Skip to content

Commit 97ca2af

Browse files
authored
Merge pull request #19348 from github/changedocs-2.21.1
changedocs from 2.21.1 release
2 parents 4483a24 + 2439b1e commit 97ca2af

File tree

2 files changed

+142
-0
lines changed

2 files changed

+142
-0
lines changed
Lines changed: 141 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,141 @@
1+
.. _codeql-cli-2.21.1:
2+
3+
==========================
4+
CodeQL 2.21.1 (2025-04-22)
5+
==========================
6+
7+
.. contents:: Contents
8+
:depth: 2
9+
:local:
10+
:backlinks: none
11+
12+
This is an overview of changes in the CodeQL CLI and relevant CodeQL query and library packs. For additional updates on changes to the CodeQL code scanning experience, check out the `code scanning section on the GitHub blog <https://github.blog/tag/code-scanning/>`__, `relevant GitHub Changelog updates <https://github.blog/changelog/label/code-scanning/>`__, `changes in the CodeQL extension for Visual Studio Code <https://marketplace.visualstudio.com/items/GitHub.vscode-codeql/changelog>`__, and the `CodeQL Action changelog <https://github.com/github/codeql-action/blob/main/CHANGELOG.md>`__.
13+
14+
Security Coverage
15+
-----------------
16+
17+
CodeQL 2.21.1 runs a total of 452 security queries when configured with the Default suite (covering 168 CWE). The Extended suite enables an additional 136 queries (covering 35 more CWE).
18+
19+
CodeQL CLI
20+
----------
21+
22+
Bug Fixes
23+
~~~~~~~~~
24+
25+
* Fixed a bug in CodeQL analysis for GitHub Actions in the presence of a code scanning configuration file containing :code:`paths-ignore` exclusion patterns but not :code:`paths` inclusion patterns.
26+
Previously, such a configuration incorrectly led to all YAML, HTML,
27+
JSON, and JS source files being extracted,
28+
except for those filtered by :code:`paths-ignore`.
29+
This in turn led to performance issues on large codebases.
30+
Now, only workflow and Action metadata YAML files relevant to the GitHub Actions analysis will be extracted,
31+
except for those filtered by :code:`paths-ignore`.
32+
This matches the default behavior when no configuration file is provided.
33+
The handling of :code:`paths` inclusion patterns is unchanged:
34+
if provided, only those paths will be considered,
35+
except for those filtered by :code:`paths-ignore`.
36+
37+
Query Packs
38+
-----------
39+
40+
Bug Fixes
41+
~~~~~~~~~
42+
43+
JavaScript/TypeScript
44+
"""""""""""""""""""""
45+
46+
* Fixed a bug that would prevent extraction of :code:`tsconfig.json` files when it contained an array literal with a trailing comma.
47+
48+
GitHub Actions
49+
""""""""""""""
50+
51+
* Alerts produced by the query :code:`actions/missing-workflow-permissions` now include a minimal set of recommended permissions in the alert message, based on well-known actions seen within the workflow file.
52+
53+
Major Analysis Improvements
54+
~~~~~~~~~~~~~~~~~~~~~~~~~~~
55+
56+
Ruby
57+
""""
58+
59+
* The query :code:`rb/useless-assignment-to-local` now comes with query help and has been tweaked to produce fewer false positives.
60+
* The query :code:`rb/uninitialized-local-variable` now only produces alerts when the variable is the receiver of a method call and should produce very few false positives. It also now comes with a help file.
61+
62+
Minor Analysis Improvements
63+
~~~~~~~~~~~~~~~~~~~~~~~~~~~
64+
65+
C#
66+
""
67+
68+
* Enums and :code:`System.DateTimeOffset` are now treated as *simple* types, which means that they are considered to have a sanitizing effect. This impacts many queries, among others the :code:`cs/log-forging` query.
69+
* The MaD models for the .NET 9 Runtime have been re-generated after a fix related to :code:`out`\ /\ :code:`ref` parameters.
70+
71+
JavaScript/TypeScript
72+
"""""""""""""""""""""
73+
74+
* Data passed to the `Response <https://developer.mozilla.org/en-US/docs/Web/API/Response>`__ constructor is now treated as a sink for :code:`js/reflected-xss`.
75+
* Slightly improved detection of DOM element references, leading to XSS results being detected in more cases.
