-
Notifications
You must be signed in to change notification settings - Fork 0
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
chore(deps): update dependency @openzeppelin/contracts-upgradeable to v4.9.1 [security] - autoclosed #130
Closed
renovate
wants to merge
1
commit into
main
from
renovate/npm-@openzeppelin/contracts-upgradeable-vulnerability
Closed
Conversation
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
The latest updates on your projects. Learn more about Vercel for Git ↗︎
|
renovate
bot
force-pushed
the
renovate/npm-@openzeppelin/contracts-upgradeable-vulnerability
branch
from
August 14, 2022 02:04
87c5e10
to
2be3d9a
Compare
renovate
bot
changed the title
chore(deps): update dependency @openzeppelin/contracts-upgradeable to v4.7.1 [security]
chore(deps): update dependency @openzeppelin/contracts-upgradeable to v4.7.2 [security]
Aug 14, 2022
renovate
bot
force-pushed
the
renovate/npm-@openzeppelin/contracts-upgradeable-vulnerability
branch
from
August 18, 2022 21:42
2be3d9a
to
f6222d9
Compare
renovate
bot
changed the title
chore(deps): update dependency @openzeppelin/contracts-upgradeable to v4.7.2 [security]
chore(deps): update dependency @openzeppelin/contracts-upgradeable to v4.7.3 [security]
Aug 18, 2022
renovate
bot
force-pushed
the
renovate/npm-@openzeppelin/contracts-upgradeable-vulnerability
branch
from
April 23, 2023 07:02
f6222d9
to
fb05d2d
Compare
renovate
bot
changed the title
chore(deps): update dependency @openzeppelin/contracts-upgradeable to v4.7.3 [security]
chore(deps): update dependency @openzeppelin/contracts-upgradeable to v4.8.3 [security]
Apr 23, 2023
renovate
bot
force-pushed
the
renovate/npm-@openzeppelin/contracts-upgradeable-vulnerability
branch
from
July 23, 2023 15:09
fb05d2d
to
97eb258
Compare
renovate
bot
force-pushed
the
renovate/npm-@openzeppelin/contracts-upgradeable-vulnerability
branch
from
July 23, 2023 19:47
97eb258
to
17e23e8
Compare
renovate
bot
changed the title
chore(deps): update dependency @openzeppelin/contracts-upgradeable to v4.8.3 [security]
chore(deps): update dependency @openzeppelin/contracts-upgradeable to v4.9.1 [security]
Jul 23, 2023
renovate
bot
force-pushed
the
renovate/npm-@openzeppelin/contracts-upgradeable-vulnerability
branch
from
July 23, 2023 21:06
17e23e8
to
8e3cbb7
Compare
renovate
bot
force-pushed
the
renovate/npm-@openzeppelin/contracts-upgradeable-vulnerability
branch
from
July 24, 2023 00:45
8e3cbb7
to
ba1f7b7
Compare
renovate
bot
force-pushed
the
renovate/npm-@openzeppelin/contracts-upgradeable-vulnerability
branch
from
July 24, 2023 16:20
ba1f7b7
to
32f4e3d
Compare
renovate
bot
force-pushed
the
renovate/npm-@openzeppelin/contracts-upgradeable-vulnerability
branch
from
July 31, 2023 01:17
b3d1015
to
f804f5a
Compare
renovate
bot
force-pushed
the
renovate/npm-@openzeppelin/contracts-upgradeable-vulnerability
branch
from
July 31, 2023 16:29
f804f5a
to
02a5959
Compare
renovate
bot
force-pushed
the
renovate/npm-@openzeppelin/contracts-upgradeable-vulnerability
branch
from
July 31, 2023 18:27
02a5959
to
4299ed7
Compare
renovate
bot
force-pushed
the
renovate/npm-@openzeppelin/contracts-upgradeable-vulnerability
branch
from
July 31, 2023 21:06
4299ed7
to
424f4fe
Compare
renovate
bot
force-pushed
the
renovate/npm-@openzeppelin/contracts-upgradeable-vulnerability
branch
from
August 1, 2023 17:30
424f4fe
to
9f02630
Compare
renovate
bot
force-pushed
the
renovate/npm-@openzeppelin/contracts-upgradeable-vulnerability
branch
from
August 1, 2023 18:07
9f02630
to
4b1ed0f
Compare
renovate
bot
force-pushed
the
renovate/npm-@openzeppelin/contracts-upgradeable-vulnerability
branch
from
August 1, 2023 22:52
4b1ed0f
to
0cac766
Compare
renovate
bot
force-pushed
the
renovate/npm-@openzeppelin/contracts-upgradeable-vulnerability
branch
from
August 2, 2023 00:47
0cac766
to
b4b4cb2
Compare
… v4.9.1 [security]
renovate
bot
force-pushed
the
renovate/npm-@openzeppelin/contracts-upgradeable-vulnerability
branch
from
August 2, 2023 03:24
b4b4cb2
to
274df6c
Compare
renovate
bot
changed the title
chore(deps): update dependency @openzeppelin/contracts-upgradeable to v4.9.1 [security]
chore(deps): update dependency @openzeppelin/contracts-upgradeable to v4.9.1 [security] - autoclosed
