• Damarus@feddit.org
      link
      fedilink
      English
      arrow-up
      123
      ·
      6 days ago

      Kinda defeats the purpose of a media server built to be used by multiple people

        • faercol
          link
          fedilink
          English
          arrow-up
          43
          ·
          6 days ago

          Somehow difficult to install on a TV though.

          • ramble81@lemmy.zip
            link
            fedilink
            English
            arrow-up
            32
            ·
            6 days ago

            That’s why you do it at your router or gateway and then set a route for the Jellyfin server through the VPN adapter. That way any device on your network will flow through the tunnel to the Jellyfin server including TVs

            • faercol
              link
              fedilink
              English
              arrow-up
              46
              ·
              6 days ago

              Which again implies that you have a router that allows you to do so. It’s not always the case. For tech enthusiast people that’s the case. But not for everyone.

              I tried to do the same thing at first, but it was a pain, there were tons of issues.

        • tiz@lemmy.ml
          link
          fedilink
          English
          arrow-up
          9
          ·
          6 days ago

          Don’t reverse proxies like pangolin just do the job? Does it have to be VPN in this particular concept? VPN isn’t like immune to vulnerabilities.

          • radar@programming.dev
            link
            fedilink
            English
            arrow-up
            30
            ·
            6 days ago

            Reverse proxy doesn’t really get you much security. If there is an application level issue a reverse proxy will not help

            • whimsy@lemmy.zip
              link
              fedilink
              English
              arrow-up
              4
              ·
              6 days ago

              Hmmm, I’m a bit rusty on this but can’t one put an auth gate in front of the application, handled by the reverse proxy?

              • radar@programming.dev
                link
                fedilink
                English
                arrow-up
                2
                ·
                6 days ago

                You can, that would actually give you security. Not sure how many people do that. I assumed a straight reverse proxy without any auth

                • PeriodicallyPedantic@lemmy.ca
                  link
                  fedilink
                  English
                  arrow-up
                  2
                  ·
                  4 days ago

                  I think that’s one of the major reasons to use pangolin over something like nginx - built in auth and support for oidc.

                  Of course, the native jellyfin apps don’t like the auth layer so idk if it helps if you’re trying to install it on your dad’s tv

            • WhyJiffie@sh.itjust.works
              link
              fedilink
              English
              arrow-up
              1
              ·
              5 days ago

              well, at least you are not depending on the application to do TLS properly, and you may be able to set up some access restrictions that your clients may support

          • r00ty@kbin.life
            link
            fedilink
            arrow-up
            13
            ·
            6 days ago

            Reverse proxy will let anyone connect to it. VPN, you can create keys/logins for your intended users only. Having said that, from what I could see, nothing in the security fixes were to do with authentication. I think (just from a cursory look), they could only be exploited, if at all from an authenticated user session.

            But personally, something like jellyfin where the number of people I want to be able to access it is very limited, stays behind a VPN. Better to limit your potential attack surface as much as you can.

          • ohshit604@sh.itjust.works
            link
            fedilink
            English
            arrow-up
            3
            ·
            6 days ago

            Pangolin is based off of Traefik if I’m not mistaken, should be able to use Traefiks IPAllowlist middleware to blacklist all IP addresses and only whitelisting the known few, that way you can expose your application to the internet knowing you have that restriction in place for those who connect to your service.

            • Damarus@feddit.org
              link
              fedilink
              English
              arrow-up
              13
              ·
              6 days ago

              The difference is that my friends get a lot of value out of my server, as they don’t need to use any technology they’re unfamiliar with.

          • WhyJiffie@sh.itjust.works
            link
            fedilink
            English
            arrow-up
            1
            ·
            5 days ago

            you are better just closing up shop then, because it’s not like the other services you are hosting are much better. vulnerabilities being discovered don’t mean they don’t exist, it just means the software is not popular enough or too complex for someone to look into it

              • WhyJiffie@sh.itjust.works
                link
                fedilink
                English
                arrow-up
                1
                ·
                5 days ago

                much of the internet is run on simpler software or by full time employees tasked to deal with all this. but sure, ignorance is bliss, what you don’t see does not exist, etc etc, keep running your Jellyfin exposed to the internet. you wouldnt even get to know when your system is compromised. but you know what? you could even remove your password for extra convenience. who would want to log in to a random jellyfin account anyway! surely no one! just don’t recommend these practices to anyone, because you are putting them at risk.

