1
0
mirror of https://github.com/veracrypt/VeraCrypt.git synced 2025-11-11 02:58:02 -06:00
Commit Graph

2641 Commits

Author SHA1 Message Date
Mounir IDRASSI
865ee6c429 Github workflows: Fix issue running XML validation workflow by using fixed version of fast-xml-parser 4.5.2
latest version 5.x of fast-xml-parser causes described in https://github.com/veracrypt/VeraCrypt/pull/1497#issuecomment-2671395468
2025-02-20 16:05:39 +01:00
Mounir IDRASSI
fc7037b670 Linux/macOS: use absolute path of 'true' command when checking if sudo session is active. 2025-02-19 10:29:27 +01:00
Thomas De Rocker
8574033ded Update Language.nl.xml (#1502) 2025-02-18 15:06:50 +01:00
白庭
33d1de0d31 Fix SetupDLL and ExpandVolume Error (#1495)
* Fix SetupDLL [ReleaseCustomEFI] Building Error

* Fix Lib Problem
2025-02-15 11:59:43 +01:00
Jertzukka
98fa395f29 CI: Enable XML Validation Workflow (#1497) 2025-02-15 11:40:27 +01:00
Mounir IDRASSI
974a3909ec Windows: remove dependency towards Mount/Format when building setup to fix Win32 build issue (#1487)
MainCom_i.c and FormatCom_i.c are needed only for mount/format type libraries GUIDs. Since they don't change, we just define them directly.
2025-02-08 12:00:05 +01:00
Mounir IDRASSI
a2f11e1102 Windows: Fix link error in 32-bit build by removing crypto.lib reference and implementing sha512 using BCrypt API. 2025-02-08 01:17:55 +01:00
bugtracker2019
effabb4c53 Update Language.de.xml (#1489)
Fixed wrong line breaks.
2025-02-07 13:53:20 +01:00
Mounir IDRASSI
42b716f847 Rename "Dismount All" to "Unmount All" in UI. Use ALT+u as new accelerator key instead of ALT+s 2025-02-05 21:30:33 +01:00
Mounir IDRASSI
c3d7c9e45a Windows: Update version to 1.26.20 in MSI project and packaging bat files. VeraCrypt_1.26.20 2025-02-04 13:25:10 +01:00
Mounir IDRASSI
c9387caa03 Update Release Notes. Update Windows signed drivers. Update MBR bootloader. 2025-02-04 01:20:08 +01:00
Mounir IDRASSI
2180020cee Windows driver: Fix regression that always allowed defragmentation and caused other side effects
Now we properly honor the AllowDefrag configuration.

This regression introduced other issues because, in order to allow defragmentation, we must provide Windows with an actual physical disk number. As a result, we assign the number of the physical disk where the VeraCrypt volume resides. This, in turn, causes Windows to send IOCTLs directly to this disk instead of to VeraCrypt. If these IOCTLs return values and properties not supported by VeraCrypt, inconsistencies arise, leading to failures.
2025-02-04 00:02:08 +01:00
Mounir IDRASSI
e73ea7193e Widnows driver: use correct value for HiddenSectors field in structures to match read MBR disks 2025-02-03 23:48:51 +01:00
Mounir IDRASSI
6cd32af1c1 macOS: correct error message in FUSE-T pkg installer to remove mention of OSXFuse. 2025-02-03 18:59:15 +01:00
Mounir IDRASSI
55563ffe42 Increment version to 1.26.20. Update Release Notes. 2025-02-03 17:52:19 +01:00
Mounir IDRASSI
c69ba240c4 Complete replacement of Dismount references by Unmount in various files 2025-02-02 23:37:36 +01:00
Yeung, Tim Ming
bdbd95a51b Update Language.zh-hk.xml (#1408)
- matching the phases used in Chinese Traditional Windows
- resolved conflicts introduced in 498dff9013
- minor formatting correction
- translated new entries staring from line 1459
2025-02-02 15:18:33 +01:00
Mounir IDRASSI
04e7d8c5ee Windows: Revert use PDH API to gather system entropy because of issues encountered by users
cf thread: https://sourceforge.net/p/veracrypt/discussion/general/thread/293d401a30

delays and sporadic crashes in some cases.
2025-02-02 13:51:33 +01:00
Helmut K. C. Tessarek
498dff9013 refactor: use the term unmount instead of dismount (#1478)
* refactor: use UNMOUNT instead of DISMOUNT in code

This change updates the term DISMOUNT in constants to UNMOUNT.
Other occurrences (e.g. variable names) are left alone for now.

