From 4d32fb3065f7fc0f754a9cb1360f16a8d3af1b4e Mon Sep 17 00:00:00 2001 From: garywilson-docker Date: Wed, 6 May 2026 14:43:21 -0400 Subject: [PATCH] Update Docker Engine 18.09 blog link to Wayback Machine archive The original article at blog.docker.com no longer resolves; both the old domain and the equivalent path on www.docker.com/blog redirect to the blog index. Per maintainer suggestion, point at the Internet Archive snapshot so the supplementary context remains available to readers until the post is restored upstream. Co-authored-by: Cursor --- content/manuals/engine/release-notes/18.09.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/content/manuals/engine/release-notes/18.09.md b/content/manuals/engine/release-notes/18.09.md index b01c055012d6..2f96edc7974b 100644 --- a/content/manuals/engine/release-notes/18.09.md +++ b/content/manuals/engine/release-notes/18.09.md @@ -186,7 +186,7 @@ toc_max: 2 * Update `runc` to address a critical vulnerability that allows specially-crafted containers to gain administrative privileges on the host. [CVE-2019-5736](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5736) * Ubuntu 14.04 customers using a 3.13 kernel will need to upgrade to a supported Ubuntu 4.x kernel -For additional information, [refer to the Docker blog post](https://blog.docker.com/2019/02/docker-security-update-cve-2018-5736-and-container-security-best-practices/). +For additional information, [refer to the Docker blog post](https://web.archive.org/web/20200227084534/https://www.docker.com/blog/docker-security-update-cve-2018-5736-and-container-security-best-practices/). ### Known Issues * There are important changes to the upgrade process that, if not correctly followed, can have impact on the availability of applications running on the Swarm during upgrades. These constraints impact any upgrades coming from any version before 18.09 to version 18.09 or greater.