• lmr0x61@lemmy.ml
    link
    fedilink
    English
    arrow-up
    0
    ·
    2 months ago

    The update rolled out perfectly for my Kubernetes setup (using the Docker image). 👍

        • Auli@lemmy.ca
          link
          fedilink
          English
          arrow-up
          0
          ·
          2 months ago

          It kind of does. Whatever and yes I’m aware of the list people keep posting and I’ve looked at it.

        • bonenode@piefed.social
          link
          fedilink
          English
          arrow-up
          0
          ·
          2 months ago

          I just love it when people post one sentence rebuttals without actually including any usable information what they are talking about.

          • esc@piefed.social
            link
            fedilink
            English
            arrow-up
            0
            ·
            2 months ago

            The solution is mentioned already - use vpn, it will solve 90% of the problems that you can encounter. Also you can serve multiple other services this way without exposing them.

          • traxex@lemmy.dbzer0.com
            link
            fedilink
            English
            arrow-up
            0
            ·
            2 months ago

            Tailscale is a super easy vpn that gives you access to your home network from anywhere. And it’s free.

          • the usable information is information that’s so widely talked about in this community that they probably expected anyone who is reading this to know what they’re talking about.

            clearly there are still people who have no experience self-hosting whatsoever that we should be considerate of.

    • Damarus@feddit.org
      link
      fedilink
      English
      arrow-up
      0
      ·
      2 months ago

      Kinda defeats the purpose of a media server built to be used by multiple people

      • ugo@feddit.it
        link
        fedilink
        English
        arrow-up
        0
        ·
        2 months ago

        No need to expose jellyfin to the internet if you selectively allow peers on your lan via wireguard.

        • douglasg14b@lemmy.world
          link
          fedilink
          English
          arrow-up
          0
          ·
          2 months ago

          Which doesn’t work for The grand majority of devices that would be used to watch said media.

          Tvs game consoles rokus so on so forth typically don’t support VPN clients.

          The Jonathan clients for these devices also typically don’t support alternative authentication methods which would allow you to put jellyfin behind a proxy and have the proxy exposed to the internet. Gating all access to jellyfin apis behind a primary authentication layer thus mitigating effectively all security vulnerabilities that are currently open.

          • WhyJiffie@sh.itjust.works
            link
            fedilink
            English
            arrow-up
            0
            ·
            edit-2
            2 months ago

            Tvs game consoles rokus so on so forth typically don’t support VPN clients.

            and that’s why you set up a VPN client box on the location, set it up as a regular VPN client, and install a reverse proxy on it that the dumb clients can connect to.

            the VPN box could be as simple as an old android phone no one uses, and termux

          • ugo@feddit.it
            link
            fedilink
            English
            arrow-up
            0
            ·
            2 months ago

            Fair, you do you, I get a lot of value out of it instead.

            • Damarus@feddit.org
              link
              fedilink
              English
              arrow-up
              0
              ·
              2 months ago

              The difference is that my friends get a lot of value out of my server, as they don’t need to use any technology they’re unfamiliar with.

          • WhyJiffie@sh.itjust.works
            link
            fedilink
            English
            arrow-up
            0
            ·
            edit-2
            2 months ago

            you are better just closing up shop then, because it’s not like the other services you are hosting are much better. vulnerabilities being discovered don’t mean they don’t exist, it just means the software is not popular enough or too complex for someone to look into it

              • WhyJiffie@sh.itjust.works
                link
                fedilink
                English
                arrow-up
                0
                ·
                2 months ago

                much of the internet is run on simpler software or by full time employees tasked to deal with all this. but sure, ignorance is bliss, what you don’t see does not exist, etc etc, keep running your Jellyfin exposed to the internet. you wouldnt even get to know when your system is compromised. but you know what? you could even remove your password for extra convenience. who would want to log in to a random jellyfin account anyway! surely no one! just don’t recommend these practices to anyone, because you are putting them at risk.

