Skip to content

Commit 940ca49

Browse files
authored
Merge pull request #3568 from TheBlueMatt/2025-01-0.1.1
Cut 0.1.1
2 parents d8caac4 + 97c2dcd commit 940ca49

File tree

4 files changed

+38
-6
lines changed

4 files changed

+38
-6
lines changed

CHANGELOG.md

+36
Original file line numberDiff line numberDiff line change
@@ -1,3 +1,39 @@
1+
# 0.1.1 - Jan 28, 2025 - "Onchain Matters"
2+
3+
## API Updates
4+
* A `ChannelManager::send_payment_with_route` was (re-)added, with semantics
5+
similar to `ChannelManager::send_payment` (rather than like the pre-0.1
6+
`send_payent_with_route`, #3534).
7+
* `RawBolt11Invoice::{to,from}_raw` were added (#3549).
8+
9+
## Bug Fixes
10+
* HTLCs which were forwarded where the inbound edge times out within the next
11+
three blocks will have the inbound HTLC failed backwards irrespective of the
12+
status of the outbound HTLC. This avoids the peer force-closing the channel
13+
(and claiming the inbound edge HTLC on-chain) even if we have not yet managed
14+
to claim the outbound edge on chain (#3556).
15+
* On restart, replay of `Event::SpendableOutput`s could have caused
16+
`OutputSweeper` to generate double-spending transactions, making it unable to
17+
claim any delayed claims. This was resolved by retaining old claims for more
18+
than four weeks after they are claimed on-chain to detect replays (#3559).
19+
* Fixed the additional feerate we will pay each time we RBF on-chain claims to
20+
match the Bitcoin Core policy (1 sat/vB) instead of 16 sats/vB (#3457).
21+
* Fixed a cased where a custom `Router` which returns an invalid `Route`,
22+
provided to `ChannelManager`, can result in an outbound payment remaining
23+
pending forever despite no HTLCs being pending (#3531).
24+
25+
## Security
26+
0.1.1 fixes a denial-of-service vulnerability allowing channel counterparties to
27+
cause force-closure of unrelated channels.
28+
* If a malicious channel counterparty force-closes a channel, broadcasting a
29+
revoked commitment transaction while the channel at closure time included
30+
multiple non-dust forwarded outbound HTLCs with identical payment hashes and
31+
amounts, failure to fail the HTLCs backwards could cause the channels on
32+
which we recieved the corresponding inbound HTLCs to be force-closed. Note
33+
that we'll receive, at a minimum, the malicious counterparty's reserve value
34+
when they broadcast the stale commitment (#3556). Thanks to Matt Morehouse for
35+
reporting this issue.
36+
137
# 0.1 - Jan 15, 2025 - "Human Readable Version Numbers"
238

339
The LDK 0.1 release represents an important milestone for the LDK project. While

lightning-invoice/Cargo.toml

+1-1
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
[package]
22
name = "lightning-invoice"
33
description = "Data structures to parse and serialize BOLT11 lightning invoices"
4-
version = "0.33.0"
4+
version = "0.33.1"
55
authors = ["Sebastian Geisler <[email protected]>"]
66
documentation = "https://docs.rs/lightning-invoice/"
77
license = "MIT OR Apache-2.0"

lightning/Cargo.toml

+1-1
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
[package]
22
name = "lightning"
3-
version = "0.1.0"
3+
version = "0.1.1"
44
authors = ["Matt Corallo"]
55
license = "MIT OR Apache-2.0"
66
repository = "https://github.com/lightningdevkit/rust-lightning/"

pending_changelog/3531-buggy-router-leak.txt

-4
This file was deleted.

0 commit comments

Comments
 (0)