PrizmDoc Viewer v13.26

Released: Jan 16, 2024

v13.26 での更新項目

機能

  • Added support for Personally Identifiable Information (PII) detection.
  • PrizmDoc Server can now block unencrypted HTTP requests for external content, such as external images in HTML or email documents, external watermarks or URLs provided for creation of viewing sessions. This new functionality is available in LibreOffice rendering mode only.
  • Added support for user defined passphrases for the private keys used by TLS certificates. Users can define their passphrases in a file that is defined in the central configuration file.
  • PrizmDoc Windows Server no longer requires an admin user account to run in default rendering mode.
  • Introduced new parameter in Central Configuration to control connection timeouts when downloading external content in HTML documents and the HTML bodies of email documents. Setting this parameter to a smaller value will allow faster rendering of HTML when external content is not available.
  • Simplified HTTPS configuration for the PrizmDoc Windows cluster.
  • Improved logging for the Nginx Manager Service. PrizmDoc now logs meaningful errors to the PccErrors.log if the server is configured incorrectly to accept HTTPS traffic on the Microsoft Windows platform.
  • Added support for Kubernetes 1.27, 1.28 and 1.29. Support for Kubernetes 1.23, 1.24 and 1.25 has been dropped.
  • Documentation Updates
    • Added a new section to the Windows Installation and Upgrade Issues troubleshooting topic to clarify how to resolve PrizmDoc Server failing to install and rolling back.
    • Updated the Troubleshooting > Document Viewing Issues > PDF Files section with enabling the Hybrid Viewing option to resolve fonts that are pixelated.
    • Updated the acceptBadSslCertificate property description in the Viewing Sessions and Viewing Session Creators topics.
    • Updated the Central Configuration and Cluster Management topics with requirements on cluster instance names for matching subject names of their certificates when HTTPS is enabled.
    • Updated the Central Configuration > fileTypes.excel.formulas.autocalculate.enabled variable with the default value for PrizmDoc Cloud users.
    • Updated the System Requirements > Microsoft Office Conversion Requirements section with specific Microsoft Office and Windows Server versions that must be installed before running the PrizmDoc Server installer.
    • Re-organized the Security Guidance topic and updated the Windows Installation topic to clarify recommendations for addressing risks related to rendering external content.
    • Added a deprecation notice to the REST APIs for pre-converting documents to PDF to view them: "v3" viewing package creators, "v3" viewing packages, and "v3" viewing sessions.

不具合の修正

  • Addressed an issue where PrizmDoc cluster failed to work properly when network.binding.addresses configuration parameter used an IPv4 address and the DNS server listed IPv6 addresses prior to IPv4 addresses for server domain names.
  • Addressed an issue where the error "Attachment failed to load" was incorrectly shown in the Viewer when opening large PDF documents.
  • Addressed an issue where PrizmDoc formatted email headers incorrectly when the HTML body of the email document contained specific global styles.
  • Addressed an issue where PrizmDoc Viewer incorrectly rendered PDF documents that contained freed entries in the cross reference table and duplicate indirect objects.
  • Addressed an issue where PrizmDoc would return a CouldNotConvert error when certain combinations of rotations where applied to a set of pages within the same document.
  • Security
    • Addressed potential vulnerabilities in the Raster Conversion Service (RCS) third-party components by updating them to the newer versions.
    • Addressed potential vulnerabilities in the PDF Conversion Service (PDFCS) third-party component by updating it to the newer version.
    • Addressed potential vulnerabilities in the Format Detection Service (FDS) third-party component by updating it to the newer version.
    • Addressed potential vulnerabilities in the SvgPostProcessor third-party component by updating it to the newer version.
    • Addressed potential vulnerabilities in the PCCIS module of PrizmDoc Viewer third-party component by updating it to the newer version.
    • Addressed potential vulnerabilities in the HTML Conversion Service (HTMLCS) module of PrizmDoc Viewer by removing vulnerable third-party components.
    • Addressed an issue where the processing of a specific PDF document made PrizmDoc Viewer unresponsive.
    • Addressed a vulnerability when rendering specific documents in the LibreOffice rendering mode.