Author: centic
Date: Tue Apr 15 13:04:10 2025
New Revision: 1925094

URL: http://svn.apache.org/viewvc?rev=1925094&view=rev
Log:
Add published CVE-2025-31672 to project news

Modified:
    poi/site/publish/index.html
    poi/site/src/documentation/content/xdocs/index.xml

Modified: poi/site/publish/index.html
URL: 
http://svn.apache.org/viewvc/poi/site/publish/index.html?rev=1925094&r1=1925093&r2=1925094&view=diff
==============================================================================
--- poi/site/publish/index.html (original)
+++ poi/site/publish/index.html Tue Apr 15 13:04:10 2025
@@ -185,6 +185,36 @@ document.write("Last Published: " + docu
 <a name="Project+News"></a>
 <h2 class="boxed">Project News</h2>
 <div class="section">
+<a 
name="8+April+2025+-+CVE-2025-31672+-+Improper+Input+Validation+vulnerability+in+Apache+POI+before+5.4.0"></a>
+<h3 class="boxed">8 April 2025 - CVE-2025-31672 - Improper Input Validation 
vulnerability in Apache POI before 5.4.0</h3>
+<p>
+          While parsing of OOXML format files like xlsx, docx and pptx, a 
specially crafted file could
+          be used to provide multiple entries with the same name in the 
zip-compressed file-format.
+          <br>
+          Products reading the affected file could read different data because 
one of the zip entries with the
+          duplicate name is selected over another by different products 
differently.<br>
+<br>
+          This issue affects Apache POI component poi-ooxml before 5.4.0. 
Starting with 5.4.0 poi-ooxml performs
+          a check that throws an exception if zip entries with duplicate file 
names are found in the input file.<br>
+<br>
+          Users are recommended to upgrade to version poi-ooxml 5.4.0 or 
later, which fixes the issue.
+          Please refer to our <a 
href="https://poi.apache.org/security.html";>security guidelines</a>
+          for recommendations about how to use the POI libraries securely.
+        </p>
+<p>
+          References:
+        </p>
+<ul>
+          
+<li>
+<a href="https://bz.apache.org/bugzilla/show_bug.cgi?id=69620";>Bug 69620</a>
+</li>
+          
+<li>
+<a href="https://www.cve.org/CVERecord?id=CVE-2025-31672";>CVE-2025-31672</a>
+</li>
+        
+</ul>
 <a name="6+April+2025+-+POI+5.4.1+available"></a>
 <h3 class="boxed">6 April 2025 - POI 5.4.1 available</h3>
 <p>The Apache POI team is pleased to announce the release of 5.4.1.

Modified: poi/site/src/documentation/content/xdocs/index.xml
URL: 
http://svn.apache.org/viewvc/poi/site/src/documentation/content/xdocs/index.xml?rev=1925094&r1=1925093&r2=1925094&view=diff
==============================================================================
--- poi/site/src/documentation/content/xdocs/index.xml (original)
+++ poi/site/src/documentation/content/xdocs/index.xml Tue Apr 15 13:04:10 2025
@@ -27,6 +27,28 @@
   <body>
     <section><title>Project News</title>
 
+      <section><title>8 April 2025 - CVE-2025-31672 - Improper Input 
Validation vulnerability in Apache POI before 5.4.0</title>
+        <p>
+          While parsing of OOXML format files like xlsx, docx and pptx, a 
specially crafted file could
+          be used to provide multiple entries with the same name in the 
zip-compressed file-format.
+          <br/>
+          Products reading the affected file could read different data because 
one of the zip entries with the
+          duplicate name is selected over another by different products 
differently.<br/><br/>
+          This issue affects Apache POI component poi-ooxml before 5.4.0. 
Starting with 5.4.0 poi-ooxml performs
+          a check that throws an exception if zip entries with duplicate file 
names are found in the input file.<br/><br/>
+          Users are recommended to upgrade to version poi-ooxml 5.4.0 or 
later, which fixes the issue.
+          Please refer to our <a 
href="https://poi.apache.org/security.html";>security guidelines</a>
+          for recommendations about how to use the POI libraries securely.
+        </p>
+        <p>
+          References:
+        </p>
+        <ul>
+          <li><a 
href="https://bz.apache.org/bugzilla/show_bug.cgi?id=69620";>Bug 69620</a></li>
+          <li><a 
href="https://www.cve.org/CVERecord?id=CVE-2025-31672";>CVE-2025-31672</a></li>
+        </ul>
+      </section>
+
       <!-- latest final release -->
       <section><title>6 April 2025 - POI 5.4.1 available</title>
         <p>The Apache POI team is pleased to announce the release of 5.4.1.



---------------------------------------------------------------------
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]

Reply via email to