On Friday, September 26, the system hackers team discovered a misconfiguration in the wiki setup. The error, if discovered, would have enabled an unauthorised party to read protected pages and user configurations.

It was possible to read the encrypted password hashes of guest users. Registered Fellows, who log in using their Fellowship password were not affected by this. To all others we recommend changing their wiki password as a precaution.

Fellows ยป erack

erAck - Eike Rathke

Email: <erack AT SPAMFREE fsfe DOT org>

I'm a fellow from Hamburg, Germany. I work full time on LibreOffice for Red Hat, Inc. Find more information at my personal web site including GnuPG key details.

My current goal within FSFE is to (re)establish Hamburg Fellowship meetings.

My OTR fingerprints as xmpp:erack@jabber.fsfe.org, you may verify this preformatted text block by running it through gpg --verify after having added my GnuPG key 0x293C05FD to your keyring.

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

OTR fingerprints on jabber.fsfe.org:

C04F3AFB 0DF94198 0FC69D9E 5FC5F145 59B5689D
1D62C6D8 738E6B4C 00F65790 4C20C746 616233B7
39905530 598519ED C10DED11 070C673F 19D5430A
EE11F7F4 A0A60EC5 F32E7A5C 786BA4F8 CB69ECF8
18EEB4C0 D7D9C2F0 72DC50FE E655D588 CA7C35AA


-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.11 (GNU/Linux)

iEYEARECAAYFAk7eFcEACgkQFbLmO4lpmVrLgwCfTXqqrBNQm7EuUwUN0Wxy8NF0
lgUAoJUs56m5JG8fmD3LuOuPPyZ7OC46
=PpnP
-----END PGP SIGNATURE-----


CategoryHomepage