
name: codeql/csharp-queries
|
||||
version: 0.0.10-dev
|
||||
version: 0.0.10
|
||||
groups:
|
||||
- csharp
|
||||
- queries
|
||||
|
||||
@@ -1,3 +1,9 @@
|
||||
## 0.0.10
|
||||
|
||||
### New Features
|
||||
|
||||
* Added predicates `ClassOrInterface.getAPermittedSubtype` and `isSealed` exposing information about sealed classes.
|
||||
|
||||
## 0.0.9
|
||||
|
||||
## 0.0.8
|
||||
|
||||
@@ -1,4 +1,5 @@
|
||||
---
|
||||
category: feature
|
||||
---
|
||||
## 0.0.10
|
||||
|
||||
### New Features
|
||||
|
||||
* Added predicates `ClassOrInterface.getAPermittedSubtype` and `isSealed` exposing information about sealed classes.
|
||||
@@ -1,2 +1,2 @@
|
||||
---
|
||||
lastReleaseVersion: 0.0.9
|
||||
lastReleaseVersion: 0.0.10
|
||||
|
||||
@@ -1,5 +1,5 @@
|
||||
name: codeql/java-all
|
||||
version: 0.0.10-dev
|
||||
version: 0.0.10
|
||||
groups: java
|
||||
dbscheme: config/semmlecode.dbscheme
|
||||
extractor: java
|
||||
|
||||
@@ -1,3 +1,20 @@
|
||||
## 0.0.10
|
||||
|
||||
### Breaking Changes
|
||||
|
||||
* Add more classes to Netty request/response splitting. Change identification to `java/netty-http-request-or-response-splitting`.
|
||||
Identify request splitting differently from response splitting in query results.
|
||||
Support addional classes:
|
||||
* `io.netty.handler.codec.http.CombinedHttpHeaders`
|
||||
* `io.netty.handler.codec.http.DefaultHttpRequest`
|
||||
* `io.netty.handler.codec.http.DefaultFullHttpRequest`
|
||||
|
||||
### New Queries
|
||||
|
||||
* A new query titled "Local information disclosure in a temporary directory" (`java/local-temp-file-or-directory-information-disclosure`) has been added.
|
||||
This query finds uses of APIs that leak potentially sensitive information to other local users via the system temporary directory.
|
||||
This query was originally [submitted as query by @JLLeitschuh](https://github.com/github/codeql/pull/4388).
|
||||
|
||||
## 0.0.9
|
||||
|
||||
### New Queries
|
||||
|
||||
@@ -1,9 +0,0 @@
|
||||
---
|
||||
category: breaking
|
||||
---
|
||||
* Add more classes to Netty request/response splitting. Change identification to `java/netty-http-request-or-response-splitting`.
|
||||
Identify request splitting differently from response splitting in query results.
|
||||
Support addional classes:
|
||||
* `io.netty.handler.codec.http.CombinedHttpHeaders`
|
||||
* `io.netty.handler.codec.http.DefaultHttpRequest`
|
||||
* `io.netty.handler.codec.http.DefaultFullHttpRequest`
|
||||
@@ -1,6 +0,0 @@
|
||||
---
|
||||
category: newQuery
|
||||
---
|
||||
* A new query titled "Local information disclosure in a temporary directory" (`java/local-temp-file-or-directory-information-disclosure`) has been added.
|
||||
This query finds uses of APIs that leak potentially sensitive information to other local users via the system temporary directory.
|
||||
This query was originally [submitted as query by @JLLeitschuh](https://github.com/github/codeql/pull/4388).
|
||||
16
java/ql/src/change-notes/released/0.0.10.md
Normal file
16
java/ql/src/change-notes/released/0.0.10.md
Normal file
@@ -0,0 +1,16 @@
|
||||
## 0.0.10
|
||||
|
||||
### Breaking Changes
|
||||
|
||||
* Add more classes to Netty request/response splitting. Change identification to `java/netty-http-request-or-response-splitting`.
