M-19 MitigationConfirmed #114
Labels
confirmed for report
This issue is confirmed for report
mitigation-confirmed
MR-M-19
satisfactory
satisfies C4 submission criteria; eligible for awards
Lines of code
Vulnerability details
C4 Issue
M-19: Bidders might lose funds due to possible racing condition between settleWithBuyout and placeBid
Comments
Original vulnerabilities/impacts:
The vulnerability is both
settleWithBuyout()
and_placeBidChecks()
allow the same timestamp (_auction.startTime + _timeForMainLenderToBuy== block.timestamp
). This encourages tx racing. The impact is when a user’s placeBid settles before settleWithBuyout(), the user will lose their bid funds, because settleWithBuyout will delete the auction data and transfer out collateral NFT tokens.Mitigation
Fix: https://github.com/pixeldaogg/florida-contracts/pull/392/files
The mitigation is to separate the time window between settleWithBuyout() and _placeBidChecks(). In
settleWithBuyou()
, the check now will revert if timeLimit == block.timestamp.The mitigation eliminates the attack vector and resolves the issue.
Conclusion
LGTM
The text was updated successfully, but these errors were encountered: