Skip to content

Commit 7f76f5b

Browse files
authored
Merge pull request #19740 from github/changedocs-2.22.0
Changedocs 2.22.0
2 parents 7d8d596 + 94a2d08 commit 7f76f5b

File tree

3 files changed

+84
-1
lines changed

3 files changed

+84
-1
lines changed

docs/codeql/codeql-overview/codeql-changelog/codeql-cli-2.19.4.rst

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -79,4 +79,4 @@ JavaScript/TypeScript
7979
* Added taint-steps for :code:`Array.prototype.toReversed`.
8080
* Added taint-steps for :code:`Array.prototype.toSorted`.
8181
* Added support for :code:`String.prototype.matchAll`.
82-
* Added taint-steps for :code:`Array.prototype.reverse`.
82+
* Added taint-steps for :code:`Array.prototype.reverse`.
Lines changed: 82 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,82 @@
1+
.. _codeql-cli-2.22.0:
2+
3+
==========================
4+
CodeQL 2.22.0 (2025-06-11)
5+
==========================
6+
7+
.. contents:: Contents
8+
:depth: 2
9+
:local:
10+
:backlinks: none
11+
12+
This is an overview of changes in the CodeQL CLI and relevant CodeQL query and library packs. For additional updates on changes to the CodeQL code scanning experience, check out the `code scanning section on the GitHub blog <https://github.blog/tag/code-scanning/>`__, `relevant GitHub Changelog updates <https://github.blog/changelog/label/code-scanning/>`__, `changes in the CodeQL extension for Visual Studio Code <https://marketplace.visualstudio.com/items/GitHub.vscode-codeql/changelog>`__, and the `CodeQL Action changelog <https://github.com/github/codeql-action/blob/main/CHANGELOG.md>`__.
13+
14+
Security Coverage
15+
-----------------
16+
17+
CodeQL 2.22.0 runs a total of 450 security queries when configured with the Default suite (covering 165 CWE). The Extended suite enables an additional 128 queries (covering 33 more CWE). 1 security query has been added with this release.
18+
19+
CodeQL CLI
20+
----------
21+
22+
Breaking Changes
23+
~~~~~~~~~~~~~~~~
24+
25+
* A number of breaking changes have been made to the C and C++ CodeQL test environment as used by :code:`codeql test run`\ :
26+
27+
* Options starting with a :code:`/` are no longer supported by
28+
:code:`semmle-extractor-options`. Any option starting with a :code:`/` should be replaced by the equivalent option starting with a :code:`-`, e.g., :code:`/D` should be replaced by :code:`-D`.
29+
* Preprocessor command line options of the form :code:`-D<macro>#<def>` are no longer supported by :code:`semmle-extractor-options`. :code:`-D<macro>=<def>` should be used instead.
30+
* The :code:`/Fp` and :code:`-o` options are no longer supported by
31+
:code:`semmle-extractor-options`. The options should be omitted.
32+
* The :code:`-emit-pch`, :code:`-include-pch`, :code:`/Yc`, and :code:`/Yu` options, and the
33+
:code:`--preinclude` option taking a pre-compiled header as its argument, are no longer supported by :code:`semmle-extractor-options`. Any test that makes use of this should be replaced by a test that invokes the CodeQL CLI with the
34+
:code:`create database` option and that runs the relevant queries on the created database.
35+
36+
Query Packs
37+
-----------
38+
39+
Minor Analysis Improvements
40+
~~~~~~~~~~~~~~~~~~~~~~~~~~~
41+
42+
Python
43+
""""""
44+
45+
* Added SQL injection models from the :code:`pandas` PyPI package.
46+
47+
New Queries
48+
~~~~~~~~~~~
49+
50+
Golang
51+
""""""
52+
53+
* Query (:code:`go/html-template-escaping-bypass-xss`) has been promoted to the main query suite. This query finds potential cross-site scripting (XSS) vulnerabilities when using the :code:`html/template` package, caused by user input being cast to a type which bypasses the HTML autoescaping. It was originally contributed to the experimental query pack by @gagliardetto in `https://github.com/github/codeql-go/pull/493 <https://github.com/github/codeql-go/pull/493>`_.
54+
55+
Language Libraries
56+
------------------
57+
58+
Minor Analysis Improvements
59+
~~~~~~~~~~~~~~~~~~~~~~~~~~~
60+
61+
Golang
62+
""""""
63+
64+
* The first argument of :code:`Client.Query` in :code:`cloud.google.com/go/bigquery` is now recognized as a SQL injection sink.
65+
66+
JavaScript/TypeScript
67+
"""""""""""""""""""""
68+
69+
* Added taint flow through the :code:`URL` constructor from the :code:`url` package, improving the identification of SSRF vulnerabilities.
70+
71+
Swift
72+
"""""
73+
74+
* Updated to allow analysis of Swift 6.1.2.
75+
76+
New Features
77+
~~~~~~~~~~~~
78+
79+
C/C++
80+
"""""
81+
82+
* Added a predicate :code:`getReferencedMember` to :code:`UsingDeclarationEntry`, which yields a member depending on a type template parameter.

docs/codeql/codeql-overview/codeql-changelog/index.rst

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -11,6 +11,7 @@ A list of queries for each suite and language `is available here <https://docs.g
1111
.. toctree::
1212
:maxdepth: 1
1313

14+
codeql-cli-2.22.0
1415
codeql-cli-2.21.4
1516
codeql-cli-2.21.3
1617
codeql-cli-2.21.2

0 commit comments

Comments
 (0)