Skip to content

Commit 6838d94

Browse files
committed
CodeQL 2.19.2 changedocs
1 parent 226756e commit 6838d94

File tree

3 files changed

+92
-1
lines changed

3 files changed

+92
-1
lines changed

docs/codeql/codeql-overview/codeql-changelog/codeql-cli-2.19.1.rst

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -55,7 +55,7 @@ New Queries
5555
Python
5656
""""""
5757

58-
* The :code:`py/cors-misconfiguration-with-credentials` query, which finds insecure CORS middleware configurations.
58+
* The experimental :code:`py/cors-misconfiguration-with-credentials` query, which finds insecure CORS middleware configurations.
5959

6060
Query Metadata Changes
6161
~~~~~~~~~~~~~~~~~~~~~~
Lines changed: 90 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,90 @@
1+
.. _codeql-cli-2.19.2:
2+
3+
==========================
4+
CodeQL 2.19.2 (2024-10-21)
5+
==========================
6+
7+
.. contents:: Contents
8+
:depth: 2
9+
:local:
10+
:backlinks: none
11+
12+
This is an overview of changes in the CodeQL CLI and relevant CodeQL query and library packs. For additional updates on changes to the CodeQL code scanning experience, check out the `code scanning section on the GitHub blog <https://github.blog/tag/code-scanning/>`__, `relevant GitHub Changelog updates <https://github.blog/changelog/label/code-scanning/>`__, `changes in the CodeQL extension for Visual Studio Code <https://marketplace.visualstudio.com/items/GitHub.vscode-codeql/changelog>`__, and the `CodeQL Action changelog <https://github.com/github/codeql-action/blob/main/CHANGELOG.md>`__.
13+
14+
Security Coverage
15+
-----------------
16+
17+
CodeQL 2.19.2 runs a total of 427 security queries when configured with the Default suite (covering 164 CWE). The Extended suite enables an additional 128 queries (covering 34 more CWE). 1 security query has been added with this release.
18+
19+
CodeQL CLI
20+
----------
21+
22+
Potentially Breaking Changes
23+
~~~~~~~~~~~~~~~~~~~~~~~~~~~~
24+
25+
* The Python extractor will no longer extract the standard library by default, relying instead on models of the standard library. This should result in significantly faster extraction and analysis times, while the effect on alerts should be minimal. It will for a while be possible to force extraction of the standard library by setting the environment variable :code:`CODEQL_EXTRACTOR_PYTHON_EXTRACT_STDLIB` to :code:`1`.
26+
27+
Bug Fixes
28+
~~~~~~~~~
29+
30+
* The 2.19.1 release contained a bug in the query evaluator that under rare conditions could lead to wrong alerts or resource exhaustion. Although we have never seen the problem outside of internal testing, we encourage users on 2.19.1 to upgrade to 2.19.2.
31+
32+
Miscellaneous
33+
~~~~~~~~~~~~~
34+
35+
* The database relation :code:`sourceLocationPrefix` is changed for databases created with
36+
:code:`codeql test run`. Instead of containing the path of the enclosing qlpack, it now contains the actual path of the test, similar to if one had run :code:`codeql database create` on the test folder. For example, for a test such as
37+
:code:`<checkout>/cpp/ql/test/query-tests/Security/CWE/CWE-611/XXE.qlref` we now populate
38+
:code:`sourceLocationPrefix` with :code:`<checkout>/cpp/ql/test/query-tests/Security/CWE/CWE-611/` instead of :code:`<checkout>/cpp/ql/test/`. This change typically impacts calls to
39+
:code:`File.getRelativePath()`, and may as a result change the expected test output.
40+
41+
Query Packs
42+
-----------
43+
44+
Minor Analysis Improvements
45+
~~~~~~~~~~~~~~~~~~~~~~~~~~~
46+
47+
C/C++
48+
"""""
49+
50+
* The :code:`cpp/unclear-array-index-validation` ("Unclear validation of array index") query has been improved to reduce false positives and increase true positives.
51+
* Fixed false positives in the :code:`cpp/uninitialized-local` ("Potentially uninitialized local variable") query if there are extraction errors in the function.
52+
* The :code:`cpp/incorrect-string-type-conversion` query now produces fewer false positives caused by failure to detect byte arrays.
53+
* The :code:`cpp/incorrect-string-type-conversion` query now produces fewer false positives caused by failure to recognize dynamic checks prior to possible dangerous widening.
54+
55+
Ruby
56+
""""
57+
58+
* The :code:`rb/diagnostics/extraction-errors` diagnostic query has been split into :code:`rb/diagnostics/extraction-errors` and :code:`rb/diagnostics/extraction-warnings`, counting extraction errors and warnings respectively.
59+
60+
Language Libraries
61+
------------------
62+
63+
Minor Analysis Improvements
64+
~~~~~~~~~~~~~~~~~~~~~~~~~~~
65+
66+
C/C++
67+
"""""
68+
69+
* Added taint flow model for :code:`fopen` and related functions.
70+
* The :code:`SimpleRangeAnalysis` library (:code:`semmle.code.cpp.rangeanalysis.SimpleRangeAnalysis`) now generates more precise ranges for calls to :code:`fgetc` and :code:`getc`.
71+
72+
Golang
73+
""""""
74+
75+
* Added member predicates :code:`StructTag.hasOwnFieldWithTag` and :code:`Field.getTag`, which enable CodeQL queries to examine struct field tags.
76+
* Added member predicate :code:`InterfaceType.hasPrivateMethodWithQualifiedName`, which enables CodeQL queries to distinguish interfaces with matching non-exported method names that are declared in different packages, and are therefore incompatible.
77+
78+
Python
79+
""""""
80+
81+
* Modelled that :code:`re.finditer` returns an iterable of :code:`re.Match` objects. This is now understood by the API graph in many cases.
82+
* Type tracking, and hence the API graph, is now able to correctly trace through comprehensions.
83+
* More precise modelling of the dataflow through comprehensions. In particular, captured variables are now handled correctly.
84+
* Dataflow out of yield is added, allowing proper tracing through generators.
85+
* Added several models of standard library functions and classes, in anticipation of no longer extracting the standard library in a future release.
86+
87+
Ruby
88+
""""
89+
90+
* The :code:`ExtractionError` class has been split into :code:`ExtractionError` and :code:`ExtractionWarning`, reporting extraction errors and warnings respectively.

docs/codeql/codeql-overview/codeql-changelog/index.rst

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -11,6 +11,7 @@ A list of queries for each suite and language `is available here <https://docs.g
1111
.. toctree::
1212
:maxdepth: 1
1313

14+
codeql-cli-2.19.2
1415
codeql-cli-2.19.1
1516
codeql-cli-2.19.0
1617
codeql-cli-2.18.4

0 commit comments

Comments
 (0)