this post was submitted on 01 Apr 2026
131 points (99.2% liked)

Selfhosted

58044 readers
779 users here now

A place to share alternatives to popular online services that can be self-hosted without giving up privacy or locking you into a service you don't control.

Rules:

  1. Be civil: we're here to support and learn from one another. Insults won't be tolerated. Flame wars are frowned upon.

  2. No spam posting.

  3. Posts have to be centered around self-hosting. There are other communities for discussing hardware or home computing. If it's not obvious why your post topic revolves around selfhosting, please include details to make it clear.

  4. Don't duplicate the full text of your blog or github here. Just post the link for folks to click.

  5. Submission headline should match the article title (don’t cherry-pick information from the title to fit your agenda).

  6. No trolling.

  7. No low-effort posts. This is subjective and will largely be determined by the community member reports.

Resources:

Any issues on the community? Report it using the report flag.

Questions? DM the mods!

founded 2 years ago
MODERATORS
top 21 comments
sorted by: hot top controversial new old
[–] ohulancutash@feddit.uk 1 points 8 minutes ago

If only 10.11 were usable for me at all.

[–] esc@piefed.social 29 points 1 hour ago (3 children)

Don't expose jellyfin to the internet is a golden rule.

[–] Damarus@feddit.org 13 points 1 hour ago (1 children)

Kinda defeats the purpose of a media server built to be used by multiple people

[–] InnerScientist@lemmy.world 15 points 1 hour ago

Use a VPN, it's not ideal but it's secure.

[–] kbobabob@lemmy.dbzer0.com 1 points 32 minutes ago (1 children)

So don't use it outside your house? Pass

[–] esc@piefed.social 2 points 31 minutes ago

Nothing stops you from using it outside of your house.

[–] LycaKnight 5 points 1 hour ago

Yeah, i have my 30 docker containers behind Headscale (Tailscale).

[–] roserose56@lemmy.zip 3 points 1 hour ago (1 children)

Im on fedora and I have installed through dnf, no updates with the dnf update..... should I wait?

[–] gigachad@piefed.social 2 points 31 minutes ago

I depends a bit on your threat model. If you have Jellyfin exposed to the internet I would shut it down immediately. If you are running locally and rely on it, let it run maybe? If behind a tailnet or some other VPN, I would deactivate it as well. If it is an Axios like vulnerability it may be possible your secrets are in danger, dependent on how well they are secured. Not a security expert, but I would handle this a little more conservative...

[–] Decronym@lemmy.decronym.xyz 3 points 1 hour ago* (last edited 5 minutes ago)

Acronyms, initialisms, abbreviations, contractions, and other phrases which expand to something larger, that I've seen in this thread:

Fewer Letters More Letters
HTTP Hypertext Transfer Protocol, the Web
VPN Virtual Private Network
nginx Popular HTTP server

2 acronyms in this thread; the most compressed thread commented on today has 3 acronyms.

[Thread #203 for this comm, first seen 1st Apr 2026, 09:50] [FAQ] [Full list] [Contact] [Source code]

[–] webkitten@piefed.social 3 points 1 hour ago

Pretty flawless update from the apt repo on my end.

Server version 10.11.7  
[–] varnia@lemmy.blahaj.zone 5 points 2 hours ago

There is a good reason I only have Jellyfin and other services accessible via valid Client Certificate.

[–] Burghler@sh.itjust.works 13 points 3 hours ago (2 children)

Wonder if it's the Axios one. Sounds like it isn't from their description though hmm

[–] doeknius_gloek@discuss.tchncs.de 7 points 3 hours ago (1 children)

I don't think so, the previous release 10.11.6 is a few months old and the axios supply chain attack happened yesterday.

[–] Strit@lemmy.linuxuserspace.show 5 points 2 hours ago

So lets hope this 10.11.7 is not subject to the axios one. :)

[–] rollerbang@lemmy.world 2 points 3 hours ago (1 children)

Diff agrees, not likely. Might be permisson related, elevation of privileges.

[–] r00ty@kbin.life 2 points 1 hour ago

From a cursory look at just the security commits. Looks like the following:

  • GHSA-j2hf-x4q5-47j3: Checks if a media shortcut is empty, and checks if it is remote and stores the remote protocol if so. Also prevent strm files (these are meant to contain links to a stream) from referencing local files. Indeed this might have been used to reference files jellyfin couldn't usually see?
  • GHSA-8fw7-f233-ffr8: Seems to be similar, except for M3U file link validation and limiting allowed protocols. It also changes the default permissions for live TV management to false.
  • GHSA-v2jv-54xj-h76w: When creating a structure there should be a limit of 200 characters for a string which was not enforced.
  • GHSA-jh22-fw8w-2v9x: Not really completely sure here. They change regex to regexstr in a lot of places and it looks like some extra validation around choosing transcoding settings.

I'm not really sure how serious any of these are, or how they could be exploited however. Well aside from the local file in stream files one.

[–] cholesterol@lemmy.world 6 points 3 hours ago (1 children)

In the raspian repos, just updated, thanks.

[–] Strit@lemmy.linuxuserspace.show 6 points 3 hours ago

also in the docker repository.