Aug 6, 2024
renovate
bot
deleted the
renovate/npm-@openzeppelin/contracts-upgradeable-vulnerability
branch
August 6, 2024 08:10
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
This PR contains the following updates:
4.5.2
->4.9.1
GitHub Vulnerability Alerts
CVE-2022-31170
Impact
ERC165Checker.supportsInterface
is designed to always successfully return a boolean, and under no circumstance revert. However, an incorrect assumption about Solidity 0.8'sabi.decode
allows some cases to revert, given a target contract that doesn't implement EIP-165 as expected, specifically if it returns a value other than 0 or 1.The contracts that may be affected are those that use
ERC165Checker
to check for support for an interface and then handle the lack of support in a way other than reverting.Patches
The issue was patched in 4.7.1.
References
https://github.com/OpenZeppelin/openzeppelin-contracts/pull/3552
For more information
If you have any questions or comments about this advisory, or need assistance deploying the fix, email us at security@openzeppelin.com.
CVE-2022-31172
Impact
SignatureChecker.isValidSignatureNow
is not expected to revert. However, an incorrect assumption about Solidity 0.8'sabi.decode
allows some cases to revert, given a target contract that doesn't implement EIP-1271 as expected.The contracts that may be affected are those that use
SignatureChecker
to check the validity of a signature and handle invalid signatures in a way other than reverting. We believe this to be unlikely.Patches
The issue was patched in 4.7.1.
References
https://github.com/OpenZeppelin/openzeppelin-contracts/pull/3552
For more information
If you have any questions or comments about this advisory, or need assistance deploying the fix, email us at security@openzeppelin.com.
CVE-2022-35915
Impact
The target contract of an EIP-165
supportsInterface
query can cause unbounded gas consumption by returning a lot of data, while it is generally assumed that this operation has a bounded cost.Patches
The issue has been fixed in v4.7.2.
References
https://github.com/OpenZeppelin/openzeppelin-contracts/pull/3587
For more information
If you have any questions or comments about this advisory, or need assistance deploying a fix, email us at security@openzeppelin.com.
CVE-2022-31198
Impact
This issue concerns instances of Governor that use the module
GovernorVotesQuorumFraction
, a mechanism that determines quorum requirements as a percentage of the voting token's total supply. In affected instances, when a proposal is passed to lower the quorum requirement, past proposals may become executable if they had been defeated only due to lack of quorum, and the number of votes it received meets the new quorum requirement.Analysis of instances on chain found only one proposal that met this condition, and we are actively monitoring for new occurrences of this particular issue.
Patches
This issue has been patched in v4.7.2.
Workarounds
Avoid lowering quorum requirements if a past proposal was defeated for lack of quorum.
References
https://github.com/OpenZeppelin/openzeppelin-contracts/pull/3561
For more information
If you have any questions or comments about this advisory, or need assistance deploying the fix, email us at security@openzeppelin.com.
CVE-2022-35961
Impact
The functions
ECDSA.recover
andECDSA.tryRecover
are vulnerable to a kind of signature malleability due to accepting EIP-2098 compact signatures in addition to the traditional 65 byte signature format. This is only an issue for the functions that take a singlebytes
argument, and not the functions that taker, v, s
orr, vs
as separate arguments.The potentially affected contracts are those that implement signature reuse or replay protection by marking the signature itself as used rather than the signed message or a nonce included in it. A user may take a signature that has already been submitted, submit it again in a different form, and bypass this protection.
Patches
The issue has been patched in 4.7.3.
For more information
If you have any questions or comments about this advisory, or need assistance deploying a fix, email us at security@openzeppelin.com.
