Merge pull request #11134 from github/post-release-prep/codeql-cli-2.11.3

Post-release preparation for codeql-cli-2.11.3
This commit is contained in:
Dave Bartolomeo
2022-11-05 13:54:49 -04:00
committed by GitHub
82 changed files with 214 additions and 81 deletions

View File

@@ -1,3 +1,9 @@
## 0.4.3
### Minor Analysis Improvements
* Fixed bugs in the `FormatLiteral` class that were causing `getMaxConvertedLength` and related predicates to return no results when the format literal was `%e`, `%f` or `%g` and an explicit precision was specified.
## 0.4.2 ## 0.4.2
No user-facing changes. No user-facing changes.

View File

@@ -1,4 +1,5 @@
--- ## 0.4.3
category: minorAnalysis
--- ### Minor Analysis Improvements
* Fixed bugs in the `FormatLiteral` class that were causing `getMaxConvertedLength` and related predicates to return no results when the format literal was `%e`, `%f` or `%g` and an explicit precision was specified. * Fixed bugs in the `FormatLiteral` class that were causing `getMaxConvertedLength` and related predicates to return no results when the format literal was `%e`, `%f` or `%g` and an explicit precision was specified.

View File

@@ -1,2 +1,2 @@
--- ---
lastReleaseVersion: 0.4.2 lastReleaseVersion: 0.4.3

View File

@@ -1,5 +1,5 @@
name: codeql/cpp-all name: codeql/cpp-all
version: 0.4.3-dev version: 0.4.4-dev
groups: cpp groups: cpp
dbscheme: semmlecode.cpp.dbscheme dbscheme: semmlecode.cpp.dbscheme
extractor: cpp extractor: cpp

View File

@@ -1,3 +1,9 @@
## 0.4.3
### Minor Analysis Improvements
* Fixed a bug in `cpp/jsf/av-rule-76` that caused the query to miss results when an implicitly-defined copy constructor or copy assignment operator was generated.
## 0.4.2 ## 0.4.2
### New Queries ### New Queries

View File

@@ -1,4 +1,5 @@
--- ## 0.4.3
category: minorAnalysis
--- ### Minor Analysis Improvements
* Fixed a bug in `cpp/jsf/av-rule-76` that caused the query to miss results when an implicitly-defined copy constructor or copy assignment operator was generated. * Fixed a bug in `cpp/jsf/av-rule-76` that caused the query to miss results when an implicitly-defined copy constructor or copy assignment operator was generated.

View File

@@ -1,2 +1,2 @@
--- ---
lastReleaseVersion: 0.4.2 lastReleaseVersion: 0.4.3

View File

@@ -1,5 +1,5 @@
name: codeql/cpp-queries name: codeql/cpp-queries
version: 0.4.3-dev version: 0.4.4-dev
groups: groups:
- cpp - cpp
- queries - queries

View File

@@ -1,3 +1,7 @@
## 1.3.3
No user-facing changes.
## 1.3.2 ## 1.3.2
No user-facing changes. No user-facing changes.

View File

@@ -0,0 +1,3 @@
## 1.3.3
No user-facing changes.

View File

@@ -1,2 +1,2 @@
--- ---
lastReleaseVersion: 1.3.2 lastReleaseVersion: 1.3.3

View File

@@ -1,5 +1,5 @@
name: codeql/csharp-solorigate-all name: codeql/csharp-solorigate-all
version: 1.3.3-dev version: 1.3.4-dev
groups: groups:
- csharp - csharp
- solorigate - solorigate

View File

@@ -1,3 +1,7 @@
## 1.3.3
No user-facing changes.
## 1.3.2 ## 1.3.2
No user-facing changes. No user-facing changes.

View File

@@ -0,0 +1,3 @@
## 1.3.3
No user-facing changes.

View File

@@ -1,2 +1,2 @@
--- ---
lastReleaseVersion: 1.3.2 lastReleaseVersion: 1.3.3

View File

@@ -1,5 +1,5 @@
name: codeql/csharp-solorigate-queries name: codeql/csharp-solorigate-queries
version: 1.3.3-dev version: 1.3.4-dev
groups: groups:
- csharp - csharp
- solorigate - solorigate

View File

@@ -1,3 +1,7 @@
## 0.4.3
No user-facing changes.
## 0.4.2 ## 0.4.2
No user-facing changes. No user-facing changes.

View File

@@ -0,0 +1,3 @@
## 0.4.3
No user-facing changes.

