Merge pull request #20944 from github/release-prep/2.23.7

Release preparation for version 2.23.7
This commit is contained in:
Óscar San José
2025-12-01 19:34:17 +01:00
committed by GitHub
174 changed files with 432 additions and 147 deletions

View File

@@ -1,3 +1,7 @@
## 0.4.22
No user-facing changes.
## 0.4.21 ## 0.4.21
No user-facing changes. No user-facing changes.

View File

@@ -0,0 +1,3 @@
## 0.4.22
No user-facing changes.

View File

@@ -1,2 +1,2 @@
--- ---
lastReleaseVersion: 0.4.21 lastReleaseVersion: 0.4.22

View File

@@ -1,5 +1,5 @@
name: codeql/actions-all name: codeql/actions-all
version: 0.4.22-dev version: 0.4.22
library: true library: true
warnOnImplicitThis: true warnOnImplicitThis: true
dependencies: dependencies:

View File

@@ -1,3 +1,7 @@
## 0.6.14
No user-facing changes.
## 0.6.13 ## 0.6.13
No user-facing changes. No user-facing changes.

View File

@@ -0,0 +1,3 @@
## 0.6.14
No user-facing changes.

View File

@@ -1,2 +1,2 @@
--- ---
lastReleaseVersion: 0.6.13 lastReleaseVersion: 0.6.14

View File

@@ -1,5 +1,5 @@
name: codeql/actions-queries name: codeql/actions-queries
version: 0.6.14-dev version: 0.6.14
library: false library: false
warnOnImplicitThis: true warnOnImplicitThis: true
groups: [actions, queries] groups: [actions, queries]

View File

@@ -1,3 +1,9 @@
## 6.1.1
### Minor Analysis Improvements
* The class `DataFlow::FieldContent` now covers both `union` and `struct`/`class` types. A new predicate `FieldContent.getAField` has been added to access the union members associated with the `FieldContent`. The old `FieldContent` has been renamed to `NonUnionFieldContent`.
## 6.1.0 ## 6.1.0
### New Features ### New Features

View File

@@ -1,4 +1,5 @@
--- ## 6.1.1
category: minorAnalysis
--- ### Minor Analysis Improvements
* The class `DataFlow::FieldContent` now covers both `union` and `struct`/`class` types. A new predicate `FieldContent.getAField` has been added to access the union members associated with the `FieldContent`. The old `FieldContent` has been renamed to `NonUnionFieldContent`.
* The class `DataFlow::FieldContent` now covers both `union` and `struct`/`class` types. A new predicate `FieldContent.getAField` has been added to access the union members associated with the `FieldContent`. The old `FieldContent` has been renamed to `NonUnionFieldContent`.

View File

@@ -1,2 +1,2 @@
--- ---
lastReleaseVersion: 6.1.0 lastReleaseVersion: 6.1.1

View File

@@ -1,5 +1,5 @@
name: codeql/cpp-all name: codeql/cpp-all
version: 6.1.1-dev version: 6.1.1
groups: cpp groups: cpp
dbscheme: semmlecode.cpp.dbscheme dbscheme: semmlecode.cpp.dbscheme
extractor: cpp extractor: cpp

View File

@@ -1,3 +1,7 @@
## 1.5.5
No user-facing changes.
## 1.5.4 ## 1.5.4
No user-facing changes. No user-facing changes.

View File

@@ -0,0 +1,3 @@
## 1.5.5
No user-facing changes.

View File

@@ -1,2 +1,2 @@
--- ---
lastReleaseVersion: 1.5.4 lastReleaseVersion: 1.5.5

View File

@@ -1,5 +1,5 @@
name: codeql/cpp-queries name: codeql/cpp-queries
version: 1.5.5-dev version: 1.5.5
groups: groups:
- cpp - cpp
- queries - queries

View File

@@ -1,3 +1,7 @@
## 1.7.53
No user-facing changes.
## 1.7.52 ## 1.7.52
No user-facing changes. No user-facing changes.

View File

@@ -0,0 +1,3 @@
## 1.7.53
No user-facing changes.

