First published: Wed May 08 2019(Updated: )
Versions of the Official Alpine Linux Docker images (since v3.3) contain a NULL password for the `root` user. This vulnerability appears to be the result of a regression introduced in December of 2015. Due to the nature of this issue, systems deployed using affected versions of the Alpine Linux container which utilize Linux PAM, or some other mechanism which uses the system shadow file as an authentication database, may accept a NULL password for the `root` user.
Credit: talos-cna@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Gliderlabs Docker-alpine | >=3.3 | |
Alpinelinux Alpine Linux | ||
openSUSE Leap | =15.0 | |
openSUSE Leap | =15.1 | |
F5 Big-ip Controller | =1.2.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-5021 is a vulnerability that affects versions of the Official Alpine Linux Docker images since v3.3, where the root user has a NULL password.
CVE-2019-5021 has a severity rating of 9.8, which is considered critical.
Gliderlabs Docker-alpine versions since v3.3 are affected by CVE-2019-5021 where the root user has a NULL password.
To fix CVE-2019-5021, you should update your Alpine Linux Docker images to a version that has addressed the NULL password vulnerability.
No, openSUSE Leap 15.0 and 15.1 are not affected by CVE-2019-5021.