    • CompactFlax@discuss.tchncs.de
      link
      fedilink
      English
      arrow-up
      77
      ·
      edit-2
      6 days ago

      That’s never made sense to me; why build an authn frontend instead of just clicking your user if the security is just an illusion anyways. “Use a VPN” is fine for a mainframe, but an active project in 2026 should aspire to be better.

      Edit: or make note of that on their several pages with reverse proxy configuration.

      Examples dating back over six years https://github.com/jellyfin/jellyfin/issues/5415

      • AHemlocksLie@lemmy.zip
        link
        fedilink
        English
        arrow-up
        40
        ·
        6 days ago

        I mean I’m sure they’d like to just ship safe code in the first place. But if that’s not their expertise and they demonstrate that repeatedly, we gotta take steps ourselves. Secure is obviously best, but I’d rather have insecure Jellyfin behind a VPN than no Jellyfin at all.

      • IratePirate@feddit.org
        link
        fedilink
        English
        arrow-up
        27
        ·
        6 days ago

        It’s not this or that. Security comes in layers. So while I would assume that the Jellyfin developers do their best to secure their application, I acknowledge the fact that bugs do exist and that Jellyfin is developed in and for hobbyist contexts, and thus not scrutinised and pentested for vulnerabilities in the way software meant for professional environments would be. Therefore I’ll add an extra layer of security by putting it behind a VPN that only whitelisted clients can access. If a vulnerability is detected, I can be sure it hasn’t already been exploited to compromise my server because we’re all “among friends” there.

      • WhyJiffie@sh.itjust.works
        link
        fedilink
        English
        arrow-up
        5
        ·
        5 days ago

        there is just too much place in the codebase for vulnerabilities, and also, most projects like this are maintained by volunteers in their free time for free.

        I guess if you set up an IP whitelist in the reverse proxy, or a client TLS certificate requirement, it’s fine to open it to the internet, but otherwise no.

      • teawrecks@sopuli.xyz
        link
        fedilink
        English
        arrow-up
        5
        ·
        6 days ago

        If I say I custom rolled my own crypto and it’s designed to be deployed to the open web, and you inspect it and don’t see anything wrong, should you do it?

        Jellyfin is young and still in heavy development. As time goes on, more eyes have seen it, and it’s been battle hardened, the security naturally gets stronger and the risk lower. I don’t agree that no one should ever host a public jellyfin server for all time, but for right now, it should be clear that you’re assuming obvious risk.

        Technically there’s no real problem here. Just like with any vulnerability in any service that’s exposed in some way, as long as you update right now you’re (probably) fine. I just don’t want staying on top of it to be a full time job, so I limit my attack surface by using a VPN.

        • CompactFlax@discuss.tchncs.de
          link
          fedilink
          English
          arrow-up
          6
          ·
          5 days ago

          Young.

          The original ticket is 2019. That’s 7 years ago.

          Technically there’s no real problem here.

          It responds to and serves content to unauthenticated requests. That’s sorta table stakes if you’re creating an authenticated web service and providing guides to set it up with a reverse proxy.

          • teawrecks@sopuli.xyz
            link
            fedilink
            English
            arrow-up
            2
            ·
            5 days ago

            Ok, I misread what you were linking to. Yeah, that’s pretty bad to allow actual streaming of content to unauthed users. I agree they should not be encouraging anyone to set this up to be publicly accessible until those are fixed. Or at least add a warning.

          • sanzky@lemmy.world
            link
            fedilink
            English
            arrow-up
            6
            ·
            6 days ago

            and then you are giving access to your lan to people whose computer you don’t control and might be full of malware.

          • Hammersamatom@lemmy.dbzer0.com
            link
            fedilink
            English
            arrow-up
            3
            ·
            6 days ago

            Oh absolutely, difference being that you only need to expose the service once, versus helping however many people set up VPNs to access the service on your LAN

            I know way too many people who won’t remember to toggle it on, or just won’t deal with it

            It’s just not convenient enough

            • WhyJiffie@sh.itjust.works
              link
              fedilink
              English
              arrow-up
              1
              ·
              5 days ago

              I know way too many people who won’t remember to toggle it on, or just won’t deal with it

              they need a VPN app that toggles automatically. turn off when they happen to connect to your network, otherwise on, and only forward jellyfin and such apps through it.

