Skip to content

Commit fcb4703

Browse files
authored
Merge pull request #18833 from github/changedocs/2.20.5
Add changelog for CodeQL CLI version 2.20.5
2 parents 08913c5 + fd9475e commit fcb4703

File tree

2 files changed

+166
-0
lines changed

2 files changed

+166
-0
lines changed
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,165 @@
1+
.. _codeql-cli-2.20.5:
2+
3+
==========================
4+
CodeQL 2.20.5 (2025-02-20)
5+
==========================
6+
7+
.. contents:: Contents
8+
:depth: 2
9+
:local:
10+
:backlinks: none
11+
12+
This is an overview of changes in the CodeQL CLI and relevant CodeQL query and library packs. For additional updates on changes to the CodeQL code scanning experience, check out the `code scanning section on the GitHub blog <https://github.blog/tag/code-scanning/>`__, `relevant GitHub Changelog updates <https://github.blog/changelog/label/code-scanning/>`__, `changes in the CodeQL extension for Visual Studio Code <https://marketplace.visualstudio.com/items/GitHub.vscode-codeql/changelog>`__, and the `CodeQL Action changelog <https://github.com/github/codeql-action/blob/main/CHANGELOG.md>`__.
13+
14+
Security Coverage
15+
-----------------
16+
17+
CodeQL 2.20.5 runs a total of 450 security queries when configured with the Default suite (covering 168 CWE). The Extended suite enables an additional 136 queries (covering 34 more CWE). 4 security queries have been added with this release.
18+
19+
CodeQL CLI
20+
----------
21+
22+
Breaking Changes
23+
~~~~~~~~~~~~~~~~
24+
25+
* Removed support for :code:`QlBuiltins::BigInt`\ s in the :code:`avg()` aggregate.
26+
27+
* A number of breaking changes have been made to the C and C++ CodeQL test environment as used by :code:`codeql test run`\ :
28+
29+
* The :code:`-Xclang-only=<arg>` option is no longer supported by :code:`semmle-extractor-options`. Instead, when either :code:`--clang` or :code:`--clang_version` is specified the option should be replaced by :code:`<arg>` only, otherwise the option should be omitted.
30+
* The :code:`--sys_include <arg>` and :code:`--preinclude <arg>` options are no longer supported by :code:`semmle-extractor-options`. Instead, :code:`--edg <option_name> --edg <arg>` should be specified.
31+
* The :code:`-idirafter <arg>` option is no longer supported by :code:`semmle-extractor-options`. Instead, :code:`--edg --sys_include --edg <arg>` should be specified.
32+
* The :code:`-imacros <arg>` option is no longer supported by :code:`semmle-extractor-options`. Instead, :code:`--edg --preinclude_macros --edg <arg>` should be specified.
33+
* The :code:`/FI <arg>` option is no longer supported by :code:`semmle-extractor-options`. Instead, :code:`--edg --preinclude --edg <arg>` should be specified.
34+
* The :code:`-Wreserved-user-defined-literal`, :code:`-Wno-reserved-user-defined-literal`, :code:`-fwritable-strings`, :code:`/Zc:rvalueCast`, :code:`/Zc:rvalueCast-`, and :code:`/Zc:wchar_t-` options are no longer supported by :code:`semmle-extractor-options`. Instead, :code:`--edg --reserved_user_defined_literal`, :code:`--edg --no-reserved_user_defined_literal`, :code:`--edg --no_const_string_literals`, :code:`--edg --no_preserve_lvalues_with_same_type_casts`, :code:`--edg --preserve_lvalues_with_same_type_casts`, and :code:`--edg --no_wchar_t_keyword` should be specified, respectively.
35+
* The :code:`/Fo <arg>` option is no longer supported by :code:`semmle-extractor-options`. The option should be omitted.
36+
37+
Query Packs
38+
-----------
39+
40+
Bug Fixes
41+
~~~~~~~~~
42+
43+
JavaScript/TypeScript
44+
"""""""""""""""""""""
45+
46+
* Fixed a recently-introduced bug that prevented taint tracking through :code:`URLSearchParams` objects.
47+
The original behaviour has been restored and taint should once again be tracked through such objects.
48+
* Fixed a rare issue that would occur when a function declaration inside a block statement was referenced before it was declared.
49+
Such code is reliant on legacy web semantics, which is non-standard but nevertheless implemented by most engines.
50+
CodeQL now takes legacy web semantics into account and resolves references to these functions correctly.
51+
* Fixed a bug that would cause parse errors in :code:`.jsx` files in rare cases where the file contained syntax that was misinterpreted as Flow syntax.
52+
53+
Breaking Changes
54+
~~~~~~~~~~~~~~~~
55+
56+
GitHub Actions
57+
""""""""""""""
58+
59+
* The following queries have been removed from the :code:`code-scanning` and :code:`security-extended` suites.
60+
Any existing alerts for these queries will be closed automatically.
61+
62+
* :code:`actions/if-expression-always-true/critical`
63+
* :code:`actions/if-expression-always-true/high`
64+
* :code:`actions/unnecessary-use-of-advanced-config`
65+
66+
* The following query has been moved from the :code:`code-scanning` suite to the :code:`security-extended` suite. Any existing alerts for this query will be closed automatically unless the analysis is configured to use the :code:`security-extended` suite.
67+
68+
* :code:`actions/unpinned-tag`
69+
70+
* The following queries have been added to the :code:`security-extended` suite.
71+
72+
