Author: fanningpj
Date: Wed Jul 17 14:20:27 2024
New Revision: 1919314

URL: http://svn.apache.org/viewvc?rev=1919314&view=rev
Log:
update security notes

Modified:
    poi/site/publish/changes.html
    poi/site/publish/components/index.html
    poi/site/publish/security.html

Modified: poi/site/publish/changes.html
URL: 
http://svn.apache.org/viewvc/poi/site/publish/changes.html?rev=1919314&r1=1919313&r2=1919314&view=diff
==============================================================================
--- poi/site/publish/changes.html (original)
+++ poi/site/publish/changes.html Wed Jul 17 14:20:27 2024
@@ -231,7 +231,7 @@ document.write("Last Published: " + docu
             
 <li>Breaking change: Some invalid content in the compressed file-formats for 
xlsx/docx/pptx/... now fail parsing to prevent handling malicious input 
incorrectly</li>
             
-<li>Upgrade saxon dependency to 12.5</li>
+<li>Upgrade commons-codec dependency to 1.17.1</li>
         
 </ul>
 <a name="Changes"></a>

Modified: poi/site/publish/components/index.html
URL: 
http://svn.apache.org/viewvc/poi/site/publish/components/index.html?rev=1919314&r1=1919313&r2=1919314&view=diff
==============================================================================
--- poi/site/publish/components/index.html (original)
+++ poi/site/publish/components/index.html Wed Jul 17 14:20:27 2024
@@ -615,7 +615,7 @@ document.write("Last Published: " + docu
           
 <td colspan="1" rowspan="1">poi</td>
           <td colspan="1" rowspan="1"><a 
href="https://search.maven.org/#artifactdetails|org.apache.logging.log4j|log4j-api|2.23.1|jar">log4j
 2.x</a>,
-              <a 
href="https://search.maven.org/#artifactdetails|commons-codec|commons-codec|1.17.0|jar">commons-codec</a>,
+              <a 
href="https://search.maven.org/#artifactdetails|commons-codec|commons-codec|1.17.1|jar">commons-codec</a>,
               <a 
href="https://search.maven.org/#artifactdetails|org.apache.commons|commons-collections4|4.4|jar">commons-collections</a>,
               <a 
href="https://search.maven.org/#artifactdetails|org.apache.commons|commons-math3|3.6.1|jar">commons-math3</a>
               <a 
href="https://search.maven.org/#artifactdetails|commons-io|commons-io|2.16.1|jar">commons-io</a>

Modified: poi/site/publish/security.html
URL: 
http://svn.apache.org/viewvc/poi/site/publish/security.html?rev=1919314&r1=1919313&r2=1919314&view=diff
==============================================================================
--- poi/site/publish/security.html (original)
+++ poi/site/publish/security.html Wed Jul 17 14:20:27 2024
@@ -219,7 +219,7 @@ document.write("Last Published: " + docu
 <strong>Expect any type of Exception when processing documents</strong>
 <br>
                 As parsing the various formats is very complex and involved, 
there are some unexpected types of
-                exceptions which can be thrown. E.g. StackOverflow or many 
different types of RuntimeException.
+                exceptions which can be thrown. E.g. StackOverflowError or 
many different types of RuntimeException.
                 <br>
                 Make sure to have a broad catch-statement around your 
document-parsing functionality and be prepared
                 to handle all those gracefully.
@@ -248,9 +248,20 @@ document.write("Last Published: " + docu
 <li>
 <strong>Consider sandboxing document-parsing</strong>
 <br>
-                If you operate in a highly sensitive enviornment and would 
like to avoid any side effect from
+                If you operate in a highly sensitive environment and would 
like to avoid any side effect from
                 parsing documents on your application, then consider 
extracting the parsing logic into a separate
                 process which is configured with appropriate memory settings 
and which you stop after some timeout.
+                It is a good idea to be able to auto-restart the process in 
case of a crash.
+                <br>
+            
+</li>
+            
+<li>
+<strong>Keep up to date with releases</strong>
+<br>
+                Apache POI does occasionally issue CVEs for security issues. 
There are also other bug fixes and
+                improvements in each release. Some of these fixes will be to 
make POI more robust against malicious
+                inputs, even if they are not explicitly security-related.
                 <br>
             
 </li>



---------------------------------------------------------------------
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]

Reply via email to