Package: gpgsm Version: 2.0.14-1 Severity: grave Justification: causes non-serious data loss
Werner Koch discovered a problem with passphrases for x509 certificates in 2.0.14, he also send around a patch on 2010-01-26, e.g. see: http://marc.info/?l=gnupg-users&m=126451730710129&w=2 This has a data loss scenario, given a few conditions you cannot use your keys anymore: | If you now try to use the key and enter the passphrase, | gpg-agent uses the wrong iteration count from the file (65536) and thus | can't unprotect the key. Bernhard -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org