[ 
https://issues.apache.org/jira/browse/TIKA-2952?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=17044222#comment-17044222
 ] 

Hudson commented on TIKA-2952:
------------------------------

SUCCESS: Integrated in Jenkins build Tika-trunk #1776 (See 
[https://builds.apache.org/job/Tika-trunk/1776/])
TIKA-2952 -- Upgrade metadata-extractor to 2.13.0 (tallison: 
[https://github.com/apache/tika/commit/77153d585cdb1e6ba8a5df125a923020c4b9eb28])
* (edit) tika-bundle/pom.xml
* (edit) tika-parsers/pom.xml
* (edit) CHANGES.txt
* (edit) tika-xmp/pom.xml


> Vulnerable "metadata-extractor 2.11.0" is present in tika 1.22.
> ---------------------------------------------------------------
>
>                 Key: TIKA-2952
>                 URL: https://issues.apache.org/jira/browse/TIKA-2952
>             Project: Tika
>          Issue Type: Bug
>            Reporter: Aman Mishra
>            Assignee: Tim Allison
>            Priority: Major
>             Fix For: 1.24
>
>         Attachments: TIKA-2952_draft.patch
>
>
> We can see that metadata-extractor with version 2.11.0 is present in 
> tika-bundle 1.22 jar. We can see that even latest metadata-extractor with 
> version 2.12.0 is also vulnerable.
>  
> So please confirm your side that "Is this vulnerability [CVE-2019-14262] is 
> impacting to tika or not ?"



--
This message was sent by Atlassian Jira
(v8.3.4#803005)

Reply via email to