Document OJSI-122 vulnerability 25/89525/1 dublin
authorKrzysztof Opasiak <k.opasiak@samsung.com>
Wed, 5 Jun 2019 22:00:46 +0000 (00:00 +0200)
committerShankaranarayanan Puzhavakath Narayanan <snarayanan@research.att.com>
Thu, 6 Jun 2019 14:36:10 +0000 (14:36 +0000)
Issue-ID: OJSI-122
Signed-off-by: Krzysztof Opasiak <k.opasiak@samsung.com>
Change-Id: I41342d29427ab1d8d7de345bad79454f4dd74bf3
(cherry picked from commit e4849d9e08f994766856d16160ffbd011dd1b109)

docs/sections/release-notes.rst

index 22c6b4b..4c4bd9c 100644 (file)
@@ -46,6 +46,8 @@ The Dublin release for OOF delivered the following Epics.
 
 *Known Security Issues*
 
+    * [`OJSI-122 <https://jira.onap.org/browse/OJSI-122>`_] In default deployment OPTFRA (oof-osdf) exposes HTTP port 30248 outside of cluster.
+
 *Known Vulnerabilities in Used Modules*
 
 OPTFRA osdf code has been formally scanned during build time using NexusIQ and no Critical vulnerability was found.