Package: gnupg-agent Version: 2.0.14-1 Severity: important
Keys created / imported / having passphrase changed with gpg-agent 2.0.14 cannot be decrypted (and thus used), preventing all gpg operations. This has been fixed upstream in 2.0.15: * Fixes a regression in 2.0.14 which prevented unprotection of new or changed gpg-agent passphrases. Keys that are already mangled are unreadable even by 2.0.15 and would need a special tool to repair that does not exist yet: Werner Koch <[email protected]> on Mon, 19 Apr 2010 08:35:03 +0200: > It is possible to write a tool to fix such a bad passphrases. However there > are only a very few reports and thus I believe it is easier to generate a new > key instead. -- System Information: Debian Release: squeeze/sid APT prefers testing APT policy: (990, 'testing'), (1, 'experimental') Architecture: i386 (i586) Kernel: Linux 2.6.31.9-xo-bine-nfs-16-00635-gf2e2fc4 (PREEMPT) Locale: LANG=en_US, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash Versions of packages gnupg-agent depends on: ii libc6 2.10.2-6 Embedded GNU C Library: Shared lib ii libgcrypt11 1.4.5-2 LGPL Crypto library - runtime libr ii libgpg-error0 1.6-1 library for common error values an ii libpth20 2.0.7-14 The GNU Portable Threads ii libreadline6 6.1-1 GNU readline and history libraries ii pinentry-gtk2 [pinentry] 0.8.0-1 GTK+-2-based PIN or pass-phrase en Versions of packages gnupg-agent recommends: ii gnupg 1.4.10-2 GNU privacy guard - a free PGP rep ii gnupg2 2.0.14-1 GNU privacy guard - a free PGP rep gnupg-agent suggests no packages. -- no debconf information -- To UNSUBSCRIBE, email to [email protected] with a subject of "unsubscribe". Trouble? Contact [email protected]

