diff options
author | Natanael Copa <ncopa@alpinelinux.org> | 2019-05-09 14:19:09 +0200 |
---|---|---|
committer | Natanael Copa <ncopa@alpinelinux.org> | 2019-05-09 14:19:09 +0200 |
commit | c3e9bf1adde73e006c15a4492d0ac8284d7edf73 (patch) | |
tree | 1c7fd5cc39dd2c206fd24ddd30e6853c5e5f0c39 | |
parent | cb08c39ed2f57dbdb60f8b184d7f507934dead74 (diff) | |
download | alpine-mksite-c3e9bf1adde73e006c15a4492d0ac8284d7edf73.tar.bz2 alpine-mksite-c3e9bf1adde73e006c15a4492d0ac8284d7edf73.tar.xz |
posts/docker-img-vuln: fix typo
-rw-r--r-- | posts/Docker-image-vulnerability-CVE-2019-5021.md | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/posts/Docker-image-vulnerability-CVE-2019-5021.md b/posts/Docker-image-vulnerability-CVE-2019-5021.md index 94baff5..27c3c81 100644 --- a/posts/Docker-image-vulnerability-CVE-2019-5021.md +++ b/posts/Docker-image-vulnerability-CVE-2019-5021.md @@ -56,7 +56,7 @@ Alternatively you could make sure that you don't have `linux-pam` installed. Alpine uses `busybox` as core tools. We have tested and made sure that root logins without password are only allowed from TTYs that are listed as secure in -`/etc/securetty`. This makes is possible to boot Alpine on a machine and log in +`/etc/securetty`. This makes it possible to boot Alpine on a machine and log in as root without shipping any pregenerated, well known password for Alpine. We consider a pregenerated, well known password worse than no password at all. |