|
||||
Identify request splitting differently from response splitting in query results.
|
||||
Support addional classes:
|
||||
* `io.netty.handler.codec.http.CombinedHttpHeaders`
|
||||
* `io.netty.handler.codec.http.DefaultHttpRequest`
|
||||
* `io.netty.handler.codec.http.DefaultFullHttpRequest`
|
||||
|
||||
### New Queries
|
||||
|
||||
* A new query titled "Local information disclosure in a temporary directory" (`java/local-temp-file-or-directory-information-disclosure`) has been added.
|
||||
This query finds uses of APIs that leak potentially sensitive information to other local users via the system temporary directory.
|
||||
This query was originally [submitted as query by @JLLeitschuh](https://github.com/github/codeql/pull/4388).
|
||||
@@ -1,2 +1,2 @@
|
||||
---
|
||||
lastReleaseVersion: 0.0.9
|
||||
lastReleaseVersion: 0.0.10
|
||||
|
||||
@@ -1,5 +1,5 @@
|
||||
name: codeql/java-queries
|
||||
version: 0.0.10-dev
|
||||
version: 0.0.10
|
||||
groups:
|
||||
- java
|
||||
- queries
|
||||
|
||||
@@ -1,3 +1,5 @@
|
||||
## 0.0.11
|
||||
|
||||
## 0.0.10
|
||||
|
||||
## 0.0.9
|
||||
|
||||
1
javascript/ql/lib/change-notes/released/0.0.11.md
Normal file
1
javascript/ql/lib/change-notes/released/0.0.11.md
Normal file
@@ -0,0 +1 @@
|
||||
## 0.0.11
|
||||
@@ -1,2 +1,2 @@
|
||||
---
|
||||
lastReleaseVersion: 0.0.10
|
||||
lastReleaseVersion: 0.0.11
|
||||
|
||||
@@ -1,5 +1,5 @@
|
||||
name: codeql/javascript-all
|
||||
version: 0.0.11-dev
|
||||
version: 0.0.11
|
||||
groups: javascript
|
||||
dbscheme: semmlecode.javascript.dbscheme
|
||||
extractor: javascript
|
||||
|
||||
@@ -1,3 +1,25 @@
|
||||
## 0.0.11
|
||||
|
||||
### New Queries
|
||||
|
||||
* A new query, `js/functionality-from-untrusted-source`, has been added to the query suite. It finds DOM elements
|
||||
that load functionality from untrusted sources, like `script` or `iframe` elements using `http` links.
|
||||
The query is run by default.
|
||||
|
||||
### Query Metadata Changes
|
||||
|
||||
* The `js/request-forgery` query previously flagged both server-side and client-side request forgery,
|
||||
but these are now handled by two different queries:
|
||||
* `js/request-forgery` is now specific to server-side request forgery. Its precision has been raised to
|
||||
`high` and is now shown by default (it was previously in the `security-extended` suite).
|
||||
* `js/client-side-request-forgery` is specific to client-side request forgery. This is technically a new query
|
||||
but simply flags a subset of what the old query did.
|
||||
This has precision `medium` and is part of the `security-extended` suite.
|
||||
|
||||
### Minor Analysis Improvements
|
||||
|
||||
* Added dataflow through the [`snapdragon`](https://npmjs.com/package/snapdragon) library.
|
||||
|
||||
## 0.0.10
|
||||
|
||||
### New Queries
|
||||
|
||||
@@ -1,4 +0,0 @@
|
||||
---
|
||||
category: minorAnalysis
|
||||
---
|
||||
* Added dataflow through the [`snapdragon`](https://npmjs.com/package/snapdragon) library.
|
||||
@@ -1,6 +0,0 @@
|
||||
---
|
||||
category: newQuery
|
||||
---
|
||||
* A new query, `js/functionality-from-untrusted-source`, has been added to the query suite. It finds DOM elements
|
||||
that load functionality from untrusted sources, like `script` or `iframe` elements using `http` links.
|
||||
The query is run by default.
