Strange that there was no comms whatsover from the team about this

  • slacktoid@lemmy.ml
    link
    fedilink
    English
    arrow-up
    10
    ·
    2 months ago

    Note: This is not a code vulnerability, but a vulnerability in the GitHub Actions workflows. No new version is required for this GHSA and end users do not need to take any actions.

    From the article

    However maybe it’s time to going back to build from source.

  • renegadespork@lemmy.jelliefrontier.net
    link
    fedilink
    English
    arrow-up
    6
    ·
    2 months ago

    Everyone might want to freeze your Jellyfin versions until this gets sorted. As far as we know, nothing has been hijacked, but safer sit on your local copies for now.

  • le_throosh@lemmy.dbzer0.comOP
    link
    fedilink
    English
    arrow-up
    4
    ·
    2 months ago

    To clarify: This is about a possible supply chain attack. The possibility of it. Not about unsafe code in the app or anywhere else. It means that an attacker could have gained access to the ios repo and possibly any other repo. It is fixed now.

    I imagine that hostile commits would have been caught by now, as would compromised releases. But the main issue for me is that we are pretty much left in the dark about this. Maybe the team checked everything well and came to the conclusion that this was nothing worry about and was catched before it could do any harm. Which is the most probable scenario I think. Still leaves a bit of a sour taste.