CVE-2023-30541
Impact
A function in the implementation contract may be inaccessible if its selector clashes with one of the proxy's own selectors. Specifically, if the clashing function has a different signature with incompatible ABI encoding, the proxy could revert while attempting to decode the arguments from calldata.
The probability of an accidental clash is negligible, but one could be caused deliberately.
Patches
The issue has been fixed in v4.8.3.
Workarounds
If a function appears to be inaccessible for this reason, it may be possible to craft the calldata such that ABI decoding does not fail at the proxy and the function is properly proxied through.
References
https://github.com/OpenZeppelin/openzeppelin-contracts/pull/4154
CVE-2023-30542
Impact
The proposal creation entrypoint (
propose
) inGovernorCompatibilityBravo
allows the creation of proposals with asignatures
array shorter than thecalldatas
array. This causes the additional elements of the latter to be ignored, and if the proposal succeeds the corresponding actions would eventually execute without any calldata. TheProposalCreated
event correctly represents what will eventually execute, but the proposal parameters as queried throughgetActions
appear to respect the original intended calldata.Patches
This issue has been patched in v4.8.3.
Workarounds
Ensure that all proposals that pass through governance have equal length
signatures
andcalldatas
parameters.CVE-2023-34234
Impact
By frontrunning the creation of a proposal, an attacker can become the proposer and gain the ability to cancel it. The attacker can do this repeatedly to try to prevent a proposal from being proposed at all.
This impacts the
Governor
contract in v4.9.0 only, and theGovernorCompatibilityBravo
contract since v4.3.0.Patches
The problem has been patched in 4.9.1 by introducing opt-in frontrunning protection.
Workarounds
Submit the proposal creation transaction to an endpoint with frontrunning protection.
Credit
Reported by Lior Abadi and Joaquin Pereyra from Coinspect.
References
https://www.coinspect.com/openzeppelin-governor-dos/
CVE-2023-40014
Impact
OpenZeppelin Contracts is a library for secure smart contract development. Starting in version 4.0.0 and prior to version 4.9.3, contracts using
ERC2771Context
along with a custom trusted forwarder may see_msgSender
returnaddress(0)
in calls that originate from the forwarder with calldata shorter than 20 bytes. This combination of circumstances does not appear to be common, in particular it is not the case forMinimalForwarder
from OpenZeppelin Contracts, or any deployed forwarder the team is aware of, given that the signer address is appended to all calls that originate from these forwarders.Patches
The problem has been patched in v4.9.3.
CVE-2024-27094
Impact
The
Base64.encode
function encodes abytes
input by iterating over it in chunks of 3 bytes. When this input is not a multiple of 3, the last iteration may read parts of the memory that are beyond the input buffer.Although the
encode
function pads the output for these cases, up to 4 bits of data are kept between the encoding and padding, corrupting the output if these bits were dirty (i.e. memory after the input is not 0). These conditions are more frequent in the following scenarios:bytes memory
struct is allocated just after the input and the first bytes of it are non-zero.Developers should evaluate whether the extra bits can be maliciously manipulated by an attacker.
Patches
Upgrade to 5.0.2 or 4.9.6.
