Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

CVE-2019-5021 #13

Closed
tao12345666333 opened this issue May 9, 2019 · 3 comments
Closed

CVE-2019-5021 #13

tao12345666333 opened this issue May 9, 2019 · 3 comments

Comments

@tao12345666333
Copy link

tao12345666333 commented May 9, 2019

Versions of the Official Alpine Linux Docker images (since v3.3) contain a NULL password for the root user. This vulnerability appears to be the result of a regression introduced in December of 2015. Due to the nature of this issue, systems deployed using affected versions of the Alpine Linux container which utilize Linux PAM, or some other mechanism which uses the system shadow file as an authentication database, may accept a NULL password for the root user.

ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5021

@tianon
Copy link
Contributor

tianon commented May 9, 2019

There's some relevant discussion over in gliderlabs/docker-alpine#511 and docker-library/official-images#5880

TLDR; no currently supported Alpine images are affected (all affected images are EOL), the attack vector is very narrow to begin with, and there are a couple other images we're looking to fix (and updating our test to catch this more aggressively).

@yosifkit
Copy link

yosifkit commented May 9, 2019

https://alpinelinux.org/posts/Docker-image-vulnerability-CVE-2019-5021.html

@ncopa
Copy link
Contributor

ncopa commented May 9, 2019

The issue was fixed March 7 2019 with docker-library/official-images#5516

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

4 participants