aboutsummaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorKrzysztof Opasiak <k.opasiak@samsung.com>2019-06-05 23:44:18 +0200
committerKrzysztof Opasiak <k.opasiak@samsung.com>2019-06-05 23:44:18 +0200
commitdb952f6a0a8099b26f216b980192a0d06dfc5c23 (patch)
treeae13681064fa0ee2596bcabc102803dafdfad7c8
parentb6c8710967a1627d4f43dfba04ad3e080a4dc894 (diff)
Document OJSI-134 vulnerability
Issue-ID: OJSI-134 Signed-off-by: Krzysztof Opasiak <k.opasiak@samsung.com> Change-Id: Ic48733b90bc80836fadb78c085b378180c5cb1c3
-rw-r--r--docs/release-notes.rst2
1 files changed, 2 insertions, 0 deletions
diff --git a/docs/release-notes.rst b/docs/release-notes.rst
index 0261b2a442..339925ad5f 100644
--- a/docs/release-notes.rst
+++ b/docs/release-notes.rst
@@ -53,6 +53,8 @@ Summary
*Known Security Issues*
+* In default deployment OOM (consul-server-ui) exposes HTTP port 30270 outside of cluster. [`OJSI-134 <https://jira.onap.org/browse/OJSI-134>`_]
+
*Known Vulnerabilities in Used Modules*
OOM code has been formally scanned during build time using NexusIQ and no