            • WhyJiffie@sh.itjust.works
              link
              fedilink
              English
              arrow-up
              1
              ·
              5 days ago

              I know way too many people who won’t remember to toggle it on, or just won’t deal with it

              they need a VPN app that toggles automatically. turn off when they happen to connect to your network, otherwise on, and only forward jellyfin and such apps through it.

      • mic_check_one_two@lemmy.dbzer0.com
        link
        fedilink
        English
        arrow-up
        1
        ·
        5 days ago

        They’ve stated that they have no intention of ever fixing some of the biggest “anyone can access your media without a login” vulnerabilities, because it would require completely divesting from the Kodi branch that they initially used to start the entire project. And they never plan on rebuilding that from scratch, so those vulnerabilities will never be fixed.

    • atzanteol@sh.itjust.works
      link
      fedilink
      English
      arrow-up
      17
      ·
      edit-2
      6 days ago

      Y’all are assuming the security issue is something exploitable without authentication or has something to do with auth.

      But it it could be a supply chain issue which a VPN won’t protect you from.

        • antrosapien@lemmy.ml
          link
          fedilink
          English
          arrow-up
          3
          ·
          6 days ago

          I have been planning to check out Netbird for couple of days. Is it a good alternative for headscale and pangolin?

          • pfr@piefed.social
            link
            fedilink
            English
            arrow-up
            2
            ·
            6 days ago

            It depends if you’re using Pangolin for private access or public exposure.

            NetBird is a clean replacement for headscale/tailscale, but if your using pangolin specifically for its public tunnel feature then you’d need to keep pangolin.

            • antrosapien@lemmy.ml
              link
              fedilink
              English
              arrow-up
              1
              ·
              6 days ago

              Mainly use pangolin for public access, I’m looking for something/somehow add authentication for pangolin while trying to access endpoint in apps where it’s not exactly possible to directly authenticate in pangolin

        • bonenode@piefed.social
          link
          fedilink
          English
          arrow-up
          19
          ·
          6 days ago

          I just love it when people post one sentence rebuttals without actually including any usable information what they are talking about.

          • esc@piefed.social
            link
            fedilink
            English
            arrow-up
            5
            ·
            6 days ago

            The solution is mentioned already - use vpn, it will solve 90% of the problems that you can encounter. Also you can serve multiple other services this way without exposing them.

          • traxex@lemmy.dbzer0.com
            link
            fedilink
            English
            arrow-up
            2
            ·
            6 days ago

            Tailscale is a super easy vpn that gives you access to your home network from anywhere. And it’s free.

          • the usable information is information that’s so widely talked about in this community that they probably expected anyone who is reading this to know what they’re talking about.

            clearly there are still people who have no experience self-hosting whatsoever that we should be considerate of.

    • Lemmchen@feddit.org
      link
      fedilink
      English
      arrow-up
      10
      ·
      6 days ago

      The thing is, if you have non-technical users, you have to set up the VPN connection on the client site yourself, maybe on multiple machines and more than once, if they decide to upgrade or even just reset their devices.

      • esc@piefed.social
        link
        fedilink
        English
        arrow-up
        22
        ·
        6 days ago

        The problem here - it’s not me who requires access to my library, if someone isn’t willing or able to do it, I’m sorry but that’s just how it is. People should stop infantilize non-technical people, absolute majority of them is capable of navigating our world without much problems and I’m willing to help them if help is asked.

        If my 60 y.o. mother with close to zero technical skills can do it with limited help (due to distance and other constraints) I’m pretty sure that majority of people with sound mind can.

        • Lemmchen@feddit.org
          link
          fedilink
          English
          arrow-up
          11
          ·
          6 days ago

          Or you can not be arrogant towards your friends and family who have probably helped you on lots of occasions and will probably keep being there for you in the future.
          Idk man, unconditional sharing feels pretty good, tbh. Making them jump through hoops isn’t really my jam. To me this kinda all plays into making a stronger bond with people that are close to me, so maybe we have different reasons for why we are sharing our stuff.

