<?xml version="1.0" encoding="utf-8"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="zh_TW">
    <title type="text">Bitcoin Core</title>
    <link rel="self" type="application/atom+xml" href="https://btc-zhtw-review.achow101.com/zh_TW/feed.xml" />
    <link rel="alternate" type="text/html" href="https://btc-zhtw-review.achow101.com" />
    
    
    
    <updated>2026-04-22T14:58:05+00:00</updated>
    <id></id>
    <author>
        <name>Bitcoin Core</name>
        <uri>https://btc-zhtw-review.achow101.com</uri>
    </author>
    
    
    <entry>
        <title type="html"><![CDATA[CVE-2024-52911 - Script Interpreter Remote Crash]]></title>
        <link rel="alternate" type="text/html" href="https://btc-zhtw-review.achow101.com/en/2026/05/05/disclose-cve-2024-52911/" />
        <id>/en/2026/05/05/disclose-cve-2024-52911</id>
        <published>2026-05-05T00:00:00+00:00</published>
        <updated>2026-05-05T00:00:00+00:00</updated>
        <author>
            <name>Bitcoin Core</name>
            <uri>https://btc-zhtw-review.achow101.com/en/2026/05/05/disclose-cve-2024-52911/</uri>
            
        </author>
        <content type="html">
            &lt;p&gt;After Bitcoin Core 0.14.0 and before Bitcoin Core 29.0, validating a specially-crafted block may
cause the node to access previously freed memory.&lt;/p&gt;

&lt;p&gt;During validation, necessary data required for checking inputs for each transaction is
pre-calculated and cached. For specially crafted invalid blocks, it was possible for this data to be
destroyed while it was still being accessed by a background validation thread. An attacker capable
of mining a block with sufficient proof-of-work could have exploited this to crash victim nodes.
Because of the nature of use-after-free bugs, it is possible that the crash could have been used for
remote code execution, though constraints on the input (block) data make this unlikely.&lt;/p&gt;

&lt;p&gt;This issue is considered &lt;strong&gt;High&lt;/strong&gt; severity.&lt;/p&gt;

&lt;h2 id=&quot;details&quot;&gt;Details&lt;/h2&gt;

&lt;p&gt;By default, script validation for new blocks is dispatched to background threads via a vector of
&lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;CScriptCheck&lt;/code&gt; functors. Each CScriptCheck holds a pointer to a &lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;PrecomputedTransactionData&lt;/code&gt; object
which stores some data needed by each input in the transaction. Because it stores a pointer and not
the data itself, care must be taken to ensure that the &lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;PrecomputedTransactionData&lt;/code&gt; outlives the
&lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;CScriptCheck&lt;/code&gt;.&lt;/p&gt;

&lt;p&gt;The script checks lifetime is enforced by an RAII class, &lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;CCheckQueueControl&lt;/code&gt;. However, the control
is intantiated before the precomputed transaction data. Because local objects in C++ are
&lt;a href=&quot;https://isocpp.org/wiki/faq/dtors#order-dtors-for-locals&quot;&gt;destructed in reverse order of construction&lt;/a&gt;,
this means the vector of &lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;PrecomputedTransactionData&lt;/code&gt; is destroyed &lt;em&gt;before&lt;/em&gt; the
&lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;CCheckQueueControl&lt;/code&gt;.&lt;/p&gt;

&lt;p&gt;This is not an issue when the block is valid, as &lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;CCheckQueueControl::Wait()&lt;/code&gt; will be called before
the function returns and the &lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;PrecomputedTransactionData&lt;/code&gt; gets destroyed. However, in case of an
early return (when a separate check fails) a background script thread may read the precomputed
transaction data after it was destroyed. An attacker could exploit this to crash victim nodes at the
expense of a valid PoW at tip.&lt;/p&gt;

&lt;h2 id=&quot;attribution&quot;&gt;Attribution&lt;/h2&gt;

&lt;p&gt;Cory Fields (MIT DCI) discovered this vulnerability and responsibly disclosed it in a detailed
report containing a proof of concept for reproduction and a proposed mitigation.&lt;/p&gt;

&lt;h2 id=&quot;timeline&quot;&gt;Timeline&lt;/h2&gt;

&lt;ul&gt;
  &lt;li&gt;2024-11-02 Cory Fields privately reports the bug&lt;/li&gt;
  &lt;li&gt;2024-11-06 Pieter Wuille pushes a covert fix to already open &lt;a href=&quot;https://github.com/bitcoin/bitcoin/pull/31112&quot;&gt;PR
#31112&lt;/a&gt; which works around the issue by removing
the early returns&lt;/li&gt;
  &lt;li&gt;2024-12-03 PR #31112 is merged&lt;/li&gt;
  &lt;li&gt;2025-04-12 Bitcoin Core version 29.0 is released with a fix&lt;/li&gt;
  &lt;li&gt;2026-04-19 The last vulnerable Bitcoin Core version (28.x) goes end of life&lt;/li&gt;
  &lt;li&gt;2026-05-05 Public disclosure.&lt;/li&gt;
&lt;/ul&gt;


            &lt;p&gt;&lt;a href=&quot;https://btc-zhtw-review.achow101.com/en/2026/05/05/disclose-cve-2024-52911/&quot;&gt;CVE-2024-52911 - Script Interpreter Remote Crash&lt;/a&gt; was originally published by Bitcoin Core at &lt;a href=&quot;https://btc-zhtw-review.achow101.com&quot;&gt;Bitcoin Core&lt;/a&gt; on May 05, 2026.&lt;/p&gt;
        </content>
    </entry>
    
    
    <entry>
        <title type="html"><![CDATA[CVE-2025-46597 - Highly unlikely remote crash on 32-bit systems]]></title>
        <link rel="alternate" type="text/html" href="https://btc-zhtw-review.achow101.com/en/2025/10/24/disclose-cve-2025-46597/" />
        <id>/en/2025/10/24/disclose-cve-2025-46597</id>
        <published>2025-10-24T00:00:00+00:00</published>
        <updated>2025-10-24T00:00:00+00:00</updated>
        <author>
            <name>Bitcoin Core</name>
            <uri>https://btc-zhtw-review.achow101.com/en/2025/10/24/disclose-cve-2025-46597/</uri>
            
        </author>
        <content type="html">
            &lt;p&gt;Disclosure of the details of a bug on 32-bit systems which may, in a rare edge case, cause the node
to crash when receiving a pathological block. This bug would be extremely hard to exploit. A fix was
released on October 10th 2025 in Bitcoin Core v30.0.&lt;/p&gt;

&lt;p&gt;This issue is considered &lt;strong&gt;Low&lt;/strong&gt; severity.&lt;/p&gt;

&lt;h2 id=&quot;details&quot;&gt;Details&lt;/h2&gt;

&lt;p&gt;Before writing a block to disk, Bitcoin Core checks that its size is within a normal range. This
check would overflow on 32-bit systems for blocks over 1GB, and make the node crash when writing it
to disk. Such a block cannot be sent using the &lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;BLOCK&lt;/code&gt; message, but could in theory be sent as a
compact block if the victim node has a non-default large mempool which already contains 1GB of
transactions. This would require the victim to have set their &lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;-maxmempool&lt;/code&gt; option to a value
greater than 3GB, while 32-bit systems may have at most 4GiB of memory.&lt;/p&gt;

&lt;p&gt;This issue was indirectly prevented by capping the maximum value of the &lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;-maxmempool&lt;/code&gt; setting on
32-bit systems.&lt;/p&gt;

&lt;h2 id=&quot;attribution&quot;&gt;Attribution&lt;/h2&gt;

&lt;p&gt;Pieter Wuille discovered this bug and disclosed it responsibly.&lt;/p&gt;

&lt;p&gt;Antoine Poinsot proposed and implemented a covert mitigation.&lt;/p&gt;

&lt;h2 id=&quot;timeline&quot;&gt;Timeline&lt;/h2&gt;