View File

@@ -1,2 +1,2 @@
--- ---
lastReleaseVersion: 0.4.2 lastReleaseVersion: 0.4.3

View File

@@ -1,5 +1,5 @@
name: codeql/csharp-all name: codeql/csharp-all
version: 0.4.3-dev version: 0.4.4-dev
groups: csharp groups: csharp
dbscheme: semmlecode.csharp.dbscheme dbscheme: semmlecode.csharp.dbscheme
extractor: csharp extractor: csharp

View File

@@ -1,3 +1,7 @@
## 0.4.3
No user-facing changes.
## 0.4.2 ## 0.4.2
No user-facing changes. No user-facing changes.

View File

@@ -0,0 +1,3 @@
## 0.4.3
No user-facing changes.

View File

@@ -1,2 +1,2 @@
--- ---
lastReleaseVersion: 0.4.2 lastReleaseVersion: 0.4.3

View File

@@ -1,5 +1,5 @@
name: codeql/csharp-queries name: codeql/csharp-queries
version: 0.4.3-dev version: 0.4.4-dev
groups: groups:
- csharp - csharp
- queries - queries

View File

@@ -1,3 +1,7 @@
## 0.3.3
No user-facing changes.
## 0.3.2 ## 0.3.2
No user-facing changes. No user-facing changes.

View File

@@ -0,0 +1,3 @@
## 0.3.3
No user-facing changes.

View File

@@ -1,2 +1,2 @@
--- ---
lastReleaseVersion: 0.3.2 lastReleaseVersion: 0.3.3

View File

@@ -1,5 +1,5 @@
name: codeql/go-all name: codeql/go-all
version: 0.3.3-dev version: 0.3.4-dev
groups: go groups: go
dbscheme: go.dbscheme dbscheme: go.dbscheme
extractor: go extractor: go

View File

@@ -1,3 +1,9 @@
## 0.3.3
### Minor Analysis Improvements
* Query `go/clear-text-logging` now excludes `GetX` methods of protobuf `Message` structs, except where taint is specifically known to belong to the right field. This is to avoid FPs where taint is written to one field and then spuriously read from another.
## 0.3.2 ## 0.3.2
### Minor Analysis Improvements ### Minor Analysis Improvements

View File

@@ -1,4 +1,5 @@
--- ## 0.3.3
category: minorAnalysis
--- ### Minor Analysis Improvements
* Query `go/clear-text-logging` now excludes `GetX` methods of protobuf `Message` structs, except where taint is specifically known to belong to the right field. This is to avoid FPs where taint is written to one field and then spuriously read from another. * Query `go/clear-text-logging` now excludes `GetX` methods of protobuf `Message` structs, except where taint is specifically known to belong to the right field. This is to avoid FPs where taint is written to one field and then spuriously read from another.

View File

@@ -1,2 +1,2 @@
--- ---
lastReleaseVersion: 0.3.2 lastReleaseVersion: 0.3.3

View File

@@ -1,5 +1,5 @@
name: codeql/go-queries name: codeql/go-queries
version: 0.3.3-dev version: 0.3.4-dev
groups: groups:
- go - go
- queries - queries

View File

@@ -1,3 +1,7 @@
## 0.4.3
No user-facing changes.
## 0.4.2 ## 0.4.2
### Deprecated APIs ### Deprecated APIs

View File

@@ -0,0 +1,3 @@
## 0.4.3
No user-facing changes.

View File

@@ -1,2 +1,2 @@
--- ---
lastReleaseVersion: 0.4.2 lastReleaseVersion: 0.4.3

View File

@@ -1,5 +1,5 @@
name: codeql/java-all name: codeql/java-all
version: 0.4.3-dev version: 0.4.4-dev
groups: java groups: java
dbscheme: config/semmlecode.dbscheme dbscheme: config/semmlecode.dbscheme
extractor: java extractor: java

View File

@@ -1,3 +1,7 @@
## 0.4.3
No user-facing changes.
## 0.4.2 ## 0.4.2
### New Queries ### New Queries

View File

@@ -0,0 +1,3 @@
## 0.4.3
No user-facing changes.

View File

@@ -1,2 +1,2 @@
--- ---
lastReleaseVersion: 0.4.2 lastReleaseVersion: 0.4.3

View File

@@ -1,5 +1,5 @@
name: codeql/java-queries name: codeql/java-queries
version: 0.4.3-dev version: 0.4.4-dev
groups: groups:
- java - java
- queries - queries

View File

@@ -1,3 +1,7 @@
## 0.3.3
No user-facing changes.
## 0.3.2 ## 0.3.2
No user-facing changes. No user-facing changes.

View File

@@ -0,0 +1,3 @@
## 0.3.3
No user-facing changes.

