http://www.ghacks.net/2015/04/02/truecrypt-audit-phase-ii-completed-4-vulnerabilities-identified
Does these vulnerabilities pose a real threat?
For me, it sounds like only people with a high skills in programming and good knowledge around the TC code could, **possibly**, access a TC volume.