-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Hi Folks,
We just took a short full restart of Jenkins in ci.centos.org to patch
against Jenkins SECURITY-705[0], a path-traversal exploit that could
have caused the leak of sensitive files on the Jenkins master.
If you have secrets stored with us in the Jenkins credential store,
please consider contacting me directly to get these rotated. We *do not*
have evidence of an active exploit at this time, but it is standard
practice to rotate secrets under these circumstances.
[0]: https://jenkins.io/security/advisory/2018-02-14/
Thank you for your patience while we work this through,
- --
Brian Stinson
CentOS CI Infrastructure Team
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2.0.22 (GNU/Linux)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=ALkV
-----END PGP SIGNATURE-----