        • tiz@lemmy.ml
          link
          fedilink
          English
          arrow-up
          0
          ·
          2 months ago

          Don’t reverse proxies like pangolin just do the job? Does it have to be VPN in this particular concept? VPN isn’t like immune to vulnerabilities.

          • radar@programming.dev
            link
            fedilink
            English
            arrow-up
            0
            ·
            2 months ago

            Reverse proxy doesn’t really get you much security. If there is an application level issue a reverse proxy will not help

            • whimsy@lemmy.zip
              link
              fedilink
              English
              arrow-up
              0
              ·
              2 months ago

              Hmmm, I’m a bit rusty on this but can’t one put an auth gate in front of the application, handled by the reverse proxy?

              • radar@programming.dev
                link
                fedilink
                English
                arrow-up
                0
                ·
                2 months ago

                You can, that would actually give you security. Not sure how many people do that. I assumed a straight reverse proxy without any auth

                • PeriodicallyPedantic@lemmy.ca
                  link
                  fedilink
                  English
                  arrow-up
                  0
                  ·
                  1 month ago

                  I think that’s one of the major reasons to use pangolin over something like nginx - built in auth and support for oidc.

                  Of course, the native jellyfin apps don’t like the auth layer so idk if it helps if you’re trying to install it on your dad’s tv

          • ohshit604@sh.itjust.works
            link
            fedilink
            English
            arrow-up
            0
            ·
            edit-2
            2 months ago

            Pangolin is based off of Traefik if I’m not mistaken, should be able to use Traefiks IPAllowlist middleware to blacklist all IP addresses and only whitelisting the known few, that way you can expose your application to the internet knowing you have that restriction in place for those who connect to your service.

          • r00ty@kbin.life
            link
            fedilink
            arrow-up
            0
            ·
            2 months ago

            Reverse proxy will let anyone connect to it. VPN, you can create keys/logins for your intended users only. Having said that, from what I could see, nothing in the security fixes were to do with authentication. I think (just from a cursory look), they could only be exploited, if at all from an authenticated user session.

            But personally, something like jellyfin where the number of people I want to be able to access it is very limited, stays behind a VPN. Better to limit your potential attack surface as much as you can.

          • ramble81@lemmy.zip
            link
            fedilink
            English
            arrow-up
            0
            ·
            2 months ago

            That’s why you do it at your router or gateway and then set a route for the Jellyfin server through the VPN adapter. That way any device on your network will flow through the tunnel to the Jellyfin server including TVs

            • douglasg14b@lemmy.world
              link
              fedilink
              English
              arrow-up
              0
              ·
              edit-2
              2 months ago

              Oh yes, the routers and gateways that most people have that are isp provided that may not actually have open VPN or wireguard support.

              Those ones?

              Also putting a VPN in someone else’s house so that all their Network traffic goes through your gateway is pretty damn extreme.

              • ramble81@lemmy.zip
                link
                fedilink
                English
                arrow-up
                0
                ·
                2 months ago

                What? No, you can do a tiny reverse proxy/vpn on a stick with something like a RPi. Configure it and give it to them. Then they point their Jellyfin client on their device to the IP of the RPi instance on their network and that creates the tunnel back to your VPN endpoint and server.

                And for VPNs at a router level you can inject routes and leave th default route going out through your ISP, you don’t need to, nor want to, have all traffic going through it.

            • faercol@lemmy.blahaj.zone
              link
              fedilink
              English
              arrow-up
              0
              ·
              2 months ago

              Which again implies that you have a router that allows you to do so. It’s not always the case. For tech enthusiast people that’s the case. But not for everyone.

              I tried to do the same thing at first, but it was a pain, there were tons of issues.

        • antrosapien@lemmy.ml
          link
          fedilink
          English
          arrow-up
          0
          ·
          2 months ago

          I have been planning to check out Netbird for couple of days. Is it a good alternative for headscale and pangolin?

          • pfr@piefed.social
            link
            fedilink
            English
            arrow-up
            0
            ·
            2 months ago

            It depends if you’re using Pangolin for private access or public exposure.

