This is an automated email from the ASF dual-hosted git repository.

tallison pushed a commit to branch branch_2x
in repository https://gitbox.apache.org/repos/asf/tika.git

commit 9a8187e61bc9fd12776fcc5382e86f2edefd087d
Author: tallison <[email protected]>
AuthorDate: Thu Nov 14 09:06:37 2024 -0500

    bump netty
    
    (cherry picked from commit 46b17ae24558d91c2fda8ce97325ba620e967076)
---
 tika-parent/pom.xml | 5 ++++-
 1 file changed, 4 insertions(+), 1 deletion(-)

diff --git a/tika-parent/pom.xml b/tika-parent/pom.xml
index 4aca34183..79787baca 100644
--- a/tika-parent/pom.xml
+++ b/tika-parent/pom.xml
@@ -380,6 +380,9 @@
     <!-- mockito >= 5 requires jdk11 -->
     <mockito.version>4.11.0</mockito.version>
     <netcdf-java.version>4.5.5</netcdf-java.version>
+    <!-- 4.2.0.Alpha4 tested successfully -->
+    <netty.version>4.1.115.Final</netty.version>
+    <oak.jackrabbit.version>1.70.0</oak.jackrabbit.version>
     <openjson.version>1.0.13</openjson.version>
     <!-- 2.0.0 doesn't compile with jdk8 -->
     <opennlp.version>1.9.4</opennlp.version>
@@ -1113,7 +1116,7 @@
                 <artifactId>hdf5-platform</artifactId>
                 <version>1.14.3-1.5.10</version>
             </coordinate>
-            <!-- https://github.com/jetty/jetty.project/pull/12012 
+            <!-- https://github.com/jetty/jetty.project/pull/12012
                  "As stated in CVE-2024-6763, the use of Jetty server, or 
Jetty client, does not make you vulnerable to that CVE.
                   The code for HttpURI is also quite different in those older, 
no longer supported, versions of Jetty.
             -->

Reply via email to