&lt;ul&gt;
  &lt;li&gt;2025-04-24 - Pieter Wuille reports the issue&lt;/li&gt;
  &lt;li&gt;2025-05-16 - Antoine Poinsot opens PR &lt;a href=&quot;https://github.com/bitcoin/bitcoin/pull/32530&quot;&gt;#32530&lt;/a&gt; with
a covert fix&lt;/li&gt;
  &lt;li&gt;2025-06-26 - PR #32530 is merged into master&lt;/li&gt;
  &lt;li&gt;2025-09-04 - Version 29.1 is released with the fix&lt;/li&gt;
  &lt;li&gt;2025-10-10 - Version 30.0 is released with the fix&lt;/li&gt;
  &lt;li&gt;2025-10-24 - Public Disclosure&lt;/li&gt;
&lt;/ul&gt;


            &lt;p&gt;&lt;a href=&quot;https://btc-zhtw-review.achow101.com/en/2025/10/24/disclose-cve-2025-46597/&quot;&gt;CVE-2025-46597 - Highly unlikely remote crash on 32-bit systems&lt;/a&gt; was originally published by Bitcoin Core at &lt;a href=&quot;https://btc-zhtw-review.achow101.com&quot;&gt;Bitcoin Core&lt;/a&gt; on October 24, 2025.&lt;/p&gt;
        </content>
    </entry>
    
    
    <entry>
        <title type="html"><![CDATA[CVE-2025-46598 - CPU DoS from unconfirmed transaction processing]]></title>
        <link rel="alternate" type="text/html" href="https://btc-zhtw-review.achow101.com/en/2025/10/24/disclose-cve-2025-46598/" />
        <id>/en/2025/10/24/disclose-cve-2025-46598</id>
        <published>2025-10-24T00:00:00+00:00</published>
        <updated>2025-10-24T00:00:00+00:00</updated>
        <author>
            <name>Bitcoin Core</name>
            <uri>https://btc-zhtw-review.achow101.com/en/2025/10/24/disclose-cve-2025-46598/</uri>
            
        </author>
        <content type="html">
            &lt;p&gt;Disclosure of the details of a resource exhaustion issue when processing an unconfirmed transaction.
A fix was released on October 10th 2025 in Bitcoin Core v30.0.&lt;/p&gt;

&lt;p&gt;This issue is considered &lt;strong&gt;Low&lt;/strong&gt; severity.&lt;/p&gt;

&lt;h2 id=&quot;details&quot;&gt;Details&lt;/h2&gt;

&lt;p&gt;An attacker could send specially-crafted unconfirmed transactions that would take a victim node a
few seconds each to validate. The non-standard transactions would be rejected but not lead to a
disconnection and the process could be repeated. This could be exploited to delay block propagation.&lt;/p&gt;

&lt;p&gt;The issue was mitigated in multiple steps by reducing the validation time in different Script
contexts.&lt;/p&gt;

&lt;h2 id=&quot;attribution&quot;&gt;Attribution&lt;/h2&gt;

&lt;p&gt;Antoine Poinsot reported this issue to the Bitcoin Core security mailing list.&lt;/p&gt;

&lt;p&gt;Pieter Wuille, Anthony Towns and Antoine Poinsot implemented mitigations to reduce the worst case
validation time of unconfirmed transactions.&lt;/p&gt;

&lt;h2 id=&quot;timeline&quot;&gt;Timeline&lt;/h2&gt;

&lt;ul&gt;
  &lt;li&gt;2025-04-25 - Antoine Poinsot reports the issue&lt;/li&gt;
  &lt;li&gt;2025-05-12 - Pieter Wuille opens PR &lt;a href=&quot;https://github.com/bitcoin/bitcoin/pull/32473&quot;&gt;#32473&lt;/a&gt; to
mitigate the worst case quadratic signature hashing in legacy Script context&lt;/li&gt;
  &lt;li&gt;2025-07-24 - Anthony Towns opens PR &lt;a href=&quot;https://github.com/bitcoin/bitcoin/pull/33050&quot;&gt;#33050&lt;/a&gt; to
mitigate the worst case hashing in Tapscript context&lt;/li&gt;
  &lt;li&gt;2025-07-30 - Antoine Poinsot opens PR &lt;a href=&quot;https://github.com/bitcoin/bitcoin/pull/33105&quot;&gt;#33105&lt;/a&gt; to
further mitigate the worst case in legacy Script context&lt;/li&gt;
  &lt;li&gt;2025-08-08 - PR #33105 is merged into master&lt;/li&gt;
  &lt;li&gt;2025-08-11 - PR #32473 is merged into master&lt;/li&gt;
  &lt;li&gt;2025-08-12 - PR #33050 is merged into master&lt;/li&gt;
  &lt;li&gt;2025-10-10 - Version 30.0 is released with the mitigations&lt;/li&gt;
  &lt;li&gt;2025-10-24 - Public Disclosure&lt;/li&gt;
&lt;/ul&gt;


            &lt;p&gt;&lt;a href=&quot;https://btc-zhtw-review.achow101.com/en/2025/10/24/disclose-cve-2025-46598/&quot;&gt;CVE-2025-46598 - CPU DoS from unconfirmed transaction processing&lt;/a&gt; was originally published by Bitcoin Core at &lt;a href=&quot;https://btc-zhtw-review.achow101.com&quot;&gt;Bitcoin Core&lt;/a&gt; on October 24, 2025.&lt;/p&gt;
        </content>
    </entry>
    
    
    <entry>
        <title type="html"><![CDATA[CVE-2025-54604 - Disk filling from spoofed self connections]]></title>
        <link rel="alternate" type="text/html" href="https://btc-zhtw-review.achow101.com/en/2025/10/24/disclose-cve-2025-54604/" />
        <id>/en/2025/10/24/disclose-cve-2025-54604</id>
        <published>2025-10-24T00:00:00+00:00</published>
        <updated>2025-10-24T00:00:00+00:00</updated>
        <author>
            <name>Bitcoin Core</name>
            <uri>https://btc-zhtw-review.achow101.com/en/2025/10/24/disclose-cve-2025-54604/</uri>
            
        </author>
        <content type="html">
            &lt;p&gt;Disclosure of the details of a log-filling bug which allowed an attacker to fill up the disk space
of a victim node by faking self-connections. Exploitability of this bug is limited, and it would
take a long time before it would cause the victim to run out of disk space.  A fix was released on
October 10th 2025 in Bitcoin Core v30.0.&lt;/p&gt;

&lt;p&gt;This issue is considered &lt;strong&gt;Low&lt;/strong&gt; severity.&lt;/p&gt;

&lt;h2 id=&quot;details&quot;&gt;Details&lt;/h2&gt;

&lt;p&gt;Bitcoin Core would unconditionally log in case of self-connection. This could be exploited by an
attacker by waiting for a victim to connect to it and reusing the version message nonce to establish
many connections to the victim, causing it to detect those attempts as self-connections. However,
exploitability is limited because the initial connection from the victim will timeout after 60
seconds by default.&lt;/p&gt;

&lt;p&gt;This issue was fixed by implementing log rate-limiting across the board, also preventing future
issues of the same type from happening.&lt;/p&gt;

&lt;h2 id=&quot;attribution&quot;&gt;Attribution&lt;/h2&gt;

&lt;p&gt;Niklas Goegge discovered this bug and disclosed it responsibly.&lt;/p&gt;

&lt;p&gt;Eugene Siegel and Niklas Goegge worked on a fix mitigating all types of log-filling attacks.&lt;/p&gt;

&lt;p&gt;Credits also to contributor “practicalswift” who previously raised concerns
about disk-filling vectors in Bitcoin Core and worked to address them.&lt;/p&gt;

&lt;h2 id=&quot;timeline&quot;&gt;Timeline&lt;/h2&gt;

&lt;ul&gt;
  &lt;li&gt;2022-03-16 - Niklas Goegge reports this issue to the Bitcoin Core security mailing list&lt;/li&gt;
  &lt;li&gt;2025-05-23 - Eugene Siegel opens PR &lt;a href=&quot;https://github.com/bitcoin/bitcoin/pull/32604&quot;&gt;#32604&lt;/a&gt; to
introduce log rate-limiting, based on earlier work from Niklas Goegge&lt;/li&gt;
  &lt;li&gt;2025-07-09 - PR #32604 is merged into master&lt;/li&gt;
  &lt;li&gt;2025-09-04 - Version 29.1 is released with the fix&lt;/li&gt;
  &lt;li&gt;2025-10-10 - Version 30.0 is released with the fix&lt;/li&gt;
  &lt;li&gt;2025-10-24 - Public Disclosure&lt;/li&gt;
&lt;/ul&gt;


