This is an automated email from the ASF dual-hosted git repository. tallison pushed a commit to branch branch_2x in repository https://gitbox.apache.org/repos/asf/tika.git
commit 9a8187e61bc9fd12776fcc5382e86f2edefd087d Author: tallison <[email protected]> AuthorDate: Thu Nov 14 09:06:37 2024 -0500 bump netty (cherry picked from commit 46b17ae24558d91c2fda8ce97325ba620e967076) --- tika-parent/pom.xml | 5 ++++- 1 file changed, 4 insertions(+), 1 deletion(-) diff --git a/tika-parent/pom.xml b/tika-parent/pom.xml index 4aca34183..79787baca 100644 --- a/tika-parent/pom.xml +++ b/tika-parent/pom.xml @@ -380,6 +380,9 @@ <!-- mockito >= 5 requires jdk11 --> <mockito.version>4.11.0</mockito.version> <netcdf-java.version>4.5.5</netcdf-java.version> + <!-- 4.2.0.Alpha4 tested successfully --> + <netty.version>4.1.115.Final</netty.version> + <oak.jackrabbit.version>1.70.0</oak.jackrabbit.version> <openjson.version>1.0.13</openjson.version> <!-- 2.0.0 doesn't compile with jdk8 --> <opennlp.version>1.9.4</opennlp.version> @@ -1113,7 +1116,7 @@ <artifactId>hdf5-platform</artifactId> <version>1.14.3-1.5.10</version> </coordinate> - <!-- https://github.com/jetty/jetty.project/pull/12012 + <!-- https://github.com/jetty/jetty.project/pull/12012 "As stated in CVE-2024-6763, the use of Jetty server, or Jetty client, does not make you vulnerable to that CVE. The code for HttpURI is also quite different in those older, no longer supported, versions of Jetty. -->
