A new update for VeraCrypt version 1.24 has been released. VeraCrypt, a fork of TrueCrypt, is an open source encryption program that can encrypt entire hard drives or partitions and virtual volumes. VeraCrypt uses the original source code of TrueCrypt, but includes several security improvements. Volumes created with TrueCrypt can simply be opened and converted. The changelog for this release can be found below.
- Don’t allow Hidden volume to have the same password, PIM and keyfiles as Outer volume
- Fix random crash in 32-bit builds when using Streebog.
- Enable FIPS mode in JitterEntropy random generator.
- Update Beginner’s Tutorial in documentation to use “MyVolume.hc” instead of “My Volume” for file container name in order to avoid confusion about nature of file nature.
- Minor code cleanup
- Fix wrong results in benchmark of encryption algorithms when RAM encryption is enabled
- Fix issue when RAM encryption used, AES selected and AES-NI not supported by CPU that caused the free space of newly created volumes not filled with random data even if “quick format” is not selected.
- Fix UI for blocking TRIM in system encryption not working in MBR boot mode.
- Support password drag-n-drop from external applications (eg KeePass) to password UI fields which is more secure than using clipboard.
- Implements compatibility with Windows 10 Modern Standby and Windows 8.1 Connected Standby power model. This makes detection of entering power saving mode more reliable.
- Avoid displaying waiting dialog when /silent specified for “VeraCrypt Format” during creating of file container using /create switch and a filesystem other than FAT.
- Use native Windows format program to perform formatting of volume since it is more reliable and only fallback to FormatEx function from fmifs.dll in case of issue.
- Don’t use API for Processor Groups support if there is only 1 CPU group in the system. This can fix slowness issue observed on some PCs with AMD CPUs.
- Don’t allow to encrypt the system drive if it is already encrypted by BitLocker.
- Implement detection of Hibernate and Fast Startup and disable them if RAM encryption is activated.
- Warn about Fast Startup if it is enabled during VeraCrypt installation/upgrade, when starting system encryption or when creating a volume, and propose to disable it.
- Add UI options to control the behavior of automatic bootloader fixing when System Encryption used.
- Don’t allow a directory path to be entered for the file container to be created in Format wizard.
- Don’t try to use fix for CVE-2019-19501 if Windows Shell has been modified or is not running since there is no reliable way to fix it in such non standard configuation.
- MBR bootloader: fix incorrect compressed data size passed to decompressor in boot sector.
- Add warning message when typed password reaches maximum length during the system encryption wizard.
- Fix wrong error message when UTF-8 encoding of entered password exceeds the maximum supported length.
- Fix crash when using portable 32-bit “VeraCrypt Format.exe” to create hidden volume on a 64-bit machine where VeraCrypt is already installed.
- Update libzip to latest version 1.7.3.
- Update translations.
Linux/Mac OS X:
- Force reading of at least 32 bytes from /dev/random before allowing it to fail gracefully
- Allow choosing a filesystem other than FAT for Outer volume but display warning about risks of such choice. Implement an estimation of maximum possible size of hidden volume in this case.
- Erase sensitive memory explicitly instead of relying on the compiler not optimizing calls to method Memory::Erase.
- Add support for Btrfs filesystem when creating volumes (Linux Only).
- Update wxWidgets for static builds to version 3.0.5.
|Operating systems||Windows 7, Linux, BSD, macOS, Windows 8, Windows 10|