|
||||
@@ -1,6 +1,13 @@
|
||||
---
|
||||
category: queryMetadata
|
||||
---
|
||||
## 0.0.11
|
||||
|
||||
### New Queries
|
||||
|
||||
* A new query, `js/functionality-from-untrusted-source`, has been added to the query suite. It finds DOM elements
|
||||
that load functionality from untrusted sources, like `script` or `iframe` elements using `http` links.
|
||||
The query is run by default.
|
||||
|
||||
### Query Metadata Changes
|
||||
|
||||
* The `js/request-forgery` query previously flagged both server-side and client-side request forgery,
|
||||
but these are now handled by two different queries:
|
||||
* `js/request-forgery` is now specific to server-side request forgery. Its precision has been raised to
|
||||
@@ -8,3 +15,7 @@ category: queryMetadata
|
||||
* `js/client-side-request-forgery` is specific to client-side request forgery. This is technically a new query
|
||||
but simply flags a subset of what the old query did.
|
||||
This has precision `medium` and is part of the `security-extended` suite.
|
||||
|
||||
### Minor Analysis Improvements
|
||||
|
||||
* Added dataflow through the [`snapdragon`](https://npmjs.com/package/snapdragon) library.
|
||||
@@ -1,2 +1,2 @@
|
||||
---
|
||||
lastReleaseVersion: 0.0.10
|
||||
lastReleaseVersion: 0.0.11
|
||||
|
||||
@@ -1,5 +1,5 @@
|
||||
name: codeql/javascript-queries
|
||||
version: 0.0.11-dev
|
||||
version: 0.0.11
|
||||
groups:
|
||||
- javascript
|
||||
- queries
|
||||
|
||||
@@ -1,3 +1,9 @@
|
||||
## 0.0.10
|
||||
|
||||
### Deprecated APIs
|
||||
|
||||
* The old points-to based modeling has been deprecated. Use the new type-tracking/API-graphs based modeling instead.
|
||||
|
||||
## 0.0.9
|
||||
|
||||
## 0.0.8
|
||||
|
||||
@@ -1,4 +1,5 @@
|
||||
---
|
||||
category: deprecated
|
||||
---
|
||||
## 0.0.10
|
||||
|
||||
### Deprecated APIs
|
||||
|
||||
* The old points-to based modeling has been deprecated. Use the new type-tracking/API-graphs based modeling instead.
|
||||
@@ -1,2 +1,2 @@
|
||||
---
|
||||
lastReleaseVersion: 0.0.9
|
||||
lastReleaseVersion: 0.0.10
|
||||
|
||||
@@ -1,5 +1,5 @@
|
||||
name: codeql/python-all
|
||||
version: 0.0.10-dev
|
||||
version: 0.0.10
|
||||
groups: python
|
||||
dbscheme: semmlecode.python.dbscheme
|
||||
extractor: python
|
||||
|
||||
@@ -1,3 +1,10 @@
|
||||
## 0.0.10
|
||||
|
||||
### New Queries
|
||||
|
||||
* The query "LDAP query built from user-controlled sources" (`py/ldap-injection`) has been promoted from experimental to the main query pack. Its results will now appear by default. This query was originally [submitted as an experimental query by @jorgectf](https://github.com/github/codeql/pull/5443).
|
||||
* The query "Log Injection" (`py/log-injection`) has been promoted from experimental to the main query pack. Its results will now appear when `security-extended` is used. This query was originally [submitted as an experimental query by @haby0](https://github.com/github/codeql/pull/6182).
|
||||
|
||||
## 0.0.9
|
||||
|
||||
### Bug Fixes
|
||||
|
||||
@@ -1,4 +0,0 @@
|
||||
---
|
||||
category: newQuery
|
||||
---
|
||||
* The query "Log Injection" (`py/log-injection`) has been promoted from experimental to the main query pack. Its results will now appear when `security-extended` is used. This query was originally [submitted as an experimental query by @haby0](https://github.com/github/codeql/pull/6182).
