From f2ce85b62b6180af0b86a0d3cb60300a1255a386 Mon Sep 17 00:00:00 2001 From: Shankar Narayanan Date: Thu, 6 Jun 2019 10:28:15 -0400 Subject: [PATCH] Duplicating the cherry-pick from master Commit in master: https://gerrit.onap.org/r/c/optf/has/+/89442 Change-Id: I648cfb085b2cfd9829f541a844665ca5e2490330 Signed-off-by: Shankar Narayanan Issue-ID: OJSI-137 --- docs/sections/release-notes.rst | 2 ++ 1 file changed, 2 insertions(+) diff --git a/docs/sections/release-notes.rst b/docs/sections/release-notes.rst index 8e9b99a..10062de 100644 --- a/docs/sections/release-notes.rst +++ b/docs/sections/release-notes.rst @@ -58,6 +58,8 @@ These are all issues with fix version: Dublin Release and status: open, in-progr *Known Security Issues* + * [`OJSI-137 `_] In default deployment OPTFRA (oof-has-api) exposes HTTP port 30275 outside of cluster. + *Known Vulnerabilities in Used Modules* OPTFRA code has been formally scanned during build time using NexusIQ and no Critical vulnerability was found. `project `_. -- 2.16.6