Merge pull request #20346 from github/release-prep/2.23.0

Release preparation for version 2.23.0
This commit is contained in:
Arthur Baars
2025-09-02 13:13:45 +02:00
committed by GitHub
185 changed files with 473 additions and 184 deletions

View File

@@ -1,3 +1,7 @@
## 0.4.16
No user-facing changes.
## 0.4.15
No user-facing changes.

View File

@@ -0,0 +1,3 @@
## 0.4.16
No user-facing changes.

View File

@@ -1,2 +1,2 @@
---
lastReleaseVersion: 0.4.15
lastReleaseVersion: 0.4.16

View File

@@ -1,5 +1,5 @@
name: codeql/actions-all
version: 0.4.16-dev
version: 0.4.16
library: true
warnOnImplicitThis: true
dependencies:

View File

@@ -1,3 +1,7 @@
## 0.6.8
No user-facing changes.
## 0.6.7
No user-facing changes.

View File

@@ -0,0 +1,3 @@
## 0.6.8
No user-facing changes.

View File

@@ -1,2 +1,2 @@
---
lastReleaseVersion: 0.6.7
lastReleaseVersion: 0.6.8

View File

@@ -1,5 +1,5 @@
name: codeql/actions-queries
version: 0.6.8-dev
version: 0.6.8
library: false
warnOnImplicitThis: true
groups: [actions, queries]

View File

@@ -1,3 +1,14 @@
## 5.5.0
### New Features
* Added a new class `PchFile` representing precompiled header (PCH) files used during project compilation.
### Minor Analysis Improvements
* Added flow summaries for the `Microsoft::WRL::ComPtr` member functions.
* The new dataflow/taint-tracking library (`semmle.code.cpp.dataflow.new.DataFlow` and `semmle.code.cpp.dataflow.new.TaintTracking`) now resolves virtual function calls more precisely. This results in fewer false positives when running dataflow/taint-tracking queries on C++ projects.
## 5.4.1
### Minor Analysis Improvements

View File

@@ -1,4 +0,0 @@
---
category: minorAnalysis
---
* The new dataflow/taint-tracking library (`semmle.code.cpp.dataflow.new.DataFlow` and `semmle.code.cpp.dataflow.new.TaintTracking`) now resolves virtual function calls more precisely. This results in fewer false positives when running dataflow/taint-tracking queries on C++ projects.

View File

@@ -1,5 +0,0 @@
---
category: feature
---
* Added a new class `PchFile` representing precompiled header (PCH) files used during project compilation.

View File

@@ -1,4 +0,0 @@
---
category: minorAnalysis
---
* Added flow summaries for the `Microsoft::WRL::ComPtr` member functions.

View File

@@ -0,0 +1,10 @@
## 5.5.0
### New Features
* Added a new class `PchFile` representing precompiled header (PCH) files used during project compilation.
### Minor Analysis Improvements
* Added flow summaries for the `Microsoft::WRL::ComPtr` member functions.
* The new dataflow/taint-tracking library (`semmle.code.cpp.dataflow.new.DataFlow` and `semmle.code.cpp.dataflow.new.TaintTracking`) now resolves virtual function calls more precisely. This results in fewer false positives when running dataflow/taint-tracking queries on C++ projects.

View File

@@ -1,2 +1,2 @@
---
lastReleaseVersion: 5.4.1
lastReleaseVersion: 5.5.0

View File

@@ -1,5 +1,5 @@
name: codeql/cpp-all
version: 5.4.2-dev
version: 5.5.0
groups: cpp
dbscheme: semmlecode.cpp.dbscheme
extractor: cpp

View File

@@ -1,3 +1,9 @@
## 1.4.7
### Bug Fixes
* Fixed an inconsistency across languages where most have a `Customizations.qll` file for adding customizations, but not all did.
## 1.4.6
### Minor Analysis Improvements

View File

@@ -1,4 +0,0 @@
---
category: fix
---
* Fixed an inconsistency across languages where most have a `Customizations.qll` file for adding customizations, but not all did.