References
This issue was reported by the Independent Security Researcher Riley Holterhus through Immunefi (@rileyholterhus on X)
Release Notes
OpenZeppelin/openzeppelin-contracts-upgradeable (@openzeppelin/contracts-upgradeable)
v4.9.1
Compare Source
Governor
: Add a mechanism to restrict the address of the proposer using a suffix in the description.v4.9.0
Compare Source
ReentrancyGuard
: Add a_reentrancyGuardEntered
function to expose the guard status. (#3714)ERC721Wrapper
: add a new extension of theERC721
token which wraps an underlying token. Deposit and withdraw guarantee that the ownership of each token is backed by a corresponding underlying token with the same identifier. (#3863)EnumerableMap
: add akeys()
function that returns an array containing all the keys. (#3920)Governor
: add a publiccancel(uint256)
function. (#3983)Governor
: Enable timestamp operation for blockchains without a stable block time. This is achieved by connecting a Governor's internal clock to match a voting token's EIP-6372 interface. (#3934)Strings
: addequal
method. (#3774)IERC5313
: Add an interface for EIP-5313 that is now final. (#4013)IERC4906
: Add an interface for ERC-4906 that is now Final. (#4012)StorageSlot
: Add support forstring
andbytes
. (#4008)Votes
,ERC20Votes
,ERC721Votes
: support timestamp checkpointing using EIP-6372. (#3934)ERC4626
: Add mitigation to the inflation attack through virtual shares and assets. (#3979)Strings
: addtoString
method for signed integers. (#3773)ERC20Wrapper
: Make theunderlying
variable private and add a public accessor. (#4029)EIP712
: add EIP-5267 support for better domain discovery. (#3969)AccessControlDefaultAdminRules
: Add an extension ofAccessControl
with additional security rules for theDEFAULT_ADMIN_ROLE
. (#4009)SignatureChecker
: AddisValidERC1271SignatureNow
for checking a signature directly against a smart contract using ERC-1271. (#3932)SafeERC20
: Add aforceApprove
function to improve compatibility with tokens behaving like USDT. (#4067)ERC1967Upgrade
: removed contract-wideoz-upgrades-unsafe-allow delegatecall
annotation, replaced by granular annotation inUUPSUpgradeable
. (#3971)ERC20Wrapper
: self wrapping and deposit by the wrapper itself are now explicitly forbidden. (#4100)ECDSA
: optimize bytes32 computation by using assembly instead ofabi.encodePacked
. (#3853)ERC721URIStorage
: Emit ERC-4906MetadataUpdate
in_setTokenURI
. (#4012)ShortStrings
: Added a library for handling short strings in a gas efficient way, with fallback to storage for longer strings. (#4023)SignatureChecker
: Allow return data length greater than 32 from EIP-1271 signers. (#4038)UUPSUpgradeable
: added granularoz-upgrades-unsafe-allow-reachable
annotation to improve upgrade safety checks on latest version of the Upgrades Plugins (starting with@openzeppelin/upgrades-core@1.21.0
). (#3971)Initializable
: optimize_disableInitializers
by using!=
instead of<
. (#3787)Ownable2Step
: makeacceptOwnership
public virtual to enable usecases that require overriding it. (#3960)UUPSUpgradeable.sol
: Change visibility to the functionsupgradeTo
andupgradeToAndCall
fromexternal
topublic
. (#3959)TimelockController
: Add theCallSalt
event to emit on operation schedule. (#4001)Math
: optimizelog256
rounding check. (#3745)ERC20Votes
: optimize by using unchecked arithmetic. (#3748)Multicall
: annotatemulticall
function as upgrade safe to not raise a flag for its delegatecall. (#3961)ERC20Pausable
,ERC721Pausable
,ERC1155Pausable
: Add note regarding missing public pausing functionality (#4007)ECDSA
: Add a functiontoDataWithIntendedValidatorHash
that encodes data with version 0x00 following EIP-191. (#4063)MerkleProof
: optimize by using unchecked arithmetic. (#3745)Breaking changes
EIP712
: Addition of ERC5267 support requires support for user defined value types, which was released in Solidity version 0.8.8. This requires a pragma change from^0.8.0
to^0.8.8
.EIP712
: Optimization of the cache for the upgradeable version affects the wayname
andversion
are set. This is no longer done through an initializer, and is instead part of the implementation's constructor. As a consequence, all proxies using the same implementation will necessarily share the samename
andversion
. Additionally, an implementation upgrade risks changing the EIP712 domain unless the samename
andversion
are used when deploying the new implementation contract.Deprecations
ERC20Permit
: Added the fileIERC20Permit.sol
andERC20Permit.sol
and deprecateddraft-IERC20Permit.sol
anddraft-ERC20Permit.sol
since EIP-2612 is no longer a Draft. Developers are encouraged to update their imports. (#3793)Timers
: TheTimers
library is now deprecated and will be removed in the next major release. (#4062)ERC777
: TheERC777
