

Bitcoin Core has disclosed CVE-2024-52911, a high-severity memory bug that affected versions after 0.14.0 and before 29.0. The issue involved Bitcoin Core’s script interpreter during block validation and could have allowed a miner to crash vulnerable nodes with a specially crafted invalid block.
The flaw was a use-after-free issue, a memory safety bug where software continues accessing data after it has already been destroyed. In this case, Bitcoin Core pre-calculated transaction input data and sent script checks to background validation threads. Under a specific invalid-block path, the cached data could be destroyed while a background thread still attempted to read it.
That made the attack serious, but not easy. A successful attacker needed to mine a block with enough proof-of-work to reach the chain tip. Since the block would be invalid, the attacker would spend real mining resources without receiving the normal block reward. That economic barrier limits the practical attack surface, but the impact on affected nodes still pushed the issue into the High severity category.
The most sensitive part of the disclosure is the remote code execution angle. Use-after-free bugs can sometimes move beyond crashes into code execution, depending on memory layout, attacker control, and target conditions. Bitcoin Core’s advisory treats that outcome carefully: remote code execution was possible in principle, but unlikely because the attacker’s input was constrained by block data.
The bug did not create a supply inflation path, did not let an attacker steal BTC at the protocol level, and did not rewrite Bitcoin’s consensus rules. It was a node software vulnerability that could have disrupted machines still running affected Bitcoin Core releases.
Cory Fields of MIT Digital Currency Initiative privately reported the vulnerability on Nov. 2, 2024. Pieter Wuille pushed a covert fix four days later through an already open pull request, and the patch was merged in December 2024. The fix shipped with Bitcoin Core 29.0 in April 2025.
The public disclosure came on May 5, 2026, after the last vulnerable 28.x release line reached end of life on April 19. Under Bitcoin Core’s software life cycle, the project maintains the latest three major versions, while end-of-life versions generally stop receiving security fixes.
The immediate concern is not newly patched Bitcoin Core software. It is node operators who still run versions before 29.0. Bitcoin Core does not auto-update, so full-node operators, miners, service providers, custodians, and infrastructure teams need to manage upgrades directly.
The disclosure lands during a broader period of crypto infrastructure security pressure, from exchange and protocol incidents to smart-contract attack waves across DeFi. Bitcoin’s risk profile is different because full nodes verify blocks independently, but the lesson is similar: old software keeps old attack paths alive long after patches exist.
The clean operational response is to run a maintained Bitcoin Core version, preferably the latest release line available for the operator’s environment. CVE-2024-52911 was patched months before the public advisory, but every outdated node still turns a closed bug into a live dependency on luck, miner incentives, and the assumption that no one will spend hashpower to test the edge case.
The post Bitcoin Core High-Severity Bug Exposes Old Node Upgrade Risk appeared first on Crypto Adventure.