* refactor(ui): use unmount instead of dismount

This change updates the GUI text and replaces dismount with unmount.

* docs: update term dismount -> unmount

* refactor(cmdline): add unmount

This change adds an argument 'unmount' for command line usage, while
trying to deprecate the old disnount argument.
The current dismount argument/flag will still work to not introduce
a breaking change.

* docs: mention that /dismount is deprecated

This change fixes the shorthand version of the argument /unmount
It also adds back the info for /dismount and that it is deprecated.
2025-01-31 23:18:26 +01:00
Xeonacid
c71fa14dc0 Enable AESNI only on x86 (#1479)
This helps building on riscv which does not have immintrin.h.
2025-01-30 09:53:19 +01:00
p0k3m0n
5ceec41eb3 Update Language.pl.xml (#1471)
Improved formatting.
2025-01-26 21:25:19 +01:00
Mounir IDRASSI
247c98d954 Implement SHA256 acceleration on ARM64 platforms using CPU instructions 2025-01-26 16:21:13 +01:00
Mounir IDRASSI
5ff256a53d Linux: simpler and more robust approach to detect active sudo session (#1473) 2025-01-25 01:04:47 +01:00
Mounir IDRASSI
e34411b5db Translation: Update Russian translation of Release Notes (by Dmitry Yerokhin) 2025-01-25 01:02:46 +01:00
Mounir IDRASSI
ad3e98af74 Fix Github action failure by moving upload-artifact to v4 2025-01-23 17:29:09 +01:00
Mounir IDRASSI
eeebbf74f9 macOS: fix wxWidgets 3.2.6 assert for undefined switch use-dummy-sudo-password (GH #1470) 2025-01-23 17:18:57 +01:00
Mounir IDRASSI
16aa1a7be0 Increment version to 1.26.19. Update Release Notes. VeraCrypt_1.26.19 2025-01-22 18:37:46 +01:00
Mounir IDRASSI
1ebe3546a6 Update copyright date to 2025 2025-01-22 17:52:45 +01:00
Mounir IDRASSI
b42841ed3c macOS: Fix regression in dismount caused by wrong umount path (#1467) 2025-01-22 17:48:51 +01:00
Mounir IDRASSI
05ea7c120a macOS: Fix packaging error due to template dmg being too small.
To fix it, we resized the template dmg using hdiutil resize --size 16M
VeraCrypt_1.26.18
2025-01-20 13:51:31 +01:00
Mounir IDRASSI
c17270fc53 MacOSX: Fix erroneous preprocessor directive 2025-01-20 13:49:31 +01:00
Mounir IDRASSI
b187afb4c8 Update release notes and release date. 2025-01-19 14:06:36 +01:00
Mounir IDRASSI
c1d9219f72 Translations: Update French translation 2025-01-19 13:54:58 +01:00
Mounir IDRASSI
ef214a511a Updated translation: pt-br. 2025-01-19 11:11:51 +01:00
Mounir IDRASSI
cca323964e Linux: Add missing header in ARM64 build. Add .oarmv8crypto to .gitignore 2025-01-18 16:37:26 +01:00
Mounir IDRASSI
ff63e5aad0 Update Release Notes. Set version to 1.26.18. Update signed Windows drivers. 2025-01-17 07:44:09 +01:00
Mounir IDRASSI
54bd819990 Windows/Linux/macOS: implement AES hardware support on ARM64 (ARMv8) 2025-01-17 00:58:54 +01:00
Mounir IDRASSI
c79f8102e0 Update Release Notes about fixed CVEs 2025-01-14 15:52:03 +01:00
Mounir IDRASSI
1c38446d78 Translations: Update translations of newly added fields 2025-01-14 14:59:45 +01:00
Mounir IDRASSI
078d1410dd Linux/FreeBSD: Prevent mounting volumes on system directories and PATH (CVE-2025-23021, reported by SivertPL @__tfr)
Added security checks to prevent mounting VeraCrypt volumes on system directories (like /usr/bin) or directories in the user's PATH, which could theoretically allow execution of malicious binaries instead of legitimate system binaries.

