Release preparation for version 2.25.5

This commit is contained in:
github-actions[bot]
2026-05-18 12:05:32 +00:00
parent e55edf2f1f
commit e38616a2ef
167 changed files with 410 additions and 115 deletions

View File

@@ -1,3 +1,9 @@
## 0.4.36
### Minor Analysis Improvements
* Altered 2 patterns in the `poisonable_steps` modelling. Extra sinks are detected in the following cases: scripts executed via python modules and `go run` in directories are detected as potential mechanisms of injection. For the go execution pattern, the pattern is updated to now ignore flags that occur between go and the specific command. This change may lead to more results being detected by the following queries: `actions/untrusted-checkout/high`, `actions/untrusted-checkout/critical`, `actions/untrusted-checkout-toctou/high`, `actions/untrusted-checkout-toctou/critical`, `actions/cache-poisoning/poisonable-step`, `actions/cache-poisoning/direct-cache` and `actions/artifact-poisoning/path-traversal`.
## 0.4.35
No user-facing changes.

View File

@@ -1,4 +1,5 @@
---
category: minorAnalysis
---
* Altered 2 patterns in the `poisonable_steps` modelling. Extra sinks are detected in the following cases: scripts executed via python modules and `go run` in directories are detected as potential mechanisms of injection. For the go execution pattern, the pattern is updated to now ignore flags that occur between go and the specific command. This change may lead to more results being detected by the following queries: `actions/untrusted-checkout/high`, `actions/untrusted-checkout/critical`, `actions/untrusted-checkout-toctou/high`, `actions/untrusted-checkout-toctou/critical`, `actions/cache-poisoning/poisonable-step`, `actions/cache-poisoning/direct-cache` and `actions/artifact-poisoning/path-traversal`.
## 0.4.36
### Minor Analysis Improvements
* Altered 2 patterns in the `poisonable_steps` modelling. Extra sinks are detected in the following cases: scripts executed via python modules and `go run` in directories are detected as potential mechanisms of injection. For the go execution pattern, the pattern is updated to now ignore flags that occur between go and the specific command. This change may lead to more results being detected by the following queries: `actions/untrusted-checkout/high`, `actions/untrusted-checkout/critical`, `actions/untrusted-checkout-toctou/high`, `actions/untrusted-checkout-toctou/critical`, `actions/cache-poisoning/poisonable-step`, `actions/cache-poisoning/direct-cache` and `actions/artifact-poisoning/path-traversal`.

View File

@@ -1,2 +1,2 @@
---
lastReleaseVersion: 0.4.35
lastReleaseVersion: 0.4.36

View File

@@ -1,5 +1,5 @@
name: codeql/actions-all
version: 0.4.36-dev
version: 0.4.36
library: true
warnOnImplicitThis: true
dependencies:

View File

@@ -1,3 +1,17 @@
## 0.6.28
### Query Metadata Changes
* Adjusted the name of `actions/untrusted-checkout/high` to more clearly describe which parts of the scenario are in a privileged context.
### Minor Analysis Improvements
* The `actions/unpinned-tag` query now analyzes composite action metadata (`action.yml`/`action.yaml` files) in addition to workflow files, providing more comprehensive detection of unpinned action references across the entire Actions ecosystem.
### Bug Fixes
* Fixed help file descriptions for queries: `actions/untrusted-checkout/critical`, `actions/untrusted-checkout/high`, `actions/untrusted-checkout/medium`. Previously the messages were unclear as to why and how the vulnerabilities could occur.
## 0.6.27
No user-facing changes.

View File

@@ -1,4 +0,0 @@
---
category: fix
---
* Fixed help file descriptions for queries: `actions/untrusted-checkout/critical`, `actions/untrusted-checkout/high`, `actions/untrusted-checkout/medium`. Previously the messages were unclear as to why and how the vulnerabilities could occur.

View File

@@ -1,4 +0,0 @@
---
category: queryMetadata
---
* Adjusted the name of `actions/untrusted-checkout/high` to more clearly describe which parts of the scenario are in a privileged context.

