Release Notes: A corruption of the public keyring database on import of manipulated public keys was fixed. This issue was reported as CVE-2012-6085. Support for the old cipher algorithm IDEA was added. Small changes were made to increase compatibility with future OpenPGP and GnuPG features. Minor bugfixes were made.
Release Notes: A space separated fingerprint is now accepted as a user ID. This allows you to copy and paste the fingerprint from the key listing. Support for the original HKP keyserver was removed. The trustdb is now rebuilt after changing the option --min-cert-level. JPEG detection was improved. More VMS patches are now included. File locking was made more portable. The 32-bit variant of the mingw-w64 toolchain is now supported. Minor bugs were fixed.
Release Notes: More hash algorithms are now possible with the OpenPGP v2 card. gpg-agent now tests for a new gpg-agent.conf configuration file on a SIGHUP. The output of "gpgconf --check-options" was fixed. A bug where scdaemon sends a signal to gpg-agent running in non-daemon mode was fixed. TTY management for pinentries and a session variable update problem were fixed. Further minor bugfixes were made.
Release Notes: Bugs were fixed. Portability changes were made. Minor changes were made for better compatibility with GnuPG-2 (the modular implementation).
Release Notes: The agent's "--use-standard-socket" option is now available on non-Win32 systems, allowing all tools to start and daemonize the agent on the fly. The gpg-agent commands KILLAGENT and RELOADAGENT are now available on all platforms. Minor bugs were fixed.
Release Notes: A regression in 2.0.14 which prevented unprotection of new or changed gpg-agent passphrases was fixed. A new command "--passwd" was added. libassuan 2.0 is now used.
Release Notes: 2048-bit RSA keys are now generated by default. The default hash algorithm preferences have changed to prefer SHA-256 over SHA-1. Writing of keys to v2 OpenPGP cards was enhanced. Several environment variables are now passed to the Pinentry to make SCIM work. A '--batch' mode was added to the GPGSM command '--gen-key' command. Several other enhancements and minor bugs were fixed.
Release Notes: 2048 bit RSA keys are now generated by default. The default hash algorithm preferences have changed to prefer SHA-256 over SHA-1. 2048 bit DSA keys are now generated to use a 256 bit hash algorithm. Support for v2 OpenPGP cards was added. Support for the Camellia cipher (RFC-5581) was implemented. Support for HKP keyservers over SSL ("HKPS") was added. The algorithm for computing the SIG_ID status was changed to match the one used in version 2.0.10. File locking was improved. A memory leak which made imports of many keys very slow was fixed. Many smaller bugs were fixed.
Release Notes: GPGSM now always lists ephemeral certificates if specified by fingerprint or keygrip. GPGSM now also returns information about smartcards. It is now made sure not to leak file descriptors if running gpg-agent with a command. The order of the confirmation questions for root certificates was changed, and negative answers are stored in trustlist.txt. Better synchronization of concurrent smartcard sessions was implemented. Support for 2048 bit OpenPGP cards and for Telesec Netkey 3 cards was added. A potential Mac OS X system freeze is now avoided.
Release Notes: User IDs are now capped at 2048 bytes to avoid memory allocation attacks (as reported in CVE-2006-3082). Support for the SHA-224 hash has been added for better DSS compatibility. Support for the latest update to DSA keys and signatures has been added, allowing for larger keys than 1024 bits and hashes other than SHA-1 and RIPEMD/160.