The following Jenkins updates have been released to fix security 
vulnerabilities:

* Jenkins weekly 2.197
* Jenkins LTS 2.176.4 and 2.190.1

The following Jenkins plugin updates have been released to fix security 
vulnerabilities:

* Aqua MicroScanner Plugin 1.0.8
* Aqua Security Scanner Plugin 3.0.18
* Data Theorem: CI/CD Plugin 1.4.0
* Git Changelog Plugin 2.18
* GitLab Logo Plugin 1.0.4
* Inedo BuildMaster Plugin Plugin 2.5.0
* Inedo ProGet Plugin Plugin 1.3
* Log Parser Plugin 2.1
* NeuVector Vulnerability Scanner Plugin version 1.6
* Project Inheritance Plugin 19.08.02
* Violation Comments to GitLab Plugin 2.29 

Additionally, we announce unresolved security issues in the following plugins: 

* Assembla Plugin
* Azure Event Grid Build Notifier Plugin
* Call Remote Job Plugin
* CodeScan Plugin
* elOyente Plugin
* Gem Publisher Plugin
* Google Calendar Plugin
* Kubernetes :: Pipeline :: Arquillian Steps Plugin
* Kubernetes :: Pipeline :: Kubernetes Steps Plugin
* vFabric Application Director Plugin

Please see the advisory for more information:
https://jenkins.io/security/advisory/2019-09-25/

-- 
You received this message because you are subscribed to the Google Groups 
"Jenkins Advisories" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected].
To view this discussion on the web visit 
https://groups.google.com/d/msgid/jenkinsci-advisories/7B07493B-4155-4C61-B5C7-21294D8F0A40%40beckweb.net.

Reply via email to