View File

@@ -1,4 +0,0 @@
---
category: minorAnalysis
---
* The `actions/unpinned-tag` query now analyzes composite action metadata (`action.yml`/`action.yaml` files) in addition to workflow files, providing more comprehensive detection of unpinned action references across the entire Actions ecosystem.

View File

@@ -0,0 +1,13 @@
## 0.6.28
### Query Metadata Changes
* Adjusted the name of `actions/untrusted-checkout/high` to more clearly describe which parts of the scenario are in a privileged context.
### Minor Analysis Improvements
* The `actions/unpinned-tag` query now analyzes composite action metadata (`action.yml`/`action.yaml` files) in addition to workflow files, providing more comprehensive detection of unpinned action references across the entire Actions ecosystem.
### Bug Fixes
* Fixed help file descriptions for queries: `actions/untrusted-checkout/critical`, `actions/untrusted-checkout/high`, `actions/untrusted-checkout/medium`. Previously the messages were unclear as to why and how the vulnerabilities could occur.

View File

@@ -1,2 +1,2 @@
---
lastReleaseVersion: 0.6.27
lastReleaseVersion: 0.6.28

View File

@@ -1,5 +1,5 @@
name: codeql/actions-queries
version: 0.6.28-dev
version: 0.6.28
library: false
warnOnImplicitThis: true
groups: [actions, queries]

View File

@@ -1,3 +1,9 @@
## 10.1.1
### Minor Analysis Improvements
* The `RemoteFlowSourceFunction` model for `fscanf` (and variants) now implements `hasSocketInput` to reflect that these functions may read from a socket.
## 10.1.0
### New Features

View File

@@ -1,4 +1,5 @@
---
category: minorAnalysis
---
* The `RemoteFlowSourceFunction` model for `fscanf` (and variants) now implements `hasSocketInput` to reflect that these functions may read from a socket.
## 10.1.1
### Minor Analysis Improvements
* The `RemoteFlowSourceFunction` model for `fscanf` (and variants) now implements `hasSocketInput` to reflect that these functions may read from a socket.

View File

@@ -1,2 +1,2 @@
---
lastReleaseVersion: 10.1.0
lastReleaseVersion: 10.1.1

View File

@@ -1,5 +1,5 @@
name: codeql/cpp-all
version: 10.1.1-dev
version: 10.1.1
groups: cpp
dbscheme: semmlecode.cpp.dbscheme
extractor: cpp

View File

@@ -1,3 +1,9 @@
## 1.6.3
### Minor Analysis Improvements
* The 'Cleartext transmission of sensitive information' query (`cpp/cleartext-transmission`) no longer raises an alert on calls to `fscanf` (and variants) when the call reads from an "obviously local" `FILE` stream such as `stdin`.
## 1.6.2
No user-facing changes.

View File

@@ -1,4 +1,5 @@
---
category: minorAnalysis
---
* The 'Cleartext transmission of sensitive information' query (`cpp/cleartext-transmission`) no longer raises an alert on calls to `fscanf` (and variants) when the call reads from an "obviously local" `FILE` stream such as `stdin`.
## 1.6.3
### Minor Analysis Improvements
* The 'Cleartext transmission of sensitive information' query (`cpp/cleartext-transmission`) no longer raises an alert on calls to `fscanf` (and variants) when the call reads from an "obviously local" `FILE` stream such as `stdin`.

View File

@@ -1,2 +1,2 @@
---
lastReleaseVersion: 1.6.2
lastReleaseVersion: 1.6.3

View File

@@ -1,5 +1,5 @@
name: codeql/cpp-queries
version: 1.6.3-dev
version: 1.6.3
groups:
- cpp
- queries

View File

@@ -1,3 +1,7 @@
## 1.7.67
No user-facing changes.
## 1.7.66
No user-facing changes.

View File

@@ -0,0 +1,3 @@
## 1.7.67
No user-facing changes.

