yosifkit

Results 301 comments of yosifkit

Having to use `kill -9` is a red flag to me. See also https://serverfault.com/a/76296/58240

> How can I get `nginx` to continue working after the `jvm` receives the diagnostic signal? First, `tini` isn't meant to run multiple programs, it is not a full supervisor....

We've had a few instances when updating the Dockerization or configuration of an existing image:tag has broken some users, so we try to limit it. But sometimes we have to...

- https://security-tracker.debian.org/tracker/CVE-2022-27780 - https://security-tracker.debian.org/tracker/CVE-2022-27781 - https://security-tracker.debian.org/tracker/CVE-2022-27782 - https://security-tracker.debian.org/tracker/CVE-2022-27779 - https://security-tracker.debian.org/tracker/CVE-2022-30115 As for the Debian based images, they are not affected by some of these CVEs (`Vulnerable code introduced later`) and...

> it still restarts once in a while with exit code 0 I feel like the answer to why the nginx container is restarting is in the initial description and...

Likely an environment issue. Maybe try restarting Docker Desktop. It works fine here. ```console $ docker build - FROM nginx:1.19.7-alpine RUN wget https://github.com/kelseyhightower/confd/releases/download/v0.16.0/confd-0.16.0-linux-amd64 Sending build context to Docker daemon 2.048kB...

The Alpine base images were specifically updated for `CVE-2022-37434` (https://github.com/docker-library/official-images/pull/12929) and all dependent images were rebuilt (that's how the Docker official images program works). The current image has the latest...

As seen on the Debian security tracker pages, the fix is only available in `bookworm` (currently aka `sid` or `unstable`). All other Debian releases do not have the update. And,...

Just a note that as part of the official images, the images are rebuilt any time the base image is updated. For example, the images with `FROM alpine:3.15` will be...

- https://security-tracker.debian.org/tracker/CVE-2022-2068 - https://security-tracker.debian.org/tracker/CVE-2022-22576 - https://security-tracker.debian.org/tracker/CVE-2022-27775 - https://security-tracker.debian.org/tracker/CVE-2022-27782 - https://security-tracker.debian.org/tracker/CVE-2022-27781 Some of these have fixes available in Debian's package repos, while some do not; any with fixes will be updated...