Hi Amichai and Ofir,

Thank-you for your known vulnerability analysis of vid 
(https://wiki.onap.org/pages/viewpage.action?pageId=28378623).

For the vulnerabilities for where there is no fix, do you have an analysis of 
how VID uses the imported code so that the implications of the risk can be 
evaluated?  For example for the Jackson mapper, see: 
https://wiki.onap.org/pages/viewpage.action?pageId=25439016
Best Regards,

Steve

[Ericsson]<http://www.ericsson.com/>

STEPHEN TERRILL
Technology Specialist
POA Architecture and Solutions
Business Unit Digital Services

Ericsson
Ericsson R&D Center, via de los Poblados 13
28033, Madrid, Spain
Phone +34 339 3005
Mobile +34 609 168 515
[email protected]
www.ericsson.com


[http://www.ericsson.com/current_campaign]<http://www.ericsson.com/current_campaign>

Legal entity: Ericsson EspaƱa S.A, compay registration number ESA288568603. 
This Communication is Confidential. We only send and receive email on the basis 
of the terms set out at 
www.ericsson.com/email_disclaimer<http://www.ericsson.com/email_disclaimer>

_______________________________________________
ONAP-TSC mailing list
[email protected]
https://lists.onap.org/mailman/listinfo/onap-tsc

Reply via email to