X-Git-Url: https://gerrit.onap.org/r/gitweb?a=blobdiff_plain;f=docs%2Fsections%2Frelease-notes.rst;h=4c4bd9c0e27869e5d851e87ffc5c36b24fe3caac;hb=e4849d9e08f994766856d16160ffbd011dd1b109;hp=22c6b4b3393329405e726a85b036288c942774d2;hpb=c2792b0c133098f31022a69fb45bffc8f5518405;p=optf%2Fosdf.git diff --git a/docs/sections/release-notes.rst b/docs/sections/release-notes.rst index 22c6b4b..4c4bd9c 100644 --- a/docs/sections/release-notes.rst +++ b/docs/sections/release-notes.rst @@ -46,6 +46,8 @@ The Dublin release for OOF delivered the following Epics. *Known Security Issues* + * [`OJSI-122 `_] In default deployment OPTFRA (oof-osdf) exposes HTTP port 30248 outside of cluster. + *Known Vulnerabilities in Used Modules* OPTFRA osdf code has been formally scanned during build time using NexusIQ and no Critical vulnerability was found.