          Inb4 “we are not the same” meme

          • esc@piefed.social
            link
            fedilink
            English
            arrow-up
            7
            ·
            6 days ago

            I’m not arrogant, just don’t assume that people are dumb and inept. If they can’t or don’t want to give a bit of time to setup it, well how can someone be forced to use free service that causes momentarily inconvenience once to use. 😔

          • irmadlad@lemmy.world
            link
            fedilink
            English
            arrow-up
            3
            ·
            6 days ago

            Idk man, unconditional sharing feels pretty good

            Pass. Users cause complexities. Complexities cause issues.

            • BladeFederation@piefed.social
              link
              fedilink
              English
              arrow-up
              4
              ·
              6 days ago

              Users cause issues. Programs cause issues. Connecting it to the internet causes issues. Having a computer causes issues. Better turn your laptop off and throw it on the garbage.

              • irmadlad@lemmy.world
                link
                fedilink
                English
                arrow-up
                1
                ·
                6 days ago

                The difference being, I can control computers, laptops, servers, etc. I cannot control users.

          • WhyJiffie@sh.itjust.works
            link
            fedilink
            English
            arrow-up
            1
            ·
            5 days ago

            idk man, I wont keep my front gate unlocked just so my friends can come in without keys. either they accept having to carry an additional key, or they won’t have access without me, but I’m not going to compromise on reasonable security. oh the burden I know.

            I’ll help them set it up if they want it, they are not on their own. but zero effort won’t work.

        • IratePirate@feddit.org
          link
          fedilink
          English
          arrow-up
          6
          ·
          6 days ago

          This. And for everyone you just can’t figure it out on their own, there’s RustDesk for remote assistance. It, too, can be self-hosted.

      • DreamlandLividity@lemmy.world
        link
        fedilink
        English
        arrow-up
        9
        ·
        edit-2
        6 days ago

        So use a reverse proxy with authentiacation before access to Jellyfin is allowed. I use Caddy forward_auth with Authelia for this. Unless you also want to use the apps without VPN, this works great.

          • DreamlandLividity@lemmy.world
            link
            fedilink
            English
            arrow-up
            3
            ·
            edit-2
            6 days ago

            No. As I said, apps don’t work. I cobbled together an API key service that let’s you have an API key (password) in the server URL in Rust for myself. This works with Apps, but it is a bit too messy and single purpose for me to open source it right now. Maybe one day.

    • ligma_centauri@lemmy.world
      link
      fedilink
      English
      arrow-up
      1
      ·
      4 days ago

      Just did a cursory read of the commits related to security for this release, and my assumpion based solely on the changes, is that it’s not a remote-access vulnerability, but a supply-chain-esque vulnerability where a video you downloaded from a questionable source might trigger code embedded in the metadata to be run by jellyfin.

    • AllHailTheSheep@sh.itjust.works
      link
      fedilink
      English
      arrow-up
      3
      ·
      6 days ago

      or use the ldap auth plugin with your source of truth, put it behind a reverse proxy, protect it with fail2ban and anubis. there are ways of exposing it safely.

  • clif@lemmy.world
    link
    fedilink
    English
    arrow-up
    122
    ·
    6 days ago

    Thank you for posting this. I tend to get a lot of my opensource project info from Lemmy so people who take the time to post it are awesome.

    Just updated my home instance. Can confirm that 10.11.7 is available in the Debian repos and the update went perfect. I got a new kernel in the same update : D

    • mrbutterscotch@feddit.org
      link
      fedilink
      English
      arrow-up
      4
      ·
      5 days ago

      Hi!

      So I installed jellyfin on Bazzite as per this video.

      But he didn’t explain how to update the server. Could you maybe tell me how you did it with your server? Maybe it could help me figure out how to update mine as well.