76+
77+
Python
78+
""""""
79+
80+
* The :code:`py/mixed-tuple-returns` query no longer flags instances where the tuple is passed into the function as an argument, as this led to too many false positives.
81+
82+
Language Libraries
83+
------------------
84+
85+
Minor Analysis Improvements
86+
~~~~~~~~~~~~~~~~~~~~~~~~~~~
87+
88+
C#
89+
""
90+
91+
* The *alignment* and *format* clauses in string interpolation expressions are now extracted. That is, in :code:`$"Hello {name,align:format}"` *name*, *align* and *format* are extracted as children of the string interpolation *insert* :code:`{name,align:format}`.
92+
* Blazor support can now better recognize when a property being set is specified with a string literal, rather than referenced in a :code:`nameof` expression.
93+
94+
Golang
95+
""""""
96+
97+
* Local source models for APIs reading from databases have been added for :code:`github.com/gogf/gf/database/gdb` and :code:`github.com/uptrace/bun`.
98+
99+
Java/Kotlin
100+
"""""""""""
101+
102+
* Enum-typed values are now assumed to be safe by most queries. This means that queries may return fewer results where an enum value is used in a sensitive context, e.g. pasted into a query string.
103+
* All existing modelling and support for :code:`javax.persistence` now applies to :code:`jakarta.persistence` as well.
104+
105+
JavaScript/TypeScript
106+
"""""""""""""""""""""
107+
108+
* Data passed to the `NextResponse <https://nextjs.org/docs/app/api-reference/functions/next-response>`__ constructor is now treated as a sink for :code:`js/reflected-xss`.
109+
* Data received from `NextRequest <https://nextjs.org/docs/app/api-reference/functions/next-request>`__ and `Request <https://developer.mozilla.org/en-US/docs/Web/API/Request>`__ is now treated as a remote user input :code:`source`.
110+
* Added support for the :code:`make-dir` package.
111+
* Added support for the :code:`open` package.
112+
* Added taint propagation for :code:`Uint8Array`, :code:`ArrayBuffer`, :code:`SharedArrayBuffer` and :code:`TextDecoder.decode()`.
113+
* Improved detection of :code:`WebSocket` and :code:`SockJS` usage.
114+
* Added data received from :code:`WebSocket` clients as a remote flow source.
115+
* Added support for additional :code:`mkdirp` methods as sinks in path-injection queries.
116+
* Added support for additional :code:`rimraf` methods as sinks in path-injection queries.
117+
118+
Ruby
119+
""""
120+
121+
* Calls to :code:`super` without explict arguments now have their implicit arguments generated. For example, in :code:`def foo(x, y) { super } end` the call to :code:`super` becomes :code:`super(x, y)`.
122+
123+
New Features
124+
~~~~~~~~~~~~
125+
126+
C/C++
127+
"""""
128+
129+
* Calling conventions explicitly specified on function declarations (:code:`__cdecl`, :code:`__stdcall`, :code:`__fastcall`, etc.) are now represented as specifiers of those declarations.
130+
* A new class :code:`CallingConventionSpecifier` extending the :code:`Specifier` class was introduced, which represents explicitly specified calling conventions.
131+
132+
Shared Libraries
133+
----------------
134+
135+
Deprecated APIs
136+
~~~~~~~~~~~~~~~
137+
138+
Static Single Assignment (SSA)
139+
""""""""""""""""""""""""""""""
140+
141+
* All references to the :code:`DefinitionExt` and :code:`PhiReadNode` classes in the SSA library have been deprecated. The concept of phi-read nodes is now strictly an internal implementation detail. Their sole use-case is to improve the structure of the use-use flow relation for data flow, and this use-case remains supported by the :code:`DataFlowIntegration` module.

docs/codeql/codeql-overview/codeql-changelog/index.rst

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -11,6 +11,7 @@ A list of queries for each suite and language `is available here <https://docs.g
1111
.. toctree::
1212
:maxdepth: 1
1313

14+
codeql-cli-2.21.1
1415
codeql-cli-2.21.0
1516
codeql-cli-2.20.7
1617
codeql-cli-2.20.6

0 commit comments

Comments
 (0)