美文网首页HiBlock区块链社区
已知bug列表——Solidity中文文档(12)

已知bug列表——Solidity中文文档(12)

作者: 宇宙永恒 | 来源:发表于2018-08-09 23:24 被阅读12次
image

写在前面:HiBlock区块链社区成立了翻译小组,翻译区块链相关的技术文档及资料,本文为Solidity文档翻译的第十二部分《已知bug列表》,特发布出来邀请solidity爱好者、开发者做公开的审校,您可以添加微信baobaotalk_com,验证输入“solidity”,然后将您的意见和建议发送给我们,也可以在文末“留言”区留言,有效的建议我们会采纳及合并进下一版本,同时将送一份小礼物给您以示感谢。

在下面,你可以找到一个 JSON 格式的列表,上面列出了 Solidity 编译器上一些已知的安全相关的 bug。 该文件被放置于 Github 仓库(https://github.com/ethereum/solidity/blob/develop/docs/bugs.json) 。 该列表可以追溯到 0.3.0 版本,只在此版本之前存在的 bug 没有被列入。

这里,还有另外一个 bugs_by_version.json 文件(https://github.com/ethereum/solidity/blob/develop/docs/bugs_by_version.json)。 该文件可用于查询特定的某个编译器版本会受哪些 bug 影响。

合约的源文件检查工具以及其他与合约交互的工具,需基于以下规则查阅上述 bug 列表文件:

  • 如果合约是用每日构建版本的编译器编译,而不是发布版本的编译器,那就有点可疑了。上述bug列表不跟踪未发布或每日构建版本的编译器。

  • 如果一个合约并不是由它被创建时点的最新版本编译器所编译的,那么这也是值得怀疑的。对于由其他合约创建的合约,您必须沿着创建链追溯最初交易,并使用该交易的日期作为创建日期。

  • 高度可疑的情况是,如果一份合约由一个包含已知 bug 的编译器编译,但在合约创建时,已修复了相应 bug 的新版编译器已经发布了。

下面这份包含已知 bug 的 JSON 文件实际上是一个对象数组,每个对象对应一个 bug,并包含以下的 keys :

name

赋予该 bug 的唯一的名字

summary

对该 bug 的简要描述

description

对该 bug 的详细描述

link

包含更多详尽信息的链接,可选

introduced

第一个包含该 bug 的编译器的发布版本,可选

fixed

第一个不再包含该 bug 的编译器的发布版本

publish

该 bug 被公开的日期,可选

severity

bug 的严重性: very low, low, medium, high。综合考虑了在合约测试中的可发现性、发生的可能性和被利用后的潜在损害。

conditions

触发该 bug 所需满足的条件。当前,这是一个包含了 optimizer 布尔值的对象,这意味着只有打开优化器选项时,才会触发该 bug。 如果没有给出任何条件,则意味着此 bug 始终存在。

