Release preparation for version 2.10.3

This commit is contained in:
github-actions[bot]
2022-08-11 11:12:15 +00:00
parent a5c0fa24d7
commit 57c4f9145b
76 changed files with 175 additions and 93 deletions

View File

@@ -1,3 +1,10 @@
## 0.3.3
### Minor Analysis Improvements
* Improved analysis of the Android class `AsyncTask` so that data can properly flow through its methods according to the life-cycle steps described here: https://developer.android.com/reference/android/os/AsyncTask#the-4-steps.
* Added a data-flow model for the `setProperty` method of `java.util.Properties`. Additional results may be found where relevant data is stored in and then retrieved from a `Properties` instance.
## 0.3.2
### New Features

View File

@@ -1,4 +0,0 @@
---
category: minorAnalysis
---
* Added a data-flow model for the `setProperty` method of `java.util.Properties`. Additional results may be found where relevant data is stored in and then retrieved from a `Properties` instance.

View File

@@ -1,4 +0,0 @@
---
category: minorAnalysis
---
* Improved analysis of the Android class `AsyncTask` so that data can properly flow through its methods according to the life-cycle steps described here: https://developer.android.com/reference/android/os/AsyncTask#the-4-steps.

View File

@@ -0,0 +1,6 @@
## 0.3.3
### Minor Analysis Improvements
* Improved analysis of the Android class `AsyncTask` so that data can properly flow through its methods according to the life-cycle steps described here: https://developer.android.com/reference/android/os/AsyncTask#the-4-steps.
* Added a data-flow model for the `setProperty` method of `java.util.Properties`. Additional results may be found where relevant data is stored in and then retrieved from a `Properties` instance.

View File

@@ -1,2 +1,2 @@
---
lastReleaseVersion: 0.3.2
lastReleaseVersion: 0.3.3

View File

@@ -1,5 +1,5 @@
name: codeql/java-all
version: 0.3.3-dev
version: 0.3.3
groups: java
dbscheme: config/semmlecode.dbscheme
extractor: java

View File

@@ -1,3 +1,17 @@
## 0.3.2
### New Queries
* A new query "Android `WebView` that accepts all certificates" (`java/improper-webview-certificate-validation`) has been added. This query finds implementations of `WebViewClient`s that accept all certificates in the case of an SSL error.
### Major Analysis Improvements
* The query `java/sensitive-log` has been improved to no longer report results that are effectively duplicates due to one source flowing to another source.
### Minor Analysis Improvements
* The query `java/path-injection` now recognises vulnerable APIs defined using the `SinkModelCsv` class with the `create-file` type. Out of the box this includes Apache Commons-IO functions, as well as any user-defined sinks.
## 0.3.1
## 0.3.0

View File

@@ -1,4 +0,0 @@
---
category: newQuery
---
* A new query "Android `WebView` that accepts all certificates" (`java/improper-webview-certificate-validation`) has been added. This query finds implementations of `WebViewClient`s that accept all certificates in the case of an SSL error.

View File

@@ -1,4 +0,0 @@
---
category: minorAnalysis
---
* The query `java/path-injection` now recognises vulnerable APIs defined using the `SinkModelCsv` class with the `create-file` type. Out of the box this includes Apache Commons-IO functions, as well as any user-defined sinks.

View File

@@ -1,4 +0,0 @@
---
category: majorAnalysis
---
* The query `java/sensitive-log` has been improved to no longer report results that are effectively duplicates due to one source flowing to another source.

View File

@@ -0,0 +1,13 @@
## 0.3.2
### New Queries
* A new query "Android `WebView` that accepts all certificates" (`java/improper-webview-certificate-validation`) has been added. This query finds implementations of `WebViewClient`s that accept all certificates in the case of an SSL error.
### Major Analysis Improvements
* The query `java/sensitive-log` has been improved to no longer report results that are effectively duplicates due to one source flowing to another source.
### Minor Analysis Improvements
* The query `java/path-injection` now recognises vulnerable APIs defined using the `SinkModelCsv` class with the `create-file` type. Out of the box this includes Apache Commons-IO functions, as well as any user-defined sinks.

View File

@@ -1,2 +1,2 @@
---
lastReleaseVersion: 0.3.1
lastReleaseVersion: 0.3.2

View File

@@ -1,5 +1,5 @@
name: codeql/java-queries
version: 0.3.2-dev
version: 0.3.2
groups:
- java
- queries