aboutsummaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorTaka Cho <takamune.cho@att.com>2019-09-26 09:42:10 -0400
committerTakamune Cho <takamune.cho@att.com>2019-09-26 13:43:01 +0000
commit9de622cdf48e0648f6bab1207415e6ab459fde5e (patch)
tree5cd3e469a222ee69c8dd3a2fb59511b10f9dbc5d
parentbadde58de3d73a175de9c37338633dae8187edd5 (diff)
APPC R5 release note fix
fixed a typo Issue-ID: APPC-1722 Change-Id: Id1bb4cdbc019d2b92f57c2610e279d964948daae Signed-off-by: Taka Cho <takamune.cho@att.com>
-rw-r--r--docs/release-notes.rst2
1 files changed, 1 insertions, 1 deletions
diff --git a/docs/release-notes.rst b/docs/release-notes.rst
index 17153ba83..b317feb37 100644
--- a/docs/release-notes.rst
+++ b/docs/release-notes.rst
@@ -61,7 +61,7 @@ The El Alto added the following feature, bug fixes and security enhancements:
- `OJSI-25 <https://jira.onap.org/browse/OJSI-25>`_ - SQL Injection in APPC (CVE-2019-12316)
- `OJSI-104 <https://jira.onap.org/browse/OJSI-104>`_ - appc exposes plain text HTTP endpoint using port 30211
- `OJSI-113 <https://jira.onap.org/browse/OJSI-113>`_ - appc exposes plain text HTTP endpoint using port 30230
- - `OJSI-113 <https://jira.onap.org/browse/OJSI-146>`_ - appc-cdt exposes plain text HTTP endpoint using port 30289
+ - `OJSI-146 <https://jira.onap.org/browse/OJSI-146>`_ - appc-cdt exposes plain text HTTP endpoint using port 30289
- `OJSI-176 <https://jira.onap.org/browse/OJSI-176>`_ - dev-appc-appc exposes JDWP on port 1830 which allows for arbitrary code execution
- `OJSI-177 <https://jira.onap.org/browse/OJSI-177>`_ - dev-appc-appc exposes JDWP on port 8101 which allows for arbitrary code execution
- `OJSI-185 <https://jira.onap.org/browse/OJSI-185>`_ - appc exposes ssh service on port 30231