Content pfp
Content
@
0 reply
0 recast
0 reaction

Péter Szilágyi pfp
Péter Szilágyi
@karalabe.eth
In case you missed it, Geth v1.13.14 and prior had a P2P regression that allowed remote bad actors to trigger a potential OOM blowup. This was fixed in Geth v1.13.15; and also all the Geth v1.14.x releases. Please ensure you're safe. https://github.com/ethereum/go-ethereum/security/advisories/GHSA-4xc9-8hmq-j652
6 replies
8 recasts
70 reactions

Péter Szilágyi pfp
Péter Szilágyi
@karalabe.eth
Raising awareness again before we publish the details of the vuln.
0 reply
0 recast
0 reaction

oliver pfp
oliver
@oliverk120.eth
No idea what this means, but im glad someone out there is doing something about it!
0 reply
0 recast
0 reaction

Doğuş pfp
Doğuş
@dogusyon
Hop
0 reply
0 recast
0 reaction

Rafiq pfp
Rafiq
@rafiq007
Please give me Degen
0 reply
0 recast
0 reaction

HAMi🎩🍖🔮 pfp
HAMi🎩🍖🔮
@hammad
In case you missed it, Geth v1.13.14 and prior had a P2P regression that allowed remote bad actors to trigger a potential OOM blowup. This was fixed in Geth v1.13.15; and also all the Geth v1.14.x releases. Please ensure your safe
0 reply
0 recast
0 reaction

Abdulsamad pfp
Abdulsamad
@abdulsamad
Pewpew
0 reply
0 recast
0 reaction

Md Fahim Sarkar pfp
Md Fahim Sarkar
@fahi
Back please mate 😍
0 reply
0 recast
0 reaction

vamsicbm pfp
vamsicbm
@vamsicbm
Peter
0 reply
0 recast
0 reaction

Pippi pfp
Pippi
@rabbi21
Pew pew Hope you have a happy day today
0 reply
0 recast
0 reaction

Lidoboss pfp
Lidoboss
@lidoboss
Great
0 reply
0 recast
0 reaction

sadanandam pfp
sadanandam
@kavithagoud
Nice
0 reply
0 recast
0 reaction

Jek🥷🏼 pfp
Jek🥷🏼
@jekich
Gm
0 reply
0 recast
0 reaction

Lucky Guy pfp
Lucky Guy
@tlsgmlwns
Thanks
0 reply
0 recast
0 reaction

MARI🍄🎭 pfp
MARI🍄🎭
@kimtee
wowow
0 reply
0 recast
0 reaction