Skip to content
Open
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
2 changes: 1 addition & 1 deletion content/manuals/engine/release-notes/18.09.md
Original file line number Diff line number Diff line change
Expand Up @@ -186,7 +186,7 @@ toc_max: 2
* Update `runc` to address a critical vulnerability that allows specially-crafted containers to gain administrative privileges on the host. [CVE-2019-5736](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5736)
* Ubuntu 14.04 customers using a 3.13 kernel will need to upgrade to a supported Ubuntu 4.x kernel

For additional information, [refer to the Docker blog post](https://blog.docker.com/2019/02/docker-security-update-cve-2018-5736-and-container-security-best-practices/).
For additional information, [refer to the Docker blog post](https://web.archive.org/web/20200227084534/https://www.docker.com/blog/docker-security-update-cve-2018-5736-and-container-security-best-practices/).
Copy link
Copy Markdown
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Well, if we are anyway touching this... I think we should just remove the link. I don't see any information on that page that restored page that could still be of interest to anyone. It's mostly talking about retired features/products like "Docker Certified Containers" and Docker Enterprise. Doesn't give any additional information about the CVE.


### Known Issues
* There are important changes to the upgrade process that, if not correctly followed, can have impact on the availability of applications running on the Swarm during upgrades. These constraints impact any upgrades coming from any version before 18.09 to version 18.09 or greater.
Expand Down