summaryrefslogtreecommitdiffstats
path: root/docs/release-notes.rst
diff options
context:
space:
mode:
authorKrzysztof Opasiak <k.opasiak@samsung.com>2019-06-05 23:45:38 +0200
committerKrzysztof Opasiak <k.opasiak@samsung.com>2019-06-05 23:45:38 +0200
commitc887b4744c9105b66f5d9bbea77f455ccd99867a (patch)
tree625de2fc8ce4737d9f4fcb839b95d69c31932941 /docs/release-notes.rst
parenta53506fc58f8169b36e22e4850432dda12fb2d62 (diff)
Document OJSI-202 (CVE-2019-12127) vulnerability
Issue-ID: OJSI-202 Signed-off-by: Krzysztof Opasiak <k.opasiak@samsung.com> Change-Id: I46d31d23309f8f34cb1a21d025aac0ff9a5b709a
Diffstat (limited to 'docs/release-notes.rst')
-rw-r--r--docs/release-notes.rst1
1 files changed, 1 insertions, 0 deletions
diff --git a/docs/release-notes.rst b/docs/release-notes.rst
index ae22cb25ee..3d61e73a5b 100644
--- a/docs/release-notes.rst
+++ b/docs/release-notes.rst
@@ -55,6 +55,7 @@ Summary
* In default deployment OOM (consul-server-ui) exposes HTTP port 30270 outside of cluster. [`OJSI-134 <https://jira.onap.org/browse/OJSI-134>`_]
* Hard coded password used for all oom deployments [`OJSI-188 <https://jira.onap.org/browse/OJSI-188>`_]
+* CVE-2019-12127 - OOM exposes unprotected API/UI on port 30270 [`OJSI-202 <https://jira.onap.org/browse/OJSI-202>`_]
*Known Vulnerabilities in Used Modules*