Close Menu
Chain Tech Daily

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Core Scientific shifts Bitcoin mining site toward 1.5GW AI data center plan

    April 28, 2026

    Bitcoin Core devs claimed Knots operators were inflating statistics

    April 28, 2026

    Security Alert – Smart Contract Wallets created in frontier are vulnerable to phishing attacks

    April 28, 2026
    Facebook X (Twitter) Instagram
    Chain Tech Daily
    • Altcoins
      • Litecoin
      • Coinbase
      • Crypto
      • Blockchain
    • Bitcoin
    • Ethereum
    • Lithosphere News Releases
    Facebook X (Twitter) Instagram YouTube
    Chain Tech Daily
    Home » Solidity Storage Array Bugs | Ethereum Foundation Blog
    Ethereum

    Solidity Storage Array Bugs | Ethereum Foundation Blog

    Olivia MartinezBy Olivia MartinezApril 8, 20265 Mins Read
    Facebook Twitter Pinterest LinkedIn WhatsApp Reddit Tumblr Email
    Share
    Facebook Twitter LinkedIn Pinterest Email


    Solidity Storage Array Bug Announcement

    This blog post is about two bugs connected to storage arrays which are otherwise unrelated. Both have been present in the compiler for a long time and have only been discovered now even though a contract containing them should very likely show malfunctions in tests.

    Daenam Kim with help from Nguyen Pham, both from Curvegrid discovered an issue where invalid data is stored in connection with arrays of signed integers.

    This bug has been present since Solidity 0.4.7 and we consider it the more serious of the two. If these arrays use negative integers in a certain situation, it will cause data corruption and thus the bug should be easy to detect.

    Through the Ethereum bug bounty program, we received a report about a flaw within the new experimental ABI encoder (referred to as ABIEncoderV2). The new ABI encoder is still marked as experimental, but we nevertheless think that this deserves a prominent announcement since it is already used on mainnet.
    Credits to Ming Chuan Lin (of https://www.secondstate.io) for both discovering and fixing the bug!

    The 0.5.10 release contains the fixes to the bugs.
    At the moment, we do not plan to publish a fix to the legacy 0.4.x series of Solidity, but we might if there is popular demand.

    Both bugs should be easily visible in tests that touch the relevant code paths.

    Details about the two bugs can be found below.

    Signed Integer Array Bug

    Who should be concerned

    If you have deployed contracts which use signed integer arrays in storage and either directly assign

    • a literal array with at least one negative value in it (x = [-1, -2, -3];) or
    • an existing array of a different signed integer type

    to it, this will lead to data corruption in the storage array.

    Contracts that only assign individual array elements (i.e. with x[2] = -1;) are not affected.

    How to check if contract is vulnerable

    If you use signed integer arrays in storage, try to run tests where you use negative values. The effect should be that the actual value stored is positive instead of negative.

    If you have a contract that meets these conditions, and want to verify whether the contract is indeed vulnerable, you can reach out to us via [email protected].

    Technical details

    Storage arrays can be assigned from arrays of different type. During this copy and assignment operation, a type conversion is performed on each of the elements. In addition to the conversion, especially if the signed integer type is shorter than 256 bits, certain bits of the value have to be zeroed out in preparation for storing multiple values in the same storage slot.

    Which bits to zero out was incorrectly determined from the source and not the target type. This leads to too many bits being zeroed out. In particular, the sign bit will be zero which makes the value positive.

    ABIEncoderV2 Array Bug

    Who should be concerned

    If you have deployed contracts which use the experimental ABI encoder V2, then those might be affected. This means that only contracts which use the following directive within the source code can be affected:

    pragma experimental ABIEncoderV2;
    

    Additionally, there are a number of requirements for the bug to trigger. See technical details further below for more information.

    How to check if contract is vulnerable

    The bug only manifests itself when all of the following conditions are met:

    • Storage data involving arrays or structs is sent directly to an external function call, to abi.encode or to event data without prior assignment to a local (memory) variable AND
    • this data either contains an array of structs or an array of statically-sized arrays (i.e. at least two-dimensional).

    In addition to that, in the following situation, your code is NOT affected:

    • if you only return such data and do not use it in abi.encode, external calls or event data.

