Release preparation for version 2.20.6

This commit is contained in:
github-actions[bot]
2025-03-03 17:13:19 +00:00
parent 7f56c67544
commit fa850cccb1
164 changed files with 423 additions and 144 deletions

View File

@@ -1,3 +1,13 @@
## 7.1.0
### New Features
* The Java extractor and QL libraries now support Java 24.
### Minor Analysis Improvements
* Added a path injection sanitizer for the `child` argument of a `java.io.File` constructor if that argument does not contain path traversal sequences.
## 7.0.1
No user-facing changes.

View File

@@ -1,4 +0,0 @@
---
category: feature
---
* The Java extractor and QL libraries now support Java 24.

View File

@@ -1,4 +1,9 @@
---
category: minorAnalysis
---
## 7.1.0
### New Features
* The Java extractor and QL libraries now support Java 24.
### Minor Analysis Improvements
* Added a path injection sanitizer for the `child` argument of a `java.io.File` constructor if that argument does not contain path traversal sequences.

View File

@@ -1,2 +1,2 @@
---
lastReleaseVersion: 7.0.1
lastReleaseVersion: 7.1.0

View File

@@ -1,5 +1,5 @@
name: codeql/java-all
version: 7.0.2-dev
version: 7.1.0
groups: java
dbscheme: config/semmlecode.dbscheme
extractor: java

View File

@@ -1,3 +1,9 @@
## 1.3.0
### Major Analysis Improvements
* Fixed false positive alerts in the java query "Cross-site scripting" (`java/xss`) when `javax.servlet.http.HttpServletResponse` is used with a content type which is not exploitable.
## 1.2.0
### New Queries

View File

@@ -1,4 +1,5 @@
---
category: majorAnalysis
---
## 1.3.0
### Major Analysis Improvements
* Fixed false positive alerts in the java query "Cross-site scripting" (`java/xss`) when `javax.servlet.http.HttpServletResponse` is used with a content type which is not exploitable.

View File

@@ -1,2 +1,2 @@
---
lastReleaseVersion: 1.2.0
lastReleaseVersion: 1.3.0

View File

@@ -1,5 +1,5 @@
name: codeql/java-queries
version: 1.2.1-dev
version: 1.3.0
groups:
- java
- queries