View File

@@ -1,4 +1,5 @@
---
category: fix
---
* Fixed an inconsistency across languages where most have a `Customizations.qll` file for adding customizations, but not all did.
## 1.4.7
### Bug Fixes
* Fixed an inconsistency across languages where most have a `Customizations.qll` file for adding customizations, but not all did.

View File

@@ -1,2 +1,2 @@
---
lastReleaseVersion: 1.4.6
lastReleaseVersion: 1.4.7

View File

@@ -1,5 +1,5 @@
name: codeql/cpp-queries
version: 1.4.7-dev
version: 1.4.7
groups:
- cpp
- queries

View File

@@ -1,3 +1,7 @@
## 1.7.47
No user-facing changes.
## 1.7.46
No user-facing changes.

View File

@@ -0,0 +1,3 @@
## 1.7.47
No user-facing changes.

View File

@@ -1,2 +1,2 @@
---
lastReleaseVersion: 1.7.46
lastReleaseVersion: 1.7.47

View File

@@ -1,5 +1,5 @@
name: codeql/csharp-solorigate-all
version: 1.7.47-dev
version: 1.7.47
groups:
- csharp
- solorigate

View File

@@ -1,3 +1,7 @@
## 1.7.47
No user-facing changes.
## 1.7.46
No user-facing changes.

View File

@@ -0,0 +1,3 @@
## 1.7.47
No user-facing changes.

View File

@@ -1,2 +1,2 @@
---
lastReleaseVersion: 1.7.46
lastReleaseVersion: 1.7.47

View File

@@ -1,5 +1,5 @@
name: codeql/csharp-solorigate-queries
version: 1.7.47-dev
version: 1.7.47
groups:
- csharp
- solorigate

View File

@@ -1,3 +1,12 @@
## 5.2.3
### Minor Analysis Improvements
* A bug has been fixed in the data flow analysis, which means that flow through calls using the `base` qualifier may now be tracked more accurately.
* Added summary models for `System.Xml.XmlReader`, `System.Xml.XmlTextReader` and `System.Xml.XmlDictionaryReader`.
* Models-as-data summaries for byte and char arrays and pointers now treat the entire collection as tainted, reflecting their common use as string alternatives.
* The default taint tracking configuration now allows implicit reads from collections at sinks and in additional flow steps. This increases flow coverage for many taint tracking queries and helps reduce false negatives.
## 5.2.2
No user-facing changes.

View File

@@ -1,4 +0,0 @@
---
category: minorAnalysis
---
* Models-as-data summaries for byte and char arrays and pointers now treat the entire collection as tainted, reflecting their common use as string alternatives.

View File

@@ -1,4 +0,0 @@
---
category: minorAnalysis
---
* The default taint tracking configuration now allows implicit reads from collections at sinks and in additional flow steps. This increases flow coverage for many taint tracking queries and helps reduce false negatives.

View File

@@ -1,4 +0,0 @@
---
category: minorAnalysis
---
* Added summary models for `System.Xml.XmlReader`, `System.Xml.XmlTextReader` and `System.Xml.XmlDictionaryReader`.

View File

@@ -1,4 +0,0 @@
---
category: minorAnalysis
---
* A bug has been fixed in the data flow analysis, which means that flow through calls using the `base` qualifier may now be tracked more accurately.

View File

@@ -0,0 +1,8 @@
## 5.2.3
### Minor Analysis Improvements
* A bug has been fixed in the data flow analysis, which means that flow through calls using the `base` qualifier may now be tracked more accurately.
* Added summary models for `System.Xml.XmlReader`, `System.Xml.XmlTextReader` and `System.Xml.XmlDictionaryReader`.
* Models-as-data summaries for byte and char arrays and pointers now treat the entire collection as tainted, reflecting their common use as string alternatives.
* The default taint tracking configuration now allows implicit reads from collections at sinks and in additional flow steps. This increases flow coverage for many taint tracking queries and helps reduce false negatives.

