diff options
author | Natanael Copa <ncopa@alpinelinux.org> | 2019-05-09 12:18:32 +0200 |
---|---|---|
committer | Natanael Copa <ncopa@alpinelinux.org> | 2019-05-09 12:18:32 +0200 |
commit | 01e088a08d6c118d5b280cddd3b47668cc8a8e8b (patch) | |
tree | 4aaeb3527ad26b516a2a1cff2822a5b964b6f99c | |
parent | 339328c71ab4db21668d50521a54a6f85e48f971 (diff) | |
download | alpine-mksite-01e088a08d6c118d5b280cddd3b47668cc8a8e8b.tar.bz2 alpine-mksite-01e088a08d6c118d5b280cddd3b47668cc8a8e8b.tar.xz |
posts/docker image vuln: shorten title, fix grammar
-rw-r--r-- | posts/Docker-Image-root-User-Hard-Coded-Credential-Vulnerability.md | 6 |
1 files changed, 3 insertions, 3 deletions
diff --git a/posts/Docker-Image-root-User-Hard-Coded-Credential-Vulnerability.md b/posts/Docker-Image-root-User-Hard-Coded-Credential-Vulnerability.md index 75e6a94..fd6ff1f 100644 --- a/posts/Docker-Image-root-User-Hard-Coded-Credential-Vulnerability.md +++ b/posts/Docker-Image-root-User-Hard-Coded-Credential-Vulnerability.md @@ -1,16 +1,16 @@ --- -title: 'Docker Image root Credential Vulnerability - CVE-2019-5021' +title: 'Docker Image Vulnerability - CVE-2019-5021' date: 2019-05-09 --- -# Docker Image root User Credential Vulnerability - CVE-2019-5021 +# Docker Image Vulnerability (CVE-2019-5021) [CVE-2019-5021](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5021) ## What is the problem? If you have `shadow` package installed in your Docker container and run your -service as non-root an attacker who compromised your system via unrelated +service as non-root an attacker who compromised your system via an unrelated security vulnerabillity, or a user with shell access, could elevate the privileges to root within the container. |