View File

@@ -1,2 +1,2 @@
--- ---
lastReleaseVersion: 1.7.52 lastReleaseVersion: 1.7.53

View File

@@ -1,5 +1,5 @@
name: codeql/csharp-solorigate-all name: codeql/csharp-solorigate-all
version: 1.7.53-dev version: 1.7.53
groups: groups:
- csharp - csharp
- solorigate - solorigate

View File

@@ -1,3 +1,7 @@
## 1.7.53
No user-facing changes.
## 1.7.52 ## 1.7.52
No user-facing changes. No user-facing changes.

View File

@@ -0,0 +1,3 @@
## 1.7.53
No user-facing changes.

View File

@@ -1,2 +1,2 @@
--- ---
lastReleaseVersion: 1.7.52 lastReleaseVersion: 1.7.53

View File

@@ -1,5 +1,5 @@
name: codeql/csharp-solorigate-queries name: codeql/csharp-solorigate-queries
version: 1.7.53-dev version: 1.7.53
groups: groups:
- csharp - csharp
- solorigate - solorigate

View File

@@ -1,3 +1,11 @@
## 5.4.1
### Minor Analysis Improvements
* Improved stability when downloading .NET versions by setting appropriate environment variables for `dotnet` commands. The correct architecture-specific version of .NET is now downloaded on ARM runners.
* Compilation errors are now included in the debug log when using build-mode none.
* Added a new extractor option to specify a custom directory for dependency downloads in buildless mode. Use `-O buildless_dependency_dir=<path>` to configure the target directory.
## 5.4.0 ## 5.4.0
### Deprecated APIs ### Deprecated APIs

View File

@@ -1,4 +0,0 @@
---
category: minorAnalysis
---
* Compilation errors are now included in the debug log when using build-mode none.

View File

@@ -1,4 +0,0 @@
---
category: minorAnalysis
---
* Added a new extractor option to specify a custom directory for dependency downloads in buildless mode. Use `-O buildless_dependency_dir=<path>` to configure the target directory.

View File

@@ -1,4 +0,0 @@
---
category: minorAnalysis
---
* Improved stability when downloading .NET versions by setting appropriate environment variables for `dotnet` commands. The correct architecture-specific version of .NET is now downloaded on ARM runners.

View File

@@ -0,0 +1,7 @@
## 5.4.1
### Minor Analysis Improvements
* Improved stability when downloading .NET versions by setting appropriate environment variables for `dotnet` commands. The correct architecture-specific version of .NET is now downloaded on ARM runners.
* Compilation errors are now included in the debug log when using build-mode none.
* Added a new extractor option to specify a custom directory for dependency downloads in buildless mode. Use `-O buildless_dependency_dir=<path>` to configure the target directory.

View File

@@ -1,2 +1,2 @@
--- ---
lastReleaseVersion: 5.4.0 lastReleaseVersion: 5.4.1

View File

@@ -1,5 +1,5 @@
name: codeql/csharp-all name: codeql/csharp-all
version: 5.4.1-dev version: 5.4.1
groups: csharp groups: csharp
dbscheme: semmlecode.csharp.dbscheme dbscheme: semmlecode.csharp.dbscheme
extractor: csharp extractor: csharp

View File

@@ -1,3 +1,7 @@
## 1.5.1
No user-facing changes.
## 1.5.0 ## 1.5.0
### New Queries ### New Queries
@@ -180,7 +184,7 @@ No user-facing changes.
### Minor Analysis Improvements ### Minor Analysis Improvements
* C#: The method `string.ReplaceLineEndings(string)` is now considered a sanitizer for the `cs/log-forging` query. * C#: The method `string.ReplaceLineEndings(string)` is now considered a sanitizer for the `cs/log-forging` query.
## 1.0.10 ## 1.0.10

View File

@@ -0,0 +1,3 @@
## 1.5.1
No user-facing changes.

View File

@@ -1,2 +1,2 @@
--- ---
lastReleaseVersion: 1.5.0 lastReleaseVersion: 1.5.1

View File

@@ -1,5 +1,5 @@
name: codeql/csharp-queries name: codeql/csharp-queries
version: 1.5.1-dev version: 1.5.1
groups: groups:
- csharp - csharp
- queries - queries

View File

@@ -1,3 +1,7 @@
## 1.0.36
No user-facing changes.
## 1.0.35 ## 1.0.35
No user-facing changes. No user-facing changes.