      • def@aussie.zone
        link
        fedilink
        English
        arrow-up
        9
        ·
        edit-2
        5 days ago

        The video uses quadlets, which afaik, is just using systemd units to run containers via podman. Therefore, you can just run

        podman stop jellyfin (podman ps to get the actual name of the jellyfin container)

        podman rm jellyfin

        podman pull docker.io/jellyfin/jellyfin:latest

        systemctl restart jellyfin.container (or whatever you called your unit when you set it up)

        Quick google says you can setup auto updates if you want: https://major.io/p/podman-quadlet-automatic-updates/

        Caveat: I am a docker compose user, I may have missed something due to lack of familiarity with quadlets/podman

        • clif@lemmy.world
          link
          fedilink
          English
          arrow-up
          4
          ·
          5 days ago

          You’re correct.

          The only time I can think of that this approach wouldn’t work is if the quadlet config file specified a tag/version on the image setting besides latest. That is, if the quadlet file specified something like Image=docker.io/jellyfin/jellyfin:a_old_version. I usually stick with latest on mine.

          EG: Image=docker.io/jellyfin/jellyfin:latest

        • mrbutterscotch@feddit.org
          link
          fedilink
          English
          arrow-up
          4
          ·
          5 days ago

          It worked! Thanks so much!

          I suppose I’ll start looking into docker/containers/quadlets etc, so I actually understand what I am using lol

  • catlover@sh.itjust.works
    link
    fedilink
    English
    arrow-up
    55
    ·
    6 days ago

    I forgot that it’s April first, and was wondering what catasthropic event had happend in order that it had to be stated in the title that its not a joke

  • Seefra 1@lemmy.zip
    link
    fedilink
    English
    arrow-up
    9
    ·
    4 days ago

    Good thing my Jellyfin is behind Wireguard.

    Consider doing the same if your usecase permits.

    • kieron115@startrek.website
      link
      fedilink
      English
      arrow-up
      20
      ·
      edit-2
      5 days ago

      yeah okay let me just connect grandma’s tv to a vpn.

      edit: gas is $5/gal ya’ll, I’m not driving to a different state each time a new family member wants to watch something from my server!

      • Possibly linux@lemmy.zip
        link
        fedilink
        English
        arrow-up
        2
        ·
        5 days ago

        There are plenty of ways around this

        A cheap thin client minipc is only like 20-40 USD and would solve the problem overnight

          • Possibly linux@lemmy.zip
            link
            fedilink
            English
            arrow-up
            6
            ·
            5 days ago

            The average user isn’t using Jellyfin

            All you need is a little Linux knowledge in order to setup Netbird with Caddy

            • kieron115@startrek.website
              link
              fedilink
              English
              arrow-up
              1
              ·
              5 days ago

              I’m talking average enough to see an article, or hear about it from a friend/coworker, then follow the insanely easy setup directions for Windows. I know plenty of people who aren’t really “computer people” but know enough to open a port because they had to to get a game working at some point or another. Those people probably wouldnt notice “hey this thing is going to http maybe i should rethink this…”

              • Shnog@lemmy.world
                link
                fedilink
                English
                arrow-up
                2
                ·
                5 days ago

                These are going to be the people who think it’s smart to just open up RDP and SSH to the wide web though…they shouldn’t be forwarding ports…they should use a VPN.

                • kieron115@startrek.website
                  link
                  fedilink
                  English
                  arrow-up
                  1
                  ·
                  5 days ago

                  I had to explain to one of them why RDP is a bad idea lol. Thats kind of my point - average people tend to only know enough to be dangerous, not to do things safely. Or as Shakespeare said - "The fool doth think he is wise, but the wise man knows himself to be a fool.”

        • kieron115@startrek.website
          link
          fedilink
          English
          arrow-up
          5
          ·
          5 days ago

          I think you’re missing the point - that’s neither simple nor easy for most people. I’m a network engineer and I don’t wanna deal with setting up and (being responsible for troubleshooting) a bunch of VPNs! Nevermind the additional power/CPU usage from the tunnels. My parents just got fiber and they don’t even have a public address (ipv4 or v6) which just adds another layer of headache. thanks west virginia…

          • Shnog@lemmy.world
            link
            fedilink
            English
            arrow-up
            3
            ·
            5 days ago

            I’d much rather deal with setting up a few VPN gateways which is trivial at most…than securing a public web service. I deal with that crap enough at work.

            There are a lot less variables to contend with with a single VPN endpoint which undergoes considerably more security auditing than N public web services. Many of which I don’t have the time to review myself and mitigate if they decide to suck at coding.

            Edit: I share my services with less than 5 households though.

            Edit2: I’m not sure what public ipv4 or ipv6 has to do with this. My remote sites use starlink ipv4. I haven’t setup ipv6 on those internally at all. They all tunnel via wireguard to my homesite.

            • kieron115@startrek.website
              link
              fedilink
              English
              arrow-up
              4
              ·
              5 days ago

              When I set up wireguard it was just more complicated when one side didn’t have a public IP. Whyyyy can’t we adopt ipv6 already.

            • kieron115@startrek.website
              link
              fedilink
              English
              arrow-up
              2
              ·
              5 days ago

              also fyi starlink has public ipv6 available if you DO wan’t to set it up. been hosting a minecraft server off a starlink connection lol.

              • Shnog@lemmy.world
                link
                fedilink
                English
                arrow-up
                1
                ·
                5 days ago

                At my remote site it has little value. At my home I have IPv6 setup on Starlink as my secondary backup internet. I use Fiber as the primary that has a public IPv4 and IPv6.

                Could just use a VPS though I guess if you want.

          • Seefra 1@lemmy.zip
            link
            fedilink
            English
            arrow-up
            1
            ·
            4 days ago

            If you have the skills to setup a Jellyfin server you also have the skills to setup wireguard.

            My parents just got fiber and they don’t even have a public address (ipv4 or v6) which just adds another layer of headache. thanks west virginia…

            That’s a very specific use case.

    • magguzu@lemmy.pt
      link
      fedilink
      English
      arrow-up
      16
      ·
      5 days ago

      The worst part of enthusiast threads are the “I am very smart” takes like this

      • Possibly linux@lemmy.zip
        link
        fedilink
        English
        arrow-up
        12
        ·
        5 days ago

        You objectively shouldn’t expose Jellyfin to the internet. It has a rather large attack surface and isn’t designed with security in mind.

        Pretending everything is fine won’t solve the problem

        • kieron115@startrek.website
          link
          fedilink
          English
          arrow-up
          5
          ·
          5 days ago

          Sounds like a great reason to use Plex instead!

          edit: to add something constructive to my snarky comment, what kind of attack surface are we talkin here? Multiple ports? Lots of separate services running? No authentication?

          • mic_check_one_two@lemmy.dbzer0.com
            link
            fedilink
            English
            arrow-up
            8
            ·
            4 days ago

            There has been a known “anyone can access your media without authentication” vulnerability for seven years and counting, and the Jellyfin devs have openly stated that they have no intentions of fixing it. Because fixing it would require completely divesting from the Enby branch that the entire program is built upon. And they never plan on refactoring that entire thing, so they never plan on fixing the vulnerabilities.

            The “don’t expose it to the internet” people aren’t just screaming at clouds. Jellyfin is objectively insecure, and shouldn’t be exposed.

              • mic_check_one_two@lemmy.dbzer0.com
                link
                fedilink
                English
                arrow-up
                5
                ·
                4 days ago

                Exactly. And that’s honestly why I doubt it will ever truly contend with Plex. It’s fine for sharing with friends who can figure out how to connect via VPN, but it’ll never be robust enough to share with your tech-illiterate grandparents on the open internet. Plex wins handily in that regard, because their sign in process is basically the same as Netflix, HBO, Hulu, etc…

                Plex has problems of its own, but (at least as of me writing this) it doesn’t have any major known security vulnerabilities. They had some level 10.0 vulnerability last year, but they followed standard CVE protocols and patched it before the vulnerability was actually released.

            • grrgyle@slrpnk.net
              link
              fedilink
              English
              arrow-up
              2
              ·
              4 days ago

              Ahh bummer. It works so well as a home media server… kind of calls out for sharing.

            • kieron115@startrek.website
              link
              fedilink
              English
              arrow-up
              2
              ·
              5 days ago

              Sure, but being mostly secure by default isn’t one of them. One advantage of running a service that offers optional subscription services is that they can offer security features like built-in SSL and AAA that just work. Any average user can install it and have a reasonably secure service running. Hell, until a few months ago you didn’t even need to open a port to have remote access to your content, whether you paid or not. Now they’ve made that a paid feature though.

