We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
There was an error while loading. Please reload this page.
2 parents 4e45a31 + 37088c3 commit 9bb5f9aCopy full SHA for 9bb5f9a
content/zh-cn/docs/concepts/security/multi-tenancy.md
@@ -603,7 +603,7 @@ access to the host system and all the processes/files running on that host.
603
在容器逃逸场景中,攻击者会利用漏洞来访问主机系统以及在该主机上运行的所有进程/文件。
604
605
<!--
606
-Virtual machines and userspace kernels are 2 popular approaches to sandboxing. The following
+Virtual machines and userspace kernels are two popular approaches to sandboxing. The following
607
sandboxing implementations are available:
608
609
* [gVisor](https://gvisor.dev/) intercepts syscalls from containers and runs them through a
0 commit comments