CodeQL documentation

CodeQL 2.12.3 (2023-02-23)

This is an overview of changes in the CodeQL CLI and relevant CodeQL query and library packs. For additional updates on changes to the CodeQL code scanning experience, check out the code scanning section on the GitHub blog, relevant GitHub Changelog updates, changes in the CodeQL extension for Visual Studio Code, and the CodeQL Action changelog.

Security Coverage

CodeQL 2.12.3 runs a total of 385 security queries when configured with the Default suite (covering 154 CWE). The Extended suite enables an additional 122 queries (covering 31 more CWE). 1 security query has been added with this release.

CodeQL CLI

Bug Fixes

  • Fixed a bug where the CLI would refuse to complete database creation if the OS reports less than about 1.5 GB of physical memory. Now an attempt will be made even on low-memory systems (but it might still run out of memory unless there’s swap space available).

New Features

  • The CodeQL compiler now produces better error messages when it is unable to find a QL library that the query being evaluated depends on.

Query Packs

Minor Analysis Improvements

Java

  • The java/index-out-of-bounds query has improved its handling of arrays of constant length, and may report additional results in those cases.

Ruby

  • The rb/polynomial-redos query now considers the entrypoints of the API of a gem as sources.

New Queries

Golang

  • Added a new query, go/unhandled-writable-file-close, to detect instances where writable file handles are closed without appropriate checks for errors.

Java

  • Added a new query, java/xxe-local, which is a version of the XXE query that uses local sources (for example, reads from a local file).

Ruby

  • Added a new query, rb/regex/badly-anchored-regexp, to detect regular expression validators that use ^ and $ as anchors and therefore might match only a single line of a multi-line string.

Query Metadata Changes

Golang

  • The precision of the go/log-injection query was decreased from high to medium, since it may not be able to identify every way in which log data may be sanitized. This also aligns it with the precision of comparable queries for other languages.

Language Libraries

Breaking Changes

Python

  • Python 2 is no longer supported for extracting databases using the CodeQL CLI. As a consequence, the previously deprecated support for pyxl and spitfire templates has also been removed. When extracting Python 2 code, having Python 2 installed is still recommended, as this ensures the correct version of the Python standard library is extracted.

Minor Analysis Improvements

C#

  • C# 11: Added extractor support for the scoped modifier annotation on parameters and local variables.

Golang

  • Support for the Twirp framework has been added.

Java

  • Removed the first argument of java.nio.file.Files#createTempDirectory(String,FileAttribute[]) as a “create-file” sink.
  • Added the first argument of java.nio.file.Files#copy as a “read-file” sink for the java/path-injection query.
  • The data flow library now disregards flow through code that is dead based on some basic constant propagation, for example, guards like if (1+1>3).

JavaScript/TypeScript

  • Added dataflow sources for the express-ws library.

Python

  • Fixed module resolution so we properly recognize that in from <pkg> import *, where <pkg> is a package, the actual imports are made from the <pkg>/__init__.py file.

Ruby

  • Ruby 3.1: one-line pattern matches are now supported. The AST nodes are named TestPattern (expr in pattern) and MatchPattern (expr => pattern).

New Features

Golang

  • Go 1.20 is now supported. The extractor now functions as expected when Go 1.20 is installed; the definition of implementsComparable has been updated according to Go 1.20’s new, more-liberal rules; and taint flow models have been added for relevant, new standard-library functions.

Java

  • Kotlin versions up to 1.8.20 are now supported.
  • © GitHub, Inc.
  • Terms
  • Privacy