            NetBird is a clean replacement for headscale/tailscale, but if your using pangolin specifically for its public tunnel feature then you’d need to keep pangolin.

    • CompactFlax@discuss.tchncs.de
      link
      fedilink
      English
      arrow-up
      0
      ·
      2 months ago

      That’s never made sense to me; why build an authn frontend instead of just clicking your user if the security is just an illusion anyways. “Use a VPN” is fine for a mainframe, but an active project in 2026 should aspire to be better.

      • teawrecks@sopuli.xyz
        link
        fedilink
        English
        arrow-up
        0
        ·
        edit-2
        2 months ago

        If I say I custom rolled my own crypto and it’s designed to be deployed to the open web, and you inspect it and don’t see anything wrong, should you do it?

        Jellyfin is young and still in heavy development. As time goes on, more eyes have seen it, and it’s been battle hardened, the security naturally gets stronger and the risk lower. I don’t agree that no one should ever host a public jellyfin server for all time, but for right now, it should be clear that you’re assuming obvious risk.

        Technically there’s no real problem here. Just like with any vulnerability in any service that’s exposed in some way, as long as you update right now you’re (probably) fine. I just don’t want staying on top of it to be a full time job, so I limit my attack surface by using a VPN.

        • CompactFlax@discuss.tchncs.de
          link
          fedilink
          English
          arrow-up
          0
          ·
          2 months ago

          Young.

          The original ticket is 2019. That’s 7 years ago.

          Technically there’s no real problem here.

          It responds to and serves content to unauthenticated requests. That’s sorta table stakes if you’re creating an authenticated web service and providing guides to set it up with a reverse proxy.

          • teawrecks@sopuli.xyz
            link
            fedilink
            English
            arrow-up
            0
            ·
            2 months ago

            Ok, I misread what you were linking to. Yeah, that’s pretty bad to allow actual streaming of content to unauthed users. I agree they should not be encouraging anyone to set this up to be publicly accessible until those are fixed. Or at least add a warning.

        • Auli@lemmy.ca
          link
          fedilink
          English
          arrow-up
          0
          ·
          2 months ago

          I don’t care if someone finds my instance and manages to guess a random number to stream some random movie. Good for them I guess it would be easier to just download it themselves.

          • rumba@lemmy.zip
            link
            fedilink
            English
            arrow-up
            0
            ·
            1 month ago

            Biggest worry is someone finding an uncaught RCE.

            Of course plugins also have surface area.

            We know they can anon pull video. You can sandbox it to limit exposure.

            But if they modify the web client with an RCE, then you hit your own server as a trusted site and that delivers a payload…

      • AHemlocksLie@lemmy.zip
        link
        fedilink
        English
        arrow-up
        0
        ·
        2 months ago

        I mean I’m sure they’d like to just ship safe code in the first place. But if that’s not their expertise and they demonstrate that repeatedly, we gotta take steps ourselves. Secure is obviously best, but I’d rather have insecure Jellyfin behind a VPN than no Jellyfin at all.

      • IratePirate@feddit.org
        link
        fedilink
        English
        arrow-up
        0
        ·
        edit-2
        2 months ago

        It’s not this or that. Security comes in layers. So while I would assume that the Jellyfin developers do their best to secure their application, I acknowledge the fact that bugs do exist and that Jellyfin is developed in and for hobbyist contexts, and thus not scrutinised and pentested for vulnerabilities in the way software meant for professional environments would be. Therefore I’ll add an extra layer of security by putting it behind a VPN that only whitelisted clients can access. If a vulnerability is detected, I can be sure it hasn’t already been exploited to compromise my server because we’re all “among friends” there.

        • FauxLiving@lemmy.world
          link
          fedilink
          English
          arrow-up
          0
          ·
          2 months ago

          Yes, not everyone. My grandmother would struggle setting up a VPN, for example.

          However, a community member of the selfhosted community is perfectly capable of reading a manual and learning the software.

          That’s how you become tech literate in the first place, and you’re already on that path if you’re commenting/reading here.