View File

@@ -1,2 +1,2 @@
---
lastReleaseVersion: 5.2.2
lastReleaseVersion: 5.2.3

View File

@@ -1,5 +1,5 @@
name: codeql/csharp-all
version: 5.2.3-dev
version: 5.2.3
groups: csharp
dbscheme: semmlecode.csharp.dbscheme
extractor: csharp

View File

@@ -1,3 +1,7 @@
## 1.3.4
No user-facing changes.
## 1.3.3
No user-facing changes.

View File

@@ -0,0 +1,3 @@
## 1.3.4
No user-facing changes.

View File

@@ -1,2 +1,2 @@
---
lastReleaseVersion: 1.3.3
lastReleaseVersion: 1.3.4

View File

@@ -1,5 +1,5 @@
name: codeql/csharp-queries
version: 1.3.4-dev
version: 1.3.4
groups:
- csharp
- queries

View File

@@ -1,3 +1,7 @@
## 1.0.30
No user-facing changes.
## 1.0.29
No user-facing changes.

View File

@@ -0,0 +1,3 @@
## 1.0.30
No user-facing changes.

View File

@@ -1,2 +1,2 @@
---
lastReleaseVersion: 1.0.29
lastReleaseVersion: 1.0.30

View File

@@ -1,5 +1,5 @@
name: codeql-go-consistency-queries
version: 1.0.30-dev
version: 1.0.30
groups:
- go
- queries

View File

@@ -1,3 +1,7 @@
## 4.3.3
No user-facing changes.
## 4.3.2
No user-facing changes.

View File

@@ -0,0 +1,3 @@
## 4.3.3
No user-facing changes.

View File

@@ -1,2 +1,2 @@
---
lastReleaseVersion: 4.3.2
lastReleaseVersion: 4.3.3

View File

@@ -1,5 +1,5 @@
name: codeql/go-all
version: 4.3.3-dev
version: 4.3.3
groups: go
dbscheme: go.dbscheme
extractor: go

View File

@@ -1,3 +1,7 @@
## 1.4.4
No user-facing changes.
## 1.4.3
No user-facing changes.

View File

@@ -0,0 +1,3 @@
## 1.4.4
No user-facing changes.

View File

@@ -1,2 +1,2 @@
---
lastReleaseVersion: 1.4.3
lastReleaseVersion: 1.4.4

View File

@@ -1,5 +1,5 @@
name: codeql/go-queries
version: 1.4.4-dev
version: 1.4.4
groups:
- go
- queries

View File

@@ -1,3 +1,7 @@
## 7.6.1
No user-facing changes.
## 7.6.0
### Major Analysis Improvements

View File

@@ -0,0 +1,3 @@
## 7.6.1
No user-facing changes.

View File

@@ -1,2 +1,2 @@
---
lastReleaseVersion: 7.6.0
lastReleaseVersion: 7.6.1

View File

@@ -1,5 +1,5 @@
name: codeql/java-all
version: 7.6.1-dev
version: 7.6.1
groups: java
dbscheme: config/semmlecode.dbscheme
extractor: java

View File

@@ -1,3 +1,19 @@
## 1.7.0
### New Queries
* The query `java/insecure-spring-actuator-config` has been promoted from experimental to the main query pack as `java/spring-boot-exposed-actuators-config`. Its results will now appear by default. This query detects exposure of Spring Boot actuators through configuration files. It was originally submitted as an experimental query [by @luchua-bc](https://github.com/github/codeql/pull/5384).
### Query Metadata Changes
* The tag `maintainability` has been removed from `java/run-finalizers-on-exit` and the tags `quality`, `correctness`, and `performance` have been added.
* The tag `maintainability` has been removed from `java/garbage-collection` and the tags `quality` and `correctness` have been added.
### Minor Analysis Improvements
* Fixed a bug that was causing false negatives in rare cases in the query `java/dereferenced-value-may-be-null`.
* Removed the `java/empty-statement` query that was subsumed by the `java/empty-block` query.
## 1.6.3
No user-facing changes.