            &lt;p&gt;&lt;a href=&quot;https://btc-zhtw-review.achow101.com/en/2025/10/24/disclose-cve-2025-54604/&quot;&gt;CVE-2025-54604 - Disk filling from spoofed self connections&lt;/a&gt; was originally published by Bitcoin Core at &lt;a href=&quot;https://btc-zhtw-review.achow101.com&quot;&gt;Bitcoin Core&lt;/a&gt; on October 24, 2025.&lt;/p&gt;
        </content>
    </entry>
    
    
    <entry>
        <title type="html"><![CDATA[CVE-2025-54605 - Disk filling from invalid blocks]]></title>
        <link rel="alternate" type="text/html" href="https://btc-zhtw-review.achow101.com/en/2025/10/24/disclose-cve-2025-54605/" />
        <id>/en/2025/10/24/disclose-cve-2025-54605</id>
        <published>2025-10-24T00:00:00+00:00</published>
        <updated>2025-10-24T00:00:00+00:00</updated>
        <author>
            <name>Bitcoin Core</name>
            <uri>https://btc-zhtw-review.achow101.com/en/2025/10/24/disclose-cve-2025-54605/</uri>
            
        </author>
        <content type="html">
            &lt;p&gt;Disclosure of the details of a log-filling bug which allowed an attacker to cause a victim node to
fill up its disk space by repeatedly sending invalid blocks. Exploitability of this bug is limited,
as it would take a long time before it would cause the victim to run out of disk space. A fix was
released on October 10th 2025 in Bitcoin Core v30.0.&lt;/p&gt;

&lt;p&gt;This issue is considered &lt;strong&gt;Low&lt;/strong&gt; severity.&lt;/p&gt;

&lt;h2 id=&quot;details&quot;&gt;Details&lt;/h2&gt;

&lt;p&gt;A node would unconditionally log when receiving a block that fails basic sanity checks, or when
receiving a block that branches off prior to the last checkpoint. By repeatedly sending such an
invalid block to a victim node, an attacker could cause the victim to run out of disk space.&lt;/p&gt;

&lt;p&gt;This issue was fixed by implementing log rate-limiting across the board, also preventing future
issues of the same type from happening.&lt;/p&gt;

&lt;h2 id=&quot;attribution&quot;&gt;Attribution&lt;/h2&gt;

&lt;p&gt;Niklas Goegge discovered this bug and disclosed it responsibly. Eugene Siegel independently
re-discovered this bug and disclosed it responsibly.&lt;/p&gt;

&lt;p&gt;Eugene Siegel and Niklas Goegge worked on a fix mitigating all types of log-filling attacks.&lt;/p&gt;

&lt;p&gt;Credits also to contributor “practicalswift” who previously raised concerns
about disk-filling vectors in Bitcoin Core and worked to address them.&lt;/p&gt;

&lt;h2 id=&quot;timeline&quot;&gt;Timeline&lt;/h2&gt;

&lt;ul&gt;
  &lt;li&gt;2022-05-16 - Niklas Goegge reports this issue to the Bitcoin Core security mailing list&lt;/li&gt;
  &lt;li&gt;2025-03-13 - Eugene Siegel reports this issue to the Bitcoin Core security mailing list&lt;/li&gt;
  &lt;li&gt;2025-04-24 - Eugene Siegel reports to the security mailing list about his research on the worst
case disk filling rate.&lt;/li&gt;
  &lt;li&gt;2025-05-23 - Eugene Siegel opens PR &lt;a href=&quot;https://github.com/bitcoin/bitcoin/pull/32604&quot;&gt;#32604&lt;/a&gt; to
introduce log rate-limiting, based on earlier work from Niklas Goegge&lt;/li&gt;
  &lt;li&gt;2025-07-09 - PR #32604 is merged into master&lt;/li&gt;
  &lt;li&gt;2025-09-04 - Version 29.1 is released with the fix&lt;/li&gt;
  &lt;li&gt;2025-10-10 - Version 30.0 is released with the fix&lt;/li&gt;
  &lt;li&gt;2025-10-24 - Public Disclosure&lt;/li&gt;
&lt;/ul&gt;


            &lt;p&gt;&lt;a href=&quot;https://btc-zhtw-review.achow101.com/en/2025/10/24/disclose-cve-2025-54605/&quot;&gt;CVE-2025-54605 - Disk filling from invalid blocks&lt;/a&gt; was originally published by Bitcoin Core at &lt;a href=&quot;https://btc-zhtw-review.achow101.com&quot;&gt;Bitcoin Core&lt;/a&gt; on October 24, 2025.&lt;/p&gt;
        </content>
    </entry>
    
    
    <entry>
        <title type="html"><![CDATA[Bitcoin Core 28.3 版本發布]]></title>
        <link rel="alternate" type="text/html" href="https://btc-zhtw-review.achow101.com/zh_TW/2025/10/17/release-28.3/" />
        <id>/zh_TW/2025/10/17/release-28.3</id>
        <published>2025-10-17T00:00:00+00:00</published>
        <updated>2025-10-17T00:00:00+00:00</updated>
        <author>
            <name>Bitcoin Core</name>
            <uri>https://btc-zhtw-review.achow101.com/zh_TW/2025/10/17/release-28.3/</uri>
            
        </author>
        <content type="html">
            &lt;p&gt;Bitcoin Core 28.3 版本現已可供&lt;a href=&quot;/zh_TW/download&quot;&gt;下載&lt;/a&gt;。請參閱&lt;a href=&quot;/zh_TW/releases/28.3/&quot;&gt;版本說明&lt;/a&gt;以了解此版本的錯誤修復詳情。&lt;/p&gt;

&lt;p&gt;如有任何問題，請前往 #bitcoin IRC 聊天室（&lt;a href=&quot;irc://irc.libera.chat/bitcoin&quot;&gt;IRC&lt;/a&gt;、&lt;a href=&quot;https://web.libera.chat/#bitcoin&quot;&gt;網頁版&lt;/a&gt;），我們會盡力為您提供協助。&lt;/p&gt;


            &lt;p&gt;&lt;a href=&quot;https://btc-zhtw-review.achow101.com/zh_TW/2025/10/17/release-28.3/&quot;&gt;Bitcoin Core 28.3 版本發布&lt;/a&gt; was originally published by Bitcoin Core at &lt;a href=&quot;https://btc-zhtw-review.achow101.com&quot;&gt;Bitcoin Core&lt;/a&gt; on October 17, 2025.&lt;/p&gt;
        </content>
    </entry>
    
    
    <entry>
        <title type="html"><![CDATA[Bitcoin Core 29.2 版本發布]]></title>
        <link rel="alternate" type="text/html" href="https://btc-zhtw-review.achow101.com/zh_TW/2025/10/14/release-29.2/" />
        <id>/zh_TW/2025/10/14/release-29.2</id>
        <published>2025-10-14T00:00:00+00:00</published>
        <updated>2025-10-14T00:00:00+00:00</updated>
        <author>
            <name>Bitcoin Core</name>
            <uri>https://btc-zhtw-review.achow101.com/zh_TW/2025/10/14/release-29.2/</uri>
            
        </author>
        <content type="html">
            &lt;p&gt;Bitcoin Core 29.2 版本現已可供&lt;a href=&quot;/zh_TW/download&quot;&gt;下載&lt;/a&gt;。請參閱&lt;a href=&quot;/zh_TW/releases/29.2/&quot;&gt;版本說明&lt;/a&gt;以了解此版本的錯誤修復詳情。&lt;/p&gt;

&lt;p&gt;如有任何問題，請前往 #bitcoin IRC 聊天室（&lt;a href=&quot;irc://irc.libera.chat/bitcoin&quot;&gt;IRC&lt;/a&gt;、&lt;a href=&quot;https://web.libera.chat/#bitcoin&quot;&gt;網頁版&lt;/a&gt;），我們會盡力為您提供協助。&lt;/p&gt;


            &lt;p&gt;&lt;a href=&quot;https://btc-zhtw-review.achow101.com/zh_TW/2025/10/14/release-29.2/&quot;&gt;Bitcoin Core 29.2 版本發布&lt;/a&gt; was originally published by Bitcoin Core at &lt;a href=&quot;https://btc-zhtw-review.achow101.com&quot;&gt;Bitcoin Core&lt;/a&gt; on October 14, 2025.&lt;/p&gt;
        </content>
    </entry>
    
