Unnamed repository; edit this file 'description' to name the repository.
 help / color / mirror / Atom feed
* [bitcoindev] Public disclosure of one high severity Bitcoin Core advisory (CVE-2024-52911)
@ 2026-05-05 13:17 Niklas Goegge
  2026-05-06  0:25 ` [bitcoindev] " Antoine Riard
  0 siblings, 1 reply; 2+ messages in thread
From: Niklas Goegge @ 2026-05-05 13:17 UTC (permalink / raw)
  To: Bitcoin Development Mailing List


[-- Attachment #1.1: Type: text/plain, Size: 943 bytes --]

Hi everyone, 

In accordance with our security disclosure policy, we are sharing one 
advisory for a 
*high-severity* security vulnerability fixed in Bitcoin Core version 29.0 
and above.

The detailed advisory can be found here: 
https://bitcoincore.org/en/2026/05/05/disclose-cve-2024-52911/.

Thanks to Cory Fields for reporting this issue and to everyone involved in 
fixing it.

Our disclosure policy as well as previously disclosed vulnerabilities are 
available on the Bitcoin Core website at 
https://bitcoincore.org/en/security-advisories/.

Niklas Goegge

-- 
You received this message because you are subscribed to the Google Groups "Bitcoin Development Mailing List" group.
To unsubscribe from this group and stop receiving emails from it, send an email to bitcoindev+unsubscribe@googlegroups.com.
To view this discussion visit https://groups.google.com/d/msgid/bitcoindev/dd3a05f3-19a5-42ab-9680-2bd897df8d4en%40googlegroups.com.

[-- Attachment #1.2: Type: text/html, Size: 1412 bytes --]

^ permalink raw reply	[flat|nested] 2+ messages in thread

* [bitcoindev] Re: Public disclosure of one high severity Bitcoin Core advisory (CVE-2024-52911)
  2026-05-05 13:17 [bitcoindev] Public disclosure of one high severity Bitcoin Core advisory (CVE-2024-52911) Niklas Goegge
@ 2026-05-06  0:25 ` Antoine Riard
  0 siblings, 0 replies; 2+ messages in thread
From: Antoine Riard @ 2026-05-06  0:25 UTC (permalink / raw)
  To: Bitcoin Development Mailing List


[-- Attachment #1.1: Type: text/plain, Size: 2641 bytes --]

Hi, This is an interesting class of bug. Escalating a use-after-free into a 
userspace remote code execution do not seem as unlikely as one can think. 
Thinking briefly about an escalation strategy: - 1. make specifically 
crafted invalid block (e.g a multi-input tx) - 2. scan the used kernel by 
the node to rough guess the memory allocator used - 3. progressively fill 
bitcoind to reach process virtual mem limit (i.e can't `mmap()` anymore) - 
4. trigger the struct pointer being freed (here it would be 
`PrecomputedTransactionData`) - 5. on a background / parallel thread 
accessing sensitive data struct, got the mem area being reallocated - 6. on 
your original thread, access the pointer to write in the sensitive struct 
Now, the open question is if the accessed data struct is somehow consensus, 
if it could be more severe than a simple crash, e.g a netsplit. Easier said 
than done, that is sure. With the validation code, currently it requires 
the `cs_main` lock, so in my understanding numerous entry points also 
requiring a lock held cannot be leveraged, that makes it harder to find a 
gadget (the step 4). I don't think you can ruled out non-cs_main holding 
entry points (e.g a RPC call), as long as the gadget is living in the same 
process memory space one might be able to trigger it. Minimal validation 
code that's less gadgets that can be adverserialy re-used for this class of 
bug. 0.14 -> nov 2024. 7 years not being found. Best, Antoine OTS: 
7396aa55e02738434d26e27cdadc9649ce568c38c3a3977d1f9094d1658d3c8d

Le Tuesday, May 5, 2026 à 2:41:20 PM UTC+1, Niklas Goegge a écrit :

> Hi everyone, 
>
> In accordance with our security disclosure policy, we are sharing one 
> advisory for a 
> *high-severity* security vulnerability fixed in Bitcoin Core version 29.0 
> and above.
>
> The detailed advisory can be found here: 
> https://bitcoincore.org/en/2026/05/05/disclose-cve-2024-52911/.
>
> Thanks to Cory Fields for reporting this issue and to everyone involved in 
> fixing it.
>
> Our disclosure policy as well as previously disclosed vulnerabilities are 
> available on the Bitcoin Core website at 
> https://bitcoincore.org/en/security-advisories/.
>
> Niklas Goegge
>
>

-- 
You received this message because you are subscribed to the Google Groups "Bitcoin Development Mailing List" group.
To unsubscribe from this group and stop receiving emails from it, send an email to bitcoindev+unsubscribe@googlegroups.com.
To view this discussion visit https://groups.google.com/d/msgid/bitcoindev/1eebd976-c242-4c6f-a8ce-4fc8d093a447n%40googlegroups.com.

[-- Attachment #1.2: Type: text/html, Size: 3795 bytes --]

^ permalink raw reply	[flat|nested] 2+ messages in thread

end of thread, other threads:[~2026-05-06  0:26 UTC | newest]

Thread overview: 2+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2026-05-05 13:17 [bitcoindev] Public disclosure of one high severity Bitcoin Core advisory (CVE-2024-52911) Niklas Goegge
2026-05-06  0:25 ` [bitcoindev] " Antoine Riard

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox