How to provide security fixes in a high constraint ecosystem? Practical examples with the Jenkins project