Merge pull request #11134 from github/post-release-prep/codeql-cli-2.11.3

Post-release preparation for codeql-cli-2.11.3
This commit is contained in:
Dave Bartolomeo
2022-11-05 13:54:49 -04:00
committed by GitHub
82 changed files with 214 additions and 81 deletions

View File

@@ -1,3 +1,7 @@
## 0.3.3
No user-facing changes.
## 0.3.2
No user-facing changes.

View File

@@ -0,0 +1,3 @@
## 0.3.3
No user-facing changes.

View File

@@ -1,2 +1,2 @@
---
lastReleaseVersion: 0.3.2
lastReleaseVersion: 0.3.3

View File

@@ -1,5 +1,5 @@
name: codeql/javascript-all
version: 0.3.3-dev
version: 0.3.4-dev
groups: javascript
dbscheme: semmlecode.javascript.dbscheme
extractor: javascript

View File

@@ -1,3 +1,17 @@
## 0.4.3
### New Queries
* Added a new query, `js/second-order-command-line-injection`, to detect shell
commands that may execute arbitrary code when the user has control over
the arguments to a command-line program.
This currently flags up unsafe invocations of git and hg.
### Minor Analysis Improvements
* Added sources for user defined path and query parameters in `Next.js`.
* The alert message of many queries have been changed to better follow the style guide and make the message consistent with other languages.
## 0.4.2
### Minor Analysis Improvements

View File

@@ -1,7 +0,0 @@
---
category: newQuery
---
* Added a new query, `js/second-order-command-line-injection`, to detect shell
commands that may execute arbitrary code when the user has control over
the arguments to a command-line program.
This currently flags up unsafe invocations of git and hg.

View File

@@ -1,4 +0,0 @@
---
category: minorAnalysis
---
* The alert message of many queries have been changed to better follow the style guide and make the message consistent with other languages.

View File

@@ -1,5 +0,0 @@
---
category: minorAnalysis
---
- Added sources for user defined path and query parameters in `Next.js`.

View File

@@ -0,0 +1,13 @@
## 0.4.3
### New Queries
* Added a new query, `js/second-order-command-line-injection`, to detect shell
commands that may execute arbitrary code when the user has control over
the arguments to a command-line program.
This currently flags up unsafe invocations of git and hg.
### Minor Analysis Improvements
* Added sources for user defined path and query parameters in `Next.js`.
* The alert message of many queries have been changed to better follow the style guide and make the message consistent with other languages.

View File

@@ -1,2 +1,2 @@
---
lastReleaseVersion: 0.4.2
lastReleaseVersion: 0.4.3

View File

@@ -1,5 +1,5 @@
name: codeql/javascript-queries
version: 0.4.3-dev
version: 0.4.4-dev
groups:
- javascript
- queries