|
| 1 | +.. _codeql-cli-2.22.2: |
| 2 | + |
| 3 | +========================== |
| 4 | +CodeQL 2.22.2 (2025-07-29) |
| 5 | +========================== |
| 6 | + |
| 7 | +.. contents:: Contents |
| 8 | + :depth: 2 |
| 9 | + :local: |
| 10 | + :backlinks: none |
| 11 | + |
| 12 | +This is an overview of changes in the CodeQL CLI and relevant CodeQL query and library packs. For additional updates on changes to the CodeQL code scanning experience, check out the `code scanning section on the GitHub blog <https://github.blog/tag/code-scanning/>`__, `relevant GitHub Changelog updates <https://github.blog/changelog/label/code-scanning/>`__, `changes in the CodeQL extension for Visual Studio Code <https://marketplace.visualstudio.com/items/GitHub.vscode-codeql/changelog>`__, and the `CodeQL Action changelog <https://github.com/github/codeql-action/blob/main/CHANGELOG.md>`__. |
| 13 | + |
| 14 | +Security Coverage |
| 15 | +----------------- |
| 16 | + |
| 17 | +CodeQL 2.22.2 runs a total of 474 security queries when configured with the Default suite (covering 166 CWE). The Extended suite enables an additional 130 queries (covering 32 more CWE). |
| 18 | + |
| 19 | +CodeQL CLI |
| 20 | +---------- |
| 21 | + |
| 22 | +Bug Fixes |
| 23 | +~~~~~~~~~ |
| 24 | + |
| 25 | +* Fixes a bug in query suites where the :code:`version` property of an :code:`import` instruction was ignored. Previously, the following query suite would *not* resolve to :code:`v1.0.19` of :code:`codeql/csharp-queries`. Instead it would resolve to the latest version. This is now fixed and the resolve pack version would be :code:`v1.0.19`. |
| 26 | + |
| 27 | + .. code-block:: text |
| 28 | + |
| 29 | + - from: codeql/csharp-queries |
| 30 | + import: codeql-suites/csharp-security-and-quality.qls |
| 31 | + version: 1.0.19 |
| 32 | +
|
| 33 | +Query Packs |
| 34 | +----------- |
| 35 | + |
| 36 | +Bug Fixes |
| 37 | +~~~~~~~~~ |
| 38 | + |
| 39 | +C# |
| 40 | +"" |
| 41 | + |
| 42 | +* :code:`web.config` and :code:`web.release.config` files are now recognized regardless of case. This means queries :code:`cs/web/debug-binary` and :code:`cs/web/missing-x-frame-options` may produce more results than before. |
| 43 | + |
| 44 | +Breaking Changes |
| 45 | +~~~~~~~~~~~~~~~~ |
| 46 | + |
| 47 | +JavaScript/TypeScript |
| 48 | +""""""""""""""""""""" |
| 49 | + |
| 50 | +* The :code:`Type` and :code:`Symbol` classes have been deprecated and will be empty in newly extracted databases, since the TypeScript extractor no longer populates them. |
| 51 | + This is a breaking change for custom queries that explicitly relied on these classes. |
| 52 | + Such queries will still compile, but with deprecation warnings, and may have different query results due to type information no longer being available. |
| 53 | + We expect most custom queries will not be affected, however. If a custom query has no deprecation warnings, it should not be affected by this change. |
| 54 | + Uses of :code:`getType()` should be rewritten to use the new :code:`getTypeBinding()` or :code:`getNameBinding()` APIs instead. |
| 55 | + If the new API is not sufficient, please consider opening an issue in :code:`github/codeql` describing your use-case. |
| 56 | + |
| 57 | +Major Analysis Improvements |
| 58 | +~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
| 59 | + |
| 60 | +JavaScript/TypeScript |
| 61 | +""""""""""""""""""""" |
| 62 | + |
| 63 | +* The TypeScript extractor no longer relies on the TypeScript compiler for extracting type information. |
| 64 | + Instead, the information we need from types is now derived by an algorithm written in QL. |
| 65 | + This results in more robust extraction with faster extraction times, in some cases significantly faster. |
| 66 | +* Taint is now tracked through the React :code:`use` function. |
