blubblibla Posted April 8, 2014 Share Posted April 8, 2014 (edited) Offizielles Release: v0.9.1 Bitcoin Core Version 0.9.1 ist zum Herunterladen verfügbar bei: https://bitcoin.org/bin/0.9.1/Dies ist ein Sicherheitsupdate, alle Benutzer sollten ihr Programm aktualisieren. Download:https://bitcoin.org/bin/0.9.1/https://bitcoin.org/en/downloadSource: https://github.com/bitcoin/bitcoin README:Bitcoin Core version 0.9.1 is now available from:https://bitcoin.org/bin/0.9.1/This is a security update. It is recommended to upgrade to this releaseas soon as possible.It is especially important to upgrade if you currently have version0.9.0 installed and are using the graphical interface OR you are usingbitcoind from any pre-0.9.1 version, and have enabled SSL for RPC andhave configured allowip to allow rpc connections from potentiallyhostile hosts.Please report bugs using the issue tracker at github:https://github.com/bitcoin/bitcoin/issuesHow to Upgrade--------------If you are running an older version, shut it down. Wait until it has completelyshut down (which might take a few minutes for older versions), then run theinstaller (on Windows) or just copy over /Applications/Bitcoin-Qt (on Mac) orbitcoind/bitcoin-qt (on Linux).If you are upgrading from version 0.7.2 or earlier, the first time you run0.9.1 your blockchain files will be re-indexed, which will take anywhere from30 minutes to several hours, depending on the speed of your machine.0.9.1 Release notes=======================No code changes were made between 0.9.0 and 0.9.1. Only the dependencies were changed.- Upgrade OpenSSL to 1.0.1g. This release fixes the following vulnerabilities which canaffect the Bitcoin Core software:- CVE-2014-0160 ("heartbleed")A missing bounds check in the handling of the TLS heartbeat extension canbe used to reveal up to 64k of memory to a connected client or server.- CVE-2014-0076The Montgomery ladder implementation in OpenSSL does not ensure thatcertain swap operations have a constant-time behavior, which makes iteasier for local users to obtain ECDSA nonces via a FLUSH+RELOAD cacheside-channel attack.- Add statically built executables to Linux buildCredits--------Credits go to the OpenSSL team for fixing the vulnerabilities quickly. Edited April 8, 2014 by blubblibla Link to comment Share on other sites More sharing options...
Kutscher Posted April 8, 2014 Share Posted April 8, 2014 Danke für den Hinweis. Der neue Linux Client funktioniert, soeben installiert. Link to comment Share on other sites More sharing options...
Recommended Posts
Create an account or sign in to comment
You need to be a member in order to leave a comment
Create an account
Sign up for a new account in our community. It's easy!
Register a new accountSign in
Already have an account? Sign in here.
Sign In Now