summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorKrzysztof Opasiak <k.opasiak@samsung.com>2019-06-05 23:33:16 +0200
committerKrzysztof Opasiak <k.opasiak@samsung.com>2019-06-05 23:33:16 +0200
commit5a83a8dc3dd5359b343f6dba52e0ca6907f58a5a (patch)
tree0a164bab9eb246ae7154ac20f3a40f927d21dc20
parent706cd5cf82e16d10d18732fc8df2e3efea7eac87 (diff)
Document OJSI-185 vulnerability
Issue-ID: OJSI-185 Signed-off-by: Krzysztof Opasiak <k.opasiak@samsung.com> Change-Id: I6cbe6a6cb0129bd4ac6ccba35cf018f4a04f80e5
-rw-r--r--docs/release-notes.rst1
1 files changed, 1 insertions, 0 deletions
diff --git a/docs/release-notes.rst b/docs/release-notes.rst
index 3a49169c7..cb27daa3b 100644
--- a/docs/release-notes.rst
+++ b/docs/release-notes.rst
@@ -121,6 +121,7 @@ The Dublin release added the following functionality:
- `OJSI-95 <https://jira.onap.org/browse/OJSI-95>`_ - appc-cdt allows to impersonate any user by setting USER_ID
- `OJSI-112 <https://jira.onap.org/browse/OJSI-112>`_ - In default deployment APPC (appc-dgbuilder) exposes HTTP port 30228 outside of cluster.
- `OJSI-113 <https://jira.onap.org/browse/OJSI-113>`_ - In default deployment APPC (appc) exposes HTTP port 30230 outside of cluster.
+ - `OJSI-185 <https://jira.onap.org/browse/OJSI-185>`_ - appc exposes ssh service on port 30231
*Known Vulnerabilities in Used Modules*