    
    <entry>
        <title type="html"><![CDATA[Bitcoin Core 30.0 版本發布]]></title>
        <link rel="alternate" type="text/html" href="https://btc-zhtw-review.achow101.com/zh_TW/2025/10/10/release-30.0/" />
        <id>/zh_TW/2025/10/10/release-30.0</id>
        <published>2025-10-10T00:00:00+00:00</published>
        <updated>2025-10-10T00:00:00+00:00</updated>
        <author>
            <name>Bitcoin Core</name>
            <uri>https://btc-zhtw-review.achow101.com/zh_TW/2025/10/10/release-30.0/</uri>
            
        </author>
        <content type="html">
            &lt;p&gt;Bitcoin Core 30.0 版本現已可供&lt;a href=&quot;/zh_TW/download&quot;&gt;下載&lt;/a&gt;。請參閱&lt;a href=&quot;/zh_TW/releases/30.0/&quot;&gt;版本說明&lt;/a&gt;以了解此版本中的新功能和其他變更。&lt;/p&gt;

&lt;p&gt;如有任何問題，請前往 #bitcoin IRC 聊天室（&lt;a href=&quot;irc://irc.libera.chat/bitcoin&quot;&gt;IRC&lt;/a&gt;、&lt;a href=&quot;https://web.libera.chat/#bitcoin&quot;&gt;網頁版&lt;/a&gt;），我們會盡力為您提供協助。&lt;/p&gt;


            &lt;p&gt;&lt;a href=&quot;https://btc-zhtw-review.achow101.com/zh_TW/2025/10/10/release-30.0/&quot;&gt;Bitcoin Core 30.0 版本發布&lt;/a&gt; was originally published by Bitcoin Core at &lt;a href=&quot;https://btc-zhtw-review.achow101.com&quot;&gt;Bitcoin Core&lt;/a&gt; on October 10, 2025.&lt;/p&gt;
        </content>
    </entry>
    
    
    <entry>
        <title type="html"><![CDATA[Bitcoin Core 29.1 版本發布]]></title>
        <link rel="alternate" type="text/html" href="https://btc-zhtw-review.achow101.com/zh_TW/2025/09/04/release-29.1/" />
        <id>/zh_TW/2025/09/04/release-29.1</id>
        <published>2025-09-04T00:00:00+00:00</published>
        <updated>2025-09-04T00:00:00+00:00</updated>
        <author>
            <name>Bitcoin Core</name>
            <uri>https://btc-zhtw-review.achow101.com/zh_TW/2025/09/04/release-29.1/</uri>
            
        </author>
        <content type="html">
            &lt;p&gt;Bitcoin Core 29.1 版本現已可供&lt;a href=&quot;/zh_TW/download&quot;&gt;下載&lt;/a&gt;。請參閱&lt;a href=&quot;/zh_TW/releases/29.1/&quot;&gt;版本說明&lt;/a&gt;以了解此版本的錯誤修復詳情。&lt;/p&gt;

&lt;p&gt;如有任何問題，請前往 #bitcoin IRC 聊天室（&lt;a href=&quot;irc://irc.libera.chat/bitcoin&quot;&gt;IRC&lt;/a&gt;、&lt;a href=&quot;https://web.libera.chat/#bitcoin&quot;&gt;網頁版&lt;/a&gt;），我們會盡力為您提供協助。&lt;/p&gt;


            &lt;p&gt;&lt;a href=&quot;https://btc-zhtw-review.achow101.com/zh_TW/2025/09/04/release-29.1/&quot;&gt;Bitcoin Core 29.1 版本發布&lt;/a&gt; was originally published by Bitcoin Core at &lt;a href=&quot;https://btc-zhtw-review.achow101.com&quot;&gt;Bitcoin Core&lt;/a&gt; on September 04, 2025.&lt;/p&gt;
        </content>
    </entry>
    
    
    <entry>
        <title type="html"><![CDATA[Bitcoin Core 28.2 版本發布]]></title>
        <link rel="alternate" type="text/html" href="https://btc-zhtw-review.achow101.com/zh_TW/2025/06/26/release-28.2/" />
        <id>/zh_TW/2025/06/26/release-28.2</id>
        <published>2025-06-26T00:00:00+00:00</published>
        <updated>2025-06-26T00:00:00+00:00</updated>
        <author>
            <name>Bitcoin Core</name>
            <uri>https://btc-zhtw-review.achow101.com/zh_TW/2025/06/26/release-28.2/</uri>
            
        </author>
        <content type="html">
            &lt;p&gt;Bitcoin Core 28.2 版本現已可供&lt;a href=&quot;/zh_TW/download&quot;&gt;下載&lt;/a&gt;。請參閱&lt;a href=&quot;/zh_TW/releases/28.2/&quot;&gt;版本說明&lt;/a&gt;以了解此版本的錯誤修復詳情。&lt;/p&gt;

&lt;p&gt;如有任何問題，請前往 #bitcoin IRC 聊天室（&lt;a href=&quot;irc://irc.libera.chat/bitcoin&quot;&gt;IRC&lt;/a&gt;、&lt;a href=&quot;https://web.libera.chat/#bitcoin&quot;&gt;網頁版&lt;/a&gt;），我們會盡力為您提供協助。&lt;/p&gt;


            &lt;p&gt;&lt;a href=&quot;https://btc-zhtw-review.achow101.com/zh_TW/2025/06/26/release-28.2/&quot;&gt;Bitcoin Core 28.2 版本發布&lt;/a&gt; was originally published by Bitcoin Core at &lt;a href=&quot;https://btc-zhtw-review.achow101.com&quot;&gt;Bitcoin Core&lt;/a&gt; on June 26, 2025.&lt;/p&gt;
        </content>
    </entry>
    
    
    <entry>
        <title type="html"><![CDATA[Bitcoin Core 開發和交易中繼策略]]></title>
        <link rel="alternate" type="text/html" href="https://btc-zhtw-review.achow101.com/zh_TW/2025/06/06/relay-statement/" />
        <id>/zh_TW/2025/06/06/relay-statement</id>
        <published>2025-06-06T00:00:00+00:00</published>
        <updated>2025-06-06T00:00:00+00:00</updated>
        <author>
            <name>Bitcoin Core</name>
            <uri>https://btc-zhtw-review.achow101.com/zh_TW/2025/06/06/relay-statement/</uri>
            
        </author>
        <content type="html">
            &lt;p&gt;我們想分享我們對 Bitcoin Core 開發與網路上交易中繼策略之間關係的看法。&lt;/p&gt;

&lt;p&gt;Bitcoin 是一個由其使用者定義的網路，他們在選擇使用什麼軟體（完全驗證或非完全驗證）和實作他們想要的任何策略方面擁有最終自由。Bitcoin Core 貢獻者無權規定這些策略是什麼。這反映在我們長期以來避免在軟體中自動更新的做法中。這意味著沒有任何實體可以單方面向 Bitcoin Core 使用者推送變更：變更必須由使用者自己選擇採用新的軟體版本，或者如果他們願意，採用不同的軟體。自由執行任何軟體是網路對抗強制的主要保障。&lt;/p&gt;

&lt;p&gt;作為 Bitcoin Core 開發者，我們也認為我們有責任使我們的軟體盡可能有效和可靠地為其目的服務，即在 Bitcoin 點對點網路中驗證和中繼區塊和交易，以便 Bitcoin 作為去中心化數位貨幣取得成功。關於交易中繼，這可能包括新增阻斷服務（DoS）保護和手續費評估的策略，但不會阻止中繼有持續經濟需求且可靠地進入區塊的交易。交易中繼的目標包括：&lt;/p&gt;

