Processing untrusted PDFs is only supported to a point: malformed PDFs
will not cause remote code execution or other privilege escalation
problems. However, processing them they may cause unchecked exceptions
such as StackOverflowException
or NullPointerException
, or even use
unexpected amounts of memory.
The Apache Software Foundation takes a very active stance in eliminating and disclosing security problems against its products.
We strongly encourage folks to report such problems to our private security mailing list first, before disclosing them in a public forum.
Please note that the security mailing list should only be used for reporting undisclosed security vulnerabilities and managing the process of fixing such vulnerabilities. We cannot accept regular bug reports or other queries at this address. All mail sent to this address that does not relate to an undisclosed security problem in our source code will be ignored.
If you need to report a bug that isn't an undisclosed security vulnerability, please contact one of our mailing lists.
The private security mailing address is: security@apache.org. Please send one plain-text email for each vulnerability you are reporting.
An overview of the vulnerability handling process is:
Committers should read a more detailed description of the process. Reporters of security vulnerabilities may also find it useful