[
   {
       "name": "OneOfTwoConstructorsSkipped",
       "summary": "If a contract has both a new-style constructor (using the constructor keyword) and an old-style constructor (a function with the same name as the contract) at the same time, one of them will be ignored.",
       "description": "If a contract has both a new-style constructor (using the constructor keyword) and an old-style constructor (a function with the same name as the contract) at the same time, one of them will be ignored. There will be a compiler warning about the old-style constructor, so contracts only using new-style constructors are fine.",
       "introduced": "0.4.22",
       "fixed": "0.4.23",
       "severity": "very low"
   },
   {
       "name": "ZeroFunctionSelector",
       "summary": "It is possible to craft the name of a function such that it is executed instead of the fallback function in very specific circumstances.",
       "description": "If a function has a selector consisting only of zeros, is payable and part of a contract that does not have a fallback function and at most five external functions in total, this function is called instead of the fallback function if Ether is sent to the contract without data.",
       "fixed": "0.4.18",
       "severity": "very low"
   },
   {
       "name": "DelegateCallReturnValue",
       "summary": "The low-level .delegatecall() does not return the execution outcome, but converts the value returned by the functioned called to a boolean instead.",
       "description": "The return value of the low-level .delegatecall() function is taken from a position in memory, where the call data or the return data resides. This value is interpreted as a boolean and put onto the stack. This means if the called function returns at least 32 zero bytes, .delegatecall() returns false even if the call was successuful.",
       "introduced": "0.3.0",
       "fixed": "0.4.15",
       "severity": "low"
   },
   {
       "name": "ECRecoverMalformedInput",
       "summary": "The ecrecover() builtin can return garbage for malformed input.",
       "description": "The ecrecover precompile does not properly signal failure for malformed input (especially in the 'v' argument) and thus the Solidity function can return data that was previously present in the return area in memory.",
       "fixed": "0.4.14",
       "severity": "medium"
   },
   {
       "name": "SkipEmptyStringLiteral",
       "summary": "If \"\" is used in a function call, the following function arguments will not be correctly passed to the function.",
       "description": "If the empty string literal \"\" is used as an argument in a function call, it is skipped by the encoder. This has the effect that the encoding of all arguments following this is shifted left by 32 bytes and thus the function call data is corrupted.",
       "fixed": "0.4.12",
       "severity": "low"
   },
   {
       "name": "ConstantOptimizerSubtraction",
       "summary": "In some situations, the optimizer replaces certain numbers in the code with routines that compute different numbers.",
       "description": "The optimizer tries to represent any number in the bytecode by routines that compute them with less gas. For some special numbers, an incorrect routine is generated. This could allow an attacker to e.g. trick victims about a specific amount of ether, or function calls to call different functions (or none at all).",
       "link": "https://blog.ethereum.org/2017/05/03/solidity-optimizer-bug/",
       "fixed": "0.4.11",
       "severity": "low",
       "conditions": {
           "optimizer": true
       }
   },
   {
       "name": "IdentityPrecompileReturnIgnored",
       "summary": "Failure of the identity precompile was ignored.",
       "description": "Calls to the identity contract, which is used for copying memory, ignored its return value. On the public chain, calls to the identity precompile can be made in a way that they never fail, but this might be different on private chains.",
       "severity": "low",
       "fixed": "0.4.7"
   },
   {
       "name": "OptimizerStateKnowledgeNotResetForJumpdest",
       "summary": "The optimizer did not properly reset its internal state at jump destinations, which could lead to data corruption.",
       "description": "The optimizer performs symbolic execution at certain stages. At jump destinations, multiple code paths join and thus it has to compute a common state from the incoming edges. Computing this common state was simplified to just use the empty state, but this implementation was not done properly. This bug can cause data corruption.",
       "severity": "medium",
       "introduced": "0.4.5",
       "fixed": "0.4.6",
       "conditions": {
           "optimizer": true
       }
   },
   {
       "name": "HighOrderByteCleanStorage",
       "summary": "For short types, the high order bytes were not cleaned properly and could overwrite existing data.",
       "description": "Types shorter than 32 bytes are packed together into the same 32 byte storage slot, but storage writes always write 32 bytes. For some types, the higher order bytes were not cleaned properly, which made it sometimes possible to overwrite a variable in storage when writing to another one.",
       "link": "https://blog.ethereum.org/2016/11/01/security-alert-solidity-variables-can-overwritten-storage/",
       "severity": "high",
       "introduced": "0.1.6",
       "fixed": "0.4.4"
   },
   {
       "name": "OptimizerStaleKnowledgeAboutSHA3",
       "summary": "The optimizer did not properly reset its knowledge about SHA3 operations resulting in some hashes (also used for storage variable positions) not being calculated correctly.",
       "description": "The optimizer performs symbolic execution in order to save re-evaluating expressions whose value is already known. This knowledge was not properly reset across control flow paths and thus the optimizer sometimes thought that the result of a SHA3 operation is already present on the stack. This could result in data corruption by accessing the wrong storage slot.",
       "severity": "medium",
       "fixed": "0.4.3",
       "conditions": {
           "optimizer": true
       }
   },
   {
       "name": "LibrariesNotCallableFromPayableFunctions",
       "summary": "Library functions threw an exception when called from a call that received Ether.",
       "description": "Library functions are protected against sending them Ether through a call. Since the DELEGATECALL opcode forwards the information about how much Ether was sent with a call, the library function incorrectly assumed that Ether was sent to the library and threw an exception.",
       "severity": "low",
       "introduced": "0.4.0",
       "fixed": "0.4.2"
   },
   {
       "name": "SendFailsForZeroEther",
       "summary": "The send function did not provide enough gas to the recipient if no Ether was sent with it.",
       "description": "The recipient of an Ether transfer automatically receives a certain amount of gas from the EVM to handle the transfer. In the case of a zero-transfer, this gas is not provided which causes the recipient to throw an exception.",
       "severity": "low",
       "fixed": "0.4.0"
   },
   {
       "name": "DynamicAllocationInfiniteLoop",
       "summary": "Dynamic allocation of an empty memory array caused an infinite loop and thus an exception.",
       "description": "Memory arrays can be created provided a length. If this length is zero, code was generated that did not terminate and thus consumed all gas.",
       "severity": "low",
       "fixed": "0.3.6"
   },
   {
       "name": "OptimizerClearStateOnCodePathJoin",
       "summary": "The optimizer did not properly reset its internal state at jump destinations, which could lead to data corruption.",
       "description": "The optimizer performs symbolic execution at certain stages. At jump destinations, multiple code paths join and thus it has to compute a common state from the incoming edges. Computing this common state was not done correctly. This bug can cause data corruption, but it is probably quite hard to use for targeted attacks.",
       "severity": "low",
       "fixed": "0.3.6",
       "conditions": {
           "optimizer": true
       }
   },
   {
       "name": "CleanBytesHigherOrderBits",
       "summary": "The higher order bits of short bytesNN types were not cleaned before comparison.",
       "description": "Two variables of type bytesNN were considered different if their higher order bits, which are not part of the actual value, were different. An attacker might use this to reach seemingly unreachable code paths by providing incorrectly formatted input data.",
       "severity": "medium/high",
       "fixed": "0.3.3"
   },
   {
       "name": "ArrayAccessCleanHigherOrderBits",
       "summary": "Access to array elements for arrays of types with less than 32 bytes did not correctly clean the higher order bits, causing corruption in other array elements.",
       "description": "Multiple elements of an array of values that are shorter than 17 bytes are packed into the same storage slot. Writing to a single element of such an array did not properly clean the higher order bytes and thus could lead to data corruption.",
       "severity": "medium/high",
       "fixed": "0.3.1"
   },
   {
       "name": "AncientCompiler",
       "summary": "This compiler version is ancient and might contain several undocumented or undiscovered bugs.",
       "description": "The list of bugs is only kept for compiler versions starting from 0.3.0, so older versions might contain undocumented bugs.",
       "severity": "high",
       "fixed": "0.3.0"
   }

