summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorNatanael Copa <ncopa@alpinelinux.org>2019-05-09 14:19:09 +0200
committerNatanael Copa <ncopa@alpinelinux.org>2019-05-09 14:19:09 +0200
commitc3e9bf1adde73e006c15a4492d0ac8284d7edf73 (patch)
tree1c7fd5cc39dd2c206fd24ddd30e6853c5e5f0c39
parentcb08c39ed2f57dbdb60f8b184d7f507934dead74 (diff)
downloadalpine-mksite-c3e9bf1adde73e006c15a4492d0ac8284d7edf73.tar.bz2
alpine-mksite-c3e9bf1adde73e006c15a4492d0ac8284d7edf73.tar.xz
posts/docker-img-vuln: fix typo
-rw-r--r--posts/Docker-image-vulnerability-CVE-2019-5021.md2
1 files changed, 1 insertions, 1 deletions
diff --git a/posts/Docker-image-vulnerability-CVE-2019-5021.md b/posts/Docker-image-vulnerability-CVE-2019-5021.md
index 94baff5..27c3c81 100644
--- a/posts/Docker-image-vulnerability-CVE-2019-5021.md
+++ b/posts/Docker-image-vulnerability-CVE-2019-5021.md
@@ -56,7 +56,7 @@ Alternatively you could make sure that you don't have `linux-pam` installed.
Alpine uses `busybox` as core tools. We have tested and made sure that root
logins without password are only allowed from TTYs that are listed as secure in
-`/etc/securetty`. This makes is possible to boot Alpine on a machine and log in
+`/etc/securetty`. This makes it possible to boot Alpine on a machine and log in
as root without shipping any pregenerated, well known password for Alpine. We
consider a pregenerated, well known password worse than no password at all.