          • WhyJiffie@sh.itjust.works
            link
            fedilink
            English
            arrow-up
            0
            ·
            2 months ago

            Yes, not everyone. My grandmother would struggle setting up a VPN, for example.

            that’s a weird take. your grandmother doesn’t need to set up a VPN. It’s not like this is where they would get stuck, they would have problems much sooner with running their own Jellyfin. that’s why you are hosting it for them, and why you go there and set the VPN up yourself.

          • Hammersamatom@lemmy.dbzer0.com
            link
            fedilink
            English
            arrow-up
            0
            ·
            edit-2
            2 months ago

            Agreed, was more so referring to others. I apologize if it seemed like I was referring to myself

            I’m already well and truly deep into this, myself. Two Proxmox nodes running the *Arr stack and Jellyfin in LXC containers. Bare metal TrueNAS, with scheduled LTO backups every two weeks. A few other bits and bobs, like some game servers and home automation for family.

            Will need to re-map everything eventually, it’s kind of grown out of hand

          • Hammersamatom@lemmy.dbzer0.com
            link
            fedilink
            English
            arrow-up
            0
            ·
            edit-2
            2 months ago

            Oh absolutely, difference being that you only need to expose the service once, versus helping however many people set up VPNs to access the service on your LAN

            I know way too many people who won’t remember to toggle it on, or just won’t deal with it

            It’s just not convenient enough

          • sanzky@lemmy.world
            link
            fedilink
            English
            arrow-up
            0
            ·
            2 months ago

            and then you are giving access to your lan to people whose computer you don’t control and might be full of malware.

            • FauxLiving@lemmy.world
              link
              fedilink
              English
              arrow-up
              0
              ·
              2 months ago

              You only have to give them access to a specific port on a specific machine, not your entire LAN.

              My VPN has a ‘media’ usergroup who can only access the, read-only, NFS exports of my media library.

              If you’re just installing Wireguard and enabling IP forwarding, yeah it would not be secure. But using a mesh VPN, like Tailscale/Headscale, gives you A LOT more tools to control access.

              • WhyJiffie@sh.itjust.works
                link
                fedilink
                English
                arrow-up
                0
                ·
                2 months ago

                yeah but even with plain wireguard the peers can be limited. you just have to figure out the firewall rules, or use opnsense as your wireguard server because it figures the harder part out for you.

                • sanzky@lemmy.world
                  link
                  fedilink
                  English
                  arrow-up
                  0
                  ·
                  edit-2
                  1 month ago

                  it’s not that it cannot be done. the issue is that something as simple as acceding a service should not require to configure wire guard and routing rules. plenty of FOSS projects are safe to expose through a simple reverse proxy

      • WhyJiffie@sh.itjust.works
        link
        fedilink
        English
        arrow-up
        0
        ·
        2 months ago

        there is just too much place in the codebase for vulnerabilities, and also, most projects like this are maintained by volunteers in their free time for free.

        I guess if you set up an IP whitelist in the reverse proxy, or a client TLS certificate requirement, it’s fine to open it to the internet, but otherwise no.

      • mic_check_one_two@lemmy.dbzer0.com
        link
        fedilink
        English
        arrow-up
        0
        ·
        2 months ago

        They’ve stated that they have no intention of ever fixing some of the biggest “anyone can access your media without a login” vulnerabilities, because it would require completely divesting from the Kodi branch that they initially used to start the entire project. And they never plan on rebuilding that from scratch, so those vulnerabilities will never be fixed.

        • Auli@lemmy.ca
          link
          fedilink
          English
          arrow-up
          0
          ·
          2 months ago

          They didn’t start the project from Kodi. It is a fork of Emby.

    • Lemmchen@feddit.org
      link
      fedilink
      English
      arrow-up
      0
      ·
      2 months ago

      The thing is, if you have non-technical users, you have to set up the VPN connection on the client site yourself, maybe on multiple machines and more than once, if they decide to upgrade or even just reset their devices.