View File

@@ -0,0 +1,3 @@
## 1.0.36
No user-facing changes.

View File

@@ -1,2 +1,2 @@
--- ---
lastReleaseVersion: 1.0.35 lastReleaseVersion: 1.0.36

View File

@@ -1,5 +1,5 @@
name: codeql-go-consistency-queries name: codeql-go-consistency-queries
version: 1.0.36-dev version: 1.0.36
groups: groups:
- go - go
- queries - queries

View File

@@ -1,3 +1,7 @@
## 5.0.3
No user-facing changes.
## 5.0.2 ## 5.0.2
### Bug Fixes ### Bug Fixes

View File

@@ -0,0 +1,3 @@
## 5.0.3
No user-facing changes.

View File

@@ -1,2 +1,2 @@
--- ---
lastReleaseVersion: 5.0.2 lastReleaseVersion: 5.0.3

View File

@@ -1,5 +1,5 @@
name: codeql/go-all name: codeql/go-all
version: 5.0.3-dev version: 5.0.3
groups: go groups: go
dbscheme: go.dbscheme dbscheme: go.dbscheme
extractor: go extractor: go

View File

@@ -1,3 +1,12 @@
## 1.5.0
### New Queries
* The `go/cookie-http-only-not-set` query has been promoted from the experimental query pack. This query was originally contributed to the experimental query pack by @edvraa.
* A new query `go/cookie-secure-not-set` has been added to detect cookies without the `Secure` flag set.
* Added a new query, `go/weak-crypto-algorithm`, to detect the use of a broken or weak cryptographic algorithm. A very simple version of this query was originally contributed as an [experimental query by @dilanbhalla](https://github.com/github/codeql-go/pull/284).
* Added a new query, `go/weak-sensitive-data-hashing`, to detect the use of a broken or weak cryptographic hash algorithm on sensitive data.
## 1.4.9 ## 1.4.9
No user-facing changes. No user-facing changes.

View File

@@ -1,5 +0,0 @@
---
category: newQuery
---
* The `go/cookie-http-only-not-set` query has been promoted from the experimental query pack. This query was originally contributed to the experimental query pack by @edvraa.
* A new query `go/cookie-secure-not-set` has been added to detect cookies without the `Secure` flag set.

View File

@@ -1,5 +1,8 @@
--- ## 1.5.0
category: newQuery
--- ### New Queries
* The `go/cookie-http-only-not-set` query has been promoted from the experimental query pack. This query was originally contributed to the experimental query pack by @edvraa.
* A new query `go/cookie-secure-not-set` has been added to detect cookies without the `Secure` flag set.
* Added a new query, `go/weak-crypto-algorithm`, to detect the use of a broken or weak cryptographic algorithm. A very simple version of this query was originally contributed as an [experimental query by @dilanbhalla](https://github.com/github/codeql-go/pull/284). * Added a new query, `go/weak-crypto-algorithm`, to detect the use of a broken or weak cryptographic algorithm. A very simple version of this query was originally contributed as an [experimental query by @dilanbhalla](https://github.com/github/codeql-go/pull/284).
* Added a new query, `go/weak-sensitive-data-hashing`, to detect the use of a broken or weak cryptographic hash algorithm on sensitive data. * Added a new query, `go/weak-sensitive-data-hashing`, to detect the use of a broken or weak cryptographic hash algorithm on sensitive data.

View File

@@ -1,2 +1,2 @@
--- ---
lastReleaseVersion: 1.4.9 lastReleaseVersion: 1.5.0

View File

@@ -1,5 +1,5 @@
name: codeql/go-queries name: codeql/go-queries
version: 1.4.10-dev version: 1.5.0
groups: groups:
- go - go
- queries - queries

View File

@@ -1,3 +1,9 @@
## 7.8.0
### Deprecated APIs
* The SSA interface has been updated and all classes and several predicates have been renamed. See the qldoc for more specific migration information.
## 7.7.4 ## 7.7.4
No user-facing changes. No user-facing changes.

