From bba15ac0a127b80a2b8d9939627866e1bcddc8fb Mon Sep 17 00:00:00 2001 From: Stephen Turner Date: Thu, 16 Dec 2021 11:48:01 +0000 Subject: [PATCH 1/2] Remove two issues that are now fixed --- desktop/mac/troubleshoot.md | 8 -------- 1 file changed, 8 deletions(-) diff --git a/desktop/mac/troubleshoot.md b/desktop/mac/troubleshoot.md index 865c0a549f..3caaf7e211 100644 --- a/desktop/mac/troubleshoot.md +++ b/desktop/mac/troubleshoot.md @@ -276,18 +276,10 @@ in the Apple documentation, and Docker Desktop [Mac system requirements](install This is an interaction between `vmnet.framework` (as used by `virtualization.framework`) and the VPN clients. - * Docker Desktop is incompatible with macOS Internet Sharing. See [docker/for-mac#5348](https://github.com/docker/for-mac/issues/5348). - - This is an interaction between `vmnet.framework` (as used by `virtualization.framework`) and macOS Internet Sharing. At the moment it is not possible to use Docker Desktop and macOS Internet Sharing at the same time. - * Some container disk I/O is much slower than expected. See [docker/for-mac#5389](https://github.com/docker/for-mac/issues/5389). Disk flushes are particularly slow due to the need to guarantee data is written to stable storage on the host. We have also observed specific performance problems when using the `virtualization.framework` on Intel chips on MacOS Monterey. This is an artifact of the new `virtualization.framework`. - * TCP and UDP port 53 (DNS) are bound on the host when Docker Desktop starts. Therefore you cannot bind to port 53 on all interfaces with a command like `docker run -p 53:53`. See [docker/for-mac#5335](https://github.com/docker/for-mac/issues/5335). - - This is an artifact of the new `virtualization.framework`. A workaround is to bind to a specific IP address e.g. `docker run -p 127.0.0.1:53:53`. - * The Linux Kernel may occasionally crash. Docker now detects this problem and pops up an error dialog offering the user the ability to quickly restart Linux. We are still gathering data and testing alternate kernel versions. From 516848663f55572bd64bd1a5e2263c7e9da812a4 Mon Sep 17 00:00:00 2001 From: Usha Mandya Date: Thu, 16 Dec 2021 21:13:58 +0000 Subject: [PATCH 2/2] Update patch versions for Flink and sonarqube repos Signed-off-by: Usha Mandya --- security/index.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/security/index.md b/security/index.md index a6e1c189fd..a591b39046 100644 --- a/security/index.md +++ b/security/index.md @@ -65,14 +65,14 @@ vulnerable for other reasons. We recommend that you also review the guidelines p |:------------------------|:-----------------------|:-----------------------| | [couchbase](https://hub.docker.com/_/couchbase) | 7.0.3 | [Couchbase blog](https://blog.couchbase.com/what-to-know-about-the-log4j-vulnerability-cve-2021-44228/) | | [Elasticsearch](https://hub.docker.com/_/elasticsearch) | 7.16.1, 6.8.21 | [Elasticsearch security announcement](https://discuss.elastic.co/t/apache-log4j2-remote-code-execution-rce-vulnerability-cve-2021-44228-esa-2021-31/291476) | -| [Flink](https://hub.docker.com/_/flink) | Awaiting info | [Flink advice on Log4j CVE](https://flink.apache.org/2021/12/10/log4j-cve.html) | +| [Flink](https://hub.docker.com/_/flink) | 1.11.6, 1.12.7, 1.13.5, 1.14.2 | [Flink advice on Log4j CVE](https://flink.apache.org/2021/12/10/log4j-cve.html) | | [Geonetwork](https://hub.docker.com/_/geonetwork) | 3.10.10 | [Geonetwork GitHub discussion](https://github.com/geonetwork/core-geonetwork/issues/6076) | | [lightstreamer](https://hub.docker.com/_/lightstreamer) | Awaiting info | Awaiting info | | [logstash](https://hub.docker.com/_/logstash) | 7.16.1 | Awaiting info | | [neo4j](https://hub.docker.com/_/neo4j) | 4.4.1 | [Neo4j announcement](https://community.neo4j.com/t/log4j-cve-mitigation-for-neo4j/48856) | | [nuxeo](https://hub.docker.com/_/nuxeo) | Awaiting info | [nuxeo blog](https://www.nuxeo.com/blog/apache-log4j/) | | [solr](https://hub.docker.com/_/solr) | Awaiting info | [Solr security news](https://solr.apache.org/security.html#apache-solr-affected-by-apache-log4j-cve-2021-44228) | -| [sonarqube](https://hub.docker.com/_/sonarqube) | 9.2.2 | [SonarQube announcement](https://community.sonarsource.com/t/sonarqube-sonarcloud-and-the-log4j-vulnerability/54721) | +| [sonarqube](https://hub.docker.com/_/sonarqube) | 8.9.5, 9.2.2 | [SonarQube announcement](https://community.sonarsource.com/t/sonarqube-sonarcloud-and-the-log4j-vulnerability/54721) | | [storm](https://hub.docker.com/_/storm) | Awaiting info | Awaiting info | > **Note**