  • FackCurs@lemmy.world
    link
    fedilink
    English
    arrow-up
    28
    ·
    6 days ago

    Is it standard practice to release the security updates on GitHub?

    I am a very amateur self hoster and wouldn’t go on the github of projects on my own unless I wanted to read the “read me” for install instructions. I am realizing that I got aware I needed to update my Jellyfin container ASAP only thanks to this post. I would have never checked the GitHub.

    • ShortN0te@lemmy.ml
      link
      fedilink
      English
      arrow-up
      26
      ·
      6 days ago

      Is it standard practice to release the security updates on GitHub?

      Yes.

      And then the maintainers of the package on the package repository you use will release the patch there. Completely standard operation.

      I recommend younto read up on package repositories on Linux and package maintainers etc.

    • SayCyberOnceMore@feddit.uk
      link
      fedilink
      English
      arrow-up
      7
      ·
      6 days ago

      Not really.

      Depending on how you install things, the package maintainers usually deal with this, so your next apt update / pacman -Syuv or … whatever Fedora does… would capture it.

      If you’ve installed this as a container… dunno… whatever the container update process is (I don’t use them)

        • SayCyberOnceMore@feddit.uk
          link
          fedilink
          English
          arrow-up
          6
          ·
          5 days ago

          It’s difficult to do security-only updates when the fix is contained within a package update.

          Even Microsoft’s security updates are a mix with secuirity updates containing feature changes and vice versa.

          I usually do an update on 1 random device / VM and if that was ok (inc. watching for any .pacnew files) and then kick Ansible into action for the rest.

      • FackCurs@lemmy.world
        link
        fedilink
        English
        arrow-up
        4
        ·
        6 days ago

        I indeed use a container. Wasn’t familiar with the update process for containers but now know how to do it.

        • ButtDrugs@lemmy.zip
          link
          fedilink
          English
          arrow-up
          5
          ·
          5 days ago

          There’s a lot of good container management solutions out there that are worth investigating. They do things like monitor availability, resource management, as well as altering on versioning.

        • communism@lemmy.ml
          link
          fedilink
          English
          arrow-up
          2
          ·
          5 days ago

          If you haven’t already, I recommend Watchtower (nickfedor fork—the original is unmaintained) which automatically pulls updates to Docker containers and restarts them. Make sure to track latest, although for security updates, these should be backported to any supported versions so it’s fine to track an older supported version too.

          • mic_check_one_two@lemmy.dbzer0.com
            link
            fedilink
            English
            arrow-up
            5
            ·
            5 days ago

            Implying you have access to some major Docker 0-day exploit, or just talking out of your ass? Because a container is no more or less secure than the machine it runs on. At least if a container gets compromised, it only has access to the volumes you have specifically given it access to. It can’t just run rampant on your entire system, because you haven’t (or at least shouldn’t have) given it access to your entire system.

            • quick_snail@feddit.nl
              link
              fedilink
              English
              arrow-up
              2
              ·
              5 days ago

              Docker is known insecure. It doesn’t verify any layers it pulls cryptography. The devs are aware. The tickets remain open.

              • FackCurs@lemmy.world
                link
                fedilink
                English
                arrow-up
                1
                ·
                5 days ago

                I don’t know if I remember correctly but I could not install Jellyfin on the latest Ubuntu server version. I had to use docker to get Jellyfin running.

              • def@aussie.zone
                link
                fedilink
                English
                arrow-up
                1
                ·
                5 days ago

                If that is indeed true it would only mean that the docker container is vulnerable to a supply chain attack. You are not any more vulnerable to a vulnerability in the codebase.

                If you’re using the ghcr image, to post malicious code there, the attack would have already had to compromise their github infra … which would likely result in the attacker being able to push malicious code to git or publish malicious releases. Their linux distro packages are self published via a ppa/install script, which I would assume just pull from their github releases, so a bad github release would immediately be pulled as an update by users just as fast as a container.

                • quick_snail@feddit.nl
                  link
                  fedilink
                  English
                  arrow-up
                  1
                  ·
                  3 days ago

                  No, it’s also vulnerable to a targeted mitm attack. Github can be unaffected and you can get a malicious version on your server.

