Skip to content

Is null root password / CVE-2019-5021 of any risk to Wolfi images? #1245

Answered by kaniini
jemag asked this question in Q&A
Discussion options

You must be logged in to vote

I am wondering if there is any way this can get exploited

Busybox is not installed SUID in images, so it is not possible to use it as an escalation tool, and only allows passwordless escalation from sources listed in /etc/securetty. The su included with util-linux does not allow for escalation without password from any source other than a tty listed in /etc/securetty. PAM is similarly configured.

Honestly, Alpine should have disputed CVE-2019-5021, as the Alpine image was never vulnerable either, for the same reason. If it were to happen today, Alpine probably would reject this CVE.

We could scramble the root password to quiet the tool, but this would either result in a predictable pass…

Replies: 1 comment 1 reply

Comment options

You must be logged in to vote
1 reply
@jemag
Comment options

Answer selected by kaniini
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Category
Q&A
Labels
None yet
2 participants