Ecosyste.ms: Advisories

An open API service providing security vulnerability metadata for many open source software ecosystems.

Security Advisories: GSA_kwCzR0hTQS1oYzgyLXc5djgtODNwcs4AAv8P

Witness Block Parsing DoS Vulnerability

Impact

All lnd nodes before version v0.15.4 are vulnerable to a block parsing bug that can cause a node to enter a degraded state once encountered. In this degraded state, nodes can continue to make payments and forward HTLCs, and close out channels. Opening channels is prohibited, and also on chain transaction events will be undetected.

This can cause loss of funds if a CSV expiry is researched during a breach attempt or a CLTV delta expires forgetting the funds in the HTLC.

Patches

A patch is available starting with lnd v0.15.4.

Workarounds

Nodes can use the lncli updatechanpolicy RPC call to increase their CLTV value to a very high amount or increase their fee policies. This will prevent nodes from routing through your node, meaning that no pending HTLCs can be present.

References

https://github.com/lightningnetwork/lnd/issues/7096

https://github.com/lightningnetwork/lnd/releases/tag/v0.15.4-beta

Permalink: https://github.com/advisories/GHSA-hc82-w9v8-83pr
JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS1oYzgyLXc5djgtODNwcs4AAv8P
Source: GitHub Advisory Database
Origin: Unspecified
Severity: High
Classification: General
Published: over 1 year ago
Updated: about 1 year ago


CVSS Score: 8.2
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H

Identifiers: GHSA-hc82-w9v8-83pr, CVE-2022-39389
References: Repository: https://github.com/lightningnetwork/lnd

Affected Packages

go:github.com/lightningnetwork/lnd
Dependent packages: 190
Dependent repositories: 145
Downloads:
Affected Version Ranges: < 0.15.4-beta
Fixed in: 0.15.4-beta
All affected versions: 0.0.2
All unaffected versions: