summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorNatanael Copa <ncopa@alpinelinux.org>2019-05-09 14:37:30 +0200
committerNatanael Copa <ncopa@alpinelinux.org>2019-05-09 14:39:01 +0200
commit44d5a1c3f8f14795c490587eecec70e2e05bf27a (patch)
tree547e38cda4c68774b7765fe93bf55380a2b57fb4
parentc3e9bf1adde73e006c15a4492d0ac8284d7edf73 (diff)
downloadalpine-mksite-44d5a1c3f8f14795c490587eecec70e2e05bf27a.tar.bz2
alpine-mksite-44d5a1c3f8f14795c490587eecec70e2e05bf27a.tar.xz
posts/docker-image-vuln: grammar fixes
-rw-r--r--posts/Docker-image-vulnerability-CVE-2019-5021.md8
1 files changed, 4 insertions, 4 deletions
diff --git a/posts/Docker-image-vulnerability-CVE-2019-5021.md b/posts/Docker-image-vulnerability-CVE-2019-5021.md
index 27c3c81..ed155f2 100644
--- a/posts/Docker-image-vulnerability-CVE-2019-5021.md
+++ b/posts/Docker-image-vulnerability-CVE-2019-5021.md
@@ -9,10 +9,10 @@ date: 2019-05-09
## What is the problem?
-If you have `shadow` package installed in your Docker container and run your
-service as non-root an attacker who compromised your system via an unrelated
-security vulnerabillity, or a user with shell access, could elevate the
-privileges to root within the container.
+If you have the `shadow` package installed in your Docker container and run
+your service as non-root user, an attacker who compromised your system via an
+unrelated security vulnerabillity, or a user with shell access, could elevate
+their privileges to root within the container.
## Who is affected?