As part of last week’s network-wide upgrade to 3.0.0 a consensus breaking patch was rolled out that fixes a security vulnerability of medium severity where malleable blocks can be produced to force a chain split.
There has been no indication of the vulnerability ever having been exploited. Attacks to target users following a successful chain split would have been exceptionally difficult to pull off in practice. After the release of 3.0.0, users are not vulnerable, and no further action is required.
Just to follow up on this. A link to the initial question on gitter chat was included in the vulnerability writeup but credit/attribution for this was not particularly clear.
Thanks @devrandom for asking what at first glance appeared to be a simple question on an implementation detail.
This was then followed up with a more specific point related to the original question. This turned out to very concisely describe the underlying problem behind the vulnerability.