Proposals of #10

Juno Security Upgrade CWA-2021-003

Exec Legacy Content
passed
Expected result
Turnout / Quorum
41.48% / 33.40%
Voting start 2021.12.22 at 00:12:00
Voting end 2021.12.27 at 00:12:00
99.18%
16 710 963 juno
Yes
0.47%
78 394 juno
No
0.00%
154 juno
Veto
0.36%
59 929 juno
Abstain

Details

logo
Proposer
-
Total deposit
500 juno
Submit time
2021.12.22 at 00:12:46
Deposit end time
2022.01.01 at 00:01:46

Description

Juno Security Upgrade CWA-2021-003\n\nA critical security vulnerability has been found on wasmvm 0.13.x, 0.14.x, 0.15.x, 0.16.x and 1.x (link) user funds are not at risk but this could lead to a chain halt and consensus break.\n\nA patch for this security breach will be released with juno v2.2.x.\n\nThis signaling governance proposal is to amend the software version specified on proposal #9 from v2.1.x to v2.2.x. \n\nIn this way we can upgrade the chain in one time and have both moneta-patch and security patch live as quickly as possible.\n\n## Notes\n\n1. v2.2.0 is consensus breaking against v2.1.0, so it's very important that super-majority of validators runs correct version.\n2. Validators can follow the previousily shared instructions for the upgrade, but using the new version of the software.\n3. This proposal will still be in voting period during and after the upgrade. This doesn't really affect the upgrade process, but in case of rejection of this proposal validators should coordinate to cancel the upgrade or run the previous agreed version of the software.\n

Votes

Voter
Answer