You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
- Fixed [CVE-2025-10657](https://www.cve.org/CVERecord?id=CVE-2025-10657) where the Enhanced Container Isolation [Docker Socket command restrictions](../enterprise/security/hardened-desktop/enhanced-container-isolation/config.md#command-restrictions) feature was not working properly in Docker Desktop 4.46.0 only (the configuration for it was being ignored).
46
+
43
47
### New
44
48
45
49
- Added dynamic MCP server discovery and support to Docker's MCP catalog.
@@ -85,7 +89,7 @@ For more frequently asked questions, see the [FAQs](/manuals/desktop/troubleshoo
85
89
### New
86
90
87
91
- Added a new Learning center walkthrough for Docker MCP Toolkit and other onboarding improvements.
88
-
- Administrators can now control [PAC configurations with Settings Management](/manuals/enterprise/security/hardened-desktop/settings-management/configure-json-file.md#proxy-settings).
92
+
- Administrators can now control [PAC configurations with Settings Management](/manuals/enterprise/security/hardened-desktop/settings-management/configure-json-file.md#proxy-settings).
89
93
- The update experience has been redesigned to make it easier to understand and manage updates for Docker Desktop and its components.
90
94
91
95
### Upgrades
@@ -107,7 +111,7 @@ For more frequently asked questions, see the [FAQs](/manuals/desktop/troubleshoo
107
111
108
112
#### For Windows
109
113
110
-
- Improved the security of Docker Model Runner by enabling sandboxing of the `llama.cpp` inference processes.
114
+
- Improved the security of Docker Model Runner by enabling sandboxing of the `llama.cpp` inference processes.
111
115
112
116
#### For Linux
113
117
@@ -156,7 +160,7 @@ For more frequently asked questions, see the [FAQs](/manuals/desktop/troubleshoo
- Fixed [CVE-2025-9074](https://www.cve.org/CVERecord?id=CVE-2025-9074) where a malicious container running on Docker Desktop could access the Docker Engine and launch additional containers without requiring the Docker socket to be mounted. This could allow unauthorized access to user files on the host system. Enhanced Container Isolation (ECI) does not mitigate this vulnerability.
162
166
@@ -219,7 +223,7 @@ For more frequently asked questions, see the [FAQs](/manuals/desktop/troubleshoo
219
223
-[Docker Model CLI v0.1.36](https://github.com/docker/model-cli/releases/tag/v0.1.36)
We are aware of [CVE-2025-23266](https://nvd.nist.gov/vuln/detail/CVE-2025-23266), a critical vulnerability affecting the NVIDIA Container Toolkit in CDI mode up to version 1.17.7. Docker Desktop includes version 1.17.8, which is not impacted. However, older versions of Docker Desktop that bundled earlier toolkit versions may be affected if CDI mode was manually enabled. Uprade to Docker Desktop 4.44 or later to ensure you're using the patched version.
A vulnerability in Docker Desktop was fixed on September 25 in the [4.47.0](/manuals/desktop/release-notes.md#4470) release:
18
+
19
+
- Fixed [CVE-2025-10657](https://www.cve.org/CVERecord?id=CVE-2025-10657) where the Enhanced Container Isolation [Docker Socket command restrictions](../enterprise/security/hardened-desktop/enhanced-container-isolation/config.md#command-restrictions) feature was not working properly in Docker Desktop 4.46.0 only (the configuration for it was being ignored).
0 commit comments