>> (p.1)
    Author Topic: Bitcoin Core 0.14.3 Released  (Read 162 times)
    This is a self-moderated topic. If you do not want to be moderated by the person who started this topic, create a new topic.
    achow101 (OP)
    Staff
    Legendary
    *
    Offline Offline

    Activity: 3752
    Merit: 7224


    Just writing some code


    View Profile WWW
    September 28, 2018, 06:33:34 PM
     #1

    Bitcoin Core version *0.14.3* is now available from:

      <https://bitcoin.org/bin/bitcoin-core-0.14.3/>

    This is a new minor version release, including various bugfixes and
    performance improvements.

    Please report bugs using the issue tracker at github:

      <https://github.com/bitcoin/bitcoin/issues>

    To receive security and update notifications, please subscribe to:

      <https://bitcoincore.org/en/list/announcements/join/>

    Compatibility
    ==============

    Bitcoin Core is extensively tested on multiple operating systems using
    the Linux kernel, macOS 10.8+, and Windows Vista and later.

    Microsoft ended support for Windows XP on [April 8th, 2014](https://www.microsoft.com/en-us/WindowsForBusiness/end-of-xp-support),
    No attempt is made to prevent installing or running the software on Windows XP, you
    can still do so at your own risk but be aware that there are known instabilities and issues.
    Please do not report issues about Windows XP to the issue tracker.

    Bitcoin Core should also work on most other Unix-like systems but is not
    frequently tested on them.

    Notable changes
    ===============

    Denial-of-Service vulnerability CVE-2018-17144
     -------------------------------

    A denial-of-service vulnerability exploitable by miners has been discovered in
    Bitcoin Core versions 0.14.0 up to 0.16.2. It is recommended to upgrade any of
    the vulnerable versions to 0.14.3, 0.15.2 or 0.16.3 as soon as possible.

    Known Bugs
    ==========

    Since 0.14.0 the approximate transaction fee shown in Bitcoin-Qt when using coin
    control and smart fee estimation does not reflect any change in target from the
    smart fee slider. It will only present an approximate fee calculated using the
    default target. The fee calculated using the correct target is still applied to
    the transaction and shown in the final send confirmation dialog.

    0.14.3 Change log
    =================

    Detailed release notes follow. This overview includes changes that affect
    behavior, not code moves, refactors and string updates. For convenience in locating
    the code changes and accompanying discussion, both the pull request and
    git merge commit are mentioned.

    ### Consensus
    - #14247 `52965fb` Fix crash bug with duplicate inputs within a transaction (TheBlueMatt, sdaftuar)
     
    ### RPC and other APIs

    - #10445 `87a21d5` Fix: make CCoinsViewDbCursor::Seek work for missing keys (Pieter Wuille, Gregory Maxwell)
    - #9853 Return correct error codes in setban(), fundrawtransaction(), removeprunedfunds(), bumpfee(), blockchain.cpp (John Newbery)


    ### P2P protocol and network code

    - #10234 `d289b56` [net] listbanned RPC and QT should show correct banned subnets (John Newbery)

    ### Build system


    ### Miscellaneous

    - #10451 `3612219` contrib/init/bitcoind.openrcconf: Don't disable wallet by default (Luke Dashjr)
    - #10250 `e23cef0` Fix some empty vector references (Pieter Wuille)
    - #10196 `d28d583` PrioritiseTransaction updates the mempool tx counter (Suhas Daftuar)
    - #9497 `e207342` Fix CCheckQueue IsIdle (potential) race condition and remove dangerous constructors. (Jeremy Rubin)

    ### GUI

    - #9481 `7abe7bb` Give fallback fee a reasonable indent (Luke Dashjr)
    - #9481 `3e4d7bf` Qt/Send: Figure a decent warning colour from theme (Luke Dashjr)
    - #9481 `e207342` Show more significant warning if we fall back to the default fee (Jonas Schnelli)

    ### Wallet

    - #10308 `28b8b8b` Securely erase potentially sensitive keys/values (tjps)
    - #10265 `ff13f59` Make sure pindex is non-null before possibly referencing in LogPrintf call. (Karl-Johan Alm)

    Credits
    =======

    Thanks to everyone who directly contributed to this release:

