Content
@
0 reply
0 recast
0 reaction
Péter Szilágyi
@karalabe.eth
In case you missed it, Geth v1.13.14 and prior had a P2P regression that allowed remote bad actors to trigger a potential OOM blowup. This was fixed in Geth v1.13.15; and also all the Geth v1.14.x releases. Please ensure you're safe. https://github.com/ethereum/go-ethereum/security/advisories/GHSA-4xc9-8hmq-j652
2 replies
8 recasts
188 reactions
Péter Szilágyi
@karalabe.eth
Raising awareness again before we publish the details of the vuln.
0 reply
0 recast
0 reaction
oliver
@oliverk120.eth
No idea what this means, but im glad someone out there is doing something about it!
0 reply
0 recast
0 reaction