From: Prudence Au Date: Wed, 9 Oct 2019 01:08:17 +0000 (-0400) Subject: Include the unresolved OJSI tickets in the release notes X-Git-Tag: 1.6.0~7 X-Git-Url: https://gerrit.onap.org/r/gitweb?p=logging-analytics.git;a=commitdiff_plain;h=8cb7d2a7333d9dfefc57b39a263cc67d3b64ee0f Include the unresolved OJSI tickets in the release notes Issue-ID: LOG-1148 Signed-off-by: Prudence Au Change-Id: Ic364bc12ea0ae82fb931499af7d1e61ae152d8eb --- diff --git a/docs/release-notes.rst b/docs/release-notes.rst index eb3878d..bef85f1 100644 --- a/docs/release-notes.rst +++ b/docs/release-notes.rst @@ -27,9 +27,12 @@ El Alto **Known Issues** - `LOG-1159 `_ Vulnerability issue: logging-analytics version 5.0.9.RELEASE -**Security Notes** +**Known Security Issues** - - LOG code has been formally scanned during build time using NexusIQ and all Critical vulnerabilities have been addressed, items that remain open have been assessed for risk and determined to be false positive. The LOG open Critical security vulnerabilities and their risk assessment have been documented as part of the `project `_. + - `OJSI-200 `_ Logging exposes unprotected APIs/UIs (CVE-2019-12125) + - `OJSI-155 `_ LOG demo target exposes plain text HTTP endpoint using port 30398 + - `OJSI-125 `_ log-es exposes plain text HTTP endpoint using port 30254 + - `OJSI-124 `_ log-kibana exposes plain text HTTP endpoint using port 30253 Quick Links: - `LOG project page `_ @@ -89,8 +92,9 @@ El Alto - `LOG-1117 `_ Vulnerability issue: POMBA-SDNC-CONTEXT-BUILDER and POMBA-NETWORK-DISCOVERY-CONTEXT-BUILDER uikit - `LOG-1160 `_ Vulnerability issue: jackson-databind 2.9.9 -**Security Notes** - - all nodeports for Kibana, context builders and data-router are open by default for now +**Known Security Issues** + - `OJSI-123 `_ pomba-data-router exposes plain text HTTP endpoint using port 30249 + - `OJSI-115 `_ pomba-kibana exposes plain text HTTP endpoint using port 30234 POMBA code has been formally scanned during build time using NexusIQ and all Critical vulnerabilities have been addressed, items that remain open have been assessed for risk and determined to be false positive. The LOG open Critical security vulnerabilities and their risk assessment have been documented as part of the `project `_.