Recent Commits to VeraCrypt:master

  • 14/01/2025 11:52

    Update Release Notes about fixed CVEs

    Update Release Notes about fixed CVEs
  • 14/01/2025 10:59

    Translations: Update translations of newly added fields

    Translations: Update translations of newly added fields
  • 14/01/2025 10:59

    Linux/FreeBSD: Prevent mounting volumes on system directories and PAT…

    Linux/FreeBSD: Prevent mounting volumes on system directories and PATH (CVE-2025-23021, reported by SivertPL @__tfr)
    
    Added security checks to prevent mounting VeraCrypt volumes on system directories (like /usr/bin) or directories in the user's PATH, which could theoretically allow execution of malicious binaries instead of legitimate system binaries.
    
    Key changes:
    - Block mounting on protected system directories (/usr, /bin, /lib, etc.)
      This restriction cannot be overridden
    - Block mounting on directories present in user's PATH environment variable
      This can be overridden with --allow-insecure-mount flag
    - Add visual warnings (red border, "[INSECURE MODE]") when mounting on PATH directories is allowed
    - Handle symlinks properly when checking paths
    - Add new error messages for blocked mount points
    
    To override PATH-based restrictions only (system directories remain protected):
    veracrypt --allow-insecure-mount [options] volume mountpoint
    
    Security Impact: Low to Medium
    The attack requires either:
    - User explicitly choosing a system directory as mount point instead of using VeraCrypt's default mount points
    - Or attacker having both filesystem access to modify favorites configuration AND knowledge of the volume password
    Default mount points are not affected by this vulnerability.
    
    Security: CVE-2025-23021
    Tags:
  • 14/01/2025 10:59

    Linux/FreeBSD: Add absolute paths for system binaries to prevent path…

    Linux/FreeBSD: Add absolute paths for system binaries to prevent path hijacking (CVE-2024-54187, collaboration with SivertPL @__tfr)
    
    This commit fixes a critical security vulnerability where VeraCrypt could be tricked into executing malicious binaries with elevated privileges. The vulnerability has two severe implications:
    
    1. When sudo's secure_path option is disabled, attackers could execute malicious binaries with root privileges by placing them in user-writable PATH directories (e.g., making "sudo mount" execute a malicious mount binary)
    
    2. By placing a malicious sudo binary in PATH, attackers could intercept and steal the user's password when VeraCrypt prompts for sudo authentication
    
    The vulnerability allowed attackers to place malicious binaries in user-writable directories that appear in PATH before system directories, potentially leading to privilege escalation and credential theft.
    
    Key changes:
    - Implement FindSystemBinary() to locate executables in secure system paths
    - Replace all relative binary paths with absolute paths for system commands
    - Add security checks for executable permissions
    - Update process execution to use absolute paths for:
      * sudo
      * mount
      * fsck
      * terminal emulators
      * file managers
      * system utilities (hdiutil, mdconfig, vnconfig, lofiadm)
    
    The fix ensures all system binaries are called using their absolute paths from secure system directories, preventing both privilege escalation through PATH manipulation and password theft through sudo hijacking.
    
    Security: CVE-2024-54187
    Tags:
  • 14/01/2025 8:26

    Increment version to 1.26.18. Update copyright date. Update Release N…

    Increment version to 1.26.18. Update copyright date. Update Release Notes. Update Windows drivers.

Log in