Portál AbcLinuxu, 2. května 2025 12:16
Plex.tv oznámilo, že 22. 8. došlo k úniku části uživatelských dat, která obsahují uživatelské jméno, email a heslo. Hesla jsou údajně zašifrována. Všichni uživatelé by si měli co nejdříve změnit heslo. Doporučeno je, zapnout si dvoufaktorové ověřování. Zároveň je potřeba po změně hesla odhlásit všechna připojená zařízení a znovu je přihlásit (včetně vlastních Plex Media Serverů).
Tiskni
Sdílej:
We want you to be aware of an incident on 2022-08-22 involving your Plex account information. While we believe the actual impact of this incident is limited, we want to ensure you have the right information and tools to keep your account secure. What happened On Monday (2022-08-22), we discovered suspicious activity on one of our databases. We immediately began an investigation and it does appear that a third-party was able to access a limited subset of data that includes emails, usernames, and encrypted passwords. Even though all account passwords that could have been accessed were hashed (with brcypt plus salted and peppered) and secured in accordance with best practices, out of an abundance of caution we are requiring all Plex accounts to have their password reset. Rest assured that credit card and other payment data are not stored on our servers at all and were not vulnerable in this incident. What we’re doing We’ve already addressed the method that this third-party employed to gain access to the system, and we’re doing additional reviews to ensure that the security of all of our systems is further hardened to prevent future incursions. While the account passwords were secured in accordance with best practices, we’re requiring all Plex users to reset their password. What you can do Long story short, we kindly request that you reset your Plex account password immediately. When doing so, there’s a checkbox to “Sign out connected devices after password change.” This will additionally sign out all of your devices (including any Plex Media Server you own) and require you to sign back in with your new password. This is a headache, but we recommend doing so for increased security. We have created a support article with step-by-step instructions on how to reset your password here. We’d also like to remind you that no one at Plex will ever reach out to you to ask for a password or credit card number over email. For further account protection, we also recommend enabling two-factor authentication on your Plex account if you haven’t already done so. Lastly, we sincerely apologize to you for any inconvenience this situation may cause. We take pride in our security system and want to assure you that we are doing everything we can to swiftly remedy this incident and prevent future incidents from occurring. We are all too aware that third-parties will continue to attempt to infiltrate IT infrastructures around the world, and rest assured we at Plex will never be complacent in hardening our security and defenses. For step-by-step instructions on how to reset your password, visit: https://support.plex.tv/articles/account-requires-password-reset/ Common Issues Some common issues that have come up: - If you wish to delete your Plex account (or make some other important account changes, such as altering the email address), you’ll need to first change/reset the password before you proceed with the account change. - If you have trouble receiving the reset email, but are still logged in to the web browser app you can manually change the password through your Account page (https://app.plex.tv/desktop/#!/settings/account) directly - In cases where you get a “not authorized” or similar error when trying to access your Plex Media Server, you likely need to (re)claim/sign in to the server. Info on claiming a server can be found here as well as troubleshooting for claiming here
Nick Wellnhofer discovered that the xsltApplyTemplates function in libxslt, an XSLT processing runtime library, is prone to a use-after-free flaw, resulting in a denial of service, or potentially the execution of arbitrary code if a specially crafted file is processed.
Multiple security issues have been found in the Mozilla Firefox web browser, which could potentially result in the execution of arbitrary code or spoofing.
A vulnerability was discovered in open-vm-tools, an open source implementation of VMware Tools, allowing an unprivileged local guest user to escalate their privileges as root user in the virtual machine.(tohle už je trochu na hraně, ale asi se očekává, že lidi znají co dělá VMware)
Multiple buffer overflows were discovered in Kicad, a suite of programs for the creation of printed circuit boards, which could result in the execution of arbitrary code if malformed Gerber/Excellon files.(I accidentally malformed Gerber/Excellon files)
ISSN 1214-1267, (c) 1999-2007 Stickfish s.r.o.