The following Jenkins updates have been released to fix security vulnerabilities:
* Jenkins weekly 2.197 * Jenkins LTS 2.176.4 and 2.190.1 The following Jenkins plugin updates have been released to fix security vulnerabilities: * Aqua MicroScanner Plugin 1.0.8 * Aqua Security Scanner Plugin 3.0.18 * Data Theorem: CI/CD Plugin 1.4.0 * Git Changelog Plugin 2.18 * GitLab Logo Plugin 1.0.4 * Inedo BuildMaster Plugin Plugin 2.5.0 * Inedo ProGet Plugin Plugin 1.3 * Log Parser Plugin 2.1 * NeuVector Vulnerability Scanner Plugin version 1.6 * Project Inheritance Plugin 19.08.02 * Violation Comments to GitLab Plugin 2.29 Additionally, we announce unresolved security issues in the following plugins: * Assembla Plugin * Azure Event Grid Build Notifier Plugin * Call Remote Job Plugin * CodeScan Plugin * elOyente Plugin * Gem Publisher Plugin * Google Calendar Plugin * Kubernetes :: Pipeline :: Arquillian Steps Plugin * Kubernetes :: Pipeline :: Kubernetes Steps Plugin * vFabric Application Director Plugin Please see the advisory for more information: https://jenkins.io/security/advisory/2019-09-25/ -- You received this message because you are subscribed to the Google Groups "Jenkins Advisories" group. To unsubscribe from this group and stop receiving emails from it, send an email to [email protected]. To view this discussion on the web visit https://groups.google.com/d/msgid/jenkinsci-advisories/7B07493B-4155-4C61-B5C7-21294D8F0A40%40beckweb.net.
