Solidity optimizer bug
A bug in the Solidity optimizer was discovered and reported through the Ethereum Foundation Bounty program by Christoph Jentzsch. The vulnerability has been patched with the release of Solidity version 0.4.11 on May 3, 2017.
1741 articles tagged with #ethereum. AI-curated summaries with sentiment analysis and key takeaways from 50+ sources.
A bug in the Solidity optimizer was discovered and reported through the Ethereum Foundation Bounty program by Christoph Jentzsch. The vulnerability has been patched with the release of Solidity version 0.4.11 on May 3, 2017.
Ethereum R&D team and Zcash Company are collaborating on the Zcash on Ethereum (ZoE) research project, which aims to combine blockchain programmability with privacy features. This joint initiative explores integrating Zcash's privacy capabilities with Ethereum's smart contract functionality.
Ethereum.org's forum database was compromised on December 16, 2016, with unauthorized access to user information. The Ethereum Foundation immediately launched an investigation to determine the scope and nature of the security breach.
A critical consensus bug was discovered in Geth versions v1.4.19 and v1.5.2 related to the journaling mechanism, causing an Ethereum network fork at block #2686351 on November 24, 2016. This represents a high-severity security issue affecting Ethereum's consensus layer and network stability.
The Go Ethereum team has released Geth 1.5, representing an almost complete internal rewrite of the Go Ethereum codebase. This major update contains extensive changes that the team considers significant enough to warrant detailed explanation rather than a simple feature list.
A critical security vulnerability affects Solidity compiler versions 0.1.6 to 0.4.3, allowing storage variables smaller than 256 bits to overwrite other variables when packed together. This bug could lead to unexpected behavior and potential security exploits in smart contracts compiled with these versions.
The Ethereum network is scheduled to undergo a hard fork at block number 2463000, expected to occur between 12:00-13:00 UTC on October 18, 2016. This represents a significant network upgrade that will affect all Ethereum participants and requires coordination across the ecosystem.
Ethereum is implementing a hard fork with EIP150 gas cost changes in response to sustained network attacks over recent weeks. The attackers exploited vulnerabilities in client implementations and protocol specifications, prompting this emergency protocol update.
A critical security vulnerability affects Geth nodes, causing them to crash due to out-of-memory errors when processing block 2283416. This high-severity issue has been addressed in Geth version 1.4.12.
The Ethereum Foundation announces its commitment to support the community consensus following the hard fork decision, focusing resources on the forked chain now called ETH. The decision was based on various metrics including carbonvote and ecosystem adoption patterns.
The Ethereum Foundation is grappling with the controversial decision of whether to implement a hard fork in response to The DAO incident. The organization acknowledges this as a delicate topic where no decision appears to be clearly correct, creating internal debate and community division.
A high-severity DoS vulnerability has been discovered in geth 1.4.8's implementation of the DAO soft fork. The vulnerability allows attackers to execute EVM code up to the block gas limit without payment, creating a potential denial of service attack vector.
The Ethereum ecosystem faced significant challenges following The DAO incident, highlighting the complexity of writing secure smart contracts and the difficulty of reaching consensus on major protocol decisions. The article discusses the ongoing debate around implementing a soft-fork solution to address the DAO vulnerability.
Smart contract wallets created using Ethereum Wallet Frontier version 0.4.0 (Beta 7) or earlier are vulnerable to phishing attacks. Wallets created with version 0.5.0 and later (released after March 3, 2016) are not affected, though the vulnerability has low likelihood but high severity.
cpp-ethereum versions 1.2.0 to 1.2.6 have a critical account unlocking security vulnerability that remains unfixed. Popular Ethereum clients like geth, Mist, and Ethereum Wallet are not affected by this issue and properly lock accounts.
A critical security vulnerability in cpp-ethereum versions 1.2.0 to 1.2.5 keeps user accounts unlocked, potentially allowing unauthorized access to funds. The issue has been fixed in version 1.2.6, while other Ethereum clients like geth and Mist are not affected.
A critical security vulnerability has been discovered in Geth and potentially other Ethereum clients that allows remote attackers to perform DoS attacks and stall the synchronization process. While the likelihood of exploitation is very low, the severity is high, prompting immediate updates for all Go client versions.
The Ethereum Foundation has partnered with banking consortium R3CEV to develop Lizardcoin, a new blockchain-based cryptocurrency designed to bridge centralized finance and blockchain technology. This collaboration aims to demonstrate blockchain benefits while making the technology more accessible to institutional clients and regulatory-compliant markets.
A security vulnerability in BLOCKHASH implementation affected Ethereum clients geth (versions up to 1.1.3 and 1.2.2) and eth (versions prior to 1.0.0), potentially causing consensus issues and chain reorganization. The bug has been fixed and users are advised to update their clients immediately.
DevCon 1 is scheduled to take place in London from November 9-13, marking a major milestone just over 100 days after Ethereum's network launch. The announcement highlights Ethereum's rapid growth from a few hundred nodes to a substantial, globally deployed stable network in its early months.
A critical security vulnerability has been discovered in Go Ethereum clients that could lead to invalid state roots when processing specific transaction sequences. The bug affects unpatched versions including v1.1.2, v1.0.4, and master branches before September 9, though the likelihood of exploitation is considered low.
A critical security vulnerability was discovered in Go and Python Ethereum clients (geth) that causes crashes when processing blocks with specific transaction combinations. The bug creates state transition and consensus issues that could lead to network-wide DoS attacks if exploited, but has been fixed and requires immediate client updates.
A security advisory warns that improperly configured Ethereum clients (particularly Geth) with exposed JSON-RPC ports, no firewall protection, and unlocked accounts can allow remote attackers to access funds. The vulnerability affects all Ethereum client implementations when configured insecurely, not just Geth.
A security vulnerability affects Windows users of the Alethzero GUI client, involving improper privacy permissions on the keys directory. Users of eth CLI client may also be at risk, while Frontier geth users are unaffected.
Ethereum releases its first major Frontier patch update, requiring users with keys from Go 1.0 rc or C++ 0.9.36 versions to regenerate all keys immediately. This represents a significant security-focused update for the early Ethereum network.