summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorDan Timoney <dtimoney@att.com>2018-02-06 14:49:15 -0500
committerDan Timoney <dtimoney@att.com>2018-02-06 14:49:15 -0500
commit472321fe0ee35a981788046b57cf3b16fdfb3199 (patch)
tree748672eb04cacc462c2cb8bca9927f5c7ed2d23d
parent6e59da361c5e0fbd0f131d85f6ff9b71704c2a9a (diff)
Update release notesamsterdam
Update release notes to document known security issues. Change-Id: Id6f7c09b3e710353864dc4902c7cba2210727f07 Issue-ID: CCSDK-160 Signed-off-by: Dan Timoney <dtimoney@att.com>
-rw-r--r--docs/release-notes.rst22
1 files changed, 21 insertions, 1 deletions
diff --git a/docs/release-notes.rst b/docs/release-notes.rst
index cdc31702..cacdc241 100644
--- a/docs/release-notes.rst
+++ b/docs/release-notes.rst
@@ -45,7 +45,27 @@ The Common Controller SDK provides the following functionality :
- `CCSDK-137 <https://jira.onap.org/browse/CCSDK-137>`_ isolate deprecated methods
**Security Issues**
- You may want to include a reference to CVE (Common Vulnerabilities and Exposures) `CVE <https://cve.mitre.org>`_
+ - `CVE-2011-4969 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4969>`
+ - `CVE-2013-1624 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1624>`
+ - `CVE-2014-0114 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0114>`
+ - `CVE-2015-0254 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0254>`
+ - `CVE-2015-5211 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5211>`
+ - `CVE-2015-5262 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5262>`
+ - `CVE-2015-7940 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7940>`
+ - `CVE-2016-3674 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3674>`
+ - `CVE-2016-9878 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9878>`
+ - `CVE-2016-1000338 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1000338>`
+ - `CVE-2016-1000339 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1000339>`
+ - `CVE-2016-1000341 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1000341>`
+ - `CVE-2016-1000342 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1000342>`
+ - `CVE-2016-1000343 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1000343>`
+ - `CVE-2016-1000344 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1000344>`
+ - `CVE-2016-1000345 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1000345>`
+ - `CVE-2016-1000352 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1000352>`
+ - `CVE-2017-5929 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5929>`
+ - `CVE-2017-7525 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7525>`
+ - `CVE-2017-7536 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7536>`
+ - `CVE-2017-7957 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7957>`
**Upgrade Notes**