diff --git a/content/manuals/desktop/release-notes.md b/content/manuals/desktop/release-notes.md index 8d919f56b62..5a0d559f622 100644 --- a/content/manuals/desktop/release-notes.md +++ b/content/manuals/desktop/release-notes.md @@ -57,6 +57,7 @@ For more frequently asked questions, see the [FAQs](/manuals/desktop/troubleshoo ### Security - Addressed [CVE-2026-2664](https://www.cve.org/cverecord?id=CVE-2026-2664), out of bounds read in grpcfuse kernel module. +- Addressed [CVE-2026-28400](https://www.cve.org/cverecord?id=CVE-2026-28400), runtime flag injection in Docker Model Runner. ## 4.61.0 diff --git a/content/manuals/dhi/get-started.md b/content/manuals/dhi/get-started.md index 6b8d99a1df3..3481552d9a2 100644 --- a/content/manuals/dhi/get-started.md +++ b/content/manuals/dhi/get-started.md @@ -11,12 +11,16 @@ This guide shows you how to go from zero to running a Docker Hardened Image Docker image to better understand the differences. While the steps use a specific image as an example, they can be applied to any DHI. -> [!NOTE] -> -> Docker Hardened Images are freely available to everyone with no subscription -> required, no usage restrictions, and no vendor lock-in. You can upgrade to a -> DHI Enterprise subscription when you require enterprise features like FIPS or -> STIG compliance variants, customization capabilities, or SLA-backed support. +Docker Hardened Images are freely available to everyone with no subscription +required, no usage restrictions, and no vendor lock-in. This quickstart covers +free DHI images pulled from `dhi.io`. If you have a DHI Enterprise subscription +or have started a trial and need compliance variants (FIPS), customization +capabilities, or SLA-backed updates, you must [mirror DHI +repositories](./how-to/mirror.md) to your organization's namespace on Docker +Hub. You then pull mirrored images from `docker.io` (not `dhi.io`) using your +organization's namespace path. For example, `docker pull +docker.io//dhi-python:3.13` instead of `docker pull +dhi.io/python:3.13`. ## Step 1: Find an image to use diff --git a/content/manuals/security/security-announcements.md b/content/manuals/security/security-announcements.md index f14c525ddcb..f0537111e5f 100644 --- a/content/manuals/security/security-announcements.md +++ b/content/manuals/security/security-announcements.md @@ -12,6 +12,12 @@ toc_max: 2 [Subscribe to security RSS feed](/security/security-announcements/index.xml) +## Docker Desktop 4.62.0 security update: CVE-2026-28400 + +A vulnerability in Docker Desktop was fixed on February 23 in the [4.62.0](/manuals/desktop/release-notes.md#4620) release: + +- Addressed [CVE-2026-28400](https://www.cve.org/cverecord?id=CVE-2026-28400), runtime flag injection in Docker Model Runner. + ## Docker Desktop 4.62.0 security update: CVE-2026-2664 A vulnerability in Docker Desktop was fixed on February 23 in the [4.62.0](/manuals/desktop/release-notes.md#4620) release: diff --git a/data/redirects.yml b/data/redirects.yml index a6a189a5814..3438e92d6c6 100644 --- a/data/redirects.yml +++ b/data/redirects.yml @@ -329,6 +329,10 @@ - /go/mcp-toolkit-install-mcp-client/ "/ai/mcp-catalog-and-toolkit/toolkit/#example-use-claude-desktop-as-a-client": - /go/mcp-toolkit-use-client-examples/ +"/ai/mcp-catalog-and-toolkit/get-started/#verify-connections": + - /go/mcp-client-verify/ +"/ai/mcp-catalog-and-toolkit/catalog/#custom-catalogs": + - /go/mcp-custom-catalogs/ # Desktop DMR "/ai/model-runner/": @@ -398,9 +402,6 @@ "/dhi/how-to/customize/#create-an-oci-artifact-image": - /go/dhi-customization-artifacts/ -"/ai/mcp-catalog-and-toolkit/get-started/#verify-connections": - - /go/mcp-client-verify/ - # Copilot extension (deprecated) "https://github.com/marketplace/docker-for-github-copilot": - /copilot/