From 10e8f008a554ae7ef7b2d5fa80538f1234fc741d Mon Sep 17 00:00:00 2001 From: Mia Date: Sat, 27 Nov 2021 18:23:26 -0500 Subject: [PATCH 1/3] Update 09_image_best.md Changed the command to login for use of `docker scan`. --- get-started/09_image_best.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/get-started/09_image_best.md b/get-started/09_image_best.md index ddc557a4b3..5b8deae89b 100644 --- a/get-started/09_image_best.md +++ b/get-started/09_image_best.md @@ -11,7 +11,7 @@ Docker has partnered with [Snyk](https://snyk.io){:target="_blank" rel="noopener > **Note** > -> You must be logged in to Docker Hub to scan your images. Run the command `docker login`, and then scan your images using +> You must be logged in to Docker Hub to scan your images. Run the command `docker scan --login`, and then scan your images using > `docker scan `. For example, to scan the `getting-started` image you created earlier in the tutorial, you can just type From eaab1382be2dd42578a02a66801b36b08e51db9f Mon Sep 17 00:00:00 2001 From: freemankevin <71524776+freemankevin@users.noreply.github.com> Date: Thu, 23 Dec 2021 10:56:33 +0800 Subject: [PATCH 2/3] Supplement the'$' identifier --- storage/volumes.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/storage/volumes.md b/storage/volumes.md index f1eb56c416..2389740d7f 100644 --- a/storage/volumes.md +++ b/storage/volumes.md @@ -494,7 +494,7 @@ $ docker service create -d \ #### NFSv4 ```console -docker service create -d \ +$ docker service create -d \ --name nfs-service \ --mount 'type=volume,source=nfsvolume,target=/app,volume-driver=local,volume-opt=type=nfs,volume-opt=device=:/var/docker-nfs,"volume-opt=o=addr=10.0.0.10,rw,nfsvers=4,async"' \ nginx:latest From 0c471a29fe53340ed43a478e44fd6f7806dd28fa Mon Sep 17 00:00:00 2001 From: Chris Crone Date: Thu, 23 Dec 2021 10:53:24 +0100 Subject: [PATCH 3/3] security: Update Elasticsearch and logstash log4j CVE information Signed-off-by: Chris Crone --- security/index.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/security/index.md b/security/index.md index b0be656ad7..f9089058fb 100644 --- a/security/index.md +++ b/security/index.md @@ -64,11 +64,11 @@ vulnerable for other reasons. We recommend that you also review the guidelines p | Repository | Patched version | Additional documentation | |:------------------------|:-----------------------|:-----------------------| | [couchbase](https://hub.docker.com/_/couchbase) | 7.0.3 | [Couchbase blog](https://blog.couchbase.com/what-to-know-about-the-log4j-vulnerability-cve-2021-44228/) | -| [Elasticsearch](https://hub.docker.com/_/elasticsearch) | 7.16.1, 6.8.21 | [Elasticsearch security announcement](https://discuss.elastic.co/t/apache-log4j2-remote-code-execution-rce-vulnerability-cve-2021-44228-esa-2021-31/291476) | +| [Elasticsearch](https://hub.docker.com/_/elasticsearch) | 6.8.22, 7.16.2 | [Elasticsearch announcement](https://www.elastic.co/blog/new-elasticsearch-and-logstash-releases-upgrade-apache-log4j2) | | [Flink](https://hub.docker.com/_/flink) | 1.11.6, 1.12.7, 1.13.5, 1.14.2 | [Flink advice on Log4j CVE](https://flink.apache.org/2021/12/10/log4j-cve.html) | | [Geonetwork](https://hub.docker.com/_/geonetwork) | 3.10.10 | [Geonetwork GitHub discussion](https://github.com/geonetwork/core-geonetwork/issues/6076) | | [lightstreamer](https://hub.docker.com/_/lightstreamer) | Awaiting info | Awaiting info | -| [logstash](https://hub.docker.com/_/logstash) | 7.16.1 | Awaiting info | +| [logstash](https://hub.docker.com/_/logstash) | 6.8.22, 7.16.2 | [Elasticsearch announcement](https://www.elastic.co/blog/new-elasticsearch-and-logstash-releases-upgrade-apache-log4j2) | | [neo4j](https://hub.docker.com/_/neo4j) | 4.4.2 | [Neo4j announcement](https://community.neo4j.com/t/log4j-cve-mitigation-for-neo4j/48856) | | [solr](https://hub.docker.com/_/solr) | 8.11.1 | [Solr security news](https://solr.apache.org/security.html#apache-solr-affected-by-apache-log4j-cve-2021-44228) | | [sonarqube](https://hub.docker.com/_/sonarqube) | 8.9.5, 9.2.2 | [SonarQube announcement](https://community.sonarsource.com/t/sonarqube-sonarcloud-and-the-log4j-vulnerability/54721) |