View File

@@ -1,4 +1,5 @@
--- ## 7.8.0
category: deprecated
--- ### Deprecated APIs
* The SSA interface has been updated and all classes and several predicates have been renamed. See the qldoc for more specific migration information. * The SSA interface has been updated and all classes and several predicates have been renamed. See the qldoc for more specific migration information.

View File

@@ -1,2 +1,2 @@
--- ---
lastReleaseVersion: 7.7.4 lastReleaseVersion: 7.8.0

View File

@@ -1,5 +1,5 @@
name: codeql/java-all name: codeql/java-all
version: 7.7.5-dev version: 7.8.0
groups: java groups: java
dbscheme: config/semmlecode.dbscheme dbscheme: config/semmlecode.dbscheme
extractor: java extractor: java

View File

@@ -1,3 +1,9 @@
## 1.10.1
### Minor Analysis Improvements
* Operations that extract only a fixed-length prefix or suffix of a string (for example, `substring` in Java or `take` in Kotlin), when limited to a length of at most 7 characters, are now treated as sanitizers for the `java/sensitive-log` query.
## 1.10.0 ## 1.10.0
### Query Metadata Changes ### Query Metadata Changes

View File

@@ -1,4 +1,5 @@
--- ## 1.10.1
category: minorAnalysis
--- ### Minor Analysis Improvements
* Operations that extract only a fixed-length prefix or suffix of a string (for example, `substring` in Java or `take` in Kotlin), when limited to a length of at most 7 characters, are now treated as sanitizers for the `java/sensitive-log` query.
* Operations that extract only a fixed-length prefix or suffix of a string (for example, `substring` in Java or `take` in Kotlin), when limited to a length of at most 7 characters, are now treated as sanitizers for the `java/sensitive-log` query.

View File

@@ -1,2 +1,2 @@
--- ---
lastReleaseVersion: 1.10.0 lastReleaseVersion: 1.10.1

View File

@@ -1,5 +1,5 @@
name: codeql/java-queries name: codeql/java-queries
version: 1.10.1-dev version: 1.10.1
groups: groups:
- java - java
- queries - queries

View File

@@ -1,3 +1,9 @@
## 2.6.16
### Minor Analysis Improvements
- JavaScript `DataFlow::globalVarRef` now recognizes `document.defaultView` as an alias of `window`, allowing flows such as `document.defaultView.history.pushState(...)` to be modeled and found by queries relying on `globalVarRef("history")`.
## 2.6.15 ## 2.6.15
No user-facing changes. No user-facing changes.

View File

@@ -1,5 +1,5 @@
--- ## 2.6.16
category: minorAnalysis
--- ### Minor Analysis Improvements
- JavaScript `DataFlow::globalVarRef` now recognizes `document.defaultView` as an alias of `window`, allowing flows such as `document.defaultView.history.pushState(...)` to be modeled and found by queries relying on `globalVarRef("history")`. - JavaScript `DataFlow::globalVarRef` now recognizes `document.defaultView` as an alias of `window`, allowing flows such as `document.defaultView.history.pushState(...)` to be modeled and found by queries relying on `globalVarRef("history")`.

View File

@@ -1,2 +1,2 @@
--- ---
lastReleaseVersion: 2.6.15 lastReleaseVersion: 2.6.16

View File

@@ -1,5 +1,5 @@
name: codeql/javascript-all name: codeql/javascript-all
version: 2.6.16-dev version: 2.6.16
groups: javascript groups: javascript
dbscheme: semmlecode.javascript.dbscheme dbscheme: semmlecode.javascript.dbscheme
extractor: javascript extractor: javascript

View File

@@ -1,3 +1,9 @@
## 2.2.1
### Minor Analysis Improvements
* Fixed a bug in the Next.js model that would cause the analysis to miss server-side taint sources in the `app/pages` folder.
## 2.2.0 ## 2.2.0
### Query Metadata Changes ### Query Metadata Changes

View File

@@ -1,4 +1,5 @@
--- ## 2.2.1
category: minorAnalysis
--- ### Minor Analysis Improvements
* Fixed a bug in the Next.js model that would cause the analysis to miss server-side taint sources in the `app/pages` folder. * Fixed a bug in the Next.js model that would cause the analysis to miss server-side taint sources in the `app/pages` folder.