&lt;ul&gt;
  &lt;li&gt;預測將被挖掘的交易（例如用於手續費估算或手續費提升，但它也是節點軟體內許多 DoS 保護策略的基礎）；&lt;/li&gt;
  &lt;li&gt;加快我們預期被挖掘的交易的區塊傳播。減少延遲有助於防止大型礦工獲得不公平的優勢；&lt;/li&gt;
  &lt;li&gt;幫助礦工了解付費交易（這樣他們就不需要依賴破壞挖礦去中心化的頻外交易提交方案）。&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;明知拒絕中繼礦工無論如何都會包含在區塊中的交易會迫使使用者進入替代通訊管道，破壞上述目標。&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;交易接受規則過去曾被有效地用於阻止使用區塊空間效率低下的用例的開發，而這樣做非常便宜。然而，這只有在使用者和礦工都對存在的任何替代方案感到滿意時才能有效。當情況不再如此，並且開發出與策略規則衝突的經濟上可行的用例時，使用者和礦工可以直接合作以避免對其活動施加限制的任何外部嘗試。事實上，能夠做到這一點是 Bitcoin 抗審查性的一個重要方面，具有優先對等的其他節點軟體也表明，規避絕大多數節點的過濾器相對容易。鑑於此，我們認為 Bitcoin 節點軟體最好旨在對下一個區塊中最終會包含什麼有一個現實的想法，而不是試圖在同意的交易建立者和礦工之間進行干預，以阻止在技術層面上基本無害的活動。&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;這不是認可或容忍非金融資料使用，而是接受作為抗審查系統，Bitcoin 可以而且將被用於不是每個人都同意的用例。&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;雖然我們認識到這一觀點並非所有使用者和開發者普遍持有，但我們真誠地相信這符合 Bitcoin 及其使用者的最佳利益，我們希望我們的使用者同意。我們將繼續作為開發者應用我們的最佳判斷，使交易接受規則與 Bitcoin 的長期健康和礦工的理性自利保持一致，包括特定的技術原因，例如升級安全性、高效的區塊建構和節點 DoS 攻擊。&lt;/p&gt;

&lt;p&gt;簽署，&lt;/p&gt;

&lt;p&gt;（支援此信的貢獻者列表）&lt;/p&gt;

&lt;ul&gt;
  &lt;li&gt;Andrew Toth&lt;/li&gt;
  &lt;li&gt;Antoine Poinsot&lt;/li&gt;
  &lt;li&gt;Anthony Towns&lt;/li&gt;
  &lt;li&gt;Ava Chow&lt;/li&gt;
  &lt;li&gt;b10c&lt;/li&gt;
  &lt;li&gt;Bruno Garcia&lt;/li&gt;
  &lt;li&gt;David Gumberg&lt;/li&gt;
  &lt;li&gt;fjahr&lt;/li&gt;
  &lt;li&gt;Gloria Zhao&lt;/li&gt;
  &lt;li&gt;Gregory Sanders&lt;/li&gt;
  &lt;li&gt;hodlinator&lt;/li&gt;
  &lt;li&gt;ismaelsadeeq&lt;/li&gt;
  &lt;li&gt;Josie Baker&lt;/li&gt;
  &lt;li&gt;kevkevinpal&lt;/li&gt;
  &lt;li&gt;l0rinc&lt;/li&gt;
  &lt;li&gt;Marco De Leon&lt;/li&gt;
  &lt;li&gt;Martin Zumsande&lt;/li&gt;
  &lt;li&gt;Matthew Zipkin&lt;/li&gt;
  &lt;li&gt;Michael Ford&lt;/li&gt;
  &lt;li&gt;Murch&lt;/li&gt;
  &lt;li&gt;Niklas Gögge&lt;/li&gt;
  &lt;li&gt;pablomartin4btc&lt;/li&gt;
  &lt;li&gt;Pieter Wuille&lt;/li&gt;
  &lt;li&gt;Pol Espinasa&lt;/li&gt;
  &lt;li&gt;Sebastian Falbesoner&lt;/li&gt;
  &lt;li&gt;Sergi Delgado&lt;/li&gt;
  &lt;li&gt;Stephan Vuylsteke&lt;/li&gt;
  &lt;li&gt;TheCharlatan&lt;/li&gt;
  &lt;li&gt;Vasil Dimov&lt;/li&gt;
  &lt;li&gt;Will Clark&lt;/li&gt;
  &lt;li&gt;w0xlt&lt;/li&gt;
&lt;/ul&gt;

            &lt;p&gt;&lt;a href=&quot;https://btc-zhtw-review.achow101.com/zh_TW/2025/06/06/relay-statement/&quot;&gt;Bitcoin Core 開發和交易中繼策略&lt;/a&gt; was originally published by Bitcoin Core at &lt;a href=&quot;https://btc-zhtw-review.achow101.com&quot;&gt;Bitcoin Core&lt;/a&gt; on June 06, 2025.&lt;/p&gt;
        </content>
    </entry>
    
    
    <entry>
        <title type="html"><![CDATA[CVE-2024-52919 - Remote crash due to addr message spam (part 2)]]></title>
        <link rel="alternate" type="text/html" href="https://btc-zhtw-review.achow101.com/en/2025/04/28/disclose-cve-2024-52919/" />
        <id>/en/2025/04/28/disclose-cve-2024-52919</id>
        <published>2025-04-28T00:00:00+00:00</published>
        <updated>2025-04-28T00:00:00+00:00</updated>
        <author>
            <name>Bitcoin Core</name>
            <uri>https://btc-zhtw-review.achow101.com/en/2025/04/28/disclose-cve-2024-52919/</uri>
            
        </author>
        <content type="html">
            &lt;p&gt;Disclosure of the details of an integer overflow bug which causes a crash if a node is getting
spammed &lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;addr&lt;/code&gt; messages continuously for a very long time (years). A fix was released on April 14th
2025 in Bitcoin Core v29.0.&lt;/p&gt;

&lt;p&gt;This issue is considered &lt;strong&gt;Low&lt;/strong&gt; severity.&lt;/p&gt;

&lt;h2 id=&quot;details&quot;&gt;Details&lt;/h2&gt;

&lt;p&gt;The address manager in Bitcoin Core uses a 32-bit identifier for each entry, incremented on every
insertion. An &lt;a href=&quot;https://bitcoincore.org/en/2024/07/31/disclose-addrman-int-overflow&quot;&gt;earlier security
advisory&lt;/a&gt; explained how it
enabled an attacker to remotely trigger an assertion failure by spamming a node with &lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;addr&lt;/code&gt; messages
until the 32-bit identifier overflow.&lt;/p&gt;

&lt;p&gt;This was partially addressed in Bitcoin Core v22.0 by rate-limiting insertions in the address
manager to 1 address per peer every 10 seconds. This made the attack a lot more expensive if not
impractical: even with 1000 peers continuously attacking it would still take more than a year to get
the 32-bit identifier to overflow.&lt;/p&gt;

&lt;p&gt;The remaining, more expensive attack vector was addressed in Bitcoin Core version 29.0 by making the
identifier a 64-bit identifier.&lt;/p&gt;

&lt;h2 id=&quot;attribution&quot;&gt;Attribution&lt;/h2&gt;

&lt;p&gt;Credit goes to Eugene Siegel for discovering and disclosing the vulnerability, and to Martin
Zumsande for changing the identifier to 64-bit.&lt;/p&gt;

&lt;h2 id=&quot;timeline&quot;&gt;Timeline&lt;/h2&gt;

&lt;ul&gt;
  &lt;li&gt;2021-06-21 - Initial report sent to security@bitcoincore.org by Eugene Siegel&lt;/li&gt;
  &lt;li&gt;2021-07-19 - Rate limiting is merged in PR &lt;a href=&quot;https://github.com/bitcoin/bitcoin/pull/22387&quot;&gt;#22387&lt;/a&gt;&lt;/li&gt;
  &lt;li&gt;2021-09-13 - v22.0 is released with rate-limiting&lt;/li&gt;
  &lt;li&gt;2024-07-31 - Publication of the &lt;a href=&quot;https://bitcoincore.org/en/2024/07/31/disclose-addrman-int-overflow&quot;&gt;first security advisory&lt;/a&gt;&lt;/li&gt;
  &lt;li&gt;2024-09-20 - Change to 64-bit identifier is merged in PR &lt;a href=&quot;https://github.com/bitcoin/bitcoin/pull/30568&quot;&gt;#30568&lt;/a&gt;&lt;/li&gt;
  &lt;li&gt;2025-04-14 - Bitcoin Core v29.0 is released with the 64-bit identifier&lt;/li&gt;
  &lt;li&gt;2025-04-28 - Public Disclosure&lt;/li&gt;
&lt;/ul&gt;


            &lt;p&gt;&lt;a href=&quot;https://btc-zhtw-review.achow101.com/en/2025/04/28/disclose-cve-2024-52919/&quot;&gt;CVE-2024-52919 - Remote crash due to addr message spam (part 2)&lt;/a&gt; was originally published by Bitcoin Core at &lt;a href=&quot;https://btc-zhtw-review.achow101.com&quot;&gt;Bitcoin Core&lt;/a&gt; on April 28, 2025.&lt;/p&gt;
        </content>
    </entry>
    
    
    <entry>
        <title type="html"><![CDATA[Bitcoin Core 29.0 版本發布]]></title>
        <link rel="alternate" type="text/html" href="https://btc-zhtw-review.achow101.com/zh_TW/2025/04/14/release-29.0/" />
        <id>/zh_TW/2025/04/14/release-29.0</id>
        <published>2025-04-14T00:00:00+00:00</published>
        <updated>2025-04-14T00:00:00+00:00</updated>
        <author>
            <name>Bitcoin Core</name>
            <uri>https://btc-zhtw-review.achow101.com/zh_TW/2025/04/14/release-29.0/</uri>
            
        </author>
        <content type="html">
            &lt;p&gt;Bitcoin Core 29.0 版本現已可供&lt;a href=&quot;/zh_TW/download&quot;&gt;下載&lt;/a&gt;。請參閱&lt;a href=&quot;/zh_TW/releases/29.0/&quot;&gt;版本說明&lt;/a&gt;以了解此版本中的新功能和其他變更。&lt;/p&gt;

&lt;p&gt;如有任何問題，請前往 #bitcoin IRC 聊天室（&lt;a href=&quot;irc://irc.libera.chat/bitcoin&quot;&gt;IRC&lt;/a&gt;、&lt;a href=&quot;https://web.libera.chat/#bitcoin&quot;&gt;網頁版&lt;/a&gt;），我們會盡力為您提供協助。&lt;/p&gt;


            &lt;p&gt;&lt;a href=&quot;https://btc-zhtw-review.achow101.com/zh_TW/2025/04/14/release-29.0/&quot;&gt;Bitcoin Core 29.0 版本發布&lt;/a&gt; was originally published by Bitcoin Core at &lt;a href=&quot;https://btc-zhtw-review.achow101.com&quot;&gt;Bitcoin Core&lt;/a&gt; on April 14, 2025.&lt;/p&gt;
        </content>
    </entry>
    
    
    <entry>
        <title type="html"><![CDATA[Bitcoin Core 28.1 版本發布]]></title>
        <link rel="alternate" type="text/html" href="https://btc-zhtw-review.achow101.com/zh_TW/2025/01/09/release-28.1/" />
        <id>/zh_TW/2025/01/09/release-28.1</id>
        <published>2025-01-09T00:00:00+00:00</published>
        <updated>2025-01-09T00:00:00+00:00</updated>
        <author>
            <name>Bitcoin Core</name>
            <uri>https://btc-zhtw-review.achow101.com/zh_TW/2025/01/09/release-28.1/</uri>
            
        </author>
        <content type="html">
            &lt;p&gt;Bitcoin Core 28.1 版本現已可供&lt;a href=&quot;/zh_TW/download&quot;&gt;下載&lt;/a&gt;。請參閱&lt;a href=&quot;/zh_TW/releases/28.1/&quot;&gt;版本說明&lt;/a&gt;以了解此版本的錯誤修復詳情。&lt;/p&gt;

&lt;p&gt;如有任何問題，請前往 #bitcoin IRC 聊天室（&lt;a href=&quot;irc://irc.libera.chat/bitcoin&quot;&gt;IRC&lt;/a&gt;、&lt;a href=&quot;https://web.libera.chat/#bitcoin&quot;&gt;網頁版&lt;/a&gt;），我們會盡力為您提供協助。&lt;/p&gt;


            &lt;p&gt;&lt;a href=&quot;https://btc-zhtw-review.achow101.com/zh_TW/2025/01/09/release-28.1/&quot;&gt;Bitcoin Core 28.1 版本發布&lt;/a&gt; was originally published by Bitcoin Core at &lt;a href=&quot;https://btc-zhtw-review.achow101.com&quot;&gt;Bitcoin Core&lt;/a&gt; on January 09, 2025.&lt;/p&gt;
        </content>
    </entry>
    
    
    <entry>
        <title type="html"><![CDATA[CVE-2024-52922 - Hindered block propagation due to stalling peers]]></title>
        <link rel="alternate" type="text/html" href="https://btc-zhtw-review.achow101.com/en/2024/11/05/cb-stall-hindering-propagation/" />
        <id>/en/2024/11/05/cb-stall-hindering-propagation</id>
        <published>2024-11-05T00:00:00+00:00</published>
        <updated>2024-11-05T00:00:00+00:00</updated>
        <author>
            <name>Bitcoin Core</name>
            <uri>https://btc-zhtw-review.achow101.com/en/2024/11/05/cb-stall-hindering-propagation/</uri>
            
        </author>
        <content type="html">
            &lt;p&gt;Before Bitcoin Core v25.1, an attacker can cause a node to not
download the latest block.&lt;/p&gt;

&lt;p&gt;This issue is considered &lt;strong&gt;Medium&lt;/strong&gt; severity.&lt;/p&gt;

&lt;h2 id=&quot;details&quot;&gt;Details&lt;/h2&gt;

&lt;p&gt;When receiving a new block announcement via a headers or compact
blocks message, the delivering peer is requested either the full
block or missing transaction details by the receiving node. If
the announcing peer then doesn’t respond as the peer to peer
protocol requires, the affected Bitcoin Core node will wait
up to 10 minutes before disconnecting the peer and making another
block download attempt. If the attacker is able to
make multiple incoming or outgoing connections, this process
can be repeated.&lt;/p&gt;

&lt;p&gt;Delaying block delivery can cause network degradation by slowing down network convergence,
making mining payouts less fair, and causing liveliness issues.&lt;/p&gt;

&lt;p&gt;This issue was further exacerbated by other issues disclosed recently (for
instance the &lt;a href=&quot;https://bitcoincore.org/en/2024/10/08/disclose-large-inv-to-send/&quot;&gt;inventory build-up&lt;/a&gt;),
when mempools were relatively heterogeneous, disallowing
opportunistic reconstruction of compact blocks by honest peers.&lt;/p&gt;

&lt;p&gt;A mitigation was introduced in &lt;a href=&quot;https://github.com/bitcoin/bitcoin/pull/27626&quot;&gt;#27626&lt;/a&gt;,
introduced in Bitcoin Core v26.0 and backported to v25.1.
It ensures that blocks can be requested concurrently from up to 3
high-bandwidth compact block peers, one of which is required
to be an outbound connection.&lt;/p&gt;

&lt;h2 id=&quot;attribution&quot;&gt;Attribution&lt;/h2&gt;

&lt;p&gt;Reported and fixed by Greg Sanders.&lt;/p&gt;

&lt;h2 id=&quot;timeline&quot;&gt;Timeline&lt;/h2&gt;

&lt;ul&gt;
  &lt;li&gt;2023-05-08 - Users reporting block timeouts in the &lt;a href=&quot;https://bitcoin-irc.chaincode.com/bitcoin-core-dev/2023-05-08&quot;&gt;#bitcoin-core-dev IRC channel&lt;/a&gt;&lt;/li&gt;
  &lt;li&gt;2023-05-09 - First github issues describing the issue https://github.com/bitcoin/bitcoin/issues/25258#issuecomment-1540028533&lt;/li&gt;
  &lt;li&gt;2023-05-11 - Mitigation PR opened https://github.com/bitcoin/bitcoin/pull/27626&lt;/li&gt;
  &lt;li&gt;2023-05-24 - PR merged prior to Bitcoin Core v26.0&lt;/li&gt;
  &lt;li&gt;2023-05-25 - Backport to Bitcoin Core v25.1 merged https://github.com/bitcoin/bitcoin/pull/27752&lt;/li&gt;
  &lt;li&gt;2023-10-19 - Bitcoin Core v25.1 Released&lt;/li&gt;
  &lt;li&gt;2024-11-05 - Public disclosure&lt;/li&gt;
&lt;/ul&gt;