    • Appoxo@lemmy.dbzer0.com
      link
      fedilink
      English
      arrow-up
      2
      ·
      4 days ago

      The Jellyfin has an official Telegram channel which I use as the newsletter.
      Besides that, the selfh.st newsletter usually highlights the more popular projects if such an issue arises.

    • irmadlad@lemmy.world
      link
      fedilink
      English
      arrow-up
      2
      ·
      6 days ago

      I am realizing that I got aware

      I don’t run the arr stack, but this is key. You really should do your due diligence before you update anything. Personally, I wait unless it’s a security issue, and use all the early adopters as beta testers.

      • r00ty@kbin.life
        link
        fedilink
        arrow-up
        14
        ·
        6 days ago

        From a cursory look at just the security commits. Looks like the following:

        • GHSA-j2hf-x4q5-47j3: Checks if a media shortcut is empty, and checks if it is remote and stores the remote protocol if so. Also prevent strm files (these are meant to contain links to a stream) from referencing local files. Indeed this might have been used to reference files jellyfin couldn’t usually see?
        • GHSA-8fw7-f233-ffr8: Seems to be similar, except for M3U file link validation and limiting allowed protocols. It also changes the default permissions for live TV management to false.
        • GHSA-v2jv-54xj-h76w: When creating a structure there should be a limit of 200 characters for a string which was not enforced.
        • GHSA-jh22-fw8w-2v9x: Not really completely sure here. They change regex to regexstr in a lot of places and it looks like some extra validation around choosing transcoding settings.

        I’m not really sure how serious any of these are, or how they could be exploited however. Well aside from the local file in stream files one.

    • Scrollone@feddit.it
      link
      fedilink
      English
      arrow-up
      1
      ·
      5 days ago

      Yeah, I think what went wrong and now everything is installed through Docker.

      Docker feels like a huge security problem to me.

        • Scrollone@feddit.it
          link
          fedilink
          English
          arrow-up
          1
          ·
          4 days ago

          I know, but your security then depends on the package maintainer to keep the image up to date

          • phobiac@lemmy.world
            link
            fedilink
            English
            arrow-up
            1
            ·
            2 days ago

            Am officially maintained Docker image is no less a security concern than an officially maintained apt repo. Depending on how you set up a container stack it can even be more secure. An attacker gaining root access to a container that you’ve given extremely selective access to the host machine is far better than them gaining root access to your actual system.

  • Decronym@lemmy.decronym.xyzB
    link
    fedilink
    English
    arrow-up
    12
    ·
    edit-2
    24 hours ago

    Acronyms, initialisms, abbreviations, contractions, and other phrases which expand to something larger, that I’ve seen in this thread:

    Fewer Letters More Letters
    Git Popular version control system, primarily for code
    HTTP Hypertext Transfer Protocol, the Web
    IP Internet Protocol
    NFS Network File System, a Unix-based file-sharing protocol known for performance and efficiency
    Plex Brand of media server package
    RPi Raspberry Pi brand of SBC
    SBC Single-Board Computer
    SMB Server Message Block protocol for file and printer sharing; Windows-native
    SSH Secure Shell for remote terminal access
    SSL Secure Sockets Layer, for transparent encryption
    TLS Transport Layer Security, supersedes SSL
    VPN Virtual Private Network
    VPS Virtual Private Server (opposed to shared hosting)
    nginx Popular HTTP server

    12 acronyms in this thread; the most compressed thread commented on today has 7 acronyms.

    [Thread #203 for this comm, first seen 1st Apr 2026, 09:50] [FAQ] [Full list] [Contact] [Source code]

    • greyscale@lemmy.grey.ooo
      link
      fedilink
      English
      arrow-up
      27
      ·
      6 days ago

      Three. Three emojis, used in headings as a bullet point.

      It is perfectly plausable for someone whos job is to write technical documentation and promotional material would punch it up with a couple 'mojis.

      https://github.com/jellyfin/jellyfin/releases

      Every single release uses the same format with the same 3 emojis. You’d know that if you’d clicked “releases” and had even a modicum of curiosity.

    • irmadlad@lemmy.world
      link
      fedilink
      English
      arrow-up
      7
      ·
      6 days ago

      No worries. We’ve been communicating with pictures since ancient cave men scrawled pictographs on cave walls with a piece of burnt firewood.