From: Krzysztof Opasiak Date: Thu, 30 May 2019 15:44:35 +0000 (+0200) Subject: Document OJSI-201 (CVE-2019-12126) vulnerability X-Git-Tag: 5.0.1-ONAP~16 X-Git-Url: https://gerrit.onap.org/r/gitweb?a=commitdiff_plain;h=bb8dea8255097e9cd306d8f02f945bfb684e469b;p=dcaegen2.git Document OJSI-201 (CVE-2019-12126) vulnerability Issue-ID: OJSI-201 Signed-off-by: Krzysztof Opasiak Change-Id: I11dfa0417c20f083c06b4ad4f697061489927b08 --- diff --git a/docs/sections/release-notes.rst b/docs/sections/release-notes.rst index b3637a05..f073d0d8 100644 --- a/docs/sections/release-notes.rst +++ b/docs/sections/release-notes.rst @@ -114,6 +114,7 @@ Source code of DCAE components are released under the following repositories on * In default deployment DCAEGEN2 (xdcae-tca-analytics) exposes HTTP port 32010 outside of cluster. [`OJSI-161 `_] * In default deployment DCAEGEN2 (dcae-redis) exposes redis port 30286 outside of cluster. [`OJSI-187 `_] * In default deployment DCAEGEN2 (config-binding-service) exposes HTTP port 30415 outside of cluster. [`OJSI-195 `_] + * CVE-2019-12126 - DCAE TCA exposes unprotected APIs/UIs on port 32010. [`OJSI-201 `_] *Known Vulnerabilities in Used Modules*