Tuesday, June 24, 2025
HomeEthereumSolidity Storage Array Bugs | Ethereum Basis Weblog

Solidity Storage Array Bugs | Ethereum Basis Weblog


Solidity Storage Array Bug Announcement

This weblog submit is about two bugs linked to storage arrays that are in any other case unrelated. Each have been current within the compiler for a very long time and have solely been found now although a contract containing them ought to very probably present malfunctions in exams.

Daenam Kim with assist from Nguyen Pham, each from Curvegrid found a difficulty the place invalid knowledge is saved in reference to arrays of signed integers.

This bug has been current since Solidity 0.4.7 and we contemplate it the extra severe of the 2. If these arrays use detrimental integers in a sure state of affairs, it would trigger knowledge corruption and thus the bug must be simple to detect.

By the Ethereum bug bounty program, we obtained a report a couple of flaw inside the new experimental ABI encoder (known as ABIEncoderV2). The brand new ABI encoder continues to be marked as experimental, however we however assume that this deserves a distinguished announcement since it’s already used on mainnet.
Credit to Ming Chuan Lin (of https://www.secondstate.io) for each discovering and fixing the bug!

The 0.5.10 launch incorporates the fixes to the bugs.
In the meanwhile, we don’t plan to publish a repair to the legacy 0.4.x sequence of Solidity, however we would if there’s common demand.

Each bugs must be simply seen in exams that contact the related code paths.

Particulars in regards to the two bugs may be discovered under.

Signed Integer Array Bug

Who must be involved

You probably have deployed contracts which use signed integer arrays in storage and both straight assign

  • a literal array with no less than one detrimental worth in it (x = [-1, -2, -3];) or
  • an present array of a totally different signed integer sort

to it, it will result in knowledge corruption within the storage array.

Contracts that solely assign particular person array parts (i.e. with x[2] = -1;) will not be affected.

Find out how to test if contract is susceptible

In the event you use signed integer arrays in storage, attempt to run exams the place you employ detrimental values. The impact must be that the precise worth saved is optimistic as a substitute of detrimental.

You probably have a contract that meets these circumstances, and wish to confirm whether or not the contract is certainly susceptible, you possibly can attain out to us through safety@ethereum.org.

Technical particulars

Storage arrays may be assigned from arrays of various sort. Throughout this copy and project operation, a kind conversion is carried out on every of the weather. Along with the conversion, particularly if the signed integer sort is shorter than 256 bits, sure bits of the worth must be zeroed out in preparation for storing a number of values in the identical storage slot.

Which bits to zero out was incorrectly decided from the supply and never the goal sort. This results in too many bits being zeroed out. Specifically, the signal bit will probably be zero which makes the worth optimistic.

ABIEncoderV2 Array Bug

Who must be involved

You probably have deployed contracts which use the experimental ABI encoder V2, then these is perhaps affected. Which means that solely contracts which use the next directive inside the supply code may be affected:

pragma experimental ABIEncoderV2;

Moreover, there are a variety of necessities for the bug to set off. See technical particulars additional under for extra info.

Find out how to test if contract is susceptible

The bug solely manifests itself when the entire following circumstances are met:

  • Storage knowledge involving arrays or structs is distributed on to an exterior operate name, to abi.encode or to occasion knowledge with out prior project to an area (reminiscence) variable AND
  • this knowledge both incorporates an array of structs or an array of statically-sized arrays (i.e. no less than two-dimensional).

Along with that, within the following state of affairs, your code is NOT affected:

  • if you happen to solely return such knowledge and don’t use it in abi.encode, exterior calls or occasion knowledge.

Attainable penalties

Naturally, any bug can have wildly various penalties relying on this system management circulate, however we anticipate that that is extra more likely to result in malfunction than exploitability.

The bug, when triggered, will beneath sure circumstances ship corrupt parameters on technique invocations to different contracts.

Technical particulars

In the course of the encoding course of, the experimental ABI encoder doesn’t correctly advance to the subsequent aspect in an array in case the weather occupy greater than a single slot in storage.

That is solely the case for parts which might be structs or statically-sized arrays. Arrays of dynamically-sized arrays or of elementary datatypes will not be affected.

The precise impact you will notice is that knowledge is “shifted” within the encoded array: You probably have an array of sort uint[2][] and it incorporates the info
[[1, 2], [3, 4], [5, 6]], then it will likely be encoded as [[1, 2], [2, 3], [3, 4]] as a result of the encoder solely advances by a single slot between parts as a substitute of two.

This submit was collectively composed by @axic, @chriseth, @holiman

RELATED ARTICLES

Most Popular

Recent Comments