View File

@@ -1,4 +0,0 @@
---
category: minorAnalysis
---
* Removed the `java/empty-statement` query that was subsumed by the `java/empty-block` query.

View File

@@ -1,4 +0,0 @@
---
category: newQuery
---
* The query `java/insecure-spring-actuator-config` has been promoted from experimental to the main query pack as `java/spring-boot-exposed-actuators-config`. Its results will now appear by default. This query detects exposure of Spring Boot actuators through configuration files. It was originally submitted as an experimental query [by @luchua-bc](https://github.com/github/codeql/pull/5384).

View File

@@ -1,5 +0,0 @@
---
category: queryMetadata
---
* The tag `maintainability` has been removed from `java/run-finalizers-on-exit` and the tags `quality`, `correctness`, and `performance` have been added.
* The tag `maintainability` has been removed from `java/garbage-collection` and the tags `quality` and `correctness` have been added.

View File

@@ -1,4 +0,0 @@
---
category: minorAnalysis
---
* Fixed a bug that was causing false negatives in rare cases in the query `java/dereferenced-value-may-be-null`.

View File

@@ -0,0 +1,15 @@
## 1.7.0
### New Queries
* The query `java/insecure-spring-actuator-config` has been promoted from experimental to the main query pack as `java/spring-boot-exposed-actuators-config`. Its results will now appear by default. This query detects exposure of Spring Boot actuators through configuration files. It was originally submitted as an experimental query [by @luchua-bc](https://github.com/github/codeql/pull/5384).
### Query Metadata Changes
* The tag `maintainability` has been removed from `java/run-finalizers-on-exit` and the tags `quality`, `correctness`, and `performance` have been added.
* The tag `maintainability` has been removed from `java/garbage-collection` and the tags `quality` and `correctness` have been added.
### Minor Analysis Improvements
* Fixed a bug that was causing false negatives in rare cases in the query `java/dereferenced-value-may-be-null`.
* Removed the `java/empty-statement` query that was subsumed by the `java/empty-block` query.

View File

@@ -1,2 +1,2 @@
---
lastReleaseVersion: 1.6.3
lastReleaseVersion: 1.7.0

View File

@@ -1,5 +1,5 @@
name: codeql/java-queries
version: 1.6.4-dev
version: 1.7.0
groups:
- java
- queries

View File

@@ -1,3 +1,9 @@
## 2.6.10
### Minor Analysis Improvements
* Removed `libxmljs` as an XML bomb sink. The underlying libxml2 library now includes [entity reference loop detection](https://github.com/GNOME/libxml2/blob/0c948334a8f5c66d50e9f8992e62998017dc4fc6/NEWS#L905-L908) that prevents XML bomb attacks.
## 2.6.9
### Minor Analysis Improvements

View File

@@ -1,4 +1,5 @@
---
category: minorAnalysis
---
## 2.6.10
### Minor Analysis Improvements
* Removed `libxmljs` as an XML bomb sink. The underlying libxml2 library now includes [entity reference loop detection](https://github.com/GNOME/libxml2/blob/0c948334a8f5c66d50e9f8992e62998017dc4fc6/NEWS#L905-L908) that prevents XML bomb attacks.

View File

@@ -1,2 +1,2 @@
---
lastReleaseVersion: 2.6.9
lastReleaseVersion: 2.6.10

View File

@@ -1,5 +1,5 @@
name: codeql/javascript-all
version: 2.6.10-dev
version: 2.6.10
groups: javascript
dbscheme: semmlecode.javascript.dbscheme
extractor: javascript

View File

@@ -1,3 +1,7 @@
## 2.0.3
No user-facing changes.
## 2.0.2
### Minor Analysis Improvements

View File

@@ -0,0 +1,3 @@
## 2.0.3
No user-facing changes.

