#0x09

Critical Arithmetic Overflow in btc-light-client-contract Leading to System DoS

@manu0596submitted a report toJupiterMarch 22, 2026 at 13:37
Severity
INFORMATIONAL
CVSS
9.1CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H
Vulnerability TypeInteger Overflow
AssetPERPHjGBqRHArX4DySjwM6UJHiR3sWAatqfdBS2qQJu - Jupiter Perps
Endpointhttps://github.com/Near-One/btc-light-client-contract

Description

Steps to Reproduce

I have successfully repaired the smoke pipe by implementing Checked Arithmetic (checked_mul / checked_div). This fix acts as a permanent seal, ensuring that no matter the input, the calculation remains within the secure 256-bit limit. As shown in Screenshot 2, the system is now 100% protected and the "leak" is closed.

Impact

Attachments (2)

Activity

raccoons
@raccoonscommented.
Mar 22

Thank you for your report. We have received your submission and our team is currently triaging it. We will provide an update soon.

raccoons
@raccoonsclosed the report asInformative
Mar 22

Hi @manu0596, Thank you for the report. We checked with our team and we don't use any of the packages such as bitcoin.rs in our app as a result we have reviewed the details and determined that this behavior is intended or does not pose a clear security risk to our users. As this does not qualify as a vulnerability under our program policy, we are closing this report as Informative. We appreciate your interest in our security and look forward to your future submissions. Jupiter Security Team

@raccoonschanged the severity fromcriticaltoinformational
Mar 23
@raccoonsdisclosed this reportPublic Disclosure
4d ago