By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
Sign In
Time puterTime puter
Aa
  • Home
  • Social Media
  • Softwares
  • Gadgets
  • Mobiles
  • Solution
  • Apple
  • News
  • Contact Us!
Reading: Ethereum Software Parity to Update After Critical Bug Detected
Share
Time puterTime puter
Aa
Search
  • Home
  • Social Media
  • Softwares
  • Gadgets
  • Mobiles
  • Solution
  • Apple
  • News
  • Contact Us!
Have an existing account? Sign In
Follow US
© 2022 Foxiz News Network. Ruby Design Company. All Rights Reserved.
Time puter > Softwares > Ethereum Software Parity to Update After Critical Bug Detected
Softwares

Ethereum Software Parity to Update After Critical Bug Detected

Loknath Das
Last updated: 2018/06/06 at 4:25 PM
Loknath Das Published June 6, 2018
Share
5 Min Read

Image result for Ethereum Software Parity to Update After Critical Bug Detected

A critical consensus bug has been uncovered in a testing environment used by one of the two principal softwares crucial to the operation of the world’s second-largest blockchain.

Revealed last night by UK-based Parity Technologies in a blog post, the issue was found to cause those running the software to fall out of sync, meaning others using different software would not recognize their transactions. While the vulnerability was found on a testnet, the worry is that it could be exploited on the mainnet as well.

As such, Parity is now urging all users to update their software to a newly patched version.

Publicly available data suggests the bug could have impacted roughly 30 percent of the ethereum network – those that use software issued by Parity to stay in sync with the wider network. But according to representatives of Parity, the issue was patched before it reached nodes operating the live ethereum blockchain.

Still, companies must update to the new software to remain safe from the vulnerability on the mainnet.

Speaking on Twitter, several companies, including mining pool Bitfly, have come forward to state they’ve updated their software to the newly secured iteration (1.10.6-stable or 1.11.3-beta).

As companies that operate on ethereum begin updating their software to avoid the issue, it has been theorized that it could still impact any blockchains that run Parity software, including users of ethereum classic (ETC).

The news of the vulnerability comes at a time when Parity has been under increased scrutiny for several similar security issues. Most notably, last November, a bug in one of the company’s wallet offerings led 513,774.16 ETH, or $311 million according to current metrics, being frozen and in turn, inaccessible to its owners.

Discussion as to whether the frozen funds should be returned is ongoing, but in the interim, Parity has stated its commitment to a refined security process, writing:

“We would like for our bugs to be a catalyst for more secure ethereum development.”

Three lines of code

Speaking to CoinDesk, Wei Tang, a Parity developer who assisted with yesterday’s code patch, said that the bug is linked to a piece of code from ethereum improvement proposal (EIP) 86.

Formerly planned for ethereum’s upgrade last year, EIP 86 aimed to introduce what is called “account abstraction,” allowing for transactions to be sent without a signature from the sender. The full ethereum upgrade to EIP 86 was postponed due to its complexity, however, Wei explained that Parity nevertheless implemented the code, possibly due to its role in ethereum’s upcoming consensus switch.

According to Wei, the team in charge of implementing it within Parity’s software had overlooked three lines of code that led to yesterday’s consensus issue.

“We missed a conditional check in our code that caused full node Parity to accept a block containing invalid transactions,” Wei told CoinDesk.

Several such transactions were discovered on the Ropsten test network yesterday, and due to the transactions incompatibility with the wider ethereum blockchain, the transactions led a fork to occur between Parity and Geth (the largest provider of ethereum software accounting for 60 percent of users) clients.

Speaking in a press release, Kirill Pimenov, head of security at Parity, said that in the “worst case” such transactions would have resulted in corrupted blocks on the ethereum mainnet that “would still be treated as valid by other affected Parity ethereum nodes.”

Given sufficient hashpower, such an exploit would result in a blockchain split, Pimenov continued.

“The response to this situation was proactive, meaning we were able to prepare a fix before anyone was actually able to exploit the bug. As a result, we have managed to avert a mainnet split,” Pimenov stated in the press release.

Wei echoed this, saying the fix, which was released mere hours ago, was simple.

“We add those three lines of the missing conditional check in our code,” Wei told CoinDesk, adding:

“But yeah this three lines have severe effect. We’ve also got many eyes to review the code during the process.”

 

[“Source-coindesk”]

TAGGED: after, bug, critical, Detected, Ethereum, Parity, software, to, update
Loknath Das June 6, 2018
Share
Previous Article iOS 11.4 Update Released With AirPlay 2, Messages in iCloud, and More: How to Download and Install
Next Article Global Veterinary Practice Management Softwares Market 2018 – Patterson Companies, ezyVET Limited, MedaNext, Animal Intelligence Software, Onward Systems

Recent Post

  • Do Varicose Veins Disappear After Pregnancy? Understanding the Postpartum Journey
  • Pregnancy Tests on the Go: Exploring the Availability of Pregnancy Tests at Gas Stations
  • Do Gas Stations Sell Pregnancy Tests? Exploring Convenience Store Offerings for Personal Health Needs
  • Crafting Comfort: DIY Pregnancy Pillow – A Guide to Personalized Pregnancy Support
  • Craving Avocado During Pregnancy: A Clue to Your Baby’s Gender?
  • Daryl Hannah’s Joyful Journey: Embracing Pregnancy and Motherhood
  • Unusual Cramping after Orgasm: Could It Be an Early Pregnancy Sign? Join the Discussion
  • Coping with the Emotional Challenges of Terminating a Pregnancy for Fetal Abnormality
Join Us!

Subscribe to our newsletter and never miss our latest news, podcasts etc..

[mc4wp_form]
Zero spam, Unsubscribe at any time.

Removed from reading list

Undo
Welcome Back!

Sign in to your account

Lost your password?