Skip to content

Commit 98f5258

Browse files
authored
Merge pull request #17684 from github/changedocs/2.19.1
Adding unified changelog for 2.19.1
2 parents fcf1b6d + 36937a0 commit 98f5258

File tree

2 files changed

+138
-0
lines changed

2 files changed

+138
-0
lines changed
Lines changed: 137 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,137 @@
1+
.. _codeql-cli-2.19.1:
2+
3+
==========================
4+
CodeQL 2.19.1 (2024-10-04)
5+
==========================
6+
7+
.. contents:: Contents
8+
:depth: 2
9+
:local:
10+
:backlinks: none
11+
12+
This is an overview of changes in the CodeQL CLI and relevant CodeQL query and library packs. For additional updates on changes to the CodeQL code scanning experience, check out the `code scanning section on the GitHub blog <https://github.blog/tag/code-scanning/>`__, `relevant GitHub Changelog updates <https://github.blog/changelog/label/code-scanning/>`__, `changes in the CodeQL extension for Visual Studio Code <https://marketplace.visualstudio.com/items/GitHub.vscode-codeql/changelog>`__, and the `CodeQL Action changelog <https://github.com/github/codeql-action/blob/main/CHANGELOG.md>`__.
13+
14+
Security Coverage
15+
-----------------
16+
17+
CodeQL 2.19.1 runs a total of 426 security queries when configured with the Default suite (covering 164 CWE). The Extended suite enables an additional 128 queries (covering 34 more CWE).
18+
19+
CodeQL CLI
20+
----------
21+
22+
New Features
23+
~~~~~~~~~~~~
24+
25+
* The command :code:`codeql generate query-help` now supports Markdown help files.
26+
The Markdown help format is commonly used in custom CodeQL query packs. This new feature allows us to generate SARIF reporting descriptors for CodeQL queries that include Markdown help directly from a query Markdown help file.
27+
28+
* Added a new command, :code:`codeql resolve packs`. This command shows each step in the pack search process, including what packs were found in each step. With the
29+
:code:`--show-hidden-packs` option, it can also show details on which packs were hidden by packs found earlier in the search sequence. :code:`codeql resolve packs` is intended as a replacement for most uses of :code:`codeql resolve qlpacks`, whose output is both less detailed and less accurate.
30+
31+
Query Packs
32+
-----------
33+
34+
Minor Analysis Improvements
35+
~~~~~~~~~~~~~~~~~~~~~~~~~~~
36+
37+
C/C++
38+
"""""
39+
40+
* Fixed false positives in the :code:`cpp/wrong-number-format-arguments` ("Too few arguments to formatting function") query when the formatting function has been declared implicitly.
41+
42+
C#
43+
""
44+
45+
* C#: The indexer and :code:`Add` method on :code:`System.Web.UI.AttributeCollection` is no longer considered an HTML sink.
46+
47+
Java/Kotlin
48+
"""""""""""
49+
50+
* Added taint summary model for :code:`org.springframework.core.io.InputStreamSource#getInputStream()`.
51+
52+
New Queries
53+
~~~~~~~~~~~
54+
55+
Python
56+
""""""
57+
58+
* The :code:`py/cors-misconfiguration-with-credentials` query, which finds insecure CORS middleware configurations.
59+
60+
Query Metadata Changes
61+
~~~~~~~~~~~~~~~~~~~~~~
62+
63+
Golang
64+
""""""
65+
66+
* The precision of the :code:`go/incorrect-integer-conversion-query` query was decreased from :code:`very-high` to :code:`high`, since there is at least one known class of false positives involving dynamic bounds checking.
67+
68+
Language Libraries
69+
------------------
70+
71+
Breaking Changes
72+
~~~~~~~~~~~~~~~~
73+
74+
C#
75+
""
76+
77+
* C#: Add support for MaD directly on properties and indexers using *attributes*. Using :code:`Attribute.Getter` or :code:`Attribute.Setter` in the model :code:`ext` field applies the model to the getter or setter for properties and indexers. Prior to this change :code:`Attribute` models unintentionally worked for property setters (if the property is decorated with the matching attribute). That is, a model that uses the :code:`Attribute` feature directly on a property for a property setter needs to be changed to :code:`Attribute.Setter`.
