Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    2 weeks to Devconnect: Everything you need to know

    February 9, 2026

    Institutional Investors Pour $2,170,000,000 Into Bitcoin and Crypto Assets in One Week: CoinShares

    February 9, 2026

    Pi Network price gets oversold ahead of a big unlock and potential Kraken listing

    February 9, 2026
    Facebook X (Twitter) Instagram YouTube
    X (Twitter) Instagram YouTube LinkedIn
    Block Hub News
    • Lithosphere News Releases
    • Altcoins
      • Bitcoin
      • Coinbase
      • Litecoin
    • Crypto
    • Ethereum
    • Blockchain
    Block Hub News
    You are at:Home » Solidity Bugfix Release | Ethereum Foundation Blog
    Ethereum

    Solidity Bugfix Release | Ethereum Foundation Blog

    Olivia MartinezBy Olivia MartinezDecember 15, 2025No Comments3 Mins Read
    Facebook Twitter Pinterest LinkedIn Tumblr Email
    Share
    Facebook Twitter LinkedIn Pinterest Email


    The latest version 0.4.25 release of Solidity fixes
    two important bugs.
    Another important bug has already been fixed in version 0.4.22 but it was only discovered recently that the bug existed.

    Note that the Ethereum Foundation runs a bounty program for the code generator part of Solidity.

    Cleanup of Exponent in Exponentiation

    • Likelihood of occurrence: very low
    • Exploitability: high
    • Discoverability by tests: low
    • Fixed in version: 0.4.25

    Summary: Using short types in the exponent of an exponentiation operation can lead to invalid results.

    The Solidity language allows integer types that are shorter than 256 bits, even though the Ethereum Virtual Machine
    only knows types of exactly 256 bits. Because of that, higher order bits need to be set to zero from time to time.
    For many operations, it is not relevant whether those bits are set to zero or not (addition is one example).
    Because of that, the Solidity compiler delays this cleanup until it is needed in order to save gas.

    In the very special circumstance that the exponent of the ** operator has a type that is shorter
    than 256 bits, but not shorter than the type of the base and contains dirty higher order bits,
    this can lead to an incorrect result. Note that literal exponents like in x ** 2 as well as
    the case where the type of the base is uint256 or int256 are unaffected.

    Note that a function parameter can have dirty higher order bits if called by a malicious entity,
    and the same is true for data returned from functions of contracts deployed by malicious entities.

    After having screened a large number of contracts, we deem this bug to affect only a very tiny number of
    smart contracts, if any at all, because the regular uses of the exponentiation operator do not lead to the bug.

    This bug was found by nweller.

    Memory Corruption in Multi-Dimensional Array Decoder

    • Likelihood of occurrence: low
    • Exploitability: medium
    • Discoverability by tests: high
    • Introduced in version: 0.1.4
    • Fixed in version: 0.4.22

    Summary: Calling functions of other contracts that return multi-dimensional fixed-size arrays results in memory corruption.

    If Solidity code calls a function that returns a multi-dimensional fixed-size array,
    the returned ABI-encoded data has to be converted to Solidity’s internal representation
    of arrays. In Solidity, multi-dimensional arrays are implemented as arrays of
    memory pointers, while in the ABI, the data is encoded inline.
    The decoder did not take this difference into account with the result that the returned
    elements are interpreted as memory pointers and thus can cause memory
    corruption if the return values are accessed. Calling functions with multi-dimensional
    fixed-size array arguments is unaffected as is returning fixed-size arrays from function calls
    if they are not used in a Solidity contract.
    The bug is only in the component that decodes a multi-dimensional fixed-size array
    that is returned from a function call from Solidity.

    This bug was found by jmahhh.

    Invalid Encoding of Structs in Events

    • Likelihood of occurrence: low
    • Exploitability: low
    • Discoverability by tests: high
    • Introduced in version: 0.4.17
    • Fixed in version: 0.4.25

    Summary: Structs as event parameters are not handled properly.

    Structs were not meant to be supported as event parameters without the new ABI encoder.
    The compiler did accept them nevertheless, but encoded their memory address instead of their actual value.
    Even with the new ABI encoder, structs cannot be indexed event parameters.

    Now, structs are properly disallowed for the old encoder and if they are indexed also for the new encoder.



    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleTether’s USDT Stablecoin Approved by Abu Dhabi Regulator For Use Across Multiple Blockchains
    Next Article Elon Musk’s old Instagram handle up for auction, bids currently at $6K
    Olivia Martinez

    Related Posts

    2 weeks to Devconnect: Everything you need to know

    February 9, 2026

    Fusaka Mainnet Announcement | Ethereum Foundation Blog

    February 8, 2026

    Allocation Update – Q3 2025

    February 8, 2026
    Leave A Reply Cancel Reply

    Demo
    Latest Posts

    2 weeks to Devconnect: Everything you need to know

    February 9, 20260 Views

    Institutional Investors Pour $2,170,000,000 Into Bitcoin and Crypto Assets in One Week: CoinShares

    February 9, 20261 Views

    Pi Network price gets oversold ahead of a big unlock and potential Kraken listing

    February 9, 20261 Views

    CHART: Bitcoin has lost all of its gains since Trump’s election

    February 9, 20261 Views
    Don't Miss

    Devconnect is back! See you this year in Istanbul.

    By Olivia MartinezNovember 28, 2025

    Dear Ethereum community, builders, and researchers, At the first-ever Devconnect last year in Amsterdam in…

    Is Howard Lutnick fundraising for Tether?

    November 26, 2025

    Terra Founder Do Kwon sentenced to 15 Years, the harshest verdict in crypto history

    December 12, 2025
    Stay In Touch
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    • YouTube
    • Vimeo

    Subscribe to Updates

    Get the latest creative news from SmartMag about art & design.

    Demo
    X (Twitter) Instagram YouTube LinkedIn
    Our Picks

    2 weeks to Devconnect: Everything you need to know

    February 9, 2026

    Institutional Investors Pour $2,170,000,000 Into Bitcoin and Crypto Assets in One Week: CoinShares

    February 9, 2026

    Pi Network price gets oversold ahead of a big unlock and potential Kraken listing

    February 9, 2026
    Most Popular

    Devconnect is back! See you this year in Istanbul.

    November 28, 202526 Views

    Is Howard Lutnick fundraising for Tether?

    November 26, 20254 Views

    Terra Founder Do Kwon sentenced to 15 Years, the harshest verdict in crypto history

    December 12, 20253 Views
    © 2026 - 2026

    Type above and press Enter to search. Press Esc to cancel.