Skip to content

Commit 8ef8155

Browse files
authored
Merge branch 'main' into python-update
2 parents adf8a8c + 362912c commit 8ef8155

File tree

8 files changed

+36
-15
lines changed

8 files changed

+36
-15
lines changed

cpp/src/qlpack.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
library: false
22
name: githubsecuritylab/codeql-cpp-queries
3-
version: 0.0.3
3+
version: 0.0.4
44
suites: suites
55
defaultSuiteFile: suites/cpp.qls
66
dependencies:

cpp/src/suites/cpp-audit.qls

Lines changed: 20 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,20 @@
1+
- description: "GitHub's Community Packs C/C++ Audit Suite"
2+
3+
# Audit queries
4+
- queries: '.'
5+
from: githubsecuritylab/codeql-cpp-queries
6+
- include:
7+
kind:
8+
- problem
9+
- path-problem
10+
- metric
11+
- diagnostic
12+
tags contain:
13+
- audit
14+
15+
# External API query
16+
- queries: '.'
17+
from: codeql/cpp-queries
18+
- include:
19+
id:
20+
- cpp/untrusted-data-to-external-api

csharp/src/qlpack.yml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,9 +1,9 @@
11
library: false
22
name: githubsecuritylab/codeql-csharp-queries
3-
version: 0.0.3
3+
version: 0.0.4
44
suites: suites
55
defaultSuiteFile: suites/csharp.qls
66
dependencies:
7-
codeql/csharp-all: '*'
8-
codeql/csharp-queries: '*' # Required for Dependencies.ql
7+
codeql/csharp-all: "*"
8+
codeql/csharp-queries: "*" # Required for Dependencies.ql
99
githubsecuritylab/codeql-csharp-libs: 0.0.1

csharp/src/security/CWE-328/WeakPasswordHashing.qhelp

Lines changed: 7 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -4,8 +4,7 @@
44
<qhelp>
55
<overview>
66
<p>
7-
Using a insufficiently computationally hard hash function can leave data
8-
vulnerable, and should not be used for password hashing.
7+
Hash functions that are not sufficiently computationally hard can leave data vulnerable. You should not use such functions for password hashing.
98
</p>
109

1110
<p>
@@ -30,18 +29,18 @@
3029
</ul>
3130

3231
<p>
33-
All of MD5, SHA-1, SHA-2 and SHA-3 are weak against offline brute forcing, since they are not computationally hard.
32+
All of MD5, SHA-1, SHA-2 and SHA-3 are weak against offline brute forcing, since they are not sufficiently computationally hard. This includes SHA-224, SHA-256, SHA-384 and SHA-512, which are in the SHA-2 family.
3433
</p>
3534

3635
<p>
37-
Password hashing algorithms are designed to be slow and/or memory intenstive to compute, which makes brute force attacks more difficult.
36+
Password hashing algorithms should be slow and/or memory intensive to compute, to make brute force attacks more difficult.
3837
</p>
3938

4039
</overview>
4140
<recommendation>
4241

4342
<p>
44-
Ensure that for password storage you should use a computationally hard cryptographic hash function, such as:
43+
For password storage, you should use a sufficiently computationally hard cryptographic hash function, such as one of the following:
4544
</p>
4645

4746
<ul>
@@ -51,7 +50,9 @@
5150
<li>
5251
scrypt
5352
</li>
53+
<li>
5454
bcrypt
55+
</li>
5556
<li>
5657
PBKDF2
5758
</li>
@@ -61,7 +62,7 @@
6162
<example>
6263

6364
<p>
64-
The following examples show a function that hashes a password using a cryptographic hashing algorithm.
65+
The following examples show two versions of the same function. In both cases, a password is hashed using a cryptographic hashing algorithm.
6566

6667
In the first case the SHA-512 hashing algorithm is used. It is vulnerable to offline brute force attacks:
6768
</p>

csharp/src/suites/csharp-audit.qls

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22

33
# Audit queries
44
- queries: '.'
5-
from: githubsecuritylab/codeql-csharp
5+
from: githubsecuritylab/codeql-csharp-queries
66
- include:
77
kind:
88
- problem

java/src/qlpack.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,8 @@
11
library: false
22
name: githubsecuritylab/codeql-java-queries
3-
version: 0.0.3
3+
version: 0.0.4
44
suites: suites
55
defaultSuiteFile: suites/java.qls
66
dependencies:
7-
codeql/java-all: '*'
7+
codeql/java-all: "*"
88
githubsecuritylab/codeql-java-libs: 0.0.1

java/src/suites/java-audit.qls

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22

33
# Audit queries
44
- queries: '.'
5-
from: githubsecuritylab/java-queries
5+
from: githubsecuritylab/codeql-java-queries
66
- include:
77
kind:
88
- problem

java/src/suites/java-local.qls

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@
44
from: codeql/java-queries
55

66
- queries: '.'
7-
from: githubsecuritylab/java-queries
7+
from: githubsecuritylab/codeql-java-queries
88
- include:
99
id:
1010
- java/xxe-local

0 commit comments

Comments
 (0)