mirror of
https://github.com/oxen-io/oxen-core.git
synced 2023-12-14 02:22:56 +01:00
8f66b7053a
Essentially, one can send such a large amount of IDs that core exhausts all free memory. This issue can theoretically be exploited using very large CN blockchains, such as Monero. This is a partial fix. Thanks and credit given to CryptoNote author 'cryptozoidberg' for collaboration and the fix. Also thanks to 'moneromooo'. Referencing HackerOne report #506595. |
||
---|---|---|
.. | ||
block_queue.cpp | ||
block_queue.h | ||
CMakeLists.txt | ||
cryptonote_protocol_defs.h | ||
cryptonote_protocol_handler-base.cpp | ||
cryptonote_protocol_handler.h | ||
cryptonote_protocol_handler.inl | ||
cryptonote_protocol_handler_common.h |