mirror of
https://github.com/ethereum/solidity
synced 2023-10-03 13:03:40 +00:00
Merge pull request #704 from ethereum/malleability
Expanded malleability risks.
This commit is contained in:
commit
e10297a2ef
@ -146,7 +146,11 @@ Minor Details
|
|||||||
Furthermore, it is not enforced by the EVM, so a contract function that "claims"
|
Furthermore, it is not enforced by the EVM, so a contract function that "claims"
|
||||||
to be constant might still cause changes to the state.
|
to be constant might still cause changes to the state.
|
||||||
- Types that do not occupy the full 32 bytes might contain "dirty higher order bits".
|
- Types that do not occupy the full 32 bytes might contain "dirty higher order bits".
|
||||||
This is especially important if you access ``msg.data`` - it poses a malleability risk.
|
This is especially important if you access ``msg.data`` - it poses a malleability risk:
|
||||||
|
You can craft transactions that call a function ``f(uint8 x)`` with a raw byte argument
|
||||||
|
of ``0xff000001`` and with ``0x00000001``. Both are fed to the contract and both will
|
||||||
|
look like the number ``1`` as far as ``x`` is concerned, but ``msg.data`` will
|
||||||
|
be different, so if you use ``sha3(msg.data)`` for anything, you will get different results.
|
||||||
|
|
||||||
***************
|
***************
|
||||||
Recommendations
|
Recommendations
|
||||||
|
Loading…
Reference in New Issue
Block a user