View File

@@ -1,2 +1,2 @@
--- ---
lastReleaseVersion: 2.2.0 lastReleaseVersion: 2.2.1

View File

@@ -1,5 +1,5 @@
name: codeql/javascript-queries name: codeql/javascript-queries
version: 2.2.1-dev version: 2.2.1
groups: groups:
- javascript - javascript
- queries - queries

View File

@@ -1,3 +1,7 @@
## 1.0.36
No user-facing changes.
## 1.0.35 ## 1.0.35
No user-facing changes. No user-facing changes.

View File

@@ -0,0 +1,3 @@
## 1.0.36
No user-facing changes.

View File

@@ -1,2 +1,2 @@
--- ---
lastReleaseVersion: 1.0.35 lastReleaseVersion: 1.0.36

View File

@@ -1,4 +1,4 @@
name: codeql/suite-helpers name: codeql/suite-helpers
version: 1.0.36-dev version: 1.0.36
groups: shared groups: shared
warnOnImplicitThis: true warnOnImplicitThis: true

View File

@@ -1,3 +1,9 @@
## 5.0.1
### Bug Fixes
- Fixed a bug in the Python extractor's import handling where failing to find an import in `find_module` would cause a `KeyError` to be raised. (Contributed by @akoeplinger.)
## 5.0.0 ## 5.0.0
### Breaking Changes ### Breaking Changes

View File

@@ -1,5 +1,5 @@
--- ## 5.0.1
category: fix
--- ### Bug Fixes
- Fixed a bug in the Python extractor's import handling where failing to find an import in `find_module` would cause a `KeyError` to be raised. (Contributed by @akoeplinger.) - Fixed a bug in the Python extractor's import handling where failing to find an import in `find_module` would cause a `KeyError` to be raised. (Contributed by @akoeplinger.)

View File

@@ -1,2 +1,2 @@
--- ---
lastReleaseVersion: 5.0.0 lastReleaseVersion: 5.0.1

View File

@@ -1,5 +1,5 @@
name: codeql/python-all name: codeql/python-all
version: 5.0.1-dev version: 5.0.1
groups: python groups: python
dbscheme: semmlecode.python.dbscheme dbscheme: semmlecode.python.dbscheme
extractor: python extractor: python

View File

@@ -1,3 +1,7 @@
## 1.7.1
No user-facing changes.
## 1.7.0 ## 1.7.0
### Query Metadata Changes ### Query Metadata Changes

View File

@@ -0,0 +1,3 @@
## 1.7.1
No user-facing changes.

View File

@@ -1,2 +1,2 @@
--- ---
lastReleaseVersion: 1.7.0 lastReleaseVersion: 1.7.1

View File

@@ -1,5 +1,5 @@
name: codeql/python-queries name: codeql/python-queries
version: 1.7.1-dev version: 1.7.1
groups: groups:
- python - python
- queries - queries

View File

@@ -1,3 +1,7 @@
## 5.1.4
No user-facing changes.
## 5.1.3 ## 5.1.3
No user-facing changes. No user-facing changes.

View File

@@ -0,0 +1,3 @@
## 5.1.4
No user-facing changes.

View File

@@ -1,2 +1,2 @@
--- ---
lastReleaseVersion: 5.1.3 lastReleaseVersion: 5.1.4

View File

@@ -1,5 +1,5 @@
name: codeql/ruby-all name: codeql/ruby-all
version: 5.1.4-dev version: 5.1.4
groups: ruby groups: ruby
extractor: ruby extractor: ruby
dbscheme: ruby.dbscheme dbscheme: ruby.dbscheme

View File

@@ -1,3 +1,7 @@
## 1.5.1
No user-facing changes.
## 1.5.0 ## 1.5.0
### Query Metadata Changes ### Query Metadata Changes

View File

@@ -0,0 +1,3 @@
## 1.5.1
No user-facing changes.

