Before publicly revealing a serious security flaw, Solana developers, validators, and client teams secured a supermajority of its network share, therefore addressing the threat.
According to Solana validator Laine, the process began on Wednesday, Aug. 7, 2024, when the Solana Foundation contacted known network operators via secret channels. This first interaction was part of a plan to subtly fix the vulnerability so it couldn’t be used in any way.
Made available via an Anza engineer’s GitHub repository, Laine said the patch lets operators independently confirm and implement the improvements. Detailed instructions for applying the patch were sent to different stakeholders by Thursday, Aug. 8 at 14:00 UTC, therefore securing 66.6% of the network’s share.
Once the patch had been applied by 70% of the network, the vulnerability was made public. Solana Labs then sent a Discord warning, asking any surviving operators to update their systems. They said, “Core contributors have identified a network security issue that requires an urgent response. v1.18.21 with a patch will be available in 30 minutes. Please be prepared to upgrade as soon as the announcement is sent.”
You can also freely share your thoughts and comments about the topic in the comment section. Additionally, don’t forget to follow us on our Telegram, YouTube, and Twitter channels for the latest news and updates.