| 67 | +* Parameters of React server functions, marked with the :code:`"use server"` directive, are now seen as taint sources. |
| 68 | + |
| 69 | +Minor Analysis Improvements |
| 70 | +~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
| 71 | + |
| 72 | +C/C++ |
| 73 | +""""" |
| 74 | + |
| 75 | +* Due to changes in the :code:`FunctionWithWrappers` library (:code:`semmle.code.cpp.security.FunctionWithWrappers`) the primary alert location generated by the queries :code:`cpp/path-injection`, :code:`cpp/sql-injection`, :code:`cpp/tainted-format-string`, and :code:`cpp/command-line-injection` may have changed. |
| 76 | +* Added flow models for the Win32 API functions :code:`CreateThread`, :code:`CreateRemoteThread`, and :code:`CreateRemoteThreadEx`. |
| 77 | +* Improved support for dataflow through function objects and lambda expressions. |
| 78 | +* Added flow models for :code:`pthread_create` and :code:`std::thread`. |
| 79 | +* The :code:`cpp/incorrect-string-type-conversion` query no longer alerts on incorrect type conversions that occur in unreachable code. |
| 80 | +* Added flow models for the GNU C Library. |
| 81 | +* Fixed a number of false positives and false negatives in :code:`cpp/global-use-before-init`. Note that this query is not part of any of the default query suites. |
| 82 | +* The query :code:`cpp/sql-injection` now can be extended using the :code:`sql-injection` Models as Data (MaD) sink kind. |
| 83 | + |
| 84 | +C# |
| 85 | +"" |
| 86 | + |
| 87 | +* Explicitly added summary models for all overloads of :code:`System.Xml.XmlDictionaryReader.CreateBinaryReader`. Added models for some of the methods and properties in :code:`System.Runtime.Serialization.SerializationInfo` and :code:`System.Runtime.Serialization.SerializationInfoEnumerator`. Updated models for :code:`System.Text.Encoding.GetBytes`, :code:`System.Text.Encoding.GetChars` and the constructor for :code:`System.IO.MemoryStream`. This generally improves the library modelling and thus reduces the number of false negatives. |
| 88 | +* Added explicit SQL injection Models as Data models for :code:`Microsoft.Data.SqlClient.SqlCommand` and :code:`Microsoft.Data.SqlClient.SqlDataAdapter`. This reduces false negatives for the query :code:`cs/sql-injection`. |
| 89 | + |
| 90 | +Golang |
| 91 | +"""""" |
| 92 | + |
| 93 | +* :code:`filepath.IsLocal` is now recognized as a sanitizer against path-traversal and related vulnerabilities. |
| 94 | + |
| 95 | +Java/Kotlin |
| 96 | +""""""""""" |
| 97 | + |
| 98 | +* Java analysis of guards has been switched to use the new and improved shared guards library. This improves precision of a number of queries, in particular :code:`java/dereferenced-value-may-be-null`, which now has fewer false positives, and :code:`java/useless-null-check` and :code:`java/constant-comparison`, which gain additional true positives. |
| 99 | + |
| 100 | +JavaScript/TypeScript |
| 101 | +""""""""""""""""""""" |
| 102 | + |
| 103 | +* Removed three queries from the JS qlpack, which have been superseded by newer queries that are part of the Actions qlpack: |
| 104 | + |
| 105 | + * :code:`js/actions/pull-request-target` has been superseded by :code:`actions/untrusted-checkout/{medium,high,critical}` |
| 106 | + * :code:`js/actions/actions-artifact-leak` has been superseded by :code:`actions/secrets-in-artifacts` |
| 107 | + * :code:`js/actions/command-injection` has been superseded by :code:`actions/command-injection/{medium,critical}` |
| 108 | + |
| 109 | +New Queries |
| 110 | +~~~~~~~~~~~ |
| 111 | + |
| 112 | +Rust |
| 113 | +"""" |
| 114 | + |
| 115 | +* Added a new query, :code:`rust/access-after-lifetime-ended`, for detecting pointer dereferences after the lifetime of the pointed-to object has ended. |
| 116 | + |
| 117 | +Language Libraries |
| 118 | +------------------ |
| 119 | + |