View File

@@ -1,2 +1,2 @@
---
lastReleaseVersion: 2.0.2
lastReleaseVersion: 2.0.3

View File

@@ -1,5 +1,5 @@
name: codeql/javascript-queries
version: 2.0.3-dev
version: 2.0.3
groups:
- javascript
- queries

View File

@@ -1,3 +1,7 @@
## 1.0.30
No user-facing changes.
## 1.0.29
No user-facing changes.

View File

@@ -0,0 +1,3 @@
## 1.0.30
No user-facing changes.

View File

@@ -1,2 +1,2 @@
---
lastReleaseVersion: 1.0.29
lastReleaseVersion: 1.0.30

View File

@@ -1,4 +1,4 @@
name: codeql/suite-helpers
version: 1.0.30-dev
version: 1.0.30
groups: shared
warnOnImplicitThis: true

View File

@@ -1,3 +1,10 @@
## 4.0.14
### Minor Analysis Improvements
- The modelling of Psycopg2 now supports the use of `psycopg2.pool` connection pools for handling database connections.
* Removed `lxml` as an XML bomb sink. The underlying libxml2 library now includes [entity reference loop detection](https://github.com/lxml/lxml/blob/f33ac2c2f5f9c4c4c1fc47f363be96db308f2fa6/doc/FAQ.txt#L1077) that prevents XML bomb attacks.
## 4.0.13
No user-facing changes.

View File

@@ -1,5 +0,0 @@
---
category: minorAnalysis
---
- The modelling of Psycopg2 now supports the use of `psycopg2.pool` connection pools for handling database connections.

View File

@@ -1,4 +1,6 @@
---
category: minorAnalysis
---
## 4.0.14
### Minor Analysis Improvements
- The modelling of Psycopg2 now supports the use of `psycopg2.pool` connection pools for handling database connections.
* Removed `lxml` as an XML bomb sink. The underlying libxml2 library now includes [entity reference loop detection](https://github.com/lxml/lxml/blob/f33ac2c2f5f9c4c4c1fc47f363be96db308f2fa6/doc/FAQ.txt#L1077) that prevents XML bomb attacks.

View File

@@ -1,2 +1,2 @@
---
lastReleaseVersion: 4.0.13
lastReleaseVersion: 4.0.14

View File

@@ -1,5 +1,5 @@
name: codeql/python-all
version: 4.0.14-dev
version: 4.0.14
groups: python
dbscheme: semmlecode.python.dbscheme
extractor: python

View File

@@ -1,3 +1,11 @@
## 1.6.4
### Minor Analysis Improvements
* The `py/unexpected-raise-in-special-method` query has been modernized. It produces additional results in cases where the exception is
only raised conditionally. Its precision has been changed from `very-high` to `high`.
* The queries `py/incomplete-ordering`, `py/inconsistent-equality`, and `py/equals-hash-mismatch` have been modernized; no longer relying on outdated libraries, improved documentation, and no longer producing alerts for problems specific to Python 2.
## 1.6.3
No user-facing changes.

View File

@@ -1,4 +0,0 @@
---
category: minorAnalysis
---
* The queries `py/incomplete-ordering`, `py/inconsistent-equality`, and `py/equals-hash-mismatch` have been modernized; no longer relying on outdated libraries, improved documentation, and no longer producing alerts for problems specific to Python 2.

View File

@@ -1,5 +0,0 @@
---
category: minorAnalysis
---
* The `py/unexpected-raise-in-special-method` query has been modernized. It produces additional results in cases where the exception is
only raised conditionally. Its precision has been changed from `very-high` to `high`.

