The Mageia project has reported that someone was able to gain access to their LDAP database and the user information the project had on users for the identity.mageia.org website. The information accessed includes names, e-mail addresses and hashed passwords. Mageia has reset the passwords of users of their identity.mageia.org service and are advising anyone who has reused their password on another website to change their password. "The passwords stored by the Mageia LDAP server are hashed and salted, meaning that the full decryption of the password, if they have actually been leaked into a human-usable format would require significant computing power for safe and complex passwords. Despite the leaked data only appearing to be names and e-mail addresses of identity.mageia.org users, we strongly urge users to be cautious if the password used for their Mageia account is used elsewhere, and we recommend changing passwords wherever else it is used."