Version 2.0.12 of The GNU Privacy Guard


Release Notes: GPGSM now always lists ephemeral certificates if specified by fingerprint or keygrip. GPGSM now also returns information about smartcards. It is now made sure not to leak file descriptors if running gpg-agent with a command. The order of the confirmation questions for root certificates was changed, and negative answers are stored in trustlist.txt. Better synchronization of concurrent smartcard sessions was implemented. Support for 2048 bit OpenPGP cards and for Telesec Netkey 3 cards was added. A potential Mac OS X system freeze is now avoided.

Other releases

  •  21 Dec 2013 01:48

    Release Notes: This release fixes the RSA Key Extraction via Low-Bandwidth Acoustic Cryptanalysis attack as described by Genkin, Shamir, and Tromer. Also, by default only the major version number is printed on armored output, a trustdb file is not created when --ttrust-model=always is used, keyid for key packets are printed when --list-packets is used, and the modular exponentiation algorithm has been changed to recover from a small performance loss in version 1.4.14.

    •  12 Sep 2013 23:30

      Release Notes: With gpg-agent, by default users are now asked via the Pinentry whether they trust an X.509 root key. To prohibit interactive marking of such keys, the new option --no-allow-mark-trusted may be used. The command KEYINFO has options to add info from sshcontrol for gpg-agent. The included ssh agent now supports ECDSA keys. The new option --enable-putty-support allows gpg-agent to act on Windows as a Pageant replacement with full smartcard support. This release supports installation as a portable application under Windows.

      •  26 Jul 2013 15:58

      Release Notes: Decryption using smartcards keys larger than 3072 now works. A new meta option ignore-invalid-option was introduced to allow using the same option file by other GnuPG versions. The hash algorithm is now printed for sig records in key listings. Invalid keyblock packets are now skipped during import to avoid a DoS. Ports from DNS SRV records are now correctly handled. Many further minor bugs were fixed.

      Release Notes: The Yarom/Falkner flush+reload side-channel attack on RSA secret keys is now mitigated. IDEA was fixed for big-endian CPUs. The diagnostics for failed keyserver lookups were improved. Several further bugs and portability issues were fixed.

      Release Notes: A corruption of the public keyring database on import of manipulated public keys was fixed. This issue was reported as CVE-2012-6085. Support for the old cipher algorithm IDEA was added. Small changes were made to increase compatibility with future OpenPGP and GnuPG features. Minor bugfixes were made.


      Project Spotlight


      An Audio/MIDI multi-track sequencer.


      Project Spotlight


      A Java code quality tool to enforce good design with respect to package dependencies.