    Possible consequences

    Naturally, any bug can have wildly varying consequences depending on the program control flow, but we expect that this is more likely to lead to malfunction than exploitability.

    The bug, when triggered, will under certain circumstances send corrupt parameters on method invocations to other contracts.

    Technical details

    During the encoding process, the experimental ABI encoder does not properly advance to the next element in an array in case the elements occupy more than a single slot in storage.

    This is only the case for elements that are structs or statically-sized arrays. Arrays of dynamically-sized arrays or of elementary datatypes are not affected.

    The specific effect you will see is that data is “shifted” in the encoded array: If you have an array of type uint[2][] and it contains the data
    [[1, 2], [3, 4], [5, 6]], then it will be encoded as [[1, 2], [2, 3], [3, 4]] because the encoder only advances by a single slot between elements instead of two.

    This post was jointly composed by @axic, @chriseth, @holiman



    Source link

    Share. Facebook Twitter Pinterest LinkedIn WhatsApp Reddit Tumblr Email
    Olivia Martinez

    Related Posts

    Ethereum April 28, 2026

    Security Alert – Smart Contract Wallets created in frontier are vulnerable to phishing attacks

    Ethereum April 28, 2026

    DAO Wars: Your voice on the soft-fork dilemma

    Ethereum April 28, 2026

    Security Alert – DoS Vulnerability in the Soft Fork

    Ethereum April 28, 2026

    The Devcon2 site is now live!

    Ethereum April 28, 2026

    C++ DEV Update – July edition

    Ethereum April 28, 2026

    Taylor’s Summer Update | Ethereum Foundation Blog

    Leave A Reply Cancel Reply

    Don't Miss
    Crypto April 28, 2026

    Core Scientific shifts Bitcoin mining site toward 1.5GW AI data center plan

    Core Scientific plans to turn its Pecos, Texas site into a large artificial intelligence data…

    Bitcoin Core devs claimed Knots operators were inflating statistics

    April 28, 2026

    Security Alert – Smart Contract Wallets created in frontier are vulnerable to phishing attacks

    April 28, 2026

    Anthropic hits $1T pre-IPO valuation on Jupiter market

    April 28, 2026
    Stay In Touch
    • Facebook
    • Twitter
    • YouTube
    • LinkedIn
    Our Picks

    Core Scientific shifts Bitcoin mining site toward 1.5GW AI data center plan

    April 28, 2026

    Bitcoin Core devs claimed Knots operators were inflating statistics

    April 28, 2026

    Security Alert – Smart Contract Wallets created in frontier are vulnerable to phishing attacks

    April 28, 2026

    Anthropic hits $1T pre-IPO valuation on Jupiter market

    April 28, 2026

    Subscribe to Updates

    Get the latest creative news from SmartMag about art & design.

    Don't Miss
    Crypto April 28, 2026

    Core Scientific shifts Bitcoin mining site toward 1.5GW AI data center plan

    Core Scientific plans to turn its Pecos, Texas site into a large artificial intelligence data…

    Bitcoin Core devs claimed Knots operators were inflating statistics

    April 28, 2026

    Security Alert – Smart Contract Wallets created in frontier are vulnerable to phishing attacks

    April 28, 2026

    Anthropic hits $1T pre-IPO valuation on Jupiter market

    April 28, 2026

    Subscribe to Updates

    Get the latest creative news from SmartMag about art & design.

    Stay In Touch
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    About Us
    About Us

    ChainTechDaily.xyz delivers the latest updates and trends in the world of cryptocurrency. Stay informed with daily news, insights, and analysis tailored for crypto enthusiasts.

    Our Picks
    Lithosphere News Releases

    Lithosphere Introduces Visual Builder for AI-Native Smart Contracts

    April 28, 2026

    Lithosphere Expands Developer Ecosystem with Lithic Toolchain Integration

    April 27, 2026

    Lithosphere Introduces Identity-Driven Architecture for Autonomous Systems

    April 24, 2026

    Lithic Enables Deterministic Control Over AI Execution in Smart Contracts

    April 23, 2026
    X (Twitter) Instagram YouTube LinkedIn
    © 2026 Copyright

    Type above and press Enter to search. Press Esc to cancel.