[
https://issues.apache.org/jira/browse/NIFI-4821?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16395338#comment-16395338
]
ASF GitHub Bot commented on NIFI-4821:
--------------------------------------
GitHub user jomach opened a pull request:
https://github.com/apache/nifi/pull/2534
NIFI-4821
* Upgrade poi to 3.17
Thank you for submitting a contribution to Apache NiFi.
In order to streamline the review of the contribution we ask you
to ensure the following steps have been taken:
### For all changes:
- [ ] Is there a JIRA ticket associated with this PR? Is it referenced
in the commit message?
- [ ] Does your PR title start with NIFI-XXXX where XXXX is the JIRA number
you are trying to resolve? Pay particular attention to the hyphen "-" character.
- [ ] Has your PR been rebased against the latest commit within the target
branch (typically master)?
- [ ] Is your initial contribution a single, squashed commit?
### For code changes:
- [ ] Have you ensured that the full suite of tests is executed via mvn
-Pcontrib-check clean install at the root nifi folder?
- [ ] Have you written or updated unit tests to verify your changes?
- [ ] If adding new dependencies to the code, are these dependencies
licensed in a way that is compatible for inclusion under [ASF
2.0](http://www.apache.org/legal/resolved.html#category-a)?
- [ ] If applicable, have you updated the LICENSE file, including the main
LICENSE file under nifi-assembly?
- [ ] If applicable, have you updated the NOTICE file, including the main
NOTICE file found under nifi-assembly?
- [ ] If adding new Properties, have you added .displayName in addition to
.name (programmatic access) for each of the new properties?
### For documentation related changes:
- [ ] Have you ensured that format looks appropriate for the output in
which it is rendered?
### Note:
Please ensure that once the PR is submitted, you check travis-ci for build
issues and submit an update to your PR as soon as possible.
You can merge this pull request into a Git repository by running:
$ git pull https://github.com/jomach/nifi nifi-4821
Alternatively you can review and apply these changes as the patch at:
https://github.com/apache/nifi/pull/2534.patch
To close this pull request, make a commit to your master/trunk branch
with (at least) the following in the commit message:
This closes #2534
----
commit d78f0e8b854f1debbd86da63c61c0d419b7e56f1
Author: Jorge Machado <jorgewilson.machado@...>
Date: 2018-03-12T14:46:31Z
NIFI-4821
* Upgrade poi to 3.17
----
> Upgrade to Apache POI 3.16 or newer
> -----------------------------------
>
> Key: NIFI-4821
> URL: https://issues.apache.org/jira/browse/NIFI-4821
> Project: Apache NiFi
> Issue Type: Improvement
> Components: Extensions
> Reporter: Joseph Witt
> Assignee: Joseph Witt
> Priority: Major
> Fix For: 1.6.0
>
>
> CVE-2017-12626 was announced today with the text:
>
> Title: CVE-2017-12626 – Denial of Service Vulnerabilities in Apache POI < 3.17
> Severity: Important
> Vendor: The Apache Software Foundation
> Versions affected: versions prior to version 3.17
> Description:
> Apache POI versions prior to release 3.17 are vulnerable to Denial of
> Service Attacks:
> * Infinite Loops while parsing specially crafted WMF, EMF, MSG and macros
> (POI bugs 61338 [0] and 61294 [1])
> * Out of Memory Exceptions while parsing specially crafted DOC, PPT and
> XLS
> (POI bugs 52372 [2] and 61295 [3])
> Mitigation: Users with applications which accept content from external or
> untrusted sources are advised to upgrade to Apache POI 3.17 or newer.
> -Tim Allison
> on behalf of the Apache POI PMC
>
> [0] [https://bz.apache.org/bugzilla/show_bug.cgi?id=61338]
> [1] [https://bz.apache.org/bugzilla/show_bug.cgi?id=61294]
> [2] [https://bz.apache.org/bugzilla/show_bug.cgi?id=52372]
> [3] [https://bz.apache.org/bugzilla/show_bug.cgi?id=61295]
--
This message was sent by Atlassian JIRA
(v7.6.3#76005)