View File

@@ -0,0 +1,7 @@
## 1.6.4
### Minor Analysis Improvements
* The `py/unexpected-raise-in-special-method` query has been modernized. It produces additional results in cases where the exception is
only raised conditionally. Its precision has been changed from `very-high` to `high`.
* The queries `py/incomplete-ordering`, `py/inconsistent-equality`, and `py/equals-hash-mismatch` have been modernized; no longer relying on outdated libraries, improved documentation, and no longer producing alerts for problems specific to Python 2.

View File

@@ -1,2 +1,2 @@
---
lastReleaseVersion: 1.6.3
lastReleaseVersion: 1.6.4

View File

@@ -1,5 +1,5 @@
name: codeql/python-queries
version: 1.6.4-dev
version: 1.6.4
groups:
- python
- queries

View File

@@ -1,3 +1,7 @@
## 5.0.3
No user-facing changes.
## 5.0.2
### Bug Fixes

View File

@@ -0,0 +1,3 @@
## 5.0.3
No user-facing changes.

View File

@@ -1,2 +1,2 @@
---
lastReleaseVersion: 5.0.2
lastReleaseVersion: 5.0.3

View File

@@ -1,5 +1,5 @@
name: codeql/ruby-all
version: 5.0.3-dev
version: 5.0.3
groups: ruby
extractor: ruby
dbscheme: ruby.dbscheme

View File

@@ -1,3 +1,7 @@
## 1.4.4
No user-facing changes.
## 1.4.3
No user-facing changes.

View File

@@ -0,0 +1,3 @@
## 1.4.4
No user-facing changes.

View File

@@ -1,2 +1,2 @@
---
lastReleaseVersion: 1.4.3
lastReleaseVersion: 1.4.4

View File

@@ -1,5 +1,5 @@
name: codeql/ruby-queries
version: 1.4.4-dev
version: 1.4.4
groups:
- ruby
- queries

View File

@@ -1,3 +1,14 @@
## 0.1.15
### Major Analysis Improvements
* Path resolution has been removed from the Rust extractor. For the majority of purposes CodeQL computed paths have been in use for several previous releases, this completes the transition. Extraction is now faster and more reliable.
### Minor Analysis Improvements
* Attribute macros are now taken into account when identifying macro-expanded code. This affects the queries `rust/unused-variable` and `rust/unused-value`, which exclude results in macro-expanded code.
* Improved modelling of the `std::fs`, `async_std::fs` and `tokio::fs` libraries. This may cause more alerts to be found by Rust injection queries, particularly `rust/path-injection`.
## 0.1.14
### Minor Analysis Improvements

View File

@@ -1,4 +0,0 @@
---
category: minorAnalysis
---
* Improved modelling of the `std::fs`, `async_std::fs` and `tokio::fs` libraries. This may cause more alerts to be found by Rust injection queries, particularly `rust/path-injection`.

View File

@@ -1,4 +0,0 @@
---
category: minorAnalysis
---
* Attribute macros are now taken into account when identifying macro-expanded code. This affects the queries `rust/unused-variable` and `rust/unused-value`, which exclude results in macro-expanded code.

View File

@@ -1,4 +0,0 @@
---
category: majorAnalysis
---
* Path resolution has been removed from the Rust extractor. For the majority of purposes CodeQL computed paths have been in use for several previous releases, this completes the transition. Extraction is now faster and more reliable.

View File

@@ -0,0 +1,10 @@
## 0.1.15
### Major Analysis Improvements
* Path resolution has been removed from the Rust extractor. For the majority of purposes CodeQL computed paths have been in use for several previous releases, this completes the transition. Extraction is now faster and more reliable.
### Minor Analysis Improvements
* Attribute macros are now taken into account when identifying macro-expanded code. This affects the queries `rust/unused-variable` and `rust/unused-value`, which exclude results in macro-expanded code.
* Improved modelling of the `std::fs`, `async_std::fs` and `tokio::fs` libraries. This may cause more alerts to be found by Rust injection queries, particularly `rust/path-injection`.

Some files were not shown because too many files have changed in this diff Show More