      • DreamlandLividity@lemmy.world
        link
        fedilink
        English
        arrow-up
        0
        ·
        edit-2
        2 months ago

        So use a reverse proxy with authentiacation before access to Jellyfin is allowed. I use Caddy forward_auth with Authelia for this. Unless you also want to use the apps without VPN, this works great.

          • DreamlandLividity@lemmy.world
            link
            fedilink
            English
            arrow-up
            0
            ·
            edit-2
            2 months ago

            No. As I said, apps don’t work. I cobbled together an API key service that let’s you have an API key (password) in the server URL in Rust for myself. This works with Apps, but it is a bit too messy and single purpose for me to open source it right now. Maybe one day.

      • esc@piefed.social
        link
        fedilink
        English
        arrow-up
        0
        ·
        edit-2
        2 months ago

        The problem here - it’s not me who requires access to my library, if someone isn’t willing or able to do it, I’m sorry but that’s just how it is. People should stop infantilize non-technical people, absolute majority of them is capable of navigating our world without much problems and I’m willing to help them if help is asked.

        If my 60 y.o. mother with close to zero technical skills can do it with limited help (due to distance and other constraints) I’m pretty sure that majority of people with sound mind can.

        • Lemmchen@feddit.org
          link
          fedilink
          English
          arrow-up
          0
          ·
          2 months ago

          Or you can not be arrogant towards your friends and family who have probably helped you on lots of occasions and will probably keep being there for you in the future.
          Idk man, unconditional sharing feels pretty good, tbh. Making them jump through hoops isn’t really my jam. To me this kinda all plays into making a stronger bond with people that are close to me, so maybe we have different reasons for why we are sharing our stuff.

          Inb4 “we are not the same” meme

          • esc@piefed.social
            link
            fedilink
            English
            arrow-up
            0
            ·
            2 months ago

            I’m not arrogant, just don’t assume that people are dumb and inept. If they can’t or don’t want to give a bit of time to setup it, well how can someone be forced to use free service that causes momentarily inconvenience once to use. 😔

          • irmadlad@lemmy.world
            link
            fedilink
            English
            arrow-up
            0
            ·
            2 months ago

            Idk man, unconditional sharing feels pretty good

            Pass. Users cause complexities. Complexities cause issues.

            • BladeFederation@piefed.social
              link
              fedilink
              English
              arrow-up
              0
              ·
              edit-2
              2 months ago

              Users cause issues. Programs cause issues. Connecting it to the internet causes issues. Having a computer causes issues. Better turn your laptop off and throw it on the garbage.

        • IratePirate@feddit.org
          link
          fedilink
          English
          arrow-up
          0
          ·
          edit-2
          2 months ago

          This. And for everyone you just can’t figure it out on their own, there’s RustDesk for remote assistance. It, too, can be self-hosted.

    • atzanteol@sh.itjust.works
      link
      fedilink
      English
      arrow-up
      0
      ·
      2 months ago

      Y’all are assuming the security issue is something exploitable without authentication or has something to do with auth.

      But it sounds like a supply chain issue which a VPN won’t protect you from.

      • yannic@lemmy.ca
        link
        fedilink
        English
        arrow-up
        0
        ·
        1 month ago

        You’ve piqued my interest. Where can I read about it?

        I did a quick search on their github and came up empty. Maybe no one mentioned “htaccess” in the issue.

        • quick_snail@feddit.nl
          link
          fedilink
          English
          arrow-up
          0
          ·
          edit-2
          1 month ago

          Search for “basic auth”

          Its the only software project I know of that you can’t put behind http basic auth. They mark this bug as “wontfix” every time someone points it out to them

          • yannic@lemmy.ca
            link
            fedilink
            English
            arrow-up
            0
            ·
            1 month ago

            Basic auth? The insecure authentication method?

            Ok, I’ll look it up anyway. Under the jellyfin repository, there were eight results, none of which seemed to describe what you meant, and under the jellyfin-web repository, there were none. Using a web crawler search, I was able to find Issue #123 for jellyfin-android

            Is that it?

