You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: change-notes/1.24/analysis-cpp.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -28,7 +28,7 @@ The following changes in version 1.24 affect C/C++ analysis in all applications.
28
28
29
29
* The data-flow library has been improved when flow through functions needs to be
30
30
combined with both taint tracking and flow through fields allowing more flow
31
-
to be tracked. This affects and improves all security queries, which may
31
+
to be tracked. This affects and improves some security queries, which may
32
32
report additional results.
33
33
* Created the `semmle.code.cpp.models.interfaces.Allocation` library to model allocation such as `new` expressions and calls to `malloc`. This in intended to replace the functionality in `semmle.code.cpp.commons.Alloc` with a more consistent and useful interface.
34
34
* Created the `semmle.code.cpp.models.interfaces.Deallocation` library to model deallocation such as `delete` expressions and calls to `free`. This in intended to replace the functionality in `semmle.code.cpp.commons.Alloc` with a more consistent and useful interface.
Copy file name to clipboardExpand all lines: change-notes/1.24/analysis-csharp.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -31,7 +31,7 @@ The following changes in version 1.24 affect C# analysis in all applications.
31
31
32
32
* The data-flow library has been improved when flow through methods needs to be
33
33
combined with both taint tracking and flow through fields allowing more flow
34
-
to be tracked. This affects and improves all security queries, which may
34
+
to be tracked. This affects and improves most security queries, which may
35
35
report additional results.
36
36
* The taint tracking library now tracks flow through (implicit or explicit) conversion operator calls.
37
37
*[Code contracts](https://docs.microsoft.com/en-us/dotnet/framework/debug-trace-profile/code-contracts) are now recognized, and are treated like any other assertion methods.
0 commit comments