diff options
author | Natanael Copa <ncopa@alpinelinux.org> | 2019-05-09 14:37:30 +0200 |
---|---|---|
committer | Natanael Copa <ncopa@alpinelinux.org> | 2019-05-09 14:39:01 +0200 |
commit | 44d5a1c3f8f14795c490587eecec70e2e05bf27a (patch) | |
tree | 547e38cda4c68774b7765fe93bf55380a2b57fb4 | |
parent | c3e9bf1adde73e006c15a4492d0ac8284d7edf73 (diff) | |
download | alpine-mksite-44d5a1c3f8f14795c490587eecec70e2e05bf27a.tar.bz2 alpine-mksite-44d5a1c3f8f14795c490587eecec70e2e05bf27a.tar.xz |
posts/docker-image-vuln: grammar fixes
-rw-r--r-- | posts/Docker-image-vulnerability-CVE-2019-5021.md | 8 |
1 files changed, 4 insertions, 4 deletions
diff --git a/posts/Docker-image-vulnerability-CVE-2019-5021.md b/posts/Docker-image-vulnerability-CVE-2019-5021.md index 27c3c81..ed155f2 100644 --- a/posts/Docker-image-vulnerability-CVE-2019-5021.md +++ b/posts/Docker-image-vulnerability-CVE-2019-5021.md @@ -9,10 +9,10 @@ date: 2019-05-09 ## What is the problem? -If you have `shadow` package installed in your Docker container and run your -service as non-root an attacker who compromised your system via an unrelated -security vulnerabillity, or a user with shell access, could elevate the -privileges to root within the container. +If you have the `shadow` package installed in your Docker container and run +your service as non-root user, an attacker who compromised your system via an +unrelated security vulnerabillity, or a user with shell access, could elevate +their privileges to root within the container. ## Who is affected? |