Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Coinbase to delist WBTC months after Justin Sun controversy

    August 9, 2025

    December Roundup | Ethereum Foundation Blog

    August 9, 2025

    TradFi tactics win on Uniswap v3 says BIS study

    August 9, 2025
    Facebook X (Twitter) Instagram
    Block Buzz News
    • Bitcoin
    • Coinbase
      • Litecoin
      • Altcoins
    • Blockchain
    • Crypto
    • Ethereum
    • Lithosphere News Releases
    Facebook X (Twitter) Instagram YouTube
    Block Buzz News
    Home » Solidity optimizer bug | Ethereum Foundation Blog
    Ethereum

    Solidity optimizer bug | Ethereum Foundation Blog

    Sophia BrownBy Sophia BrownAugust 9, 2025No Comments3 Mins Read
    Share
    Facebook Twitter LinkedIn Pinterest Email


    A bug in the Solidity optimizer was reported through the Ethereum Foundation Bounty program, by Christoph Jentzsch. This bug is patched as of 2017-05-03, with the release of Solidity 0.4.11.

    Background

    The bug in question concerned how the optimizer optimizes on constants in the byte code. By “byte code constants”, we mean anything which is PUSHed on the stack (not to be confused with Solidity constants). For example, if the value 0xfffffffffffffffffffffffffffffffffffffffffffffffe is PUSHed, then the optimizer can either do PUSH32 0xfffffffffffffffffffffffffffffffffffffffffffffffe, or choose to encode this as PUSH1 1; NOT;.

    An error in the optimizer made optimizations of byte code constants fail for certain cases by producing a routine that did not properly recreate the original constant.

    The behavior described in the reported bug was found in a contract in which one method ceased functioning when another – totally unrelated – method was added to the contract. After analysis, it was determined that a number of conditions must exist at once for the bug to trigger. Any combination of conditions that would trigger the bug would consistently have the following two conditions:

    1. The constant needs to start with 0xFF… and end with a long series of zeroes (or vice versa).
    2. The same constant needs to be used in multiple locations, for the optimizer to choose to optimize this particular constant. Alternatively, it needs to be used in the constructor, which optimises for size rather than gas.

    In addition to the two conditions above, there are further, more complicated conditions that are required.

    Analysis

    This bug is present in all released versions of Solidity from at least as far back as summer 2015 to the present. Although the bug has been present since 2015, it seems very hard to trigger by “random” code:

    We performed a static analysis of all contract code deployed on the blockchain, and found no occurrence of such an invalidly generated routine. Note, the fact that we have not found a bug in all the contract code does not guarantee the absence of such occurrences.

    Improvements

    In order to provide better transparency and increased awareness of bugs in Solidity, we have started exporting information about Solidity-related vulnerabilities as JSON-files in the Solidity code repository(1,2). We hope that block explorers will integrate this information along with other contract-related information.

    Etherscan has already implemented this, which can be seen here and here.

    Concerning the bug itself, we added a mini-EVM to the optimizer which verifies the correctness of each generated routine at compile time.

    Furthermore, work has already started on a fully-specified and more high-level intermediate language. Future optimizer routines on this language will be much easier to understand and audit and it will replace the current optimizer.



    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Sophia Brown

    Related Posts

    December Roundup | Ethereum Foundation Blog

    August 9, 2025

    Introduction of the Light Client for DApp developers

    August 9, 2025

    An Update on Integrating Zcash on Ethereum (ZoE)

    August 9, 2025

    Ethereum R&D Roundup: Valentine’s Day Edition

    August 9, 2025
    Add A Comment
    Leave A Reply Cancel Reply

    Top Posts

    Colle AI Optimizes Asset Transfer Engines for Better NFT Routing Flow

    June 10, 2025

    Crypto Products See ‘Noticeable Deceleration’ of Inflows As Monetary Policy Uncertainty Grows: CoinShares

    June 10, 2025

    BTC trades at $109.7K after weekend surge; Ethereum’s Pectra upgrade boosts institutional staking

    June 10, 2025

    Saylor to Jim Chanos: Three ways your MSTR short is doomed

    June 10, 2025
    Don't Miss
    Coinbase

    Coinbase to delist WBTC months after Justin Sun controversy

    By John SmithAugust 9, 2025

    Coinbase has announced that it intends to delist Wrapped Bitcoin (WBTC) from December 19 because…

    December Roundup | Ethereum Foundation Blog

    August 9, 2025

    TradFi tactics win on Uniswap v3 says BIS study

    August 9, 2025

    ETFs, DeFi, golden cross fuel $6,800 bull case

    August 9, 2025
    Stay In Touch
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    • YouTube
    • Vimeo

    Subscribe to Updates

    Get the latest creative news from SmartMag about art & design.

    About Us

    BlockBuzzNews: Your daily dose of the latest in cryptocurrency trends, insights, and updates!

    Our Picks

    Coinbase to delist WBTC months after Justin Sun controversy

    August 9, 2025

    December Roundup | Ethereum Foundation Blog

    August 9, 2025

    TradFi tactics win on Uniswap v3 says BIS study

    August 9, 2025
    Most Popular

    Colle AI Optimizes Asset Transfer Engines for Better NFT Routing Flow

    June 10, 2025

    Crypto Products See ‘Noticeable Deceleration’ of Inflows As Monetary Policy Uncertainty Grows: CoinShares

    June 10, 2025

    BTC trades at $109.7K after weekend surge; Ethereum’s Pectra upgrade boosts institutional staking

    June 10, 2025

    Type above and press Enter to search. Press Esc to cancel.