|
||||
@@ -1,4 +0,0 @@
|
||||
---
|
||||
category: newQuery
|
||||
---
|
||||
* The query "LDAP query built from user-controlled sources" (`py/ldap-injection`) has been promoted from experimental to the main query pack. Its results will now appear by default. This query was originally [submitted as an experimental query by @jorgectf](https://github.com/github/codeql/pull/5443).
|
||||
6
python/ql/src/change-notes/released/0.0.10.md
Normal file
6
python/ql/src/change-notes/released/0.0.10.md
Normal file
@@ -0,0 +1,6 @@
|
||||
## 0.0.10
|
||||
|
||||
### New Queries
|
||||
|
||||
* The query "LDAP query built from user-controlled sources" (`py/ldap-injection`) has been promoted from experimental to the main query pack. Its results will now appear by default. This query was originally [submitted as an experimental query by @jorgectf](https://github.com/github/codeql/pull/5443).
|
||||
* The query "Log Injection" (`py/log-injection`) has been promoted from experimental to the main query pack. Its results will now appear when `security-extended` is used. This query was originally [submitted as an experimental query by @haby0](https://github.com/github/codeql/pull/6182).
|
||||
@@ -1,2 +1,2 @@
|
||||
---
|
||||
lastReleaseVersion: 0.0.9
|
||||
lastReleaseVersion: 0.0.10
|
||||
|
||||
@@ -1,5 +1,5 @@
|
||||
name: codeql/python-queries
|
||||
version: 0.0.10-dev
|
||||
version: 0.0.10
|
||||
groups:
|
||||
- python
|
||||
- queries
|
||||
|
||||
@@ -1,3 +1,9 @@
|
||||
## 0.0.10
|
||||
|
||||
### Minor Analysis Improvements
|
||||
|
||||
* Added `FileSystemWriteAccess` concept to model data written to the filesystem.
|
||||
|
||||
## 0.0.9
|
||||
|
||||
## 0.0.8
|
||||
|
||||
@@ -1,4 +1,5 @@
|
||||
---
|
||||
category: minorAnalysis
|
||||
---
|
||||
## 0.0.10
|
||||
|
||||
### Minor Analysis Improvements
|
||||
|
||||
* Added `FileSystemWriteAccess` concept to model data written to the filesystem.
|
||||
@@ -1,2 +1,2 @@
|
||||
---
|
||||
lastReleaseVersion: 0.0.9
|
||||
lastReleaseVersion: 0.0.10
|
||||
|
||||
@@ -1,5 +1,5 @@
|
||||
name: codeql/ruby-all
|
||||
version: 0.0.10-dev
|
||||
version: 0.0.10
|
||||
groups: ruby
|
||||
extractor: ruby
|
||||
dbscheme: ruby.dbscheme
|
||||
|
||||
@@ -1,3 +1,9 @@
|
||||
## 0.0.10
|
||||
|
||||
### New Queries
|
||||
|
||||
* Added a new query, `rb/clear-text-logging-sensitive-data`. The query finds cases where sensitive information, such as user credentials, are logged as cleartext.
|
||||
|
||||
## 0.0.9
|
||||
|
||||
## 0.0.8
|
||||
|
||||
@@ -1,4 +1,5 @@
|
||||
---
|
||||
category: newQuery
|
||||
---
|
||||
## 0.0.10
|
||||
|
||||
### New Queries
|
||||
|
||||
* Added a new query, `rb/clear-text-logging-sensitive-data`. The query finds cases where sensitive information, such as user credentials, are logged as cleartext.
|
||||
@@ -1,2 +1,2 @@
|
||||
---
|
||||
lastReleaseVersion: 0.0.9
|
||||
lastReleaseVersion: 0.0.10
|
||||
|
||||
@@ -1,5 +1,5 @@
|
||||
name: codeql/ruby-queries
|
||||
version: 0.0.10-dev
|
||||
version: 0.0.10
|
||||
groups:
|
||||
- ruby
|
||||
- queries
|
||||
|
||||
Reference in New Issue
Block a user