]

延伸阅读:智能合约-Solidity官方文档(1)

安装Solidity编译器-Solidity官方文档(2)

根据例子学习Solidity-Solidity官方文档(3)

深入理解Solidity之源文件及合约结构——Solidity中文文档(4)

安全考量——Solidity中文文档(5)

合约的元数据——Solidity中文文档(6)

应用二进制接口(ABI) 说明——Solidity中文文档(7)

使用编译器——Solidity中文文档(8)

Yul语言及对象说明——Solidity中文文档(9)

风格指南——Solidity中文文档(10)

通用模式——Solidity中文文档(11)

点击“阅读原文”即可查看完整中文文档

image

:本文为solidity翻译的第十二部分《已知bug列表》,特发布出来邀请solidity爱好者、开发者做公开的审校,您可以添加微信baobaotalk_com,验证输入“solidity”,然后将您的意见和建议发送给我们,也可在文末“留言”区留言,或通过原文链接访问我们的Github。有效的建议我们会收纳并及时改进,同时将送一份小礼物给您以示感谢。

本文内容来源于HiBlock区块链社区翻译小组,感谢全体译者的辛苦工作。点击“阅读原文”即可查看完整中文文档。

线上课程推荐

线上课程:《8小时区块链智能合约开发实践》

培训讲师:《白话区块链》作者 蒋勇

课程原价:999元,现价 399元

更多福利:

  • @所有人,识别下图二维码转发课程邀请好友报名,即可获得报名费50%返利

  • @学员,报名学习课程并在规定时间内完成考试即可瓜分10000元奖金

image

点击“阅读原文”即可查看完整中文文档

相关文章

网友评论

    本文标题:已知bug列表——Solidity中文文档(12)

    本文链接:https://www.haomeiwen.com/subject/gqehbftx.html