Crypto Flexs
  • DIRECTORY
  • CRYPTO
    • ETHEREUM
    • BITCOIN
    • ALTCOIN
  • BLOCKCHAIN
  • EXCHANGE
  • ADOPTION
  • TRADING
  • HACKING
  • SLOT
Crypto Flexs
  • DIRECTORY
  • CRYPTO
    • ETHEREUM
    • BITCOIN
    • ALTCOIN
  • BLOCKCHAIN
  • EXCHANGE
  • ADOPTION
  • TRADING
  • HACKING
  • SLOT
Crypto Flexs
Home»ETHEREUM NEWS»Solidity storage array bug | Ethereum Foundation Blog
ETHEREUM NEWS

Solidity storage array bug | Ethereum Foundation Blog

By Crypto FlexsFebruary 27, 20244 Mins Read
Facebook Twitter Pinterest LinkedIn Tumblr Email
Solidity storage array bug |  Ethereum Foundation Blog
Share
Facebook Twitter LinkedIn Pinterest Email

Solidity Storage Array Bug Announced

This blog post is about two bugs linked to completely unrelated storage arrays. Both have existed in compilers for a long time and are only now being discovered, even though the contracts containing them are very likely to malfunction in testing.

Daenam Kim get help Nguyen Farmin both curve grid We discovered an issue with signed integer arrays that resulted in incorrect data being stored.

This bug has existed since Solidity 0.4.7, and we consider this the more serious of the two. If these arrays use negative numbers in certain situations, data corruption will occur, making bugs easier to detect.

Through the Ethereum bug bounty program, we have received reports of a flaw in a new experimental ABI encoder (called ABIEncoderV2). The new ABI encoder is still marked as experimental, but since it’s already in use on mainnet, we think it’s worth announcing prominently. Credit to Ming Chuan Lin (of https://www.secondstate.io) Thank you for finding and fixing the bug!

that much 0.5.10 release Contains bug fixes. There are currently no plans to publish fixes for the legacy 0.4.x Solidity series, but we may do so if there is public demand.

Both bugs should be easily visible in tests that cover the relevant code path.

More details about both bugs can be found below.

Signed integer array bug

Who should worry?

When deploying a contract that uses an array of signed integers in a repository and assigning them directly

  • A literal array containing at least one negative value (x = (-1, -2, -3);) or
  • existing array different signed integer type

Doing so may corrupt data on the storage array.

Contracts that only assign individual array elements, e.g. x(2) = -1;) has no effect.

How to tell if a contract is vulnerable

If your storage uses signed integer arrays, try running tests using negative values. As a result, the actual value stored should be positive rather than negative.

If you have a contract that meets these conditions and would like to determine whether it is in fact vulnerable, you can contact us via: security@ethereum.org.

technical details

Storage arrays can be allocated from many different types of arrays. During this copy and assignment operation, a type conversion is performed on each element. In addition to conversions, certain bits of the value must be zeroed to prepare for storing multiple values ​​in the same storage slot, especially if the signed integer type is shorter than 256 bits.

The bit to be zeroed was incorrectly determined from a source other than the target type. This causes too many bits to be set to 0. In particular, the sign bit becomes 0, making the value positive.

ABIEncoderV2 array bug

Who should worry?

If you have deployed contracts that use the experimental ABI Encoder V2, those contracts may be affected. This means that only contracts that use the following directives within their source code can be affected:

pragma experimental ABIEncoderV2;

Additionally, there are several requirements for a bug to occur. See technical details below for more information.

How to tell if a contract is vulnerable

The bug only appears if all of the following conditions are met:

  • Storage data associated with an array or structure is transferred directly to an external function call. abi.encode OR AND to event data without pre-assignment to a local (memory) variable
  • This data includes arrays of structures or statically sized (that is, at least two-dimensional) arrays.

Additionally, your code will not be affected in the following situations:

  • If you just return that data and don’t use that data abi.encodeExternal call or event data.

possible outcome

Naturally, any bug can have very different consequences depending on the program control flow, but this is expected to be more likely to lead to malfunction than exploitability.

The bug occurs when, under certain circumstances, a method call sends corrupted parameters to another contract.

technical details

During the encoding process, the experimental ABI encoder does not properly advance to the next element in the array if the element occupies more than a single slot in the storage.

This is only true for elements that are structures or statically sized arrays. Dynamically sized arrays or arrays of primitive data types are not affected.

The specific effect you will see is that the data is “moved” around the encoded array. Unit(2)() And it contains data.
((1, 2), (3, 4), (5, 6))it is encoded as follows: ((1, 2), (2, 3), (3, 4)) This is because the encoder only advances a single slot between elements rather than two.

This post was co-written by @axic, @chriseth, and @holiman.

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

Related Posts

$ 165 after brake out for SOL EYES record network activities

June 3, 2025

Can Ether Lee’s signal with a major candlestick pattern?

June 2, 2025

How smart EOA finances your wallet experience

June 2, 2025
Add A Comment

Comments are closed.

Recent Posts

Stablecoin issuer circle aims to evaluate $ 7,200,000 in the upcoming IPO

June 3, 2025

Bitcoin (BTC) is faced with the first main correction in the midst of economic tension.

June 3, 2025

Do you want to unlock the slow brake out for a big discount PI network, the next token?

June 3, 2025

Australia’s encryption ATM fraud exceeds more than 3.1 million losses.

June 3, 2025

Coinbase adds Ethena (ENA) to the listed roadmap and rises 8.6% price

June 3, 2025

Text.AI starts innovative functions to improve creative experiences.

June 3, 2025

ZRC AirDrop & Trading Competition is broadcast live

June 3, 2025

XRP On Chain Payment Conflict 45% -Bom Market Signal or Purchase Opportunity?

June 3, 2025

The world’s best cloud platform: BCC Mining can easily earn $ 77,000 a day.

June 3, 2025

Bitcoin (BTC) is less than $ 111K.

June 3, 2025

Distributed exchange will be released in Q2 in the QRP ledger ecosystem, DEXRP.

June 3, 2025

Crypto Flexs is a Professional Cryptocurrency News Platform. Here we will provide you only interesting content, which you will like very much. We’re dedicated to providing you the best of Cryptocurrency. We hope you enjoy our Cryptocurrency News as much as we enjoy offering them to you.

Contact Us : Partner(@)Cryptoflexs.com

Top Insights

Stablecoin issuer circle aims to evaluate $ 7,200,000 in the upcoming IPO

June 3, 2025

Bitcoin (BTC) is faced with the first main correction in the midst of economic tension.

June 3, 2025

Do you want to unlock the slow brake out for a big discount PI network, the next token?

June 3, 2025
Most Popular

Security – Are SPVs and fraud prevention viable options for Bitcoin scaling?

December 19, 2023

Franklin Templeton CEO: Blockchain offers significant cost savings for tokenization

May 13, 2024

Pepe Coin Surges 250% – Will March Bring More Surprises?

March 2, 2024
  • Home
  • About Us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms and Conditions
© 2025 Crypto Flexs

Type above and press Enter to search. Press Esc to cancel.