In this release, we've focused on extending support for environments, increasing performance, and enhancing our security compliance solution. Support for EnvironmentsWe've added support for:
Extended Security Compliance PackWe've added support for the latest version of Common Weaknesses Enumeration (CWE). We've added new static analysis rules and extended some existing rules to enable support for CWE 3.4, including CWE Top 25 2019 and On the Cusp guidelines; see the New and Updated Test Configurations section below. Enhanced Static Analysis
|
Rule ID | Header |
---|---|
CS.BRM.SCHR | Avoid using the Strings.Chr() and Strings.ChrW() methods in C# code |
PB.ACDE | Avoid calling the Application.DoEvents() method |
SEC.WEB.DNICV | Do not disable SSL certificate validation |
The following static analysis rules have been updated to improve analysis results:
The output messages of the following rules have been updated, and as a result, suppressions associated with these rules on DTP may no longer be available:
Bug/FR ID | Description |
---|---|
DT-10960 | Possible false positive of CS.PB.ANIL |
DT-10963 | CS.PB.ANIL potential false positive |
DT-11644 | Missing uninstaller application after dotTEST is reinstalled |
DT-13754 | Empty user rule map path after plugin installation |
FA-7470 | No resource for translation of BD.SECURITY.TDRFL violation message |
FA-7474 | Flow Analysis does not report violation on WebSite project |
XT-36609 | £ character in password prevents Parasoft tool from connecting to DTP |
XT-36611 | Publishing sim-link source code using 'min' option failed |
XT-36843 | Concurrent builds which use cpptestcli do not wait for timeout when trying to pull license |
XT-36950 | Update vulnerable libraries from XML Graphics Project |
XT-37358 | 100% not being displayed in reports when achieving 100% test success |
For information about this release, see https://docs.parasoft.com/display/DOTTEST1043/Updates+in+10.4.3. |