From 528b0da2a990fd0aaa257cb45dac7fb67c9e19a2 Mon Sep 17 00:00:00 2001 From: Krzysztof Opasiak Date: Wed, 23 Oct 2019 21:13:57 +0200 Subject: [PATCH] Fix grammar in Security Release notes Fix some grammar issues catche by Amy. Issue-ID: OJSI-98 Issue-ID: OJSI-100 Signed-off-by: Krzysztof Opasiak Change-Id: Iad3b19a2e6c7cfe88bb2f49165dd556397875088 Former-commit-id: ee26f3ea2e03b3f69d5bd3cc6b4250b518a4e3f0 --- docs/release-notes.rst | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/docs/release-notes.rst b/docs/release-notes.rst index 9b4e37dd..49e6c1d5 100644 --- a/docs/release-notes.rst +++ b/docs/release-notes.rst @@ -96,14 +96,14 @@ Dublin. These issues have been resolved in El Alto. - `OJSI-91 `_ SDNC exposes unprotected API for user creation Fixed temporarily by disabling admportal. - `OJSI-98 `_ In default deployment SDNC (sdnc-portal) exposes HTTP port 30201 outside of cluster. - Port 30201 uses now HTTPS protocol. + Port 30201 now uses HTTPS protocol. - CVE-2019-12112 `OJSI-199 `_ SDNC service allows for arbitrary code execution in sla/upload form Fixed temporarily by disabling admportal. - `OJSI-34 `_ Multiple SQL Injection issues in SDNC - `OJSI-99 `_ In default deployment SDNC (sdnc) exposes HTTP port 30202 outside of cluster. Port 30202 is no longer used. - `OJSI-100 `_ In default deployment SDNC (sdnc-dgbuilder) exposes HTTP port 30203 outside of cluster. - Port 30203 uses now HTTPS protocol. + Port 30203 now uses HTTPS protocol. - `OJSI-179 `_ dev-sdnc-sdnc exposes JDWP on port 1830 which allows for arbitrary code execution Ticket has been closed as no one was able to reproduce the issue. - `OJSI-183 `_ SDNC exposes ssh service on port 30208 -- 2.16.6