| 120 | +Bug Fixes |
| 121 | +~~~~~~~~~ |
| 122 | + |
| 123 | +JavaScript/TypeScript |
| 124 | +""""""""""""""""""""" |
| 125 | + |
| 126 | +* The JavaScript extractor no longer ignores source files specified in the :code:`tsconfig.json` compiler options :code:`outDir` if doing so would result in excluding all source code. |
| 127 | + |
| 128 | +Python |
| 129 | +"""""" |
| 130 | + |
| 131 | +* The Python parser is now able to correctly parse expressions such as :code:`match[1]` and :code:`match()` where :code:`match` is not used as a keyword. |
| 132 | + |
| 133 | +GitHub Actions |
| 134 | +"""""""""""""" |
| 135 | + |
| 136 | +* The :code:`actions/artifact-poisoning/critical` and :code:`actions/artifact-poisoning/medium` queries now exclude artifacts downloaded to :code:`$[{ runner.temp }}` in addition to :code:`/tmp`. |
| 137 | + |
| 138 | +Breaking Changes |
| 139 | +~~~~~~~~~~~~~~~~ |
| 140 | + |
| 141 | +Ruby |
| 142 | +"""" |
| 143 | + |
| 144 | +* Most classes and predicates in the AST, SSA, and control-flow-graph libraries are now annotated with :code:`overlay[local]`, in preparation for incremental analysis. This could result in compiler errors for custom queries if they extend these classes. To mitigate such errors, look for ways to restructure custom QL code so it doesn't depend on changing the behavior of standard-library classes. |
| 145 | + |
| 146 | +Minor Analysis Improvements |
| 147 | +~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
| 148 | + |
| 149 | +C/C++ |
| 150 | +""""" |
| 151 | + |
| 152 | +* The :code:`FunctionWithWrappers` library (:code:`semmle.code.cpp.security.FunctionWithWrappers`) no longer considers calls through function pointers as wrapper functions. |
| 153 | +* The analysis of C/C++ code targeting 64-bit Arm platforms has been improved. This includes support for the Arm-specific builtin functions, support for the :code:`arm_neon.h` header and Neon vector types, and support for the :code:`fp8` scalar type. The :code:`arm_sve.h` header and scalable vectors are only partially supported at this point. |
| 154 | +* Added support for :code:`__fp16 _Complex` and :code:`__bf16 _Complex` types |
| 155 | +* Added :code:`sql-injection` sink models for the Oracle Call Interface (OCI) database library functions :code:`OCIStmtPrepare` and :code:`OCIStmtPrepare2`. |
| 156 | + |
| 157 | +Golang |
| 158 | +"""""" |
| 159 | + |
| 160 | +* Added models for the :code:`Head` function and the :code:`Client.Head` method, from the :code:`net/http` package, to the :code:`Http::ClientRequest` class. This means that they will be recognized as sinks for the query :code:`go/request-forgery` and the experimental query :code:`go/ssrf`. |
| 161 | +* Previously, :code:`DefinedType.getBaseType` gave the underlying type. It now gives the right hand side of the type declaration, as the documentation indicated that it should. |
| 162 | + |
| 163 | +Java/Kotlin |
| 164 | +""""""""""" |
| 165 | + |
| 166 | +* The qualifiers of a calls to :code:`readObject` on any classes that implement :code:`java.io.ObjectInput` are now recognised as sinks for :code:`java/unsafe-deserialization`. Previously this was only the case for classes which extend :code:`java.io.ObjectInputStream`. |
| 167 | + |
| 168 | +JavaScript/TypeScript |
| 169 | +""""""""""""""""""""" |
| 170 | + |
| 171 | +* Enhanced modeling for the :code:`execa` library, adding support for command execution methods :code:`execaCommand`, :code:`execaCommandSync`, :code:`$`, and :code:`$.sync`, as well as file system operations through :code:`inputFile`, :code:`pipeStdout`, :code:`pipeAll`, and :code:`pipeStderr`. |
| 172 | + |
| 173 | +Python |
| 174 | +"""""" |
| 175 | + |
| 176 | +* Type annotations such as :code:`foo : Bar` are now treated by the call graph as an indication that :code:`foo` may be an instance of :code:`Bar`. |
