Solidity Storage Array Bug Announcement
This weblog put up is about two bugs linked to storage arrays that are in any other case unrelated. Each have been current within the compiler for a very long time and have solely been found now although a contract containing them ought to very seemingly present malfunctions in assessments.
Daenam Kim with assist from Nguyen Pham, each from Curvegrid found a problem the place invalid information is saved in reference to arrays of signed integers.
This bug has been current since Solidity 0.4.7 and we take into account it the extra critical of the 2. If these arrays use damaging integers in a sure scenario, it should trigger information corruption and thus the bug must be simple to detect.
By means of the Ethereum bug bounty program, we acquired a report a couple of flaw throughout the new experimental ABI encoder (known as ABIEncoderV2). The brand new ABI encoder remains to be marked as experimental, however we however suppose that this deserves a distinguished announcement since it’s already used on mainnet.
Credit to Ming Chuan Lin (of https://www.secondstate.io) for each discovering and fixing the bug!
The 0.5.10 release accommodates the fixes to the bugs.
In the intervening time, we don’t plan to publish a repair to the legacy 0.4.x sequence of Solidity, however we would if there’s well-liked demand.
Each bugs must be simply seen in assessments that contact the related code paths.
Particulars concerning the two bugs might be discovered under.
Signed Integer Array Bug
Who must be involved
When you’ve got deployed contracts which use signed integer arrays in storage and both straight assign
- a literal array with a minimum of one damaging worth in it (x = [-1, -2, -3];) or
- an current array of a completely different signed integer kind
to it, this can result in information corruption within the storage array.
Contracts that solely assign particular person array parts (i.e. with x[2] = -1;) usually are not affected.
Methods to test if contract is weak
When you use signed integer arrays in storage, attempt to run assessments the place you employ damaging values. The impact must be that the precise worth saved is constructive as a substitute of damaging.
When you’ve got a contract that meets these circumstances, and wish to confirm whether or not the contract is certainly weak, you may attain out to us by way of security@ethereum.org.
Technical particulars
Storage arrays might be assigned from arrays of various kind. Throughout this copy and task operation, a sort conversion is carried out on every of the weather. Along with the conversion, particularly if the signed integer kind is shorter than 256 bits, sure bits of the worth need to be zeroed out in preparation for storing a number of values in the identical storage slot.
Which bits to zero out was incorrectly decided from the supply and never the goal kind. This results in too many bits being zeroed out. Particularly, the signal bit shall be zero which makes the worth constructive.
ABIEncoderV2 Array Bug
Who must be involved
When you’ve got deployed contracts which use the experimental ABI encoder V2, then these may be affected. Because of this solely contracts which use the next directive throughout the supply code might be affected:
pragma experimental ABIEncoderV2;
Moreover, there are a variety of necessities for the bug to set off. See technical particulars additional under for extra data.
Methods to test if contract is weak
The bug solely manifests itself when all the following circumstances are met:
- Storage information involving arrays or structs is distributed on to an exterior operate name, to abi.encode or to occasion information with out prior task to a neighborhood (reminiscence) variable AND
- this information both accommodates an array of structs or an array of statically-sized arrays (i.e. a minimum of two-dimensional).
Along with that, within the following scenario, your code is NOT affected:
- when you solely return such information and don’t use it in abi.encode, exterior calls or occasion information.
Potential penalties
Naturally, any bug can have wildly various penalties relying on this system management movement, however we anticipate that that is extra prone to result in malfunction than exploitability.
The bug, when triggered, will underneath sure circumstances ship corrupt parameters on methodology invocations to different contracts.
Technical particulars
Throughout the encoding course of, the experimental ABI encoder doesn’t correctly advance to the subsequent ingredient in an array in case the weather occupy greater than a single slot in storage.
That is solely the case for parts which might be structs or statically-sized arrays. Arrays of dynamically-sized arrays or of elementary datatypes usually are not affected.
The precise impact you will notice is that information is “shifted” within the encoded array: When you’ve got an array of kind uint[2][] and it accommodates the information
[[1, 2], [3, 4], [5, 6]], then it will likely be encoded as [[1, 2], [2, 3], [3, 4]] as a result of the encoder solely advances by a single slot between parts as a substitute of two.
This put up was collectively composed by @axic, @chriseth, @holiman