Crypto Flexs
  • DIRECTORY
  • CRYPTO
    • ETHEREUM
    • BITCOIN
    • ALTCOIN
  • BLOCKCHAIN
  • EXCHANGE
  • ADOPTION
  • TRADING
  • HACKING
  • SLOT
Crypto Flexs
  • DIRECTORY
  • CRYPTO
    • ETHEREUM
    • BITCOIN
    • ALTCOIN
  • BLOCKCHAIN
  • EXCHANGE
  • ADOPTION
  • TRADING
  • HACKING
  • SLOT
Crypto Flexs
Home»ETHEREUM NEWS»Solidity storage array bug | Ethereum Foundation Blog
ETHEREUM NEWS

Solidity storage array bug | Ethereum Foundation Blog

By Crypto FlexsFebruary 27, 20244 Mins Read
Facebook Twitter Pinterest LinkedIn Tumblr Email
Solidity storage array bug |  Ethereum Foundation Blog
Share
Facebook Twitter LinkedIn Pinterest Email

Solidity Storage Array Bug Announced

This blog post is about two bugs linked to completely unrelated storage arrays. Both have existed in compilers for a long time and are only now being discovered, even though the contracts containing them are very likely to malfunction in testing.

Daenam Kim get help Nguyen Farmin both curve grid We discovered an issue with signed integer arrays that resulted in incorrect data being stored.

This bug has existed since Solidity 0.4.7, and we consider this the more serious of the two. If these arrays use negative numbers in certain situations, data corruption will occur, making bugs easier to detect.

Through the Ethereum bug bounty program, we have received reports of a flaw in a new experimental ABI encoder (called ABIEncoderV2). The new ABI encoder is still marked as experimental, but since it’s already in use on mainnet, we think it’s worth announcing prominently. Credit to Ming Chuan Lin (of https://www.secondstate.io) Thank you for finding and fixing the bug!

that much 0.5.10 release Contains bug fixes. There are currently no plans to publish fixes for the legacy 0.4.x Solidity series, but we may do so if there is public demand.

Both bugs should be easily visible in tests that cover the relevant code path.

More details about both bugs can be found below.

Signed integer array bug

Who should worry?

When deploying a contract that uses an array of signed integers in a repository and assigning them directly

  • A literal array containing at least one negative value (x = (-1, -2, -3);) or
  • existing array different signed integer type

Doing so may corrupt data on the storage array.

Contracts that only assign individual array elements, e.g. x(2) = -1;) has no effect.

How to tell if a contract is vulnerable

If your storage uses signed integer arrays, try running tests using negative values. As a result, the actual value stored should be positive rather than negative.

If you have a contract that meets these conditions and would like to determine whether it is in fact vulnerable, you can contact us via: security@ethereum.org.

technical details

Storage arrays can be allocated from many different types of arrays. During this copy and assignment operation, a type conversion is performed on each element. In addition to conversions, certain bits of the value must be zeroed to prepare for storing multiple values ​​in the same storage slot, especially if the signed integer type is shorter than 256 bits.

The bit to be zeroed was incorrectly determined from a source other than the target type. This causes too many bits to be set to 0. In particular, the sign bit becomes 0, making the value positive.

ABIEncoderV2 array bug

Who should worry?

If you have deployed contracts that use the experimental ABI Encoder V2, those contracts may be affected. This means that only contracts that use the following directives within their source code can be affected:

pragma experimental ABIEncoderV2;

Additionally, there are several requirements for a bug to occur. See technical details below for more information.

How to tell if a contract is vulnerable

The bug only appears if all of the following conditions are met:

  • Storage data associated with an array or structure is transferred directly to an external function call. abi.encode OR AND to event data without pre-assignment to a local (memory) variable
  • This data includes arrays of structures or statically sized (that is, at least two-dimensional) arrays.

Additionally, your code will not be affected in the following situations:

  • If you just return that data and don’t use that data abi.encodeExternal call or event data.

possible outcome

Naturally, any bug can have very different consequences depending on the program control flow, but this is expected to be more likely to lead to malfunction than exploitability.

The bug occurs when, under certain circumstances, a method call sends corrupted parameters to another contract.

technical details

During the encoding process, the experimental ABI encoder does not properly advance to the next element in the array if the element occupies more than a single slot in the storage.

This is only true for elements that are structures or statically sized arrays. Dynamically sized arrays or arrays of primitive data types are not affected.

The specific effect you will see is that the data is “moved” around the encoded array. Unit(2)() And it contains data.
((1, 2), (3, 4), (5, 6))it is encoded as follows: ((1, 2), (2, 3), (3, 4)) This is because the encoder only advances a single slot between elements rather than two.

This post was co-written by @axic, @chriseth, and @holiman.

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

Related Posts

Enterprise Ethereum Alliance accelerates strategic vision with new leadership and board promises -Enterprise Ethereum Alliance

June 5, 2025

Checkpoint #3: June 2025 Stats Ether Leeum Foundation Blog

June 4, 2025

Trump Deepfake requires Velociraptors in Border Patrol.

June 4, 2025
Add A Comment

Comments are closed.

Recent Posts

Ray for the square and scalable AI solutions and RAG pipelines on all scale

June 5, 2025

Economist Henrik Zeberg says that Altcoins is trying to start an explosive stage and updates Outlook and Under-The Radar Crypto for Dogwifhat.

June 5, 2025

How Algorand is quietly building the future of finance around the world

June 5, 2025

As the network activities are slow, Ether Room is unlikely to break $ 3,000 in the short term.

June 5, 2025

AI TOKEN LIVEPEER (LPT) cuts 150% and then falls 40% -What is the leading volatility?

June 5, 2025

NVIDIA DALI improves data processing function with new features.

June 5, 2025

Why is the ratio of cryptocurrency exchanges near Bitcoin’s lowest level of seven years?

June 5, 2025

The XRP face to unlock $ 2.2B. Are $ 2.14’s support under pressure?

June 5, 2025

Bitcoin protection zones, Stablecoin regulations are the main drivers.

June 5, 2025

BITMEX, June 10 Q3 2025 quarter gifts

June 5, 2025

More XRP metrics offer a $ 3 rally in June.

June 5, 2025

Crypto Flexs is a Professional Cryptocurrency News Platform. Here we will provide you only interesting content, which you will like very much. We’re dedicated to providing you the best of Cryptocurrency. We hope you enjoy our Cryptocurrency News as much as we enjoy offering them to you.

Contact Us : Partner(@)Cryptoflexs.com

Top Insights

Ray for the square and scalable AI solutions and RAG pipelines on all scale

June 5, 2025

Economist Henrik Zeberg says that Altcoins is trying to start an explosive stage and updates Outlook and Under-The Radar Crypto for Dogwifhat.

June 5, 2025

How Algorand is quietly building the future of finance around the world

June 5, 2025
Most Popular

SpaceCatch Universe Public Beta is ready to play!

April 24, 2024

Polygon (MATIC) holds above key level as bulls target $1.

December 25, 2023

Cryptocurrency investment inflows surge to $932 million after favorable CPI report

May 20, 2024
  • Home
  • About Us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms and Conditions
© 2025 Crypto Flexs

Type above and press Enter to search. Press Esc to cancel.