View File

@@ -1,2 +1,2 @@
---
lastReleaseVersion: 1.7.66
lastReleaseVersion: 1.7.67

View File

@@ -1,5 +1,5 @@
name: codeql/csharp-solorigate-all
version: 1.7.67-dev
version: 1.7.67
groups:
- csharp
- solorigate

View File

@@ -1,3 +1,7 @@
## 1.7.67
No user-facing changes.
## 1.7.66
No user-facing changes.

View File

@@ -0,0 +1,3 @@
## 1.7.67
No user-facing changes.

View File

@@ -1,2 +1,2 @@
---
lastReleaseVersion: 1.7.66
lastReleaseVersion: 1.7.67

View File

@@ -1,5 +1,5 @@
name: codeql/csharp-solorigate-queries
version: 1.7.67-dev
version: 1.7.67
groups:
- csharp
- solorigate

View File

@@ -1,3 +1,7 @@
## 6.0.1
No user-facing changes.
## 6.0.0
### Breaking Changes

View File

@@ -0,0 +1,3 @@
## 6.0.1
No user-facing changes.

View File

@@ -1,2 +1,2 @@
---
lastReleaseVersion: 6.0.0
lastReleaseVersion: 6.0.1

View File

@@ -1,5 +1,5 @@
name: codeql/csharp-all
version: 6.0.1-dev
version: 6.0.1
groups: csharp
dbscheme: semmlecode.csharp.dbscheme
extractor: csharp

View File

@@ -1,3 +1,7 @@
## 1.7.3
No user-facing changes.
## 1.7.2
No user-facing changes.

View File

@@ -0,0 +1,3 @@
## 1.7.3
No user-facing changes.

View File

@@ -1,2 +1,2 @@
---
lastReleaseVersion: 1.7.2
lastReleaseVersion: 1.7.3

View File

@@ -1,5 +1,5 @@
name: codeql/csharp-queries
version: 1.7.3-dev
version: 1.7.3
groups:
- csharp
- queries

View File

@@ -1,3 +1,7 @@
## 1.0.50
No user-facing changes.
## 1.0.49
No user-facing changes.

View File

@@ -0,0 +1,3 @@
## 1.0.50
No user-facing changes.

View File

@@ -1,2 +1,2 @@
---
lastReleaseVersion: 1.0.49
lastReleaseVersion: 1.0.50

View File

@@ -1,5 +1,5 @@
name: codeql-go-consistency-queries
version: 1.0.50-dev
version: 1.0.50
groups:
- go
- queries

View File

@@ -1,3 +1,7 @@
## 7.1.1
No user-facing changes.
## 7.1.0
### New Features

View File

@@ -0,0 +1,3 @@
## 7.1.1
No user-facing changes.

View File

@@ -1,2 +1,2 @@
---
lastReleaseVersion: 7.1.0
lastReleaseVersion: 7.1.1

View File

@@ -1,5 +1,5 @@
name: codeql/go-all
version: 7.1.1-dev
version: 7.1.1
groups: go
dbscheme: go.dbscheme
extractor: go

View File

@@ -1,3 +1,7 @@
## 1.6.3
No user-facing changes.
## 1.6.2
No user-facing changes.

View File

@@ -0,0 +1,3 @@
## 1.6.3
No user-facing changes.

View File

@@ -1,2 +1,2 @@
---
lastReleaseVersion: 1.6.2
lastReleaseVersion: 1.6.3

View File

@@ -1,5 +1,5 @@
name: codeql/go-queries
version: 1.6.3-dev
version: 1.6.3
groups:
- go
- queries

View File

@@ -1,3 +1,9 @@
## 9.1.1
### Minor Analysis Improvements
* Introduced a new sink kind `path-injection[read]` for Models-as-Data rows that only read from a path (such as `ClassLoader.getResource`, `FileInputStream`, `FileReader`, `Files.readAllBytes`, and related APIs). The general `java/path-injection` query continues to consider both `path-injection` and `path-injection[read]` sinks.
## 9.1.0
### New Features

View File

@@ -1,4 +1,5 @@
---
category: minorAnalysis
---
## 9.1.1
### Minor Analysis Improvements
* Introduced a new sink kind `path-injection[read]` for Models-as-Data rows that only read from a path (such as `ClassLoader.getResource`, `FileInputStream`, `FileReader`, `Files.readAllBytes`, and related APIs). The general `java/path-injection` query continues to consider both `path-injection` and `path-injection[read]` sinks.

