In this release, we've focused on improvements to our security compliance solution and enhancements to Unit Test Assistant. Extended Support for JavaWe've added support for Java 11. Extended Support for IDEs and Build SystemsWe've added support for:
Support for PlatformsWe've added support for:
The following operating systems are no longer supported:
|
Rule ID | Header |
---|---|
BD.PB.CHECKRET | Consistently check the returned value of non-void functions |
BD.PB.INTOVERF | Avoid integer overflows |
BD.SECURITY.TDPASSWD | Protect against using unprotected credentials |
CODSTA.ORG.TODOJAVA | Ensure that comments do not contain task tags |
CODSTA.ORG.TODOPROP | Ensure that comments do not contain task tags |
CODSTA.ORG.TODOXML | Ensure that comments do not contain task tags |
SECURITY.IBA.AUXD | Avoid parsing untrusted data with XMLDecoder |
SECURITY.IBA.DXXE | Disable XML external entity injection |
SECURITY.IBA.RUIM | Ensure proper session expiration |
SECURITY.IBA.SC | Disable LDAP deserialization |
SECURITY.UEC.STTL | Ensure that sessions are configured to time out in 'web.xml' files |
SECURITY.WSC.ACMD | Avoid using custom MessageDigest implementations |
SECURITY.WSC.AISSAJAVA | Avoid using insecure cryptographic algorithms for data encryption with Spring |
SECURITY.WSC.AISSAXML | Avoid using insecure cryptographic algorithms in Spring XML configurations |
SECURITY.WSC.AUNC | Avoid using the javax.crypto.NullCipher class in non-test classes |
SECURITY.WSC.DMDS | Avoid using the DriverManagerDataSource class in production code |
SECURITY.WSC.EWSSEC | Avoid debug information from Spring Security framework to logs |
SECURITY.WSC.HGRSI | Avoid using the 'getRequestedSessionId' method from the 'HttpServletRequest' class |
SECURITY.WSC.HV | Ensure the HostnameVerifier.verify() method validates the certificate |
SECURITY.WSC.MCMDU | MessageDigest objects must process the data with the 'update' method |
SECURITY.WSC.MDSALT | Use hash functions with a salt |
SECURITY.WSC.PBFA | Ensure sufficient protection against multiple failed authentication attempts |
SECURITY.WSC.SCHTTP | Mark cookies as HttpOnly |
SECURITY.WSC.SIKG | Initialize KeyGenerator instances |
SECURITY.WSC.VSI | Properly validate server identity |
The output messages of the following rules have been updated, and as a result, suppressions associated with these rules on DTP may no longer be available:
Bug/FR ID | Description |
---|---|
JT-49237 | json test and resource paths does not exist |
JT-70472 | 'Flow Analysis Aggressive' test configuration unable to be edited when duplicated locally |
JT-70473 | PB.NUM.UBD considers only float or double variables |
JT-70475 | PB.IKICO false positive |
JT-70584 | jtest-monitor goal is failing to generate coverage.xml file on the attached project |
JT-70618 | Not able to collect Application Coverage on the prospect's project |
JT-70653 | The type Spring Security appear after jtest run in html report |
JT-70653 | The type Spring Security appear after jtest run in html report |
JT-70817 | Import javafx.application cannot be resolved during analysis from CLI |
JT-70827 | Providing . as an argument for project.location parameter does not work as expected |
UTA-3675 | Mocking recommendation when using Mockito annotations. |
UTA-4019 | Method not mocked for parameterized Spring test |
XT-36321 | Empty PDF report created in various versions of IntelliJ. |
XT-36478 | Unable to obtain license for Jtest run from IntelliJ IDE. |
XT-36549 | Can user name set inside the IDE override system user? |
XT-36671 | JUnit view is garbled when executing impact test in Eclipse. |
XT-36705 | Change based testing doesn't work in Japanese locale. |
UTA-3675 | Mocking recommendation when using Mockito annotations. |
UTA-4019 | Method not mocked for parameterized Spring test |
For information about this release, see https://docs.parasoft.com/display/JTEST1042/Updates+in+10.4.2. |