Skip to content

Commit 5ac8475

Browse files
authored
Merge pull request #4578 from aschackmull/java/changenotes
Java: Add missing change notes for 1.26
2 parents b3fe333 + 5687b7c commit 5ac8475

15 files changed

+48
-1
lines changed

change-notes/1.26/analysis-java.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -18,4 +18,3 @@ The following changes in version 1.26 affect Java analysis in all applications.
1818

1919
## Changes to libraries
2020

21-
* The QL class `Block`, denoting the `{ ... }` statement, is renamed to `BlockStmt`.
Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,2 @@
1+
lgtm,codescanning
2+
* The SQL injection queries have been improved to recognize MongoDB injection sinks.
Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,3 @@
1+
lgtm,codescanning
2+
* Reads from `java.net.http.WebSocket` have been added as sources of tainted data for all
3+
security queries.
Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,2 @@
1+
lgtm,codescanning
2+
* The SQL injection queries have been improved to recognize unsafe jOOQ methods.
Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,3 @@
1+
lgtm,codescanning
2+
* The query "Uncontrolled data used in path expression" (`java/path-injection`) has been
3+
improved to recognize more path creation entry points.
Lines changed: 9 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,9 @@
1+
lgtm,codescanning
2+
* Two new queries, "Untrusted data passed to external API" (`java/untrusted-data-to-external-api`)
3+
and "Frequency counts for external APIs that are used with untrusted data"
4+
(`java/count-untrusted-data-external-api`), have been added. These queries
5+
should not be run by default as they are designed to have a low "true
6+
positive" rate. However, they allow you to review the use of untrusted data
7+
in an application to find new security vulnerabilities that are not found by
8+
the default security queries, as well as identifying opportunities to improve
9+
or add modeling of taint steps and sinks.
Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,4 @@
1+
lgtm,codescanning
2+
* The query "Information exposure through a stack trace" (`java/stack-trace-exposure`) has been
3+
improved to report fewer false positives when `super.printStackTrace()` is called
4+
in an overridden method.
Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,3 @@
1+
lgtm,codescanning
2+
* The query "Cross-site scripting" (`java/xss`) has been improved to recognize
3+
`PrintWriter.format` as an XSS sink.
Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,4 @@
1+
lgtm,codescanning
2+
* Virtual dispatch in data flow has been improved to take call-context-specific type
3+
improvements to instance arguments into account. This improves precision for certain
4+
code patterns involving heavy virtual dispatch.
Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,2 @@
1+
lgtm,codescanning
2+
* The string format queries now recognize the Java 14 `String.formatted` method.

0 commit comments

Comments
 (0)