token standard is no longer supported by OpenZeppelin. Our implementation is now deprecated and will be removed in the next major release. The corresponding standard interfaces remain available. (#4066)ERC1820Implementer
: TheERC1820
pseudo-introspection mechanism is no longer supported by OpenZeppelin. Our implementation is now deprecated and will be removed in the next major release. The corresponding standard interfaces remain available. (#4066)v4.8.3
Compare Source
GovernorCompatibilityBravo
: Fix encoding of proposal data when signatures are missing.TransparentUpgradeableProxy
: Fix transparency in case of selector clash with non-decodable calldata or payable mutability. (#4154)v4.8.2
Compare Source
ERC721Consecutive
: Fixed a bug when_mintConsecutive
is used for batches of size 1 that could lead to balance overflow. Refer to the breaking changes section in the changelog for a note on the behavior ofERC721._beforeTokenTransfer
.Breaking changes
ERC721
: The internal function_beforeTokenTransfer
no longer updates balances, which it previously did whenbatchSize
was greater than 1. This change has no consequence unless a custom ERC721 extension is explicitly invoking_beforeTokenTransfer
. Balance updates in extensions must now be done explicitly using__unsafe_increaseBalance
, with a name that indicates that there is an invariant that has to be manually verified.v4.8.1
Compare Source
ERC4626
: Use staticcall instead of call when fetching underlying ERC-20 decimals. (#3943)v4.8.0
Compare Source
TimelockController
: Added a newadmin
constructor parameter that is assigned the admin role instead of the deployer account. (#3722)Initializable
: add internal functions_getInitializedVersion
and_isInitializing
(#3598)ERC165Checker
: addsupportsERC165InterfaceUnchecked
for consulting individual interfaces without the full ERC165 protocol. (#3339)Address
: optimizefunctionCall
by callingfunctionCallWithValue
directly. (#3468)Address
: optimizefunctionCall
functions by checking contract size only if there is no returned data. (#3469)Governor
: make therelay
function payable, and add support for EOA payments. (#3730)GovernorCompatibilityBravo
: remove unusedusing
statements. (#3506)ERC20
: optimize_transfer
,_mint
and_burn
by usingunchecked
arithmetic when possible. (#3513)ERC20Votes
,ERC721Votes
: optimizegetPastVotes
for looking up recent checkpoints. (#3673)ERC20FlashMint
: add an internal_flashFee
function for overriding. (#3551)ERC4626
: use the samedecimals()
as the underlying asset by default (if available). (#3639)ERC4626
: add internal_initialConvertToShares
and_initialConvertToAssets
functions to customize empty vaults behavior. (#3639)ERC721
: optimize transfers by making approval clearing implicit instead of emitting an event. (#3481)ERC721
: optimize burn by making approval clearing implicit instead of emitting an event. (#3538)ERC721
: Fix balance accounting when a custom_beforeTokenTransfer
hook results in a transfer of the token under consideration. (#3611)ERC721
: use unchecked arithmetic for balance updates. (#3524)ERC721Consecutive
: Implementation of EIP-2309 that allows batch minting of ERC721 tokens during construction. (#3311)ReentrancyGuard
: Reduce code size impact of the modifier by using internal functions. (#3515)SafeCast
: optimize downcasting of signed integers. (#3565)ECDSA
: Remove redundant check on thev
value. (#3591)VestingWallet
: addreleasable
getters. (#3580)VestingWallet
: remove unused libraryMath.sol
. (#3605)VestingWallet
: make constructor payable. (#3665)Create2
: optimize address computation by using assembly instead ofabi.encodePacked
. (#3600)Clones
: optimized the assembly to use only the scratch space during deployments, and optimizedpredictDeterministicAddress
to use fewer operations. (#3640)Checkpoints
: Use procedural generation to support multiple key/value lengths. (#3589)Checkpoints
: Add new lookup mechanisms. (#3589)Arrays
: AddunsafeAccess
functions that allow reading and writing to an element in a storage array bypassing Solidity's "out-of-bounds" check. (#3589)Strings
: optimizetoString
. (#3573)Ownable2Step
: extension ofOwnable
that makes the ownership transfers a two step process. (#3620)Math
andSignedMath
: optimize functionmax
by using>
instead of>=
. (#3679)Math
: Addlog2
,log10
andlog256
. (#3670)Breaking changes
ERC721
: In order to add support for batch minting viaERC721Consecutive
it was necessary to make a minor breaking change in the internal interface ofERC721
. Namely, the hooks_beforeTokenTransfer
and_afterTokenTransfer
have one additional argument that may need to be added to overrides:function _beforeTokenTransfer( address from, address to, uint256 tokenId, + uint256 batchSize ) internal virtual override
ERC4626
