this post was submitted on 01 Apr 2026
696 points (99.2% liked)

Selfhosted

56957 readers
806 users here now

A place to share alternatives to popular online services that can be self-hosted without giving up privacy or locking you into a service you don't control.

Rules:

  1. Be civil: we're here to support and learn from one another. Insults won't be tolerated. Flame wars are frowned upon.

  2. No spam posting.

  3. Posts have to be centered around self-hosting. There are other communities for discussing hardware or home computing. If it's not obvious why your post topic revolves around selfhosting, please include details to make it clear.

  4. Don't duplicate the full text of your blog or github here. Just post the link for folks to click.

  5. Submission headline should match the article title (don’t cherry-pick information from the title to fit your agenda).

  6. No trolling.

  7. No low-effort posts. This is subjective and will largely be determined by the community member reports.

Resources:

Any issues on the community? Report it using the report flag.

Questions? DM the mods!

founded 2 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
[–] psoul@lemmy.world 27 points 4 days ago* (last edited 4 days ago) (4 children)

Is it standard practice to release the security updates on GitHub?

I am a very amateur self hoster and wouldn't go on the github of projects on my own unless I wanted to read the "read me" for install instructions. I am realizing that I got aware I needed to update my Jellyfin container ASAP only thanks to this post. I would have never checked the GitHub.

[–] ShortN0te@lemmy.ml 27 points 3 days ago

Is it standard practice to release the security updates on GitHub?

Yes.

And then the maintainers of the package on the package repository you use will release the patch there. Completely standard operation.

I recommend younto read up on package repositories on Linux and package maintainers etc.

[–] Appoxo@lemmy.dbzer0.com 2 points 2 days ago

The Jellyfin has an official Telegram channel which I use as the newsletter.
Besides that, the selfh.st newsletter usually highlights the more popular projects if such an issue arises.

[–] Cyber@feddit.uk 5 points 4 days ago (2 children)

Not really.

Depending on how you install things, the package maintainers usually deal with this, so your next apt update / pacman -Syuv or ... whatever Fedora does... would capture it.

If you've installed this as a container... dunno.. whatever the container update process is (I don't use them)

[–] quick_snail@feddit.nl 3 points 3 days ago (1 children)

Unattended upgrades set to security only and never worry

[–] Cyber@feddit.uk 6 points 3 days ago (1 children)

It's difficult to do security-only updates when the fix is contained within a package update.

Even Microsoft's security updates are a mix with secuirity updates containing feature changes and vice versa.

I usually do an update on 1 random device / VM and if that was ok (inc. watching for any .pacnew files) and then kick Ansible into action for the rest.

[–] quick_snail@feddit.nl 1 points 3 days ago (1 children)

Why does unattended upgrades with security only setting not fix this?

This is literally why Debian has distinct repos for security updates.

[–] Cyber@feddit.uk 1 points 2 days ago (1 children)

Let me know which repo this update appears in.

[–] quick_snail@feddit.nl 1 points 1 day ago

The jellyfin repo

[–] psoul@lemmy.world 4 points 3 days ago (3 children)

I indeed use a container. Wasn’t familiar with the update process for containers but now know how to do it.

[–] ButtDrugs@lemmy.zip 5 points 3 days ago

There's a lot of good container management solutions out there that are worth investigating. They do things like monitor availability, resource management, as well as altering on versioning.

[–] communism@lemmy.ml 2 points 3 days ago (1 children)

If you haven't already, I recommend Watchtower (nickfedor fork—the original is unmaintained) which automatically pulls updates to Docker containers and restarts them. Make sure to track latest, although for security updates, these should be backported to any supported versions so it's fine to track an older supported version too.

[–] psoul@lemmy.world 1 points 2 days ago

Thank you. Will look into it.

[–] irmadlad@lemmy.world 2 points 3 days ago (1 children)

I am realizing that I got aware

I don't run the arr stack, but this is key. You really should do your due diligence before you update anything. Personally, I wait unless it's a security issue, and use all the early adopters as beta testers.

[–] psoul@lemmy.world 1 points 2 days ago

Wait a minute, best security practice is to use the latest version -1?