summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorNatanael Copa <ncopa@alpinelinux.org>2019-05-09 12:18:32 +0200
committerNatanael Copa <ncopa@alpinelinux.org>2019-05-09 12:18:32 +0200
commit01e088a08d6c118d5b280cddd3b47668cc8a8e8b (patch)
tree4aaeb3527ad26b516a2a1cff2822a5b964b6f99c
parent339328c71ab4db21668d50521a54a6f85e48f971 (diff)
downloadalpine-mksite-01e088a08d6c118d5b280cddd3b47668cc8a8e8b.tar.bz2
alpine-mksite-01e088a08d6c118d5b280cddd3b47668cc8a8e8b.tar.xz
posts/docker image vuln: shorten title, fix grammar
-rw-r--r--posts/Docker-Image-root-User-Hard-Coded-Credential-Vulnerability.md6
1 files changed, 3 insertions, 3 deletions
diff --git a/posts/Docker-Image-root-User-Hard-Coded-Credential-Vulnerability.md b/posts/Docker-Image-root-User-Hard-Coded-Credential-Vulnerability.md
index 75e6a94..fd6ff1f 100644
--- a/posts/Docker-Image-root-User-Hard-Coded-Credential-Vulnerability.md
+++ b/posts/Docker-Image-root-User-Hard-Coded-Credential-Vulnerability.md
@@ -1,16 +1,16 @@
---
-title: 'Docker Image root Credential Vulnerability - CVE-2019-5021'
+title: 'Docker Image Vulnerability - CVE-2019-5021'
date: 2019-05-09
---
-# Docker Image root User Credential Vulnerability - CVE-2019-5021
+# Docker Image Vulnerability (CVE-2019-5021)
[CVE-2019-5021](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5021)
## What is the problem?
If you have `shadow` package installed in your Docker container and run your
-service as non-root an attacker who compromised your system via unrelated
+service as non-root an attacker who compromised your system via an unrelated
security vulnerabillity, or a user with shell access, could elevate the
privileges to root within the container.