Skip to content

Commit 532e1fe

Browse files
author
github-actions[bot]
committed
update codeql documentation
1 parent fb67f93 commit 532e1fe

File tree

6 files changed

+115
-5
lines changed

6 files changed

+115
-5
lines changed

docs/codeql/codeql-overview/codeql-changelog/codeql-cli-2.19.1.rst

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -129,7 +129,7 @@ Java/Kotlin
129129
"""""""""""
130130

131131
* The Java extractor and QL libraries now support Java 23.
132-
* Kotlin versions up to 2.1.0\ *x* are now supported.
132+
* Kotlin versions up to 2.1.0*x* are now supported.
133133

134134
Python
135135
""""""

docs/codeql/codeql-overview/codeql-changelog/codeql-cli-2.21.3.rst

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -144,7 +144,7 @@ New Features
144144
Java/Kotlin
145145
"""""""""""
146146

147-
* Kotlin versions up to 2.2.0\ *x* are now supported. Support for the Kotlin 1.5.x series is dropped (so the minimum Kotlin version is now 1.6.0).
147+
* Kotlin versions up to 2.2.0*x* are now supported. Support for the Kotlin 1.5.x series is dropped (so the minimum Kotlin version is now 1.6.0).
148148

149149
Swift
150150
"""""

docs/codeql/codeql-overview/codeql-changelog/codeql-cli-2.22.3.rst

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -98,4 +98,4 @@ C/C++
9898
Java/Kotlin
9999
"""""""""""
100100

101-
* Kotlin versions up to 2.2.2\ *x* are now supported.
101+
* Kotlin versions up to 2.2.2*x* are now supported.

docs/codeql/codeql-overview/codeql-changelog/codeql-cli-2.23.1.rst

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -88,7 +88,7 @@ JavaScript/TypeScript
8888
* Data flow is now tracked through the :code:`Promise.try` and :code:`Array.prototype.with` functions.
8989
* Query :code:`js/index-out-of-bounds` no longer produces a false-positive when a strictly-less-than check overrides a previous less-than-or-equal test.
9090
* The query :code:`js/remote-property-injection` now detects property injection vulnerabilities through object enumeration patterns such as :code:`Object.keys()`.
91-
* The query "Permissive CORS configuration" (:code:`js/cors-permissive-configuration`) has been promoted from experimental and is now part of the default security suite. Thank you to @maikypedia who `submitted the original experimental query <https://github.com/github/codeql/pull/14342>`__!
91+
* The query "Permissive CORS configuration" (:code:`js/cors-permissive-configuration`) has been promoted from experimental and is now part of the default security suite. Thank you to @maikypedia who `submitted the original experimental query <https://github.com/github/codeql/pull/14342>`__\ !
9292