View File

@@ -1,2 +1,2 @@
--- ---
lastReleaseVersion: 1.5.0 lastReleaseVersion: 1.5.1

View File

@@ -1,5 +1,5 @@
name: codeql/ruby-queries name: codeql/ruby-queries
version: 1.5.1-dev version: 1.5.1
groups: groups:
- ruby - ruby
- queries - queries

View File

@@ -1,3 +1,13 @@
## 0.2.0
### Breaking Changes
* The type `DataFlow::Node` is now based directly on the AST instead of the CFG, which means that predicates like `asExpr()` return AST nodes instead of CFG nodes.
### Minor Analysis Improvements
* Added more detailed models for `std::fs` and `std::path`.
## 0.1.20 ## 0.1.20
### Minor Analysis Improvements ### Minor Analysis Improvements

View File

@@ -1,4 +0,0 @@
---
category: breaking
---
* The type `DataFlow::Node` is now based directly on the AST instead of the CFG, which means that predicates like `asExpr()` return AST nodes instead of CFG nodes.

View File

@@ -1,4 +0,0 @@
---
category: minorAnalysis
---
* Added more detailed models for `std::fs` and `std::path`.

View File

@@ -0,0 +1,9 @@
## 0.2.0
### Breaking Changes
* The type `DataFlow::Node` is now based directly on the AST instead of the CFG, which means that predicates like `asExpr()` return AST nodes instead of CFG nodes.
### Minor Analysis Improvements
* Added more detailed models for `std::fs` and `std::path`.

View File

@@ -1,2 +1,2 @@
--- ---
lastReleaseVersion: 0.1.20 lastReleaseVersion: 0.2.0

View File

@@ -1,5 +1,5 @@
name: codeql/rust-all name: codeql/rust-all
version: 0.1.21-dev version: 0.2.0
groups: rust groups: rust
extractor: rust extractor: rust
dbscheme: rust.dbscheme dbscheme: rust.dbscheme

View File

@@ -1,3 +1,15 @@
## 0.1.21
### New Queries
* Added a new query `rust/xss`, to detect cross-site scripting security vulnerabilities.
* Added a new query `rust/disabled-certificate-check`, to detect disabled TLS certificate checks.
* Added three example queries (`rust/examples/empty-if`, `rust/examples/simple-sql-injection` and `rust/examples/simple-constant-password`) to help developers learn to write CodeQL queries for Rust.
### Minor Analysis Improvements
* The `rust/access-invalid-pointer` query has been improved with new flow sources and barriers.
## 0.1.20 ## 0.1.20
### Minor Analysis Improvements ### Minor Analysis Improvements

View File

@@ -1,4 +0,0 @@
---
category: newQuery
---
* Added three example queries (`rust/examples/empty-if`, `rust/examples/simple-sql-injection` and `rust/examples/simple-constant-password`) to help developers learn to write CodeQL queries for Rust.

View File

@@ -1,4 +0,0 @@
---
category: newQuery
---
* Added a new query `rust/disabled-certificate-check`, to detect disabled TLS certificate checks.

View File

@@ -1,4 +0,0 @@
---
category: minorAnalysis
---
* The `rust/access-invalid-pointer` query has been improved with new flow sources and barriers.

View File

@@ -1,4 +0,0 @@
---
category: newQuery
---
* Added a new query `rust/xss`, to detect cross-site scripting security vulnerabilities.

View File

@@ -0,0 +1,11 @@
## 0.1.21
### New Queries
* Added a new query `rust/xss`, to detect cross-site scripting security vulnerabilities.
* Added a new query `rust/disabled-certificate-check`, to detect disabled TLS certificate checks.
* Added three example queries (`rust/examples/empty-if`, `rust/examples/simple-sql-injection` and `rust/examples/simple-constant-password`) to help developers learn to write CodeQL queries for Rust.
### Minor Analysis Improvements
* The `rust/access-invalid-pointer` query has been improved with new flow sources and barriers.

View File

@@ -1,2 +1,2 @@
--- ---
lastReleaseVersion: 0.1.20 lastReleaseVersion: 0.1.21

View File

@@ -1,5 +1,5 @@
name: codeql/rust-queries name: codeql/rust-queries
version: 0.1.21-dev version: 0.1.21
groups: groups:
- rust - rust
- queries - queries

View File

@@ -1,3 +1,7 @@
## 0.0.10
No user-facing changes.
## 0.0.9 ## 0.0.9
No user-facing changes. No user-facing changes.

View File

@@ -0,0 +1,3 @@
## 0.0.10
No user-facing changes.

Some files were not shown because too many files have changed in this diff Show More