* :code:`actions/unversioned-immutable-action`
73+
* :code:`actions/envpath-injection/medium`
74+
* :code:`actions/envvar-injection/medium`
75+
* :code:`actions/code-injection/medium`
76+
* :code:`actions/artifact-poisoning/medium`
77+
* :code:`actions/untrusted-checkout/medium`
78+
79+
Minor Analysis Improvements
80+
~~~~~~~~~~~~~~~~~~~~~~~~~~~
81+
82+
Golang
83+
""""""
84+
85+
* Added `github.com/gorilla/mux.Vars <https://pkg.go.dev/github.com/gorilla/mux#Vars>`__ to path sanitizers (disabled if `github.com/gorilla/mix.Router.SkipClean <https://pkg.go.dev/github.com/gorilla/mux#Router.SkipClean>`__ has been called).
86+
87+
GitHub Actions
88+
""""""""""""""
89+
90+
* Fixed false positives in the query :code:`actions/unpinned-tag` (CWE-829), which will no longer flag uses of Docker-based GitHub actions pinned by the container's SHA256 digest.
91+
92+
New Queries
93+
~~~~~~~~~~~
94+
95+
Java/Kotlin
96+
"""""""""""
97+
98+
* Added a new query, :code:`java/csrf-unprotected-request-type`, to detect Cross-Site Request Forgery (CSRF) vulnerabilities due to using HTTP request types that are not default-protected from CSRF.
99+
100+
Language Libraries
101+
------------------
102+
103+
Bug Fixes
104+
~~~~~~~~~
105+
106+
Python
107+
""""""
108+
109+
* Fixed a bug in the extractor where a comment inside a subscript could sometimes cause the AST to be missing nodes.
110+
* Using the :code:`break` and :code:`continue` keywords outside of a loop, which is a syntax error but is accepted by our parser, would cause the control-flow construction to fail. This is now no longer the case.
111+
112+
Minor Analysis Improvements
113+
~~~~~~~~~~~~~~~~~~~~~~~~~~~
114+
115+
C#
116+
""
117+
118+
* Full support for C# 13 / .NET 9. All new language features are now supported by the extractor. QL library and data flow support for the new C# 13 language constructs and generated MaD models for the .NET 9 runtime.
119+
* C# 13: Add generated models for .NET 9.
120+
* The models for :code:`System.Net.Http.HttpRequestMessage` and :code:`System.UriBuilder` have been modified to better model the flow of tainted URIs.
121+
* Blazor :code:`[Parameter]` fields bound to a variable from the route specified in the :code:`@page` directive are now modeled as remote flow sources.
122+
123+
Golang
124+
""""""
125+
126+
* Taint models have been added for the :code:`weak` package, which was added in Go 1.24.
127+
* Taint models have been added for the interfaces :code:`TextAppender` and :code:`BinaryAppender` in the :code:`encoding` package, which were added in Go 1.24.
128+
129+
JavaScript/TypeScript
130+
"""""""""""""""""""""
131+
132+
* Added support for regular expressions using the :code:`v` flag.
133+
134+
Deprecated APIs
135+
~~~~~~~~~~~~~~~
136+
137+
C#
138+
""
139+
140+
* The predicates :code:`immediatelyControls` and :code:`controls` on the :code:`ConditionBlock` class have been deprecated in favor of the newly added :code:`dominatingEdge` predicate.
141+
142+
Golang
143+
""""""
144+
145+
* The class :code:`NamedType` has been deprecated. Use the new class :code:`DefinedType` instead. This better matches the terminology used in the Go language specification, which was changed in Go 1.9.
146+
* The member predicate :code:`getNamedType` on :code:`GoMicro::ServiceInterfaceType` has been deprecated. Use the new member predicate :code:`getDefinedType` instead.
147+
* The member predicate :code:`getNamedType` on :code:`Twirp::ServiceInterfaceType` has been deprecated. Use the new member predicate :code:`getDefinedType` instead.
148+
149+
Ruby
150+
""""
151+
152+
* The predicates :code:`immediatelyControls` and :code:`controls` on the :code:`ConditionBlock` class have been deprecated in favor of the newly added :code:`dominatingEdge` predicate.
153+
154+
Swift
155+
"""""
156+
157+
* The predicates :code:`immediatelyControls` and :code:`controls` on the :code:`ConditionBlock` class have been deprecated in favor of the newly added :code:`dominatingEdge` predicate.
158+
159+
New Features
160+
~~~~~~~~~~~~
161+
162+
GitHub Actions
163+
""""""""""""""
164+
165+
* The "Unpinned tag for a non-immutable Action in workflow" query (:code:`actions/unpinned-tag`) now supports expanding the trusted action owner list using data extensions (:code:`extensible: trustedActionsOwnerDataModel`). If you trust an Action publisher, you can include the owner name/organization in a model pack to add it to the allow list for this query. This addition will prevent security alerts when using unpinned tags for Actions published by that owner. For more information on creating a model pack, see `Creating a CodeQL Model Pack <https://docs.github.com/en/code-security/codeql-cli/using-the-advanced-functionality-of-the-codeql-cli/creating-and-working-with-codeql-packs#creating-a-codeql-model-pack>`__.

docs/codeql/codeql-overview/codeql-changelog/index.rst

+1
Original file line numberDiff line numberDiff line change
@@ -11,6 +11,7 @@ A list of queries for each suite and language `is available here <https://docs.g
1111
.. toctree::
1212
:maxdepth: 1
1313

14+
codeql-cli-2.20.5
1415
codeql-cli-2.20.4
1516
codeql-cli-2.20.3
1617
codeql-cli-2.20.2

0 commit comments

Comments
 (0)