VeraCrypt version 1.24-Update7
idrassi
released this
09 Aug 13:28
·
719 commits
to master
since this release
Binaries for Windows, Linux and MacOSX are available at Launchpad and Sourceforge.
Changes between 1.24-Update6 and 1.24-Update7 (7 August 2020) :
-
Windows:
- Fix regression in Expander and Format when RAM encryption is enable that was causing volume headers to be corrupted.
-
All OSes:
- Don't allow Hidden volume to have the same password, PIM and keyfiles as Outer volume
- Fix random crash in 32-bit builds when using Streebog.
- Enable FIPS mode in JitterEntropy random generator.
- Update Beginner's Tutorial in documentation to use "MyVolume.hc" instead of "My Volume" for file container name in order to avoid confusion about nature of file nature.
- Minor code cleanup
-
Windows:
- Fix wrong results in benchmark of encryption algorithms when RAM encryption is enabled
- Fix issue when RAM encryption used, AES selected and AES-NI not supported by CPU that caused the free space of newly created volumes not filled with random data even if "quick format" is not selected.
- Fix UI for blocking TRIM in system encryption not working in MBR boot mode.
- Support password drag-n-drop from external applications (e.g. KeePass) to password UI fields which is more secure than using clipboard.
- Implements compatibility with Windows 10 Modern Standby and Windows 8.1 Connected Standby power model. This makes detection of entering power saving mode more reliable.
- Avoid displaying waiting dialog when /silent specified for "VeraCrypt Format" during creating of file container using /create switch and a filesystem other than FAT.
- Use native Windows format program to perform formatting of volume since it is more reliable and only fallback to FormatEx function from fmifs.dll in case of issue.
- Don't use API for Processor Groups support if there is only 1 CPU group in the system. This can fix slowness issue observed on some PCs with AMD CPUs.
- Don't allow to encrypt the system drive if it is already encrypted by BitLocker.
- Implement detection of Hibernate and Fast Startup and disable them if RAM encryption is activated.
- Warn about Fast Startup if it is enabled during VeraCrypt installation/upgrade, when starting system encryption or when creating a volume, and propose to disable it.
- Add UI options to control the behavior of automatic bootloader fixing when System Encryption used.
- Don't allow a directory path to be entered for the file container to be created in Format wizard.
- Don't try to use fix for CVE-2019-19501 if Windows Shell has been modified or is not running since there is no reliable way to fix it in such non standard configuation.
- MBR bootloader: fix incorrect compressed data size passed to decompressor in boot sector.
- Add warning message when typed password reaches maximum length during the system encryption wizard.
- Fix wrong error message when UTF-8 encoding of entered password exceeds the maximum supported length.
- Fix crash when using portable 32-bit "VeraCrypt Format.exe" to create hidden volume on a 64-bit machine where VeraCrypt is already installed.
- Update libzip to latest version 1.7.3.
- Update translations.
-
Linux/MacOSX:
- Force reading of at least 32 bytes from /dev/random before allowing it to fail gracefully
- Allow choosing a filesystem other than FAT for Outer volume but display warning about risks of such choice. Implement an estimation of maximum possible size of hidden volume in this case.
- Erase sensitive memory explicitly instead of relying on the compiler not optimizing calls to method Memory::Erase.
- Add support for Btrfs filesystem when creating volumes (Linux Only).
- Update wxWidgets for static builds to version 3.0.5.