View File

@@ -1,2 +1,2 @@
---
lastReleaseVersion: 9.1.0
lastReleaseVersion: 9.1.1

View File

@@ -1,5 +1,5 @@
name: codeql/java-all
version: 9.1.1-dev
version: 9.1.1
groups: java
dbscheme: config/semmlecode.dbscheme
extractor: java

View File

@@ -1,3 +1,9 @@
## 1.11.3
### Minor Analysis Improvements
* The `java/zipslip` query no longer reports archive entry names that flow only to read-only path sinks such as `ClassLoader.getResource`, `FileInputStream`, and `FileReader`. The query now restricts its sinks to the `path-injection` kind and deliberately excludes the new `path-injection[read]` sub-kind, matching the Zip Slip threat model of unsafe archive extraction.
## 1.11.2
No user-facing changes.

View File

@@ -1,4 +1,5 @@
---
category: minorAnalysis
---
## 1.11.3
### Minor Analysis Improvements
* The `java/zipslip` query no longer reports archive entry names that flow only to read-only path sinks such as `ClassLoader.getResource`, `FileInputStream`, and `FileReader`. The query now restricts its sinks to the `path-injection` kind and deliberately excludes the new `path-injection[read]` sub-kind, matching the Zip Slip threat model of unsafe archive extraction.

View File

@@ -1,2 +1,2 @@
---
lastReleaseVersion: 1.11.2
lastReleaseVersion: 1.11.3

View File

@@ -1,5 +1,5 @@
name: codeql/java-queries
version: 1.11.3-dev
version: 1.11.3
groups:
- java
- queries

View File

@@ -1,3 +1,7 @@
## 2.7.1
No user-facing changes.
## 2.7.0
### New Features

View File

@@ -0,0 +1,3 @@
## 2.7.1
No user-facing changes.

View File

@@ -1,2 +1,2 @@
---
lastReleaseVersion: 2.7.0
lastReleaseVersion: 2.7.1

View File

@@ -1,5 +1,5 @@
name: codeql/javascript-all
version: 2.7.1-dev
version: 2.7.1
groups: javascript
dbscheme: semmlecode.javascript.dbscheme
extractor: javascript

View File

@@ -1,3 +1,7 @@
## 2.3.10
No user-facing changes.
## 2.3.9
No user-facing changes.

View File

@@ -0,0 +1,3 @@
## 2.3.10
No user-facing changes.

View File

@@ -1,2 +1,2 @@
---
lastReleaseVersion: 2.3.9
lastReleaseVersion: 2.3.10

View File

@@ -1,5 +1,5 @@
name: codeql/javascript-queries
version: 2.3.10-dev
version: 2.3.10
groups:
- javascript
- queries

View File

@@ -1,3 +1,7 @@
## 1.0.50
No user-facing changes.
## 1.0.49
No user-facing changes.

View File

@@ -0,0 +1,3 @@
## 1.0.50
No user-facing changes.

View File

@@ -1,2 +1,2 @@
---
lastReleaseVersion: 1.0.49
lastReleaseVersion: 1.0.50

View File

@@ -1,4 +1,4 @@
name: codeql/suite-helpers
version: 1.0.50-dev
version: 1.0.50
groups: shared
warnOnImplicitThis: true

View File

@@ -1,3 +1,7 @@
## 7.1.1
No user-facing changes.
## 7.1.0
### New Features

View File

@@ -0,0 +1,3 @@
## 7.1.1
No user-facing changes.

View File

@@ -1,2 +1,2 @@
---
lastReleaseVersion: 7.1.0
lastReleaseVersion: 7.1.1

View File

@@ -1,5 +1,5 @@
name: codeql/python-all
version: 7.1.1-dev
version: 7.1.1
groups: python
dbscheme: semmlecode.python.dbscheme
extractor: python

View File

@@ -1,3 +1,7 @@
## 1.8.3
No user-facing changes.
## 1.8.2
No user-facing changes.

