Package: gnupg-agent
Version: 2.0.14-1
Severity: important

Keys created / imported / having passphrase changed with gpg-agent 2.0.14 
cannot be decrypted (and thus used), preventing all gpg operations. This has 
been fixed upstream in 2.0.15:

 * Fixes a regression in 2.0.14 which prevented unprotection of new
   or changed gpg-agent passphrases.

Keys that are already mangled are unreadable even by 2.0.15 and would need a 
special tool to repair that does not exist yet:

Werner Koch <[email protected]> on Mon, 19 Apr 2010 08:35:03 +0200:
> It is possible to write a tool to fix such a bad passphrases.  However there 
> are only a very few reports and thus I believe it is easier to generate a new 
> key instead.


-- System Information:
Debian Release: squeeze/sid
  APT prefers testing
  APT policy: (990, 'testing'), (1, 'experimental')
Architecture: i386 (i586)

Kernel: Linux 2.6.31.9-xo-bine-nfs-16-00635-gf2e2fc4 (PREEMPT)
Locale: LANG=en_US, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash

Versions of packages gnupg-agent depends on:
ii  libc6                         2.10.2-6   Embedded GNU C Library: Shared lib
ii  libgcrypt11                   1.4.5-2    LGPL Crypto library - runtime libr
ii  libgpg-error0                 1.6-1      library for common error values an
ii  libpth20                      2.0.7-14   The GNU Portable Threads
ii  libreadline6                  6.1-1      GNU readline and history libraries
ii  pinentry-gtk2 [pinentry]      0.8.0-1    GTK+-2-based PIN or pass-phrase en

Versions of packages gnupg-agent recommends:
ii  gnupg                         1.4.10-2   GNU privacy guard - a free PGP rep
ii  gnupg2                        2.0.14-1   GNU privacy guard - a free PGP rep

gnupg-agent suggests no packages.

-- no debconf information



-- 
To UNSUBSCRIBE, email to [email protected]
with a subject of "unsubscribe". Trouble? Contact [email protected]

Reply via email to