X-Git-Url: https://gerrit.onap.org/r/gitweb?p=multicloud%2Fframework.git;a=blobdiff_plain;f=docs%2FRelease%20Notes.rst;h=323053dd50da2947a024ed395228182fe745e6e5;hp=a2ff43128e3c40396877e343a3e3d5ee9f4a3c4a;hb=96bb41e64271accc719a49736bb9a2c89c49f25b;hpb=9f8a873ccdf1ab1a8373d3456a99d7826103256a diff --git a/docs/Release Notes.rst b/docs/Release Notes.rst index a2ff431..323053d 100644 --- a/docs/Release Notes.rst +++ b/docs/Release Notes.rst @@ -273,6 +273,33 @@ Version: 4.0.0 (Dublin Release) **Security Notes** +*Fixed Security Issues* + +- `OJSI-130 `_ + In default deployment MULTICLOUD (multicloud-azure) exposes HTTP port 30261 outside of cluster. + +- `OJSI-148 `_ + In default deployment MULTICLOUD (multicloud) exposes HTTP port 30291 outside of cluster. + +- `OJSI-150 `_ + In default deployment MULTICLOUD (multicloud-ocata) exposes HTTP port 30293 outside of cluster. + +- `OJSI-151 `_ + In default deployment MULTICLOUD (multicloud-windriver) exposes HTTP port 30294 outside of cluster. + +- `OJSI-153 `_ + In default deployment MULTICLOUD (multicloud-pike) exposes HTTP port 30296 outside of cluster. + +- `OJSI-149 `_ + In default deployment MULTICLOUD (multicloud-vio) exposes HTTP port 30292 outside of cluster. + + +*Known Security Issues* + + +*Known Vulnerabilities in Used Modules* + + MULTICLOUD code has been formally scanned during build time using NexusIQ and all Critical vulnerabilities have been addressed, items that remain open have been assessed for risk and determined to be false positive. @@ -389,6 +416,9 @@ None *Fixed Security Issues* + +*Known Security Issues* + - `OJSI-130 `_ In default deployment MULTICLOUD (multicloud-azure) exposes HTTP port 30261 outside of cluster. @@ -404,10 +434,13 @@ None - `OJSI-153 `_ In default deployment MULTICLOUD (multicloud-pike) exposes HTTP port 30296 outside of cluster. -*Known Security Issues* +- `OJSI-149 `_ + In default deployment MULTICLOUD (multicloud-vio) exposes HTTP port 30292 outside of cluster. + *Known Vulnerabilities in Used Modules* + MULTICLOUD code has been formally scanned during build time using NexusIQ and all Critical vulnerabilities have been addressed, items that remain open have been assessed for risk and determined to be false positive.