78+
* C#: Remove all CIL tables and related QL library functionality.
79+
80+
Minor Analysis Improvements
81+
~~~~~~~~~~~~~~~~~~~~~~~~~~~
82+
83+
C#
84+
""
85+
86+
* :code:`DataFlow::Node` instances are no longer created for library methods and fields that are not callable (either statically or dynamically) or otherwise referred to from source code. This may affect third-party queries that use these nodes to identify library methods or fields that are present in DLL files where those methods or fields are unreferenced. If this presents a problem, consider using :code:`Callable` and other non-dataflow classes to identify such library entities.
87+
* C#: Add extractor support for attributes on indexers.
88+
89+
Golang
90+
""""""
91+
92+
* A method in the method set of an embedded field of a struct should not be promoted to the method set of the struct if the struct has a method with the same name. This was not being enforced, which meant that there were two methods with the same qualified name, and models were sometimes being applied when they shouldn't have been. This has now been fixed.
93+
94+
Python
95+
""""""
96+
97+
* The common sanitizer guard :code:`StringConstCompareBarrier` has been renamed to :code:`ConstCompareBarrier` and expanded to cover comparisons with other constant values such as :code:`None`. This may result in fewer false positive results for several queries.
98+
99+
Swift
100+
"""""
101+
102+
* All AST classes in :code:`codeql.swift.elements` are now :code:`final`, which means that it is no longer possible to :code:`override` predicates defined in those classes (it is, however, still possible to :code:`extend` the classes).
103+
104+
Deprecated APIs
105+
~~~~~~~~~~~~~~~
106+
107+
C#
108+
""
109+
110+
* The class :code:`ThreatModelFlowSource` has been renamed to :code:`ActiveThreatModelSource` to more clearly reflect it only contains the currently active threat model sources. :code:`ThreatModelFlowSource` has been marked as deprecated.
111+
112+
Golang
113+
""""""
114+
115+
* The class :code:`ThreatModelFlowSource` has been renamed to :code:`ActiveThreatModelSource` to more clearly reflect it only contains the currently active threat model sources. :code:`ThreatModelFlowSource` has been marked as deprecated.
116+
117+
Java/Kotlin
118+
"""""""""""
119+
120+
* The :code:`Field.getSourceDeclaration()` predicate has been deprecated. The result was always the original field, so calls to it can simply be removed.
121+
* The :code:`Field.isSourceDeclaration()` predicate has been deprecated. It always holds.
122+
* The :code:`RefType.nestedName()` predicate has been deprecated, and :code:`RefType.getNestedName()` added to replace it.
123+
* The class :code:`ThreatModelFlowSource` has been renamed to :code:`ActiveThreatModelSource` to more clearly reflect it only contains the currently active threat model sources. :code:`ThreatModelFlowSource` has been marked as deprecated.
124+
125+
New Features
126+
~~~~~~~~~~~~
127+
128+
Java/Kotlin
129+
"""""""""""
130+
131+
* The Java extractor and QL libraries now support Java 23.
132+
* Kotlin versions up to 2.1.0\ *x* are now supported.
133+
134+
Python
135+
""""""
136+
137+
* Added support for custom threat-models, which can be used in most of our taint-tracking queries, see our `documentation <https://docs.github.com/en/code-security/code-scanning/creating-an-advanced-setup-for-code-scanning/customizing-your-advanced-setup-for-code-scanning#extending-codeql-coverage-with-threat-models>`__ for more details.

docs/codeql/codeql-overview/codeql-changelog/index.rst

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -11,6 +11,7 @@ A list of queries for each suite and language `is available here <https://docs.g
1111
.. toctree::
1212
:maxdepth: 1
1313

14+
codeql-cli-2.19.1
1415
codeql-cli-2.19.0
1516
codeql-cli-2.18.4
1617
codeql-cli-2.18.3

0 commit comments

Comments
 (0)