Key changes:
- Block mounting on protected system directories (/usr, /bin, /lib, etc.)
  This restriction cannot be overridden
- Block mounting on directories present in user's PATH environment variable
  This can be overridden with --allow-insecure-mount flag
- Add visual warnings (red border, "[INSECURE MODE]") when mounting on PATH directories is allowed
- Handle symlinks properly when checking paths
- Add new error messages for blocked mount points

To override PATH-based restrictions only (system directories remain protected):
veracrypt --allow-insecure-mount [options] volume mountpoint

Security Impact: Low to Medium
The attack requires either:
- User explicitly choosing a system directory as mount point instead of using VeraCrypt's default mount points
- Or attacker having both filesystem access to modify favorites configuration AND knowledge of the volume password
Default mount points are not affected by this vulnerability.

Security: CVE-2025-23021
2025-01-14 14:59:45 +01:00
Mounir IDRASSI
2cca2e1daf Linux/FreeBSD: Add absolute paths for system binaries to prevent path hijacking (CVE-2024-54187, collaboration with SivertPL @__tfr)
This commit fixes a critical security vulnerability where VeraCrypt could be tricked into executing malicious binaries with elevated privileges. The vulnerability has two severe implications:

1. When sudo's secure_path option is disabled, attackers could execute malicious binaries with root privileges by placing them in user-writable PATH directories (e.g., making "sudo mount" execute a malicious mount binary)

2. By placing a malicious sudo binary in PATH, attackers could intercept and steal the user's password when VeraCrypt prompts for sudo authentication

The vulnerability allowed attackers to place malicious binaries in user-writable directories that appear in PATH before system directories, potentially leading to privilege escalation and credential theft.

Key changes:
- Implement FindSystemBinary() to locate executables in secure system paths
- Replace all relative binary paths with absolute paths for system commands
- Add security checks for executable permissions
- Update process execution to use absolute paths for:
  * sudo
  * mount
  * fsck
  * terminal emulators
  * file managers
  * system utilities (hdiutil, mdconfig, vnconfig, lofiadm)

The fix ensures all system binaries are called using their absolute paths from secure system directories, preventing both privilege escalation through PATH manipulation and password theft through sudo hijacking.

Security: CVE-2024-54187
2025-01-14 14:59:40 +01:00
Mounir IDRASSI
1b35abb191 Increment version to 1.26.18. Update copyright date. Update Release Notes. Update Windows drivers. 2025-01-14 12:26:28 +01:00
Mounir IDRASSI
2aae142a2d Windows: Fix regression in Traveler Disk creation (#886)
Issue was caused by the fact that Microsoft signing certificate for driver file has changed.
We fix it by updating the SHA512 fingerprint of Microsoft code signing certificate.
2025-01-13 01:02:12 +01:00
Mounir IDRASSI
cc2f177c5c Linux Debian/Ubuntu: use a distro-specific version string to avoid APT repository conflicts
In a Debian-style APT repository, the pool/ directory groups packages primarily by source package name and binary package name, version, architecture, etc. If two distinct .deb files have identical name and version (as seen in their control file) and same architecture, reprepro will report a conflict when adding one after the other.

So, we need to append distro-specific string to the existing version in order to avoid such conflict when creating VeraCrypt APT repository.
2025-01-11 16:23:11 +01:00
Mounir IDRASSI
e8e0be2ad5 Update donation HTML page to use new PayPal donation links
We add javascript code to the page to handle dynamic selection of donation currency
2025-01-06 11:50:20 +01:00
Mounir IDRASSI
a8c904813b Windows: Add missing file entry to Zip project after libzip update 2025-01-06 11:46:53 +01:00
Mounir IDRASSI
138e5e7c1d Windows: Update libzip to version 1.11.2 2025-01-01 10:37:56 +01:00
Mounir IDRASSI
fcc6302e61 Windows: Update LZMA SDK to version 24.09 2025-01-01 10:37:18 +01:00
Mounir IDRASSI
4e85009f57 Windows: use modern API to gather system entropy for random generation instead of obsolete that were not working
This commit increases randomness quality by using more dynamic/varied sources of entropy.
PDH-based disk and network statistics collection in now added to random pool

- Introduced `GetDiskStatistics` to gather disk read/write performance data using PDH API.
- Introduced `GetNetworkStatistics` to gather network send/receive performance data using PDH API.
- Integrated high-resolution timestamps and random intervals to improve entropy in collected data.
- Updated `SlowPoll` function to utilize PDH-based disk and network statistics.
- Removed obsolete NetAPI32-based network statistics collection.
2024-12-27 00:56:50 +01:00
Mounir IDRASSI
f3af65b007 Windows driver: Use IO_DISK_INCREMENT for event signaling in IRP completion routine
This provides a slight priority boost for waiting threads and maintains standard practice for disk device drivers.
2024-12-25 17:58:12 +01:00