Skip to content

Commit 4754655

Browse files
authored
Add security notices regarding CVE-2025-10657. (#23476)
<!--Delete sections as needed --> ## Description Add notices to the 4.47.0 release notes and the security announcements page. ## Reviews <!-- Notes for reviewers here --> <!-- List applicable reviews (optionally @tag reviewers) --> - [ ] Technical review - [X] Editorial review - [ ] Product review Signed-off-by: Cesar Talledo <[email protected]>
1 parent fdbe2dd commit 4754655

File tree

2 files changed

+14
-4
lines changed

2 files changed

+14
-4
lines changed

content/manuals/desktop/release-notes.md

Lines changed: 8 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -40,6 +40,10 @@ For more frequently asked questions, see the [FAQs](/manuals/desktop/troubleshoo
4040

4141
{{< desktop-install-v2 all=true win_arm_release="Early Access" version="4.47.0" build_path="/206054/" >}}
4242

43+
### Security
44+
45+
- Fixed [CVE-2025-10657](https://www.cve.org/CVERecord?id=CVE-2025-10657) where the Enhanced Container Isolation [Docker Socket command restrictions](../enterprise/security/hardened-desktop/enhanced-container-isolation/config.md#command-restrictions) feature was not working properly in Docker Desktop 4.46.0 only (the configuration for it was being ignored).
46+
4347
### New
4448

4549
- Added dynamic MCP server discovery and support to Docker's MCP catalog.
@@ -85,7 +89,7 @@ For more frequently asked questions, see the [FAQs](/manuals/desktop/troubleshoo
8589
### New
8690

8791
- Added a new Learning center walkthrough for Docker MCP Toolkit and other onboarding improvements.
88-
- Administrators can now control [PAC configurations with Settings Management](/manuals/enterprise/security/hardened-desktop/settings-management/configure-json-file.md#proxy-settings).
92+
- Administrators can now control [PAC configurations with Settings Management](/manuals/enterprise/security/hardened-desktop/settings-management/configure-json-file.md#proxy-settings).
8993
- The update experience has been redesigned to make it easier to understand and manage updates for Docker Desktop and its components.
9094

9195
### Upgrades
@@ -107,7 +111,7 @@ For more frequently asked questions, see the [FAQs](/manuals/desktop/troubleshoo
107111

108112
#### For Windows
109113

110-
- Improved the security of Docker Model Runner by enabling sandboxing of the `llama.cpp` inference processes.
114+
- Improved the security of Docker Model Runner by enabling sandboxing of the `llama.cpp` inference processes.
111115

112116
#### For Linux
113117

@@ -156,7 +160,7 @@ For more frequently asked questions, see the [FAQs](/manuals/desktop/troubleshoo
156160

157161
{{< desktop-install-v2 all=true win_arm_release="Early Access" version="4.44.3" build_path="/202357/" >}}
158162

159-
### Security
163+
### Security
160164

161165
- Fixed [CVE-2025-9074](https://www.cve.org/CVERecord?id=CVE-2025-9074) where a malicious container running on Docker Desktop could access the Docker Engine and launch additional containers without requiring the Docker socket to be mounted. This could allow unauthorized access to user files on the host system. Enhanced Container Isolation (ECI) does not mitigate this vulnerability.
162166

@@ -219,7 +223,7 @@ For more frequently asked questions, see the [FAQs](/manuals/desktop/troubleshoo
219223
- [Docker Model CLI v0.1.36](https://github.com/docker/model-cli/releases/tag/v0.1.36)
220224
- [Docker Desktop CLI v0.2.0](/manuals/desktop/features/desktop-cli.md)
221225

222-
### Security
226+
### Security
223227

224228
We are aware of [CVE-2025-23266](https://nvd.nist.gov/vuln/detail/CVE-2025-23266), a critical vulnerability affecting the NVIDIA Container Toolkit in CDI mode up to version 1.17.7. Docker Desktop includes version 1.17.8, which is not impacted. However, older versions of Docker Desktop that bundled earlier toolkit versions may be affected if CDI mode was manually enabled. Uprade to Docker Desktop 4.44 or later to ensure you're using the patched version.
225229

content/manuals/security/security-announcements.md

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -12,6 +12,12 @@ toc_max: 2
1212

1313
{{< rss-button feed="/security/security-announcements/index.xml" text="Subscribe to security RSS feed" >}}
1414

15+
## Docker Desktop 4.47.0 security update: CVE-2025-10657
16+
17+
A vulnerability in Docker Desktop was fixed on September 25 in the [4.47.0](/manuals/desktop/release-notes.md#4470) release:
18+
19+
- Fixed [CVE-2025-10657](https://www.cve.org/CVERecord?id=CVE-2025-10657) where the Enhanced Container Isolation [Docker Socket command restrictions](../enterprise/security/hardened-desktop/enhanced-container-isolation/config.md#command-restrictions) feature was not working properly in Docker Desktop 4.46.0 only (the configuration for it was being ignored).
20+
1521
## Docker Desktop 4.44.3 security update: CVE-2025-9074
1622

1723
_Last updated August 20, 2025_

0 commit comments

Comments
 (0)