Release Notes: The Yarom/Falkner flush+reload side-channel attack on RSA secret keys is now mitigated. IDEA was fixed for big-endian CPUs. The diagnostics for failed keyserver lookups were improved. Several further bugs and portability issues were fixed.
Release Notes: A corruption of the public keyring database on import of manipulated public keys was fixed. This issue was reported as CVE-2012-6085. Support for the old cipher algorithm IDEA was added. Small changes were made to increase compatibility with future OpenPGP and GnuPG features. Minor bugfixes were made.
Release Notes: A space separated fingerprint is now accepted as a user ID. This allows you to copy and paste the fingerprint from the key listing. Support for the original HKP keyserver was removed. The trustdb is now rebuilt after changing the option --min-cert-level. JPEG detection was improved. More VMS patches are now included. File locking was made more portable. The 32-bit variant of the mingw-w64 toolchain is now supported. Minor bugs were fixed.
Release Notes: Bugs were fixed. Portability changes were made. Minor changes were made for better compatibility with GnuPG-2 (the modular implementation).
Release Notes: 2048 bit RSA keys are now generated by default. The default hash algorithm preferences have changed to prefer SHA-256 over SHA-1. 2048 bit DSA keys are now generated to use a 256 bit hash algorithm. Support for v2 OpenPGP cards was added. Support for the Camellia cipher (RFC-5581) was implemented. Support for HKP keyservers over SSL ("HKPS") was added. The algorithm for computing the SIG_ID status was changed to match the one used in version 2.0.10. File locking was improved. A memory leak which made imports of many keys very slow was fixed. Many smaller bugs were fixed.
Release Notes: A possible memory corruption while importing OpenPGP keys was fixed. AES encryption performance was improved by more than 20% on x86, and decryption is also slightly faster.
Release Notes: The detection of keyrings specified multiple times was improved. Changes were made to cope better with broken keyservers. The "--openpgp" mode was updated to match the final OpenPGP standard RFC-4880. The older behavior is supported with "--rfc2440". A rare bug in decryption using the OpenPGP card was fixed. Several other minor enhancements and bugfixes were made. The license was changed to the GPLv3.
Release Notes: A vulnerability when using GnuPG in streaming mode, which made it possible to insert additional text before or after a signed message if GnuPG was not used correctly, was fixed.
Release Notes: A serious and exploitable bug in processing encrypted packages, as reported in CVE-2006-6235, was fixed. A buffer overflow as reported in CVE-2006-6169 was fixed. A bug while decrypting certain compressed and encrypted messages was fixed. The option --s2k-count was added to set the number of times passphrase mangling is repeated. The option --passphrase-repeat was added to set the number of times to prompt for a new passphrase to be repeated. The license was adjusted with regards to helper programs indirectly linked to OpenSSL.
Release Notes: Two more possible memory allocation attacks, allowing denial of service attacks and possibly remote code execution, were fixed. More DSA2 tweaks were implemented. A Norwegian translation was added.