9393
Python
9494
""""""
@@ -126,7 +126,7 @@ Golang
126126
""""""
127127

128128
* The second argument of the :code:`CreateTemp` function, from the :code:`os` package, is no longer a path-injection sink due to proper sanitization by Go.
129-
* The query "Uncontrolled data used in path expression" (:code:`go/path-injection`) now detects sanitizing a path by adding :code:`os.PathSeparator` or ``\`` to the beginning.
129+
* The query "Uncontrolled data used in path expression" (:code:`go/path-injection`) now detects sanitizing a path by adding :code:`os.PathSeparator` or :code:`\` to the beginning.
130130
131131
Java/Kotlin
132132
"""""""""""
Lines changed: 109 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,109 @@
1+
.. _codeql-cli-2.24.2:
2+
3+
==========================
4+
CodeQL 2.24.2 (2026-02-20)
5+
==========================
6+
7+
.. contents:: Contents
8+
:depth: 2
9+
:local:
10+
:backlinks: none
11+
12+
This is an overview of changes in the CodeQL CLI and relevant CodeQL query and library packs. For additional updates on changes to the CodeQL code scanning experience, check out the `code scanning section on the GitHub blog <https://github.blog/tag/code-scanning/>`__, `relevant GitHub Changelog updates <https://github.blog/changelog/label/application-security/>`__, `changes in the CodeQL extension for Visual Studio Code <https://marketplace.visualstudio.com/items/GitHub.vscode-codeql/changelog>`__, and the `CodeQL Action changelog <https://github.com/github/codeql-action/blob/main/CHANGELOG.md>`__.
13+
14+
Security Coverage
15+
-----------------
16+
17+
CodeQL 2.24.2 runs a total of 491 security queries when configured with the Default suite (covering 166 CWE). The Extended suite enables an additional 135 queries (covering 35 more CWE).
18+
19+
CodeQL CLI
20+
----------
21+
22+
Bug Fixes
23+
~~~~~~~~~
24+
25+
* Fixed SARIF output to generate RFC 1738 compatible file URIs. File URIs now always use the :code:`file:///` format instead of :code:`file:/` for better interoperability with SARIF consumers.
26+
27+
Query Packs
28+
-----------
29+
30+
Bug Fixes
31+
~~~~~~~~~
32+
33+
C#
34+
""
35+
36+
* The :code:`cs/web/missing-token-validation` ("Missing cross-site request forgery token validation") query now recognizes antiforgery attributes on base controller classes, fixing false positives when :code:`[ValidateAntiForgeryToken]` or :code:`[AutoValidateAntiforgeryToken]` is applied to a parent class.
37+
38+
Language Libraries
39+
------------------
40+
41+
Bug Fixes
42+
~~~~~~~~~
43+
44+
Python
45+
""""""
46+
47+
* Using :code:`=` as a fill character in a format specifier (e.g :code:`f"{x:=^20}"`) now no longer results in a syntax error during parsing.
48+
49+
Breaking Changes
50+
~~~~~~~~~~~~~~~~
51+
52+
Golang
53+
""""""
54+
55+
* The :code:`BasicBlock` class is now defined using the shared basic blocks library. :code:`BasicBlock.getRoot` has been replaced by :code:`BasicBlock.getScope`. :code:`BasicBlock.getAPredecessor` and :code:`BasicBlock.getASuccessor` now take a :code:`SuccessorType` argument. :code:`ReachableJoinBlock.inDominanceFrontierOf` has been removed, so use :code:`BasicBlock.inDominanceFrontier` instead, swapping the receiver and the argument.
56+
57+
Major Analysis Improvements
58+
~~~~~~~~~~~~~~~~~~~~~~~~~~~
59+
60+
Golang
61+
""""""
62+
63+
* Go 1.26 is now supported.
64+
65+
Minor Analysis Improvements
66+
~~~~~~~~~~~~~~~~~~~~~~~~~~~
67+
68+
C/C++
69+
"""""
70+
71+
* Added remote flow source models for the :code:`winhttp.h` windows header and the Azure SDK core library for C/C++.
72+
73+
C#
74+
""
75+
76+
* The model for :code:`System.Web.HttpUtility` has been modified to better model the flow of tainted URIs.
77+
* C# 14: Added support for :code:`extension` members in the extractor, QL library, data flow, and Models as Data, covering extension methods, properties, and operators.
78+
79+
Java/Kotlin
80+
"""""""""""
81+
82+
* Using a regular expression to check that a string doesn't contain any line breaks is already a sanitizer for :code:`java/log-injection`. Additional ways of doing the regular expression check are now recognised, including annotation with :code:`@javax.validation.constraints.Pattern`.
83+
* More ways of checking that a string matches a regular expression are now considered as sanitizers for various queries, including :code:`java/ssrf` and :code:`java/path-injection`. In particular, being annotated with :code:`@javax.validation.constraints.Pattern` is now recognised as a sanitizer for those queries.
84+
* Kotlin versions up to 2.3.10 are now supported.
85+
86+
Python
87+
""""""
88+
89+
* Added request forgery sink models for the Azure SDK.
90+
* Made it so that models-as-data sinks with the kind :code:`request-forgery` contribute to the class :code:`Http::Client::Request` which represents HTTP client requests.
91+
92+
Deprecated APIs
93+
~~~~~~~~~~~~~~~
94+
95+
Java/Kotlin
96+
"""""""""""
97+
98+
* The :code:`UnreachableBlocks.qll` library has been deprecated.
99+
* Renamed the following predicates to increase uniformity across languages. The :code:`getBody` predicate already existed on :code:`LoopStmt`, but is now properly inherited.
100+
101+
* :code:`UnaryExpr.getExpr` to :code:`getOperand`.
102+
* :code:`ConditionalExpr.getTrueExpr` to :code:`getThen`.
103+
* :code:`ConditionalExpr.getFalseExpr` to :code:`getElse`.
104+
* :code:`ReturnStmt.getResult` to :code:`getExpr`.
105+
* :code:`WhileStmt.getStmt` to :code:`getBody`.
106+
* :code:`DoStmt.getStmt` to :code:`getBody`.
107+
* :code:`ForStmt.getStmt` to :code:`getBody`.
108+
* :code:`EnhancedForStmt.getStmt` to :code:`getBody`.
109+

docs/codeql/codeql-overview/codeql-changelog/index.rst

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -11,6 +11,7 @@ A list of queries for each suite and language `is available here <https://docs.g
1111
.. toctree::
1212
:maxdepth: 1
1313

14+
codeql-cli-2.24.2
1415
codeql-cli-2.24.1
1516
codeql-cli-2.24.0
1617
codeql-cli-2.23.9

0 commit comments

Comments
 (0)