diff options
author | Krzysztof Opasiak <k.opasiak@samsung.com> | 2019-06-05 23:32:50 +0200 |
---|---|---|
committer | Krzysztof Opasiak <k.opasiak@samsung.com> | 2019-06-05 23:32:50 +0200 |
commit | 706cd5cf82e16d10d18732fc8df2e3efea7eac87 (patch) | |
tree | 10bac1da688b72dd6f521b5e2d825379e4f9337c /docs/release-notes.rst | |
parent | e21015630eb54bc5fba3d147962ac1d92a1ac1c8 (diff) |
Document OJSI-113 vulnerability
Issue-ID: OJSI-113
Signed-off-by: Krzysztof Opasiak <k.opasiak@samsung.com>
Change-Id: I9d0c35e01dd4f2b42bd115455863ca2d0b8dc3c7
Diffstat (limited to 'docs/release-notes.rst')
-rw-r--r-- | docs/release-notes.rst | 1 |
1 files changed, 1 insertions, 0 deletions
diff --git a/docs/release-notes.rst b/docs/release-notes.rst index 5ca3186c0..3a49169c7 100644 --- a/docs/release-notes.rst +++ b/docs/release-notes.rst @@ -120,6 +120,7 @@ The Dublin release added the following functionality: - CVE-2019-12124 `OJSI-63 <https://jira.onap.org/browse/OJSI-63>`_ - APPC exposes Jolokia Interface which allows to read and overwrite any arbitrary file - `OJSI-95 <https://jira.onap.org/browse/OJSI-95>`_ - appc-cdt allows to impersonate any user by setting USER_ID - `OJSI-112 <https://jira.onap.org/browse/OJSI-112>`_ - In default deployment APPC (appc-dgbuilder) exposes HTTP port 30228 outside of cluster. + - `OJSI-113 <https://jira.onap.org/browse/OJSI-113>`_ - In default deployment APPC (appc) exposes HTTP port 30230 outside of cluster. *Known Vulnerabilities in Used Modules* |