Monero v0.18.4.0 Released with Fixes for Network Vulnerabilities

Monero Releases Critical Update 0.18.4.0 to Address Multiple Network Vulnerabilities

  • Monero software version 0.18.4.0 has been released with critical fixes for multiple daemon-related network vulnerabilities.
  • The update includes 124 commits and 5,607 new lines of code, contributed by 17 developers.
  • Verification hashes are provided for all platform versions, with users encouraged to confirm file authenticity through GPG signature verification.

Monero has released version 0.18.4.0 of its software, addressing multiple daemon-related network vulnerabilities. The security-focused update is being recommended for all users and represents the collaborative effort of 17 developers who contributed 124 commits containing 5,607 new lines of code to the privacy-focused cryptocurrency’s codebase.

- Advertisement -

Users can obtain the new software directly from the Downloads page on the official Monero website. The release includes versions for multiple operating systems and architectures, ensuring comprehensive platform support across Windows, macOS, Linux, Android, and FreeBSD environments.

Security Verification Process

To ensure download integrity, the Monero team has published SHA256 hashes for each version of the software. These cryptographic checksums allow users to verify they have downloaded unaltered files. For example, the Windows 64-bit version (monero-win-x64-v0.18.4.0.zip) should match the hash 00151a96e96ef69eedf117c4900e6d0717ca074a61918cd94a55ed587544406b when verified.

The complete list of verification hashes covers twelve different platform-specific builds, including specialized versions for ARM processors and RISC-V architecture. This extensive platform support demonstrates Monero’s commitment to accessibility across diverse computing environments.

Enhanced Security Validation

For additional security, a GPG-signed list of the hashes is available at https://www.getmonero.org/downloads/hashes.txt. The Monero team recommends treating this signed document as the canonical reference for verification purposes.

- Advertisement -

“To ensure that the files you download are those originally posted by the maintainers, you should both check that the hashes of your files match those on the signed list, and that the signature on the list is valid,” the release notes explain. This two-step verification process helps protect users from potentially compromised downloads by confirming both file integrity and the authenticity of the hash list itself.

Users can verify the GPG signature against the appropriate GPG key found in the /utils/gpg_keys directory of the Monero source code. This comprehensive approach to security reflects the project’s focus on privacy and secure cryptocurrency transactions.

✅ Follow BITNEWSBOT on Telegram, Facebook, LinkedIn, X.com, and Google News for instant updates.

Previous Articles:

- Advertisement -

Latest News

Shopify, Coinbase Launch USDC Payments; Mastercard Expands Crypto Access

Shopify and Coinbase allow merchants to accept USDC stablecoin payments, making crypto transactions easier...

Coinbase Launches Wrapped ADA and LTC on Base, COIN Hits New High

Coinbase has introduced wrapped versions of Cardano (ADA) and Litecoin (LTC) on its Ethereum...

ClickFix Attacks Surge 517% in 2025, Fake CAPTCHAs Spread Malware

ClickFix attacks using fake CAPTCHA verifications have risen by 517% in early 2025, according...

FHFA Orders Fannie, Freddie to Consider Crypto as Mortgage Collateral

The U.S. Federal Housing Finance Agency ordered Fannie Mae and Freddie Mac to consider...

Retail Investors Can Now Buy Tokenized Shares of SpaceX via Blockchain

Retail investors can now buy blockchain-based fractional shares in SpaceX through Republic. These digital tokens...

Must Read

The 10 Best Crypto Podcasts You Can’t Miss

Table of ContentsBest Cryptocurrency Podcasts To Add To Your Playing List1. The Money Movement2. The Crypto Conversation3. The Pomp Podcast4. What Bitcoin Did5. The...