            • quick_snail@feddit.nl
              link
              fedilink
              English
              arrow-up
              0
              ·
              edit-2
              1 month ago

              Basic auth is very secure.

              Unlike custom implemented logins. So it’s common to use basic auth in front of custom auth implementations. So even when the app has a login vuln, you’re safe.

              Yes that ticket is one of many.

              Try searching the repo. Make sure to backspace out the prefix that ignores closed tickets.

    • mriormro@lemmy.zip
      link
      fedilink
      English
      arrow-up
      0
      ·
      2 months ago

      Don’t ever shit in your own house, either.

      Just in case they’re watching.

    • AllHailTheSheep@sh.itjust.works
      link
      fedilink
      English
      arrow-up
      0
      ·
      2 months ago

      or use the ldap auth plugin with your source of truth, put it behind a reverse proxy, protect it with fail2ban and anubis. there are ways of exposing it safely.

      • ohshit604@sh.itjust.works
        link
        fedilink
        English
        arrow-up
        0
        ·
        2 months ago

        Do not rely on an OIDC/LDAP provider with Jellyfin, you cannot run these in front of your proxy otherwise Jellyfin applications will not be able to communicate with the server.

        Blacklist all IP address and whitelist the known few, no need for Fail2Ban or a WAF.

        • AllHailTheSheep@sh.itjust.works
          link
          fedilink
          English
          arrow-up
          0
          ·
          2 months ago

          you totally can use ldap or oidc it just requires more setup. you just ensure jellyfin and your source of truth talk on their own subnet, docker can manage it all for you. ldap can be setup to be ldaps with ssl and never even leave the docker subnet anyways.

          and yes I suppose you could rely on whitelists, but you’d have to manually add to the whitelist for every user, and god forbid if someone is traveling.

    • psycotica0@lemmy.ca
      link
      fedilink
      English
      arrow-up
      0
      ·
      2 months ago

      I know you’re gatekeeping from Turd Mountain, but just for completeness, the reason I use Jellyfin besides the “pretty for my wife” reason is that it keeps track of her progress between clients. She sometimes watches things on her laptop, sometimes her phone, sometimes her tablet, and sometimes the TV, and no matter which one she uses it’ll remember which episode of her show is the next episode. It also highlights when a new episode of something has been added and cues her to watch the new episode that just came out.

      But yeah, if I was alone and only had a pile of anime I’d already seen before, which I only watched from my Linux devices, Samba and VLC would do me fine 😛

      • FauxLiving@lemmy.world
        link
        fedilink
        English
        arrow-up
        0
        ·
        2 months ago

        But yeah, if I was alone and only had a pile of anime I’d already seen before, which I only watched from my Linux devices, Samba and VLC would do me fine 😛

        Use NFS for your sanity. Linux samba/CIFS is annoying to deal with.

        Also, mpv

        • psycotica0@lemmy.ca
          link
          fedilink
          English
          arrow-up
          0
          ·
          2 months ago

          Honestly, I’m not a big fan if Microsoft generally, but I found NFS to be surprisingly not great for non-permanent infrastructure, whereas SMB took a few minutes and works great, at least in my use cases. Maybe I’m just a loser, though.

    • rose56@lemmy.zip
      link
      fedilink
      English
      arrow-up
      0
      ·
      edit-2
      2 months ago

      Nope? how about fancy stuff GUI and plot?
      IMDB on your phone I guess…

  • catlover@sh.itjust.works
    link
    fedilink
    English
    arrow-up
    0
    ·
    2 months ago

    I forgot that it’s April first, and was wondering what catasthropic event had happend in order that it had to be stated in the title that its not a joke

  • rose56@lemmy.zip
    link
    fedilink
    English
    arrow-up
    0
    ·
    2 months ago

    Im on fedora and I have installed through dnf, no updates with the dnf update… should I wait?

