Hi,

https://issues.apache.org/jira/browse/TIKA-4152

We should fix this.


This item was created almost 6 months ago, is it possible for someone to
take a look at it please?

Many thanks
Tom

On Mon, 16 Oct 2023 at 11:46, Tom Conlon <[email protected]> wrote:

> Hi,
> Would it be possible for the issue "Fix tika as a service"
> https://issues.apache.org/jira/browse/TIKA-4152
> to be reviewed before release?
>
> Thanks
> Tom
>
> On Mon, 16 Oct 2023 at 11:19, Tim Allison <[email protected]> wrote:
>
>> Y, I think that issue was raised during early regression tests, and it
>> seemed to make sense.
>>
>> The new readPictures exception was caused by:
>> https://svn.apache.org/viewvc/poi/trunk/poi-scratchpad/src/main/java/org/apache/poi/hslf/usermodel/HSLFSlideShowImpl.java?r1=1911524&r2=1911525&;
>> on August 7.  I still can't explain why this didn't show up in the
>> regression tests in late September. My only guess is that I didn't
>> correctly swap out the tika-app jar version from the bin/ directory. :(
>>
>> I'm not sure if it is better to arbitrarily set the max override to a
>> large value or revert the POI upgrade.
>>
>> On Sat, Oct 14, 2023 at 7:27 AM Tilman Hausherr <[email protected]>
>> wrote:
>>
>>> Also many changes in excel files, e.g. ZDAC5OCEPVR6AHYY3BU3CZS7UX3F6J4Z,
>>> "false: 107382" becomes "0: 107382" so I guess there has been a change
>>> about how to interpret that value. Also "error" is now nothing.
>>>
>>> Tilman
>>>
>>> On 14.10.2023 13:16, Tim Allison wrote:
>>>
>>> Looks like we have a bunch of new
>>> "org.apache.poi.util.RecordFormatException: Tried to allocate an array of
>>> length 10,xxx,xxx, but the maximum length for this record type is
>>> 10,000,000." triggered by:
>>> org.apache.poi.hslf.usermodel.HSLFSlideShowImpl.readPictures ... I'm not
>>> sure why the regression tests didn't pick this up.
>>>
>>> The changes in rfc822 detection have also had some effects.  The few
>>> handfuls that I've reviewed are actually positive changes.  I'll review
>>> systematically on Monday.
>>>
>>> On Sat, Oct 14, 2023 at 6:35 AM Tim Allison <[email protected]> wrote:
>>>
>>>> Reports are here:
>>>> https://corpora.tika.apache.org/base/reports/tika-2.9.1-reports.tgz
>>>>
>>>> I haven't had a chance to look at them yet. :(  Will take a look early
>>>> Monday (ET).
>>>>
>>>> On Wed, Oct 11, 2023 at 10:24 AM Tim Allison <[email protected]>
>>>> wrote:
>>>>
>>>>> Unless there are objections, I'll kick off the 2.9.1 regression tests
>>>>> shortly.  I just cherry-picked TIKA-4153 into 2.x...will be interesting to
>>>>> see how that works.
>>>>>
>>>>> Best,
>>>>>
>>>>>            Tim
>>>>>
>>>>> On Tue, Oct 10, 2023 at 1:37 PM Tim Allison <[email protected]>
>>>>> wrote:
>>>>>
>>>>>> All,
>>>>>>   Nandita's email didn't go through for some reason.
>>>>>>   Seems reasonable to kick off a 2.9.1 release cycle?  What do you
>>>>>> think?
>>>>>>
>>>>>>       Best,
>>>>>>
>>>>>>               Tim
>>>>>>
>>>>>>
>>>>>>
>>>>>> *From:* Nandita Mohan
>>>>>> *Sent:* Monday, October 9, 2023 3:41 PM
>>>>>> *To:* [email protected]
>>>>>> *Subject:* Requesting Tika Server release: commons-compress
>>>>>> vulnerability
>>>>>>
>>>>>>
>>>>>>
>>>>>> Hi there,
>>>>>>
>>>>>>
>>>>>>
>>>>>> I work on a service which needs to upgrade our images due to this
>>>>>> vulnerability in Apache *commons-compress*: Apache Commons Compress
>>>>>> denial of service vulnerability · CVE-2023-42503 · GitHub Advisory 
>>>>>> Database
>>>>>> <https://github.com/advisories/GHSA-cgwf-w82q-5jrr>
>>>>>>
>>>>>>
>>>>>>
>>>>>> This is due to use of Tika Server 2.9.0 (Apache Tika – Apache Tika
>>>>>> 1.27 <https://tika.apache.org/2.9.0/index.html>), which has
>>>>>> commons-compress as a dependency. I saw that Tim Allison recently updated
>>>>>> this* commons-compress* version in the Github mirror repo: TIKA-4123
>>>>>> -- general updates for 3.0.0-BETA -- upgrade commons-compress ·
>>>>>> apache/tika@3c88246 (github.com)
>>>>>> <https://github.com/apache/tika/commit/3c882460838c818ab2aff310d1fba9a084fe4800>
>>>>>>
>>>>>>
>>>>>>
>>>>>> We would greatly appreciate if this could be released to tika-server
>>>>>> package in the next week , so we can update our images soon from this
>>>>>> vulnerability.
>>>>>>
>>>>>>
>>>>>>
>>>>>> Thanks,
>>>>>>
>>>>>> Nandita Mohan
>>>>>>
>>>>>
>>>

Reply via email to