Mark OJSI-196 as fixed 49/97549/1
authorKrzysztof Opasiak <k.opasiak@samsung.com>
Wed, 23 Oct 2019 19:41:38 +0000 (21:41 +0200)
committerDan Timoney <dtimoney@att.com>
Thu, 24 Oct 2019 14:21:59 +0000 (14:21 +0000)
OJSI-196 ticket is already closed as the vulnerability has been
removed.

Issue-ID: OJSI-196
Signed-off-by: Krzysztof Opasiak <k.opasiak@samsung.com>
Change-Id: I12d956c1327abd51ef51ba37abf0dc403f3f4333
(cherry picked from commit d8492a2b6b66553eb17d9ae60998f850f5b12c87)

docs/release-notes.rst

index ecab776..72b394b 100644 (file)
@@ -118,10 +118,11 @@ The full list of known issues in CCSDK may be found in the ONAP Jira at <https:/
 
 *Fixed Security Issues*
 
+        * In default deployment CCSDK (cds-ui) exposes HTTP port 30497 outside of cluster. [`OJSI-196 <https://jira.onap.org/browse/OJSI-196>`_]
+
 *Known Security Issues*
 
         * In default deployment CCSDK (netbox-nginx) exposes HTTP port 30420 outside of cluster. [`OJSI-160 <https://jira.onap.org/browse/OJSI-160>`_]
-        * In default deployment CCSDK (cds-ui) exposes HTTP port 30497 outside of cluster. [`OJSI-196 <https://jira.onap.org/browse/OJSI-196>`_]
         * In default deployment CCSDK (cds-blueprints-processor-http) exposes HTTP port 30499 outside of cluster. [`OJSI-197 <https://jira.onap.org/browse/OJSI-197>`_]
 
 *Known Vulnerabilities in Used Modules*

© 2017 ONAP. Copyright © The Linux Foundation ®. All Rights Reserved.
The Linux Foundation has registered trademarks and uses trademarks.
For a list of trademarks of The Linux Foundation, please see our Trademark Usage page.
Linux is a registered trademark of Linus Torvalds.
Privacy Policy and Terms of Use