    • gigachad@piefed.social
      link
      fedilink
      English
      arrow-up
      0
      ·
      2 months ago

      I depends a bit on your threat model. If you have Jellyfin exposed to the internet I would shut it down immediately. If you are running locally and rely on it, let it run maybe? If behind a tailnet or some other VPN, I would deactivate it as well. If it is an Axios like vulnerability it may be possible your secrets are in danger, dependent on how well they are secured. Not a security expert, but I would handle this a little more conservative…

      • somehacker@lemmy.world
        link
        fedilink
        English
        arrow-up
        0
        ·
        2 months ago

        No need to shut it down if it’s not exposed to the internet. Tailnet/VPN is fine.

        If it’s a supply chain compromise shutting it down wouldn’t matter. The damage is already done.

      • Ruthalas@infosec.pub
        link
        fedilink
        English
        arrow-up
        0
        ·
        2 months ago

        In addition to the other comment, it currently has some pretty rough performance issues with big libraries.

      • ElectricVocalist@jlai.luOP
        link
        fedilink
        English
        arrow-up
        0
        ·
        2 months ago

        There was a regression that caused Jellyfin to be a LOT more restrictive regarding the structured filesystem format. But this could be something else

        • entropicdrift@lemmy.sdf.org
          link
          fedilink
          English
          arrow-up
          0
          ·
          2 months ago

          It’s probably database performance related. There’s a massive PR undergoing round after round of reviews that, when merged, will be a change to 10.12 and will resolve all of the new database performance issues experienced in certain edge cases (book libraries, large music libraries, large collections, etc)

          • ohulancutash@feddit.uk
            link
            fedilink
            English
            arrow-up
            0
            ·
            2 months ago

            I don’t have books, moved music to navidrome, and have a relatively small library and it just will not play nice. Library scans lasting for days kind of nasty. RAM and CPU domination.

    • HereIAm@lemmy.world
      link
      fedilink
      English
      arrow-up
      0
      ·
      2 months ago

      Yeah this is unfortunate news for me as well. I have a primary container I use for videos, and then a 10.10 server for music. 10.11 is borderline unusable for music for me, and I’ve tried everything for rescanning to completely redoing the server set up (rip accidentally deleting all my music playlists).

      But i shall kill off the 10.10 container and hope a performance fix is in the works.

  • Decronym@lemmy.decronym.xyzB
    link
    fedilink
    English
    arrow-up
    0
    ·
    edit-2
    2 months ago

    Acronyms, initialisms, abbreviations, contractions, and other phrases which expand to something larger, that I’ve seen in this thread:

    Fewer Letters More Letters
    HTTP Hypertext Transfer Protocol, the Web
    VPN Virtual Private Network
    nginx Popular HTTP server

    [Thread #203 for this comm, first seen 1st Apr 2026, 09:50] [FAQ] [Full list] [Contact] [Source code]

    • greyscale@lemmy.grey.ooo
      link
      fedilink
      English
      arrow-up
      0
      ·
      2 months ago

      Three. Three emojis, used in headings as a bullet point.

      It is perfectly plausable for someone whos job is to write technical documentation and promotional material would punch it up with a couple 'mojis.

      https://github.com/jellyfin/jellyfin/releases

      Every single release uses the same format with the same 3 emojis. You’d know that if you’d clicked “releases” and had even a modicum of curiosity.

    • irmadlad@lemmy.world
      link
      fedilink
      English
      arrow-up
      0
      ·
      2 months ago

      No worries. We’ve been communicating with pictures since ancient cave men scrawled pictographs on cave walls with a piece of burnt firewood.

  • FackCurs@lemmy.world
    link
    fedilink
    English
    arrow-up
    0
    ·
    edit-2
    2 months ago

    Is it standard practice to release the security updates on GitHub?

    I am a very amateur self hoster and wouldn’t go on the github of projects on my own unless I wanted to read the “read me” for install instructions. I am realizing that I got aware I needed to update my Jellyfin container ASAP only thanks to this post. I would have never checked the GitHub.

