fabriziofortino opened a new pull request, #1110: URL: https://github.com/apache/jackrabbit-oak/pull/1110
https://nvd.nist.gov/vuln/detail/CVE-2022-1471 snakeyaml 1.33 is vulnerable to remote code execution. A better solution would be to get rid of the es high-level client completely. This would require more time because of the changes needed to replace the bulk processor. We can safely exclude this dependency since it's not used in our codebase. As part of this PR, the es high-level client has been updated to the latest available version. -- This is an automated message from the Apache Git Service. To respond to the message, please log on to GitHub and use the URL above to go to the specific comment. To unsubscribe, e-mail: dev-unsubscr...@jackrabbit.apache.org For queries about this service, please contact Infrastructure at: us...@infra.apache.org