Package: gpgsm
Version: 2.0.14-1
Severity: grave
Justification: causes non-serious data loss

Werner Koch discovered a problem with passphrases for x509
certificates in 2.0.14, he also send around a patch on
2010-01-26, e.g. see:
http://marc.info/?l=gnupg-users&m=126451730710129&w=2

This has a data loss scenario, given a few conditions you 
cannot use your keys anymore:
| If you now try to use the key and enter the passphrase,
| gpg-agent uses the wrong iteration count from the file (65536) and thus
| can't unprotect the key.

Bernhard



-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Reply via email to