    • irmadlad@lemmy.world
      link
      fedilink
      English
      arrow-up
      0
      ·
      2 months ago

      I am realizing that I got aware

      I don’t run the arr stack, but this is key. You really should do your due diligence before you update anything. Personally, I wait unless it’s a security issue, and use all the early adopters as beta testers.

    • ShortN0te@lemmy.ml
      link
      fedilink
      English
      arrow-up
      0
      ·
      2 months ago

      Is it standard practice to release the security updates on GitHub?

      Yes.

      And then the maintainers of the package on the package repository you use will release the patch there. Completely standard operation.

      I recommend younto read up on package repositories on Linux and package maintainers etc.

    • SayCyberOnceMore@feddit.uk
      link
      fedilink
      English
      arrow-up
      0
      ·
      2 months ago

      Not really.

      Depending on how you install things, the package maintainers usually deal with this, so your next apt update / pacman -Syuv or … whatever Fedora does… would capture it.

      If you’ve installed this as a container… dunno… whatever the container update process is (I don’t use them)

        • SayCyberOnceMore@feddit.uk
          link
          fedilink
          English
          arrow-up
          0
          ·
          2 months ago

          It’s difficult to do security-only updates when the fix is contained within a package update.

          Even Microsoft’s security updates are a mix with secuirity updates containing feature changes and vice versa.

          I usually do an update on 1 random device / VM and if that was ok (inc. watching for any .pacnew files) and then kick Ansible into action for the rest.

      • FackCurs@lemmy.world
        link
        fedilink
        English
        arrow-up
        0
        ·
        2 months ago

        I indeed use a container. Wasn’t familiar with the update process for containers but now know how to do it.

          • mic_check_one_two@lemmy.dbzer0.com
            link
            fedilink
            English
            arrow-up
            0
            ·
            edit-2
            2 months ago

            Implying you have access to some major Docker 0-day exploit, or just talking out of your ass? Because a container is no more or less secure than the machine it runs on. At least if a container gets compromised, it only has access to the volumes you have specifically given it access to. It can’t just run rampant on your entire system, because you haven’t (or at least shouldn’t have) given it access to your entire system.

            • quick_snail@feddit.nl
              link
              fedilink
              English
              arrow-up
              0
              ·
              1 month ago

              Docker is known insecure. It doesn’t verify any layers it pulls cryptography. The devs are aware. The tickets remain open.

              • def@aussie.zone
                link
                fedilink
                English
                arrow-up
                0
                ·
                1 month ago

                If that is indeed true it would only mean that the docker container is vulnerable to a supply chain attack. You are not any more vulnerable to a vulnerability in the codebase.

                If you’re using the ghcr image, to post malicious code there, the attack would have already had to compromise their github infra … which would likely result in the attacker being able to push malicious code to git or publish malicious releases. Their linux distro packages are self published via a ppa/install script, which I would assume just pull from their github releases, so a bad github release would immediately be pulled as an update by users just as fast as a container.

              • FackCurs@lemmy.world
                link
                fedilink
                English
                arrow-up
                0
                ·
                1 month ago

                I don’t know if I remember correctly but I could not install Jellyfin on the latest Ubuntu server version. I had to use docker to get Jellyfin running.

        • ButtDrugs@lemmy.zip
          link
          fedilink
          English
          arrow-up
          0
          ·
          2 months ago

          There’s a lot of good container management solutions out there that are worth investigating. They do things like monitor availability, resource management, as well as altering on versioning.

        • communism@lemmy.ml
          link
          fedilink
          English
          arrow-up
          0
          ·
          1 month ago

          If you haven’t already, I recommend Watchtower (nickfedor fork—the original is unmaintained) which automatically pulls updates to Docker containers and restarts them. Make sure to track latest, although for security updates, these should be backported to any supported versions so it’s fine to track an older supported version too.

    • Appoxo@lemmy.dbzer0.com
      link
      fedilink
      English
      arrow-up
      0
      ·
      1 month ago

      The Jellyfin has an official Telegram channel which I use as the newsletter.
      Besides that, the selfh.st newsletter usually highlights the more popular projects if such an issue arises.