Close Menu
    X (Twitter)
    Blockchain Journal
    • News
      • Blockchain News
      • Bitcoin News
      • Ethereum News
      • NFT
      • DeFi News
      • Polkadot News
      • Chainlink News
      • Ripple News
      • Cardano News
      • EOS News
      • Litecoin News
      • Monero News
      • Stellar News
      • Tron News
      • Press Releases
      • Opinion
      • Sponsored
    • Price Analisys
    • Learn Crypto
    • Contact
    • bandera
    Facebook X (Twitter) Instagram
    Blockchain Journal
    Home » Vitaly Buterin sees no danger in the new vulnerability Ethereum

    Vitaly Buterin sees no danger in the new vulnerability Ethereum

    0
    By BlockchainJournal on February 17, 2019 News
    Share
    Facebook Twitter LinkedIn Pinterest Email

    Ethereum co-founder Vitalik Buterin, like several other leading developers of the platform, does not see a serious security threat in the bug that was identified in the code of the upcoming Constantinople system upgrade.

    Earlier it was reported that the detected vulnerability affects some smart contracts with the possibility of self-destruction. In particular, the function called Create2, assigned to EIP-1014, can replace the self-destructed smart contract, simultaneously changing the rules specified in it, which could potentially lead to loss of funds.

    This question was raised at the last Ethereum video conference, and most of them believe that this possible attack vector does not pose a serious threat. Buterin also agreed with this opinion.

    “Speaking about the future and thinking about such things as renting and deleting [data], we must remember that it may be possible to bring the contract to such a state when it turns out to be without the option of self-destruction … It’s not that we need to decide urgent over the next few weeks, although this needs to be remembered in the near future, when ETH 2.0 sharding will be linked to the virtual machine specifications, ”said Buterin.


    Jason Carver, developer of the Ethereum Foundation, said earlier that the self-destruction function does not carry additional risks in the current version of the protocol, but after upgrading to Constantinople, the code can be used to steal all allocated tokens of the smart contract.

    Among the possible technical solutions to this problem, the developers proposed to prescribe in the Create2 function additional protection against replaying.

    It is expected that the identified bug and work to eliminate it will not affect the activation of the hard forks of Constantinople, which should take place in the last days of this February.

    Subscribe to BlockchainJournal on Facebook !

    << aside id = "unisender_subscribe_form-10" class = "widget unisender_form">

    BlockchainJournal.news

    BlockchainJournal.news

    ETH ethereum Featured Video Work
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    BlockchainJournal

    Related Posts

    ARK Invest Unloads Coinbase and GBTC Shares by Millions Amid Market Boom

    December 6, 20232 Mins Read

    GBTC Discount Shrinks as Bitcoin Price Surges

    December 6, 20232 Mins Read

    IBM Introduces OSO, Designed for Cold Storage of Digital Assets

    December 6, 20232 Mins Read

    Marathon Digital Produced 1,187 Bitcoins in November and Held 14,025 Unrestricted BTC

    December 5, 20232 Mins Read

    Volume Counterfeiting Allegations Rock RATS Token on Gate Exchange

    December 5, 20232 Mins Read

    A New Era for Cryptocurrency: Zodia Custody’s Integration with Harmonize

    December 4, 20232 Mins Read

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    © 2025 Blockchain Journal

    Type above and press Enter to search. Press Esc to cancel.

    We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.