: Conversion from shares to assets (and vice-versa) in an empty vault used to consider the possible mismatch between the underlying asset's and the vault's decimals. This initial conversion rate is now set to 1-to-1 irrespective of decimals, which are meant for usability purposes only. The vault now uses the assets decimals by default, so off-chain the numbers should appear the same. Developers overriding the vault decimals to a value that does not match the underlying asset may want to override the_initialConvertToShares
and_initialConvertToAssets
to replicate the previous behavior.TimelockController
: During deployment, the TimelockController used to grant theTIMELOCK_ADMIN_ROLE
to the deployer and to the timelock itself. The deployer was then expected to renounce this role once configuration of the timelock is over. Failing to renounce that role allows the deployer to change the timelock permissions (but not to bypass the delay for any time-locked actions). The role is no longer given to the deployer by default. A new parameteradmin
can be set to a non-zero address to grant the admin role during construction (to the deployer or any other address). Just like previously, this admin role should be renounced after configuration. If this param is givenaddress(0)
, the role is not allocated and doesn't need to be revoked. In any case, the timelock itself continues to have this role.Deprecations
EIP712
: Added the fileEIP712.sol
and deprecateddraft-EIP712.sol
since the EIP is no longer a Draft. Developers are encouraged to update their imports. (#3621)ERC721Votes
: Added the fileERC721Votes.sol
and deprecateddraft-ERC721Votes.sol
since it no longer depends on a Draft EIP (EIP-712). Developers are encouraged to update their imports. (#3699)ERC-721 Compatibility Note
ERC-721 integrators that interpret contract state from events should make sure that they implement the clearing of approval that is implicit in every transfer according to the EIP. Previous versions of OpenZeppelin Contracts emitted an explicit
Approval
event even though it was not required by the specification, and this is no longer the case.With the new
ERC721Consecutive
extension, the internal workings ofERC721
are slightly changed. Custom extensions to ERC721 should be reviewed to ensure they remain correct. The internal functions that should be considered are_ownerOf
(new),_beforeTokenTransfer
, and_afterTokenTransfer
.ERC-4626 Upgrade Note
Existing
ERC4626
contracts that are upgraded to 4.8 must initialize a new variable that holds the vault token decimals. The recommended way to do this is to use a reinitializer:v4.7.3
Compare Source
Breaking changes
ECDSA
:recover(bytes32,bytes)
andtryRecover(bytes32,bytes)
no longer accept compact signatures to prevent malleability. Compact signature support remains available usingrecover(bytes32,bytes32,bytes32)
andtryRecover(bytes32,bytes32,bytes32)
.v4.7.2
Compare Source
LibArbitrumL2
,CrossChainEnabledArbitrumL2
: Fixed detection of cross-chain calls for EOAs. Previously, calls from EOAs would be classified as cross-chain calls. (#3578)GovernorVotesQuorumFraction
: Fixed quorum updates so they do not affect past proposals that failed due to lack of quorum. (#3561)ERC165Checker
: Added protection against large returndata. (#3587)v4.7.1
Compare Source
SignatureChecker
: Fix an issue that causesisValidSignatureNow
to revert when the target contract returns ill-encoded data. (#3552)ERC165Checker
: Fix an issue that causessupportsInterface
to revert when the target contract returns ill-encoded data. (#3552)v4.7.0
Compare Source
TimelockController
: Migrate_call
to_execute
and allow inheritance and overriding similar toGovernor
. (#3317)CrossChainEnabledPolygonChild
: replace therequire
statement with the custom errorNotCrossChainCall
. (#3380)ERC20FlashMint
: Add customizable flash fee receiver. (#3327)ERC4626
: add an extension ofERC20
that implements the ERC4626 Tokenized Vault Standard. (#3171)SafeERC20
: addsafePermit
as mitigation against phantom permit functions. (#3280)Math
: add amulDiv
function that can round the result either up or down. (#3171)Math
: Add asqrt
function to compute square roots of integers, rounding either up or down. (#3242)Strings
: add a new overloaded functiontoHexString
that converts anaddress
with fixed length of 20 bytes to its not checksummed ASCIIstring
hexadecimal representation. (#3403)EnumerableMap
: add newUintToUintMap
map type. (#3338)EnumerableMap
: add newBytes32ToUintMap
map type. (#3416)SafeCast
: add support for many more types, using procedural code generation. (#3245)MerkleProof
: addmultiProofVerify
to prove multiple values are part of a Merkle tree. (#3276)MerkleProof
: add calldata versions of the functions to avoid copying input arrays to memory and save gas. (#3200)ERC721