            &lt;p&gt;&lt;a href=&quot;https://btc-zhtw-review.achow101.com/en/2024/11/05/cb-stall-hindering-propagation/&quot;&gt;CVE-2024-52922 - Hindered block propagation due to stalling peers&lt;/a&gt; was originally published by Bitcoin Core at &lt;a href=&quot;https://btc-zhtw-review.achow101.com&quot;&gt;Bitcoin Core&lt;/a&gt; on November 05, 2024.&lt;/p&gt;
        </content>
    </entry>
    
    
    <entry>
        <title type="html"><![CDATA[Bitcoin Core 27.2 版本發布]]></title>
        <link rel="alternate" type="text/html" href="https://btc-zhtw-review.achow101.com/zh_TW/2024/11/04/release-27.2/" />
        <id>/zh_TW/2024/11/04/release-27.2</id>
        <published>2024-11-04T00:00:00+00:00</published>
        <updated>2024-11-04T00:00:00+00:00</updated>
        <author>
            <name>Bitcoin Core</name>
            <uri>https://btc-zhtw-review.achow101.com/zh_TW/2024/11/04/release-27.2/</uri>
            
        </author>
        <content type="html">
            &lt;p&gt;Bitcoin Core 27.2 版本現已可供&lt;a href=&quot;/zh_TW/download&quot;&gt;下載&lt;/a&gt;。請參閱&lt;a href=&quot;/zh_TW/releases/27.2/&quot;&gt;版本說明&lt;/a&gt;以了解此版本的錯誤修復詳情。&lt;/p&gt;

&lt;p&gt;如有任何問題，請前往 #bitcoin IRC 聊天室（&lt;a href=&quot;irc://irc.libera.chat/bitcoin&quot;&gt;IRC&lt;/a&gt;、&lt;a href=&quot;https://web.libera.chat/#bitcoin&quot;&gt;網頁版&lt;/a&gt;），我們會盡力為您提供協助。&lt;/p&gt;


            &lt;p&gt;&lt;a href=&quot;https://btc-zhtw-review.achow101.com/zh_TW/2024/11/04/release-27.2/&quot;&gt;Bitcoin Core 27.2 版本發布&lt;/a&gt; was originally published by Bitcoin Core at &lt;a href=&quot;https://btc-zhtw-review.achow101.com&quot;&gt;Bitcoin Core&lt;/a&gt; on November 04, 2024.&lt;/p&gt;
        </content>
    </entry>
    
    
    <entry>
        <title type="html"><![CDATA[Disclosure of CVE-2024-35202]]></title>
        <link rel="alternate" type="text/html" href="https://btc-zhtw-review.achow101.com/en/2024/10/08/disclose-blocktxn-crash/" />
        <id>/en/2024/10/08/disclose-blocktxn-crash</id>
        <published>2024-10-08T00:00:00+00:00</published>
        <updated>2024-10-08T00:00:00+00:00</updated>
        <author>
            <name>Bitcoin Core</name>
            <uri>https://btc-zhtw-review.achow101.com/en/2024/10/08/disclose-blocktxn-crash/</uri>
            
        </author>
        <content type="html">
            &lt;p&gt;Before Bitcoin Core v25.0, an attacker could remotely crash Bitcoin Core
nodes by triggering an assertion in the blocktxn message handling logic.&lt;/p&gt;

&lt;p&gt;This issue is considered &lt;strong&gt;High&lt;/strong&gt; severity.&lt;/p&gt;

&lt;h2 id=&quot;details&quot;&gt;Details&lt;/h2&gt;

&lt;p&gt;When receiving a block announcement via a cmpctblock message, Bitcoin Core
attempts to reconstruct the announced block using the transactions in its own
mempool as well as other available transactions. If reconstruction fails due to
missing transactions it will request them from the announcing peer via a
getblocktxn message. In response a blocktxn message is expected, which should
contain the requested transactions.&lt;/p&gt;

&lt;p&gt;The compact block protocol employs shortened transaction identifiers to reduce
bandwidth. These short-ids are 6 byte in size, resulting in a small chance for
collisions (i.e. transaction A has the same short-id as transaction B) upon
block reconstruction. Collisions will be detected as the merkle root computed
from the reconstructed set of transactions will not match the merkle root from
the block announcement. Peers should not be punished for collisions as they may
happen spuriously, therefore they are handled by falling back to requesting the
full block.&lt;/p&gt;

&lt;p&gt;Bitcoin Core will create an instance of &lt;code&gt;PartiallyDownloadedBlock&lt;/code&gt;
whenever a new compact block is received. If missing transactions are
requested, the instance is persisted until the corresponding blocktxn message
is processed. Upon receiving the blocktxn message,
&lt;code&gt;PartiallyDownloadedBlock::FillBlock&lt;/code&gt; is called, attempting to
reconstruct the full block. In the collision case described above, the full
block is requested but the &lt;code&gt;PartiallyDownloadedBlock&lt;/code&gt; instance as
well as the other state related to the underlying block request is left
untouched. This leaves room for a second blocktxn message for the same block to
be processed and trigger &lt;code&gt;FillBlock&lt;/code&gt; to be called again. This
violates the assumption (documented as an &lt;code&gt;assert&lt;/code&gt; statement) that
&lt;code&gt;FillBlock&lt;/code&gt; can only be called once and causes the node to crash.&lt;/p&gt;

&lt;p&gt;An attacker does not need to get lucky by triggering a collision, as the
collision handling logic can easily be triggered by simply including
transactions in the blocktxn message that are not committed to in the block’s
merkle root.&lt;/p&gt;

&lt;h2 id=&quot;attribution&quot;&gt;Attribution&lt;/h2&gt;

&lt;p&gt;Credit goes to Niklas Gögge for discovering and disclosing the vulnerability,
as well as fixing the issue in https://github.com/bitcoin/bitcoin/pull/26898.&lt;/p&gt;

&lt;h2 id=&quot;timeline&quot;&gt;Timeline&lt;/h2&gt;

&lt;ul&gt;
  &lt;li&gt;2022-10-05 - Niklas Gögge reports the issue to the Bitcoin Core security mailing list.&lt;/li&gt;
  &lt;li&gt;2023-01-24 - PR #26898 containing the fix is merged.&lt;/li&gt;
  &lt;li&gt;2023-05-25 - Bitcoin Core 25.0 is released with the fix.&lt;/li&gt;
  &lt;li&gt;2024-10-09 - Public disclosure.&lt;/li&gt;
&lt;/ul&gt;


            &lt;p&gt;&lt;a href=&quot;https://btc-zhtw-review.achow101.com/en/2024/10/08/disclose-blocktxn-crash/&quot;&gt;Disclosure of CVE-2024-35202&lt;/a&gt; was originally published by Bitcoin Core at &lt;a href=&quot;https://btc-zhtw-review.achow101.com&quot;&gt;Bitcoin Core&lt;/a&gt; on October 08, 2024.&lt;/p&gt;
        </content>
    </entry>
    
    
    <entry>
        <title type="html"><![CDATA[Disclosure of DoS due to inv-to-send sets growing too large]]></title>
        <link rel="alternate" type="text/html" href="https://btc-zhtw-review.achow101.com/en/2024/10/08/disclose-large-inv-to-send/" />
        <id>/en/2024/10/08/disclose-large-inv-to-send</id>
        <published>2024-10-08T00:00:00+00:00</published>
        <updated>2024-10-08T00:00:00+00:00</updated>
        <author>
            <name>Bitcoin Core</name>
            <uri>https://btc-zhtw-review.achow101.com/en/2024/10/08/disclose-large-inv-to-send/</uri>
            
        </author>
        <content type="html">
            &lt;p&gt;Before Bitcoin Core v25.0, the per-peer &lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;m_tx_inventory_to_send&lt;/code&gt; sets could grow
too large to a point where sorting these sets when constructing inventory
messages would affect the node’s ability to communicate with its peers. Network
conditions in early May 2023 triggered this DoS and affected block and transaction
propagation.&lt;/p&gt;

&lt;p&gt;This issue is considered &lt;strong&gt;Medium&lt;/strong&gt; severity.&lt;/p&gt;

&lt;h2 id=&quot;details&quot;&gt;Details&lt;/h2&gt;

&lt;p&gt;As part of transaction relay, Bitcoin Core maintains a per-peer
&lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;m_tx_inventory_to_send&lt;/code&gt; set with transactions that should be announced to the
peer. When constructing an inventory message for a peer, the set is sorted by
transaction dependencies and feerate to prioritize high-feerate transactions and
to avoid leaking the order the node learned about the transactions. Before
Bitcoin Core v25.0, when constructing inventory messages, relevant (still in
mempool, not yet announced to us by the peer, above the fee filter) transactions
were being drained at a rate of 7 transactions per second.&lt;/p&gt;