| 177 | + |
| 178 | +Rust |
| 179 | +"""" |
| 180 | + |
| 181 | +* Type inference has been extended to support pattern matching. |
| 182 | +* Call resolution for calls to associated functions has been improved, so it now disambiguates the targets based on type information at the call sites (either type information about the arguments or about the expected return types). |
| 183 | +* Type inference has been improved for :code:`for` loops and range expressions, which improves call resolution and may ultimately lead to more query results. |
| 184 | +* Implemented support for data flow through trait functions. For the purpose of data flow, calls to trait functions dispatch to all possible implementations. |
| 185 | +* :code:`AssocItem` and :code:`ExternItem` are now proper subclasses of :code:`Item`. |
| 186 | +* Added type inference for :code:`for` loops and array expressions. |
| 187 | + |
| 188 | +Deprecated APIs |
| 189 | +~~~~~~~~~~~~~~~ |
| 190 | + |
| 191 | +C/C++ |
| 192 | +""""" |
| 193 | + |
| 194 | +* The :code:`UnknownDefaultLocation`, :code:`UnknownExprLocation`, and :code:`UnknownStmtLocation` classes have been deprecated. Use :code:`UnknownLocation` instead. |
| 195 | + |
| 196 | +Golang |
| 197 | +"""""" |
| 198 | + |
| 199 | +* The class :code:`BuiltinType` is now deprecated. Use the new replacement :code:`BuiltinTypeEntity` instead. |
| 200 | +* The class :code:`DeclaredType` is now deprecated. Use the new replacement :code:`DeclaredTypeEntity` instead. |
| 201 | + |
| 202 | +Java/Kotlin |
| 203 | +""""""""""" |
| 204 | + |
| 205 | +* The module :code:`semmle.code.java.frameworks.Castor` has been deprecated and will be removed in a future release. |
| 206 | +* The module :code:`semmle.code.java.frameworks.JYaml` has been deprecated and will be removed in a future release. |
| 207 | +* The classes :code:`UnsafeHessianInputReadObjectMethod` and :code:`BurlapInputReadObjectMethod` in the module :code:`semmle.code.java.frameworks.HessianBurlap` have been deprecated and will be removed in a future release. |
| 208 | +* The class :code:`YamlBeansReaderReadMethod` in the module :code:`semmle.code.java.frameworks.YamlBeans` has been deprecated and will be removed in a future release. |
| 209 | +* The class :code:`MethodApacheSerializationUtilsDeserialize` in the module :code:`semmle.code.java.frameworks.apache.Lang` has been deprecated and will be removed in a future release. |
| 210 | + |
| 211 | +New Features |
| 212 | +~~~~~~~~~~~~ |
| 213 | + |
| 214 | +C/C++ |
| 215 | +""""" |
| 216 | + |
| 217 | +* Added a :code:`isFinalValueOfParameter` predicate to :code:`DataFlow::Node` which holds when a dataflow node represents the final value of an output parameter of a function. |
| 218 | + |
| 219 | +C# |
| 220 | +"" |
| 221 | + |
| 222 | +* Added a new predicate, :code:`getASuperType()`, to get a direct supertype of this type. |
| 223 | + |
| 224 | +Java/Kotlin |
| 225 | +""""""""""" |
| 226 | + |
| 227 | +* You can now add sinks for the query "Deserialization of user-controlled data" (:code:`java/unsafe-deserialization`) using `data extensions <https://codeql.github.com/docs/codeql-language-guides/customizing-library-models-for-java-and-kotlin/#extensible-predicates-used-to-create-custom-models-in-java-and-kotlin>`__ by extending :code:`sinkModel` and using the kind "unsafe-deserialization". The existing sinks that do not require extra logic to determine if they are unsafe are now defined in this way. |
| 228 | + |
| 229 | +Shared Libraries |
| 230 | +---------------- |
| 231 | + |
| 232 | +Minor Analysis Improvements |
| 233 | +~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
| 234 | + |
| 235 | +Concepts |
| 236 | +"""""""" |
| 237 | + |
| 238 | +* Initial release. Moves the shared concepts library into its own qlpack. |
0 commit comments