View File

@@ -0,0 +1,3 @@
## 1.8.3
No user-facing changes.

View File

@@ -1,2 +1,2 @@
---
lastReleaseVersion: 1.8.2
lastReleaseVersion: 1.8.3

View File

@@ -1,5 +1,5 @@
name: codeql/python-queries
version: 1.8.3-dev
version: 1.8.3
groups:
- python
- queries

View File

@@ -1,3 +1,7 @@
## 5.2.1
No user-facing changes.
## 5.2.0
### New Features

View File

@@ -0,0 +1,3 @@
## 5.2.1
No user-facing changes.

View File

@@ -1,2 +1,2 @@
---
lastReleaseVersion: 5.2.0
lastReleaseVersion: 5.2.1

View File

@@ -1,5 +1,5 @@
name: codeql/ruby-all
version: 5.2.1-dev
version: 5.2.1
groups: ruby
extractor: ruby
dbscheme: ruby.dbscheme

View File

@@ -1,3 +1,7 @@
## 1.6.3
No user-facing changes.
## 1.6.2
No user-facing changes.

View File

@@ -0,0 +1,3 @@
## 1.6.3
No user-facing changes.

View File

@@ -1,2 +1,2 @@
---
lastReleaseVersion: 1.6.2
lastReleaseVersion: 1.6.3

View File

@@ -1,5 +1,5 @@
name: codeql/ruby-queries
version: 1.6.3-dev
version: 1.6.3
groups:
- ruby
- queries

View File

@@ -1,3 +1,7 @@
## 0.2.14
No user-facing changes.
## 0.2.13
### New Features

View File

@@ -0,0 +1,3 @@
## 0.2.14
No user-facing changes.

View File

@@ -1,2 +1,2 @@
---
lastReleaseVersion: 0.2.13
lastReleaseVersion: 0.2.14

View File

@@ -1,5 +1,5 @@
name: codeql/rust-all
version: 0.2.14-dev
version: 0.2.14
groups: rust
extractor: rust
dbscheme: rust.dbscheme

View File

@@ -1,3 +1,7 @@
## 0.1.35
No user-facing changes.
## 0.1.34
No user-facing changes.

View File

@@ -0,0 +1,3 @@
## 0.1.35
No user-facing changes.

View File

@@ -1,2 +1,2 @@
---
lastReleaseVersion: 0.1.34
lastReleaseVersion: 0.1.35

View File

@@ -1,5 +1,5 @@
name: codeql/rust-queries
version: 0.1.35-dev
version: 0.1.35
groups:
- rust
- queries

View File

@@ -1,3 +1,7 @@
## 0.0.24
No user-facing changes.
## 0.0.23
No user-facing changes.

View File

@@ -0,0 +1,3 @@
## 0.0.24
No user-facing changes.

View File

@@ -1,2 +1,2 @@
---
lastReleaseVersion: 0.0.23
lastReleaseVersion: 0.0.24

View File

@@ -1,5 +1,5 @@
name: codeql/concepts
version: 0.0.24-dev
version: 0.0.24
groups: shared
library: true
dependencies:

View File

@@ -1,3 +1,7 @@
## 2.0.34
No user-facing changes.
## 2.0.33
No user-facing changes.

View File

@@ -0,0 +1,3 @@
## 2.0.34
No user-facing changes.

View File

@@ -1,2 +1,2 @@
---
lastReleaseVersion: 2.0.33
lastReleaseVersion: 2.0.34

View File

@@ -1,5 +1,5 @@
name: codeql/controlflow
version: 2.0.34-dev
version: 2.0.34
groups: shared
library: true
dependencies:

View File

@@ -1,3 +1,7 @@
## 2.1.6
No user-facing changes.
## 2.1.5
No user-facing changes.

Some files were not shown because too many files have changed in this diff Show More