&lt;p&gt;In early May 2023, increased network activity caused the sets to grow faster
than they were being drained resulting in significant time spent sorting the
sets in the P2P communication thread. Additionally, peers that only listen for
transaction announcements but never announce any themselves (commonly referred
to as “spy nodes”), amplified this by having huge sets (with transactions they
already know about) that take a long time to sort. It was observed that sorting
took up nearly the complete time spent in the P2P communication thread, which
significantly affected block and transaction propagation as well as keeping
connection with peers alive.&lt;/p&gt;

&lt;p&gt;This was fixed in &lt;a href=&quot;https://github.com/bitcoin/bitcoin/pull/27610&quot;&gt;#27610&lt;/a&gt; by 1)
earlier removing transactions that aren’t in the mempool anymore and 2) by
dynamically increasing the set drainage rate depending on the set size.&lt;/p&gt;

&lt;h2 id=&quot;attribution&quot;&gt;Attribution&lt;/h2&gt;

&lt;p&gt;Credit goes to Anthony Towns for working on a fix and to b10c for initially
reporting and narrowing the problem down to the slow inv-to-send sorting.&lt;/p&gt;

&lt;h2 id=&quot;timeline&quot;&gt;Timeline&lt;/h2&gt;

&lt;ul&gt;
  &lt;li&gt;2023-05-02 - Problem first observed and reported&lt;/li&gt;
  &lt;li&gt;2023-05-11 - Fix is merged (&lt;a href=&quot;https://github.com/bitcoin/bitcoin/pull/27610&quot;&gt;#27610&lt;/a&gt;)&lt;/li&gt;
  &lt;li&gt;2023-05-25 - v25.0 is released&lt;/li&gt;
  &lt;li&gt;2024-10-09 - Public disclosure&lt;/li&gt;
&lt;/ul&gt;


            &lt;p&gt;&lt;a href=&quot;https://btc-zhtw-review.achow101.com/en/2024/10/08/disclose-large-inv-to-send/&quot;&gt;Disclosure of DoS due to inv-to-send sets growing too large&lt;/a&gt; was originally published by Bitcoin Core at &lt;a href=&quot;https://btc-zhtw-review.achow101.com&quot;&gt;Bitcoin Core&lt;/a&gt; on October 08, 2024.&lt;/p&gt;
        </content>
    </entry>
    
    
    <entry>
        <title type="html"><![CDATA[CVE-2024-52921 - Hindered block propagation due to mutated blocks]]></title>
        <link rel="alternate" type="text/html" href="https://btc-zhtw-review.achow101.com/en/2024/10/08/disclose-mutated-blocks-hindering-propagation/" />
        <id>/en/2024/10/08/disclose-mutated-blocks-hindering-propagation</id>
        <published>2024-10-08T00:00:00+00:00</published>
        <updated>2024-10-08T00:00:00+00:00</updated>
        <author>
            <name>Bitcoin Core</name>
            <uri>https://btc-zhtw-review.achow101.com/en/2024/10/08/disclose-mutated-blocks-hindering-propagation/</uri>
            
        </author>
        <content type="html">
            &lt;p&gt;Before Bitcoin Core v25.0, a peer sending mutated blocks could clear the
download state of other peers that also announced the block to us, which would
hinder block propagation.&lt;/p&gt;

&lt;p&gt;This issue is considered &lt;strong&gt;Medium&lt;/strong&gt; severity.&lt;/p&gt;

&lt;h2 id=&quot;details&quot;&gt;Details&lt;/h2&gt;

&lt;p&gt;Bitcoin Core treats a block as mutated when, for example, the Merkle root in the
header or the witness commitment in the coinbase transaction doesn’t match the
transactions in the block.&lt;/p&gt;

&lt;p&gt;Before Bitcoin Core v25.0, a peer could clear the block download state of
other peers by sending an unrequested mutated block. This was a problem for, for
example, compact block relay. After receiving a compact block and while waiting
for a response to a &lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;getblocktxn&lt;/code&gt; request to reconstruct the full block,
receiving the mutated block would let Bitcoin Core forget about the compact
block reconstruction state. A &lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;blocktxn&lt;/code&gt; response arriving after the mutated
block couldn’t be used to reconstruct the block. This hindered block propagation.&lt;/p&gt;

&lt;p&gt;This was fixed in &lt;a href=&quot;https://github.com/bitcoin/bitcoin/pull/27608&quot;&gt;#27608&lt;/a&gt; by
making sure that a peer can only affect its own block download state and not the
download state of other peers.&lt;/p&gt;

&lt;h2 id=&quot;attribution&quot;&gt;Attribution&lt;/h2&gt;

&lt;p&gt;Credit goes to Suhas Daftuar for noticing the problem and working on a fix.&lt;/p&gt;

&lt;h2 id=&quot;timeline&quot;&gt;Timeline&lt;/h2&gt;

&lt;ul&gt;
  &lt;li&gt;2023-05-08 - A problem with mutated blocks is first reported in the &lt;a href=&quot;https://bitcoin-irc.chaincode.com/bitcoin-core-dev/2023-05-08&quot;&gt;#bitcoin-core-dev IRC channel&lt;/a&gt;.&lt;/li&gt;
  &lt;li&gt;2023-05-10 - Fix is merged (&lt;a href=&quot;https://github.com/bitcoin/bitcoin/pull/27608&quot;&gt;#27608&lt;/a&gt;)&lt;/li&gt;
  &lt;li&gt;2023-05-25 - v25.0 is released&lt;/li&gt;
  &lt;li&gt;2024-10-09 - Public disclosure&lt;/li&gt;
&lt;/ul&gt;


            &lt;p&gt;&lt;a href=&quot;https://btc-zhtw-review.achow101.com/en/2024/10/08/disclose-mutated-blocks-hindering-propagation/&quot;&gt;CVE-2024-52921 - Hindered block propagation due to mutated blocks&lt;/a&gt; was originally published by Bitcoin Core at &lt;a href=&quot;https://btc-zhtw-review.achow101.com&quot;&gt;Bitcoin Core&lt;/a&gt; on October 08, 2024.&lt;/p&gt;
        </content>
    </entry>
    
    
    <entry>
        <title type="html"><![CDATA[Bitcoin Core 28.0 版本發布]]></title>
        <link rel="alternate" type="text/html" href="https://btc-zhtw-review.achow101.com/zh_TW/2024/10/02/release-28.0/" />
        <id>/zh_TW/2024/10/02/release-28.0</id>
        <published>2024-10-02T00:00:00+00:00</published>
        <updated>2024-10-02T00:00:00+00:00</updated>
        <author>
            <name>Bitcoin Core</name>
            <uri>https://btc-zhtw-review.achow101.com/zh_TW/2024/10/02/release-28.0/</uri>
            
        </author>
        <content type="html">
            &lt;p&gt;Bitcoin Core 28.0 版本現已可供&lt;a href=&quot;/zh_TW/download&quot;&gt;下載&lt;/a&gt;。請參閱&lt;a href=&quot;/zh_TW/releases/28.0/&quot;&gt;版本說明&lt;/a&gt;以了解此版本中的新功能和其他變更。&lt;/p&gt;

&lt;p&gt;如有任何問題，請前往 #bitcoin IRC 聊天室（&lt;a href=&quot;irc://irc.libera.chat/bitcoin&quot;&gt;IRC&lt;/a&gt;、&lt;a href=&quot;https://web.libera.chat/#bitcoin&quot;&gt;網頁版&lt;/a&gt;），我們會盡力為您提供協助。&lt;/p&gt;


            &lt;p&gt;&lt;a href=&quot;https://btc-zhtw-review.achow101.com/zh_TW/2024/10/02/release-28.0/&quot;&gt;Bitcoin Core 28.0 版本發布&lt;/a&gt; was originally published by Bitcoin Core at &lt;a href=&quot;https://btc-zhtw-review.achow101.com&quot;&gt;Bitcoin Core&lt;/a&gt; on October 02, 2024.&lt;/p&gt;
        </content>
    </entry>
    
</feed>