    - Cory Fields
    - CryptAxe
    - fanquake
    - Jeremy Rubin
    - John Newbery
    - Jonas Schnelli
    - Gregory Maxwell
    - Karl-Johan Alm
    - Luke Dashjr
    - MarcoFalke
    - Matt Corallo
    - Mikerah
    - Pieter Wuille
    - practicalswift
    - Suhas Daftuar
    - Thomas Snider
    - Tjps
    - Wladimir J. van der Laan

    And to those that reported security issues:

    - awemany (for CVE-2018-17144, previously credited as "anonymous reporter")



    Code:
    -----BEGIN PGP SIGNED MESSAGE-----
    Hash: SHA256

    0e2819135366f150d9906e294b61dff58fd1996ebd26c2f8e979d6c0b7a79580  bitcoin-0.14.3-aarch64-linux-gnu.tar.gz
    d86fc90824a85c38b25c8488115178d5785dbc975f5ff674f9f5716bc8ad6e65  bitcoin-0.14.3-arm-linux-gnueabihf.tar.gz
    cd90f6e87ad93a1f80b887a110bbb62238774abceafb89c05c169386611507fd  bitcoin-0.14.3-i686-pc-linux-gnu.tar.gz
    1b0a7408c050e3d09a8be8e21e183ef7ee570385dc41216698cc3ab392a484e7  bitcoin-0.14.3-osx64.tar.gz
    4eb0c16203f438ab5da4ca4bbbb25c578fb596de207f9a7dce60cb2b6031f244  bitcoin-0.14.3-osx.dmg
    416717ab5ef94f8458da2b12e4cd742ca08f5ad3817b65fc73811e06ac949f87  bitcoin-0.14.3.tar.gz
    93de0a72fc29e2eab2950e417a8f9122ecc38f682322f914c3a71c34679eb79f  bitcoin-0.14.3-win32-setup.exe
    25f7c686ad6f527b041f31836395139fa4814c39f76a9de8627e9c11cc537069  bitcoin-0.14.3-win32.zip
    750607708f4321209c5435ee54f1e1a1921fa5a2be567191e0b553be6bac2263  bitcoin-0.14.3-win64-setup.exe
    5ea84b6a4c1b03d5f4d1a718fbed215e2fd0e66ca7d59ca6141218d163ce1301  bitcoin-0.14.3-win64.zip
    706e0472dbc933ed2757650d54cbcd780fd3829ebf8f609b32780c7eedebdbc9  bitcoin-0.14.3-x86_64-linux-gnu.tar.gz
    -----BEGIN PGP SIGNATURE-----
    Version: GnuPG v1.4.11 (GNU/Linux)

    iQIcBAEBCAAGBQJbrjnzAAoJEJDIAZ42wulk6rwP/1p56pJfZS3QpO/SexlfAZa5
    8d6djLrJ7ZRSkovPV3buS3QHmdZauNby2e7qKTTcbu58JhJo92XKCcH/1ATsbTz9
    qlqLHKWwX0U9myMv9erZ1Rv8YlLzjPggQ5NW5Qb5DCInCSCGVtkkBx7ZUDhUXkbr
    X7gGxWq85NIYmi+SI2G2qK2gTh5SZyPPqONQCf0aPJIyrEvo5+QoO6AyN1zP6nJB
    RGHsnGE47WZcT00ep+sWM1RaVsTru1HFGrJFnOzA+tDZGcYBltuwDQEUyWfSJrum
    imDDLwwHHL9GRrJv0/0QlqZyGx5mHM2AOpGLRB3AJN03B3t4iE4q13VcQvHARZWS
    pzysZb//KN4a48X4dmfdEp1VStcD3oks6hYlDFFT/gyTyTfiSx5WFlV8dwB5kRk0
    GlMhR+St3eq0QsbQA/TmFLhURLNrHSmr3vJO1ApgcPS7uyxmq35+gUOhedPN5A6Y
    MPLC9ybabzE88cXHug1dUfQNjD0OsmFeydJhgxgedAQzFjgc3agFpnZMDKqa2lgV
    +Za92V/0YHABO+aLrACGMtYi3Mohh7JL0YrfVMEgqVmsDhE+epYE6cmoFmJB/RhA
    TOXmQ9lFdDwDfQyZHEfaz9xxoFPnGLfTR1FRb85Fw8BdnLsQfYV4mHAVJh2wWRP6
    GYq+iRuSl1Yo1UXCGQU2
    =JjSI
    -----END PGP SIGNATURE-----

    Pages: [1]
      Print  
Page 1
Viewing Page: 1