View File

@@ -1,2 +1,2 @@
--- ---
lastReleaseVersion: 0.3.2 lastReleaseVersion: 0.3.3

View File

@@ -1,5 +1,5 @@
name: codeql/javascript-all name: codeql/javascript-all
version: 0.3.3-dev version: 0.3.4-dev
groups: javascript groups: javascript
dbscheme: semmlecode.javascript.dbscheme dbscheme: semmlecode.javascript.dbscheme
extractor: javascript extractor: javascript

View File

@@ -1,3 +1,17 @@
## 0.4.3
### New Queries
* Added a new query, `js/second-order-command-line-injection`, to detect shell
commands that may execute arbitrary code when the user has control over
the arguments to a command-line program.
This currently flags up unsafe invocations of git and hg.
### Minor Analysis Improvements
* Added sources for user defined path and query parameters in `Next.js`.
* The alert message of many queries have been changed to better follow the style guide and make the message consistent with other languages.
## 0.4.2 ## 0.4.2
### Minor Analysis Improvements ### Minor Analysis Improvements

View File

@@ -1,7 +0,0 @@
---
category: newQuery
---
* Added a new query, `js/second-order-command-line-injection`, to detect shell
commands that may execute arbitrary code when the user has control over
the arguments to a command-line program.
This currently flags up unsafe invocations of git and hg.

View File

@@ -1,4 +0,0 @@
---
category: minorAnalysis
---
* The alert message of many queries have been changed to better follow the style guide and make the message consistent with other languages.

View File

@@ -1,5 +0,0 @@
---
category: minorAnalysis
---
- Added sources for user defined path and query parameters in `Next.js`.

View File

@@ -0,0 +1,13 @@
## 0.4.3
### New Queries
* Added a new query, `js/second-order-command-line-injection`, to detect shell
commands that may execute arbitrary code when the user has control over
the arguments to a command-line program.
This currently flags up unsafe invocations of git and hg.
### Minor Analysis Improvements
* Added sources for user defined path and query parameters in `Next.js`.
* The alert message of many queries have been changed to better follow the style guide and make the message consistent with other languages.

View File

@@ -1,2 +1,2 @@
--- ---
lastReleaseVersion: 0.4.2 lastReleaseVersion: 0.4.3

View File

@@ -1,5 +1,5 @@
name: codeql/javascript-queries name: codeql/javascript-queries
version: 0.4.3-dev version: 0.4.4-dev
groups: groups:
- javascript - javascript
- queries - queries

View File

@@ -1,3 +1,7 @@
## 0.3.3
No user-facing changes.
## 0.3.2 ## 0.3.2
No user-facing changes. No user-facing changes.

View File

@@ -0,0 +1,3 @@
## 0.3.3
No user-facing changes.

View File

@@ -1,2 +1,2 @@
--- ---
lastReleaseVersion: 0.3.2 lastReleaseVersion: 0.3.3

View File

@@ -1,3 +1,3 @@
name: codeql/suite-helpers name: codeql/suite-helpers
version: 0.3.3-dev version: 0.3.4-dev
groups: shared groups: shared

View File

@@ -1,3 +1,7 @@
## 0.6.3
No user-facing changes.
## 0.6.2 ## 0.6.2
### Minor Analysis Improvements ### Minor Analysis Improvements

View File

@@ -0,0 +1,3 @@
## 0.6.3
No user-facing changes.

View File

@@ -1,2 +1,2 @@
--- ---
lastReleaseVersion: 0.6.2 lastReleaseVersion: 0.6.3

View File

@@ -1,5 +1,5 @@
name: codeql/python-all name: codeql/python-all
version: 0.6.3-dev version: 0.6.4-dev
groups: python groups: python
dbscheme: semmlecode.python.dbscheme dbscheme: semmlecode.python.dbscheme
extractor: python extractor: python

View File

@@ -1,3 +1,7 @@
## 0.5.3
No user-facing changes.
## 0.5.2 ## 0.5.2
### Minor Analysis Improvements ### Minor Analysis Improvements

View File

@@ -0,0 +1,3 @@
## 0.5.3
No user-facing changes.

View File

@@ -1,2 +1,2 @@
--- ---
lastReleaseVersion: 0.5.2 lastReleaseVersion: 0.5.3

View File

@@ -1,5 +1,5 @@
name: codeql/python-queries name: codeql/python-queries
version: 0.5.3-dev version: 0.5.4-dev
groups: groups:
- python - python
- queries - queries

View File

@@ -1,3 +1,12 @@
## 0.4.3
### Minor Analysis Improvements
* There was a bug in `TaintTracking::localTaint` and `TaintTracking::localTaintStep` such that they only tracked non-value-preserving flow steps. They have been fixed and now also include value-preserving steps.
* Instantiations using `Faraday::Connection.new` are now recognized as part of `FaradayHttpRequest`s, meaning they will be considered as sinks for queries such as `rb/request-forgery`.
* Taint flow is now tracked through extension methods on `Hash`, `String` and
`Object` provided by `ActiveSupport`.
## 0.4.2 ## 0.4.2
### Minor Analysis Improvements ### Minor Analysis Improvements

View File

@@ -1,5 +0,0 @@
---
category: minorAnalysis
---
* Taint flow is now tracked through extension methods on `Hash`, `String` and
`Object` provided by `ActiveSupport`.

View File

@@ -1,5 +0,0 @@
---
category: minorAnalysis
---
- Instantiations using `Faraday::Connection.new` are now recognized as part of `FaradayHttpRequest`s, meaning they will be considered as sinks for queries such as `rb/request-forgery`.

View File

@@ -1,4 +0,0 @@
---
category: minorAnalysis
---
* There was a bug in `TaintTracking::localTaint` and `TaintTracking::localTaintStep` such that they only tracked non-value-preserving flow steps. They have been fixed and now also include value-preserving steps.

View File

@@ -0,0 +1,8 @@
## 0.4.3
### Minor Analysis Improvements
* There was a bug in `TaintTracking::localTaint` and `TaintTracking::localTaintStep` such that they only tracked non-value-preserving flow steps. They have been fixed and now also include value-preserving steps.
* Instantiations using `Faraday::Connection.new` are now recognized as part of `FaradayHttpRequest`s, meaning they will be considered as sinks for queries such as `rb/request-forgery`.
* Taint flow is now tracked through extension methods on `Hash`, `String` and
`Object` provided by `ActiveSupport`.

View File

@@ -1,2 +1,2 @@
--- ---
lastReleaseVersion: 0.4.2 lastReleaseVersion: 0.4.3

View File

@@ -1,5 +1,5 @@
name: codeql/ruby-all name: codeql/ruby-all
version: 0.4.3-dev version: 0.4.4-dev
groups: ruby groups: ruby
extractor: ruby extractor: ruby
dbscheme: ruby.dbscheme dbscheme: ruby.dbscheme

View File

@@ -1,3 +1,9 @@
## 0.4.3
### Minor Analysis Improvements
* The `rb/weak-cryptographic-algorithm` has been updated to no longer report uses of hash functions such as `MD5` and `SHA1` even if they are known to be weak. These hash algorithms are used very often in non-sensitive contexts, making the query too imprecise in practice.
## 0.4.2 ## 0.4.2
### New Queries ### New Queries

View File

@@ -1,4 +1,5 @@
--- ## 0.4.3
category: minorAnalysis
--- ### Minor Analysis Improvements
* The `rb/weak-cryptographic-algorithm` has been updated to no longer report uses of hash functions such as `MD5` and `SHA1` even if they are known to be weak. These hash algorithms are used very often in non-sensitive contexts, making the query too imprecise in practice. * The `rb/weak-cryptographic-algorithm` has been updated to no longer report uses of hash functions such as `MD5` and `SHA1` even if they are known to be weak. These hash algorithms are used very often in non-sensitive contexts, making the query too imprecise in practice.

View File

@@ -1,2 +1,2 @@
--- ---
lastReleaseVersion: 0.4.2 lastReleaseVersion: 0.4.3

View File

@@ -1,5 +1,5 @@
name: codeql/ruby-queries name: codeql/ruby-queries
version: 0.4.3-dev version: 0.4.4-dev
groups: groups:
- ruby - ruby
- queries - queries

View File

@@ -1,3 +1,7 @@
## 0.0.4
No user-facing changes.
## 0.0.3 ## 0.0.3
No user-facing changes. No user-facing changes.

View File

@@ -0,0 +1,3 @@
## 0.0.4
No user-facing changes.

View File

@@ -1,2 +1,2 @@
--- ---
lastReleaseVersion: 0.0.3 lastReleaseVersion: 0.0.4

View File

@@ -1,4 +1,4 @@
name: codeql/ssa name: codeql/ssa
version: 0.0.4-dev version: 0.0.5-dev
groups: shared groups: shared
library: true library: true

View File

@@ -1,3 +1,7 @@
## 0.0.4
No user-facing changes.
## 0.0.3 ## 0.0.3
No user-facing changes. No user-facing changes.

View File

@@ -0,0 +1,3 @@
## 0.0.4
No user-facing changes.

View File

@@ -1,2 +1,2 @@
--- ---
lastReleaseVersion: 0.0.3 lastReleaseVersion: 0.0.4

View File

@@ -1,4 +1,4 @@
name: codeql/typos name: codeql/typos
version: 0.0.4-dev version: 0.0.5-dev
groups: shared groups: shared
library: true library: true