summaryrefslogtreecommitdiffstats
path: root/posts
diff options
context:
space:
mode:
authorNatanael Copa <ncopa@alpinelinux.org>2019-05-10 09:10:32 +0200
committerNatanael Copa <ncopa@alpinelinux.org>2019-05-10 09:10:32 +0200
commitc38ee17a50ffdec17fd6a37373a2d0af817157fa (patch)
tree1ca0928ae6faa1675017a3a88999d83cacaa9fad /posts
parent714b4fecc0c76001a3239e6afb7bf02c6c98a017 (diff)
downloadalpine-mksite-c38ee17a50ffdec17fd6a37373a2d0af817157fa.tar.bz2
alpine-mksite-c38ee17a50ffdec17fd6a37373a2d0af817157fa.tar.xz
posts/docker-image-vuln: add date when fix release was done
Diffstat (limited to 'posts')
-rw-r--r--posts/Docker-image-vulnerability-CVE-2019-5021.md8
1 files changed, 7 insertions, 1 deletions
diff --git a/posts/Docker-image-vulnerability-CVE-2019-5021.md b/posts/Docker-image-vulnerability-CVE-2019-5021.md
index ed155f2..a1fa061 100644
--- a/posts/Docker-image-vulnerability-CVE-2019-5021.md
+++ b/posts/Docker-image-vulnerability-CVE-2019-5021.md
@@ -24,7 +24,8 @@ installed.
The issue was
[fixed](https://git.alpinelinux.org/aports/commit/?id=7a2566ec8260ceacae81088ebe2ffe6526c3809e)
-in the following [Docker image releases](https://github.com/docker-library/official-images/pull/5516):
+in the following [Docker image releases](https://github.com/docker-library/official-images/pull/5516)
+([7 March 2019](https://github.com/docker-library/official-images/pull/5516#event-2188593676)):
- edge (20190228 snapshot)
- v3.9.2
@@ -64,3 +65,8 @@ Services like `sshd` will not allow logins with blank passwords at all.
Unfortunately we missed the case when a user installs `shadow` and `linux-pam`
instead of using the default tools.
+
+
+<small>
+EDIT: release date of fixed releases was added
+</small>