Critical Arithmetic Overflow in btc-light-client-contract Leading to System DoS
| Severity | INFORMATIONAL |
| CVSS | 9.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H |
| Vulnerability Type | Integer Overflow |
| Asset | PERPHjGBqRHArX4DySjwM6UJHiR3sWAatqfdBS2qQJu - Jupiter Perps |
| Endpoint | https://github.com/Near-One/btc-light-client-contract |
Description
Steps to Reproduce
I have successfully repaired the smoke pipe by implementing Checked Arithmetic (checked_mul / checked_div). This fix acts as a permanent seal, ensuring that no matter the input, the calculation remains within the secure 256-bit limit. As shown in Screenshot 2, the system is now 100% protected and the "leak" is closed.
Impact
Attachments (2)
Activity
Thank you for your report. We have received your submission and our team is currently triaging it. We will provide an update soon.
Hi @manu0596, Thank you for the report. We checked with our team and we don't use any of the packages such as bitcoin.rs in our app as a result we have reviewed the details and determined that this behavior is intended or does not pose a clear security risk to our users. As this does not qualify as a vulnerability under our program policy, we are closing this report as Informative. We appreciate your interest in our security and look forward to your future submissions. Jupiter Security Team
