700
submitted 3 weeks ago by Mubelotix@jlai.lu to c/selfhosted@lemmy.world
you are viewing a single comment's thread
view the rest of the comments
[-] psoul@lemmy.world 4 points 3 weeks ago

I indeed use a container. Wasn’t familiar with the update process for containers but now know how to do it.

[-] ButtDrugs@lemmy.zip 5 points 3 weeks ago

There's a lot of good container management solutions out there that are worth investigating. They do things like monitor availability, resource management, as well as altering on versioning.

[-] hellequin67@piefed.social 1 points 2 weeks ago

Can highly recommend dockhand happily runs my full docker stack with updates and great overviews of what's happening under the hood.

[-] communism@lemmy.ml 2 points 3 weeks ago

If you haven't already, I recommend Watchtower (nickfedor fork—the original is unmaintained) which automatically pulls updates to Docker containers and restarts them. Make sure to track latest, although for security updates, these should be backported to any supported versions so it's fine to track an older supported version too.

[-] psoul@lemmy.world 1 points 3 weeks ago

Thank you. Will look into it.

[-] quick_snail@feddit.nl 2 points 3 weeks ago

Lol it's already insecure then. Don't bother.

[-] mic_check_one_two@lemmy.dbzer0.com 5 points 3 weeks ago* (last edited 3 weeks ago)

Implying you have access to some major Docker 0-day exploit, or just talking out of your ass? Because a container is no more or less secure than the machine it runs on. At least if a container gets compromised, it only has access to the volumes you have specifically given it access to. It can’t just run rampant on your entire system, because you haven’t (or at least shouldn’t have) given it access to your entire system.

[-] quick_snail@feddit.nl 2 points 3 weeks ago

Docker is known insecure. It doesn't verify any layers it pulls cryptography. The devs are aware. The tickets remain open.

[-] def@aussie.zone 1 points 3 weeks ago

If that is indeed true it would only mean that the docker container is vulnerable to a supply chain attack. You are not any more vulnerable to a vulnerability in the codebase.

If you’re using the ghcr image, to post malicious code there, the attack would have already had to compromise their github infra … which would likely result in the attacker being able to push malicious code to git or publish malicious releases. Their linux distro packages are self published via a ppa/install script, which I would assume just pull from their github releases, so a bad github release would immediately be pulled as an update by users just as fast as a container.

[-] quick_snail@feddit.nl 1 points 3 weeks ago

No, it's also vulnerable to a targeted mitm attack. Github can be unaffected and you can get a malicious version on your server.

[-] psoul@lemmy.world 1 points 3 weeks ago

I don't know if I remember correctly but I could not install Jellyfin on the latest Ubuntu server version. I had to use docker to get Jellyfin running.

[-] quick_snail@feddit.nl 1 points 3 weeks ago

Jellyfin has a Debian repo. Worked fine on Debian 12 and 13.

[-] mpramann@discuss.tchncs.de 3 points 3 weeks ago

Insane way of thinking.

this post was submitted on 01 Apr 2026
700 points (100.0% liked)

Selfhosted

58774 readers
281 users here now

A place to share alternatives to popular online services that can be self-hosted without giving up privacy or locking you into a service you don't control.

Rules:

  1. Be civil: we're here to support and learn from one another. Insults won't be tolerated. Flame wars are frowned upon.

  2. No spam posting.

  3. Posts have to be centered around self-hosting. There are other communities for discussing hardware or home computing. If it's not obvious why your post topic revolves around selfhosting, please include details to make it clear.

  4. Don't duplicate the full text of your blog or github here. Just post the link for folks to click.

  5. Submission headline should match the article title (don’t cherry-pick information from the title to fit your agenda).

  6. No trolling.

  7. No low-effort posts. This is subjective and will largely be determined by the community member reports.

Resources:

Any issues on the community? Report it using the report flag.

Questions? DM the mods!

founded 2 years ago
MODERATORS