,ERC1155
: simplified revert reasons. (#3254, (#3438))ERC721
: removed redundant require statement. (#3434)PaymentSplitter
: addreleasable
getters. (#3350)Initializable
: refactored implementation of modifiers for easier understanding. (#3450)Proxies
: remove runtime check of ERC1967 storage slots. (#3455)Breaking changes
Initializable
: functions decorated with the modifierreinitializer(1)
may no longer invoke each other.v4.6.0
Compare Source
crosschain
: Add a new set of contracts for cross-chain applications.CrossChainEnabled
is a base contract with instantiations for several chains and bridges, andAccessControlCrossChain
is an extension of access control that allows cross-chain operation. (#3183)AccessControl
: add a virtual_checkRole(bytes32)
function that can be overridden to alter theonlyRole
modifier behavior. (#3137)EnumerableMap
: add newAddressToUintMap
map type. (#3150)EnumerableMap
: add newBytes32ToBytes32Map
map type. (#3192)ERC20FlashMint
: support infinite allowance when paying back a flash loan. (#3226)ERC20Wrapper
: thedecimals()
function now tries to fetch the value from the underlying token instance. If that calls revert, then the default value is used. (#3259)draft-ERC20Permit
: replaceimmutable
withconstant
for_PERMIT_TYPEHASH
since thekeccak256
of string literals is treated specially and the hash is evaluated at compile time. (#3196)ERC1155
: Add a_afterTokenTransfer
hook for improved extensibility. (#3166)ERC1155URIStorage
: add a new extension that implements a_setURI
behavior similar to ERC721's_setTokenURI
. (#3210)DoubleEndedQueue
: a new data structure that supports efficient push and pop to both front and back, useful for FIFO and LIFO queues. (#3153)Governor
: improved security ofonlyGovernance
modifier when using an external executor contract (e.g. a timelock) that can operate without necessarily going through the governance protocol. (#3147)Governor
: Add a way to parameterize votes. This can be used to implement voting systems such as fractionalized voting, ERC721 based voting, or any number of other systems. Theparams
argument added to_countVote
method, and included in the newly added_getVotes
method, can be used by counting and voting modules respectively for such purposes. (#3043)Governor
: rewording of revert reason for consistency. (#3275)Governor
: fix an inconsistency in data locations that could lead to invalid bytecode being produced. (#3295)Governor
: ImplementIERC721Receiver
andIERC1155Receiver
to improve token custody by governors. (#3230)TimelockController
: ImplementIERC721Receiver
andIERC1155Receiver
to improve token custody by timelocks. (#3230)TimelockController
: Add a separate canceller role for the ability to cancel. (#3165)Initializable
: add a reinitializer modifier that enables the initialization of new modules, added to already initialized contracts through upgradeability. (#3232)Initializable
: add an Initialized event that tracks initialized version numbers. (#3294)ERC2981
: makeroyaltyInfo
public to allow super call in overrides. (#3305)Upgradeability notice
TimelockController
: (Action needed) The upgrade from <4.6 to >=4.6 introduces a newCANCELLER_ROLE
that requires set up to be assignable. After the upgrade, only addresses with this role will have the ability to cancel. Proposers will no longer be able to cancel. Assigning cancellers can be done by an admin (including the timelock itself) once the role admin is set up. To do this, we recommend upgrading to theTimelockControllerWith46MigrationUpgradeable
contract and then calling themigrateTo46
function.Breaking changes
Governor
: Adds internal virtual_getVotes
method that must be implemented; this is a breaking change for existing concrete extensions toGovernor
. To fix this on an existing voting module extension, renamegetVotes
to_getVotes
and add abytes memory
argument. (#3043)Governor
: Addsparams
parameter to internal virtual_countVote
method; this is a breaking change for existing concrete extensions toGovernor
. To fix this on an existing counting module extension, add abytes memory
argument to_countVote
. (#3043)Governor
: Does not emitVoteCast
event when params data is non-empty; instead emitsVoteCastWithParams
event. To fix this on an integration that consumes theVoteCast
event, also fetch/monitorVoteCastWithParams
events. (#3043)Votes
: The internal virtual function_getVotingUnits
was madeview
(which was accidentally missing). Any overrides should now be updated so they areview
as well.Configuration
📅 Schedule: Branch creation - "" in timezone Asia/Kolkata, Automerge - At any time (no schedule defined).
🚦 Automerge: Enabled.
♻ Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about this update again.
This PR was generated by Mend Renovate. View the repository job log.