github veracrypt/VeraCrypt VeraCrypt_1.24-Update7
VeraCrypt version 1.24-Update7

latest releases: VeraCrypt_1.26.7, VeraCrypt_1.26.6, VeraCrypt_1.25.9...
3 years ago

Binaries for Windows, Linux and MacOSX are available at Launchpad and Sourceforge.

Changes between 1.24-Update6 and 1.24-Update7 (7 August 2020) :
  • Windows:

    • Fix regression in Expander and Format when RAM encryption is enable that was causing volume headers to be corrupted.
  • All OSes:

    • Don't allow Hidden volume to have the same password, PIM and keyfiles as Outer volume
    • Fix random crash in 32-bit builds when using Streebog.
    • Enable FIPS mode in JitterEntropy random generator.
    • Update Beginner's Tutorial in documentation to use "MyVolume.hc" instead of "My Volume" for file container name in order to avoid confusion about nature of file nature.
    • Minor code cleanup
  • Windows:

    • Fix wrong results in benchmark of encryption algorithms when RAM encryption is enabled
    • Fix issue when RAM encryption used, AES selected and AES-NI not supported by CPU that caused the free space of newly created volumes not filled with random data even if "quick format" is not selected.
    • Fix UI for blocking TRIM in system encryption not working in MBR boot mode.
    • Support password drag-n-drop from external applications (e.g. KeePass) to password UI fields which is more secure than using clipboard.
    • Implements compatibility with Windows 10 Modern Standby and Windows 8.1 Connected Standby power model. This makes detection of entering power saving mode more reliable.
    • Avoid displaying waiting dialog when /silent specified for "VeraCrypt Format" during creating of file container using /create switch and a filesystem other than FAT.
    • Use native Windows format program to perform formatting of volume since it is more reliable and only fallback to FormatEx function from fmifs.dll in case of issue.
    • Don't use API for Processor Groups support if there is only 1 CPU group in the system. This can fix slowness issue observed on some PCs with AMD CPUs.
    • Don't allow to encrypt the system drive if it is already encrypted by BitLocker.
    • Implement detection of Hibernate and Fast Startup and disable them if RAM encryption is activated.
    • Warn about Fast Startup if it is enabled during VeraCrypt installation/upgrade, when starting system encryption or when creating a volume, and propose to disable it.
    • Add UI options to control the behavior of automatic bootloader fixing when System Encryption used.
    • Don't allow a directory path to be entered for the file container to be created in Format wizard.
    • Don't try to use fix for CVE-2019-19501 if Windows Shell has been modified or is not running since there is no reliable way to fix it in such non standard configuation.
    • MBR bootloader: fix incorrect compressed data size passed to decompressor in boot sector.
    • Add warning message when typed password reaches maximum length during the system encryption wizard.
    • Fix wrong error message when UTF-8 encoding of entered password exceeds the maximum supported length.
    • Fix crash when using portable 32-bit "VeraCrypt Format.exe" to create hidden volume on a 64-bit machine where VeraCrypt is already installed.
    • Update libzip to latest version 1.7.3.
    • Update translations.
  • Linux/MacOSX:

    • Force reading of at least 32 bytes from /dev/random before allowing it to fail gracefully
    • Allow choosing a filesystem other than FAT for Outer volume but display warning about risks of such choice. Implement an estimation of maximum possible size of hidden volume in this case.
    • Erase sensitive memory explicitly instead of relying on the compiler not optimizing calls to method Memory::Erase.
    • Add support for Btrfs filesystem when creating volumes (Linux Only).
    • Update wxWidgets for static builds to version 3.0.5.

Don't miss a new VeraCrypt release

NewReleases is sending notifications on new releases.