Skip to content

Commit dde8800

Browse files
committed
site: simplify security-announcements rss page
Signed-off-by: David Karlsson <35727626+dvdksn@users.noreply.github.com>
1 parent d5fd0b2 commit dde8800

5 files changed

Lines changed: 25 additions & 127 deletions

File tree

content/manuals/security/security-announcements.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -4,13 +4,13 @@ keywords: Docker, CVEs, security, notice, Log4J 2, Log4Shell, Text4Shell, announ
44
title: Docker security announcements
55
linkTitle: Security announcements
66
outputs: ["HTML", "markdown", "RSS"]
7-
type: "security-announcements"
7+
layout: security-announcements
88
weight: 80
99
toc_min: 1
1010
toc_max: 2
1111
---
1212

13-
{{< rss-button feed="/security/security-announcements/index.xml" text="Subscribe to security RSS feed" >}}
13+
[Subscribe to security RSS feed](/security/security-announcements/index.xml)
1414

1515
## Docker Desktop 4.54.0 security update: CVE-2025-13743
1616

@@ -94,7 +94,7 @@ _Last updated June, 2024_
9494

9595
Docker is pleased to announce that we have received our SOC 2 Type 2 attestation and ISO 27001 certification with no exceptions or major non-conformities.
9696

97-
Security is a fundamental pillar to Dockers operations, which is embedded into our overall mission and company strategy. Dockers products are core to our user community and our SOC 2 Type 2 attestation and ISO 27001 certification demonstrate Dockers ongoing commitment to security to our user base.
97+
Security is a fundamental pillar to Docker's operations, which is embedded into our overall mission and company strategy. Docker's products are core to our user community and our SOC 2 Type 2 attestation and ISO 27001 certification demonstrate Docker's ongoing commitment to security to our user base.
9898

9999
For more information, see the [Blog announcement](https://www.docker.com/blog/docker-announces-soc-2-type-2-attestation-iso-27001-certification/).
100100

@@ -104,7 +104,7 @@ _Last updated February 2, 2024_
104104

105105
We at Docker prioritize the security and integrity of our software and the trust of our users. Security researchers at Snyk Labs identified and reported four security vulnerabilities in the container ecosystem. One of the vulnerabilities, [CVE-2024-21626](https://scout.docker.com/v/CVE-2024-21626), concerns the runc container runtime, and the other three affect BuildKit ([CVE-2024-23651](https://scout.docker.com/v/CVE-2024-23651), [CVE-2024-23652](https://scout.docker.com/v/CVE-2024-23652), and [CVE-2024-23653](https://scout.docker.com/v/CVE-2024-23653)). We want to assure our community that our team, in collaboration with the reporters and open source maintainers, has been diligently working on coordinating and implementing necessary remediations.
106106

107-
We are committed to maintaining the highest security standards. We have published patched versions of runc, BuildKit, and Moby on January 31 and released an update for Docker Desktop on February 1 to address these vulnerabilities. Additionally, our latest BuildKit and Moby releases included fixes for [CVE-2024-23650](https://scout.docker.com/v/CVE-2024-23650) and [CVE-2024-24557](https://scout.docker.com/v/CVE-2024-24557), discovered respectively by an independent researcher and through Dockers internal research initiatives.
107+
We are committed to maintaining the highest security standards. We have published patched versions of runc, BuildKit, and Moby on January 31 and released an update for Docker Desktop on February 1 to address these vulnerabilities. Additionally, our latest BuildKit and Moby releases included fixes for [CVE-2024-23650](https://scout.docker.com/v/CVE-2024-23650) and [CVE-2024-24557](https://scout.docker.com/v/CVE-2024-24557), discovered respectively by an independent researcher and through Docker's internal research initiatives.
108108

109109
| | Versions Impacted |
110110
|:-----------------------|:--------------------------|
@@ -113,7 +113,7 @@ We are committed to maintaining the highest security standards. We have publishe
113113
| `Moby (Docker Engine)` | <= 25.0.1 and <= 24.0.8 |
114114
| `Docker Desktop` | <= 4.27.0 |
115115

116-
### What should I do if Im on an affected version?
116+
### What should I do if I'm on an affected version?
117117

118118
If you are using affected versions of runc, BuildKit, Moby, or Docker Desktop, make sure to update to the latest versions, linked in the following table:
119119

@@ -128,7 +128,7 @@ If you are using affected versions of runc, BuildKit, Moby, or Docker Desktop, m
128128
If you are unable to update to an unaffected version promptly, follow these best practices to mitigate risk:
129129

130130
* Only use trusted Docker images (such as [Docker Official Images](../docker-hub/image-library/trusted-content.md#docker-official-images)).
131-
* Dont build Docker images from untrusted sources or untrusted Dockerfiles.
131+
* Don't build Docker images from untrusted sources or untrusted Dockerfiles.
132132
* If you are a Docker Business customer using Docker Desktop and unable to update to v4.27.1, make sure to enable [Hardened Docker Desktop](/manuals/enterprise/security/hardened-desktop/_index.md) features such as:
133133
* [Enhanced Container Isolation](/manuals/enterprise/security/hardened-desktop/enhanced-container-isolation/_index.md), which mitigates the impact of CVE-2024-21626 in the case of running containers from malicious images.
134134
* [Image Access Management](/manuals/enterprise/security/hardened-desktop/image-access-management.md), and [Registry Access Management](/manuals/enterprise/security/hardened-desktop/registry-access-management.md), which give organizations control over which images and repositories their users can access.

data/security_announcements.yaml

Lines changed: 0 additions & 59 deletions
This file was deleted.

layouts/_shortcodes/rss-button.html

Lines changed: 0 additions & 14 deletions
This file was deleted.
Lines changed: 19 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,19 @@
1+
{{- $_ := .Content -}}
2+
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
3+
<channel>
4+
<title>Docker Docs - Security Announcements</title>
5+
<description>Docker security announcements and updates</description>
6+
<link>{{ .Permalink }}</link>
7+
<generator>Hugo -- gohugo.io</generator>
8+
<language>{{ .Site.LanguageCode | default "en" }}</language>
9+
<lastBuildDate>{{ now.Format "Mon, 02 Jan 2006 15:04:05 -0700" | safeHTML }}</lastBuildDate>
10+
<atom:link href="{{ .Permalink }}index.xml" rel="self" type="application/rss+xml" />
11+
{{- range (index .Fragments.Headings 0).Headings }}
12+
<item>
13+
<title>{{ .Title }}</title>
14+
<link>{{ $.Permalink }}#{{ .ID }}</link>
15+
<guid>security-{{ .ID }}</guid>
16+
</item>
17+
{{- end }}
18+
</channel>
19+
</rss>

layouts/security-announcements/rss.xml

Lines changed: 0 additions & 48 deletions
This file was deleted.

0 commit comments

Comments
 (0)