summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorKrzysztof Opasiak <k.opasiak@samsung.com>2019-06-06 00:00:46 +0200
committerShankaranarayanan Puzhavakath Narayanan <snarayanan@research.att.com>2019-06-06 14:36:10 +0000
commit229818c2a7ce0c0061eb91cb0cc083c2d91baa49 (patch)
treee67225334472d345aa990456aae193aca1a06fbc
parent85ad24826b5587b07a69a84bd7efee97e44b2992 (diff)
Document OJSI-122 vulnerabilitydublin
Issue-ID: OJSI-122 Signed-off-by: Krzysztof Opasiak <k.opasiak@samsung.com> Change-Id: I41342d29427ab1d8d7de345bad79454f4dd74bf3 (cherry picked from commit e4849d9e08f994766856d16160ffbd011dd1b109)
-rw-r--r--docs/sections/release-notes.rst2
1 files changed, 2 insertions, 0 deletions
diff --git a/docs/sections/release-notes.rst b/docs/sections/release-notes.rst
index 22c6b4b..4c4bd9c 100644
--- a/docs/sections/release-notes.rst
+++ b/docs/sections/release-notes.rst
@@ -46,6 +46,8 @@ The Dublin release for OOF delivered the following Epics.
*Known Security Issues*
+ * [`OJSI-122 <https://jira.onap.org/browse/OJSI-122>`_] In default deployment OPTFRA (oof-osdf) exposes HTTP port 30248 outside of cluster.
+
*Known Vulnerabilities in Used Modules*
OPTFRA osdf code has been formally scanned during build time using NexusIQ and no Critical vulnerability was found.