Skip to content

Commit 1e225d7

Browse files
authored
Merge pull request github#17366 from owen-mc/go/edit-release-change-notes
Go: Remove threat models change note from 1.15.md
2 parents 04f4039 + f5c195d commit 1e225d7

File tree

2 files changed

+12
-12
lines changed

2 files changed

+12
-12
lines changed
Lines changed: 12 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,12 @@
1+
---
2+
category: minorAnalysis
3+
---
4+
* Local source models for reading and parsing environment variables have been added for the following libraries:
5+
* os
6+
* syscall
7+
* github.com/caarlos0/env
8+
* github.com/gobuffalo/envy
9+
* github.com/hashicorp/go-envparse
10+
* github.com/joho/godotenv
11+
* github.com/kelseyhightower/envconfig
12+
* Local source models have been added for the APIs which open files in the `io/fs`, `io/ioutil` and `os` packages in the Go standard library. You can optionally include threat models as appropriate when using the CodeQL CLI and in GitHub code scanning. For more information, see [Analyzing your code with CodeQL queries](https://docs.github.com/code-security/codeql-cli/getting-started-with-the-codeql-cli/analyzing-your-code-with-codeql-queries#including-model-packs-to-add-potential-sources-of-tainted-data>) and [Customizing your advanced setup for code scanning](https://docs.github.com/code-security/code-scanning/creating-an-advanced-setup-for-code-scanning/customizing-your-advanced-setup-for-code-scanning#extending-codeql-coverage-with-threat-models).
Lines changed: 0 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -1,17 +1,5 @@
11
## 1.1.5
22

3-
### Minor Analysis Improvements
4-
5-
* Local source models for reading and parsing environment variables have been added for the following libraries:
6-
- os
7-
- syscall
8-
- github.com/caarlos0/env
9-
- github.com/gobuffalo/envy
10-
- github.com/hashicorp/go-envparse
11-
- github.com/joho/godotenv
12-
- github.com/kelseyhightower/envconfig
13-
* Local source models have been added for the APIs which open files in the `io/fs`, `io/ioutil` and `os` packages in the Go standard library. You can optionally include threat models as appropriate when using the CodeQL CLI and in GitHub code scanning. For more information, see [Analyzing your code with CodeQL queries](https://docs.github.com/code-security/codeql-cli/getting-started-with-the-codeql-cli/analyzing-your-code-with-codeql-queries#including-model-packs-to-add-potential-sources-of-tainted-data>) and [Customizing your advanced setup for code scanning](https://docs.github.com/code-security/code-scanning/creating-an-advanced-setup-for-code-scanning/customizing-your-advanced-setup-for-code-scanning#extending-codeql-coverage-with-threat-models).
14-
153
### Bug Fixes
164

175
* Fixed an issue where `io/ioutil.WriteFile`'s non-path arguments incorrectly generated `go/path-injection` alerts when untrusted data was written to a file, or controlled the file's mode.

0 commit comments

Comments
 (0)