From: Dan Timoney Date: Mon, 28 Oct 2019 19:56:22 +0000 (+0000) Subject: Merge "Release 1.7.5 maven artifacts" into elalto X-Git-Tag: 1.7.6~3 X-Git-Url: https://gerrit.onap.org/r/gitweb?a=commitdiff_plain;h=11b8abd358a1ddd453e63e6a47226f7ad5a1f66a;hp=76af650cb65027b98db3364748ee85ab0f1b8998;p=sdnc%2Foam.git Merge "Release 1.7.5 maven artifacts" into elalto Former-commit-id: e85e8776a1b80517cf361c9512e0bdb4441df5ab --- diff --git a/docs/release-notes.rst b/docs/release-notes.rst index 9b4e37dd..49e6c1d5 100644 --- a/docs/release-notes.rst +++ b/docs/release-notes.rst @@ -96,14 +96,14 @@ Dublin. These issues have been resolved in El Alto. - `OJSI-91 `_ SDNC exposes unprotected API for user creation Fixed temporarily by disabling admportal. - `OJSI-98 `_ In default deployment SDNC (sdnc-portal) exposes HTTP port 30201 outside of cluster. - Port 30201 uses now HTTPS protocol. + Port 30201 now uses HTTPS protocol. - CVE-2019-12112 `OJSI-199 `_ SDNC service allows for arbitrary code execution in sla/upload form Fixed temporarily by disabling admportal. - `OJSI-34 `_ Multiple SQL Injection issues in SDNC - `OJSI-99 `_ In default deployment SDNC (sdnc) exposes HTTP port 30202 outside of cluster. Port 30202 is no longer used. - `OJSI-100 `_ In default deployment SDNC (sdnc-dgbuilder) exposes HTTP port 30203 outside of cluster. - Port 30203 uses now HTTPS protocol. + Port 30203 now uses HTTPS protocol. - `OJSI-179 `_ dev-sdnc-sdnc exposes JDWP on port 1830 which allows for arbitrary code execution Ticket has been closed as no one was able to reproduce the issue. - `OJSI-183 `_ SDNC exposes ssh service on port 30208