CVE-2022-39389 – github.com/lightningnetwork/lnd
Package
Manager: go
Name: github.com/lightningnetwork/lnd
Vulnerable Version: >=0 <0.15.4-beta
Severity
Level: High
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
EPSS: 0.00097 pctl0.27792
Details
Witness Block Parsing DoS Vulnerability ### Impact All lnd nodes before version `v0.15.4` are vulnerable to a block parsing bug that can cause a node to enter a degraded state once encountered. In this degraded state, nodes can continue to make payments and forward HTLCs, and close out channels. Opening channels is prohibited, and also on chain transaction events will be undetected. This can cause loss of funds if a CSV expiry is researched during a breach attempt or a CLTV delta expires forgetting the funds in the HTLC. ### Patches A patch is available starting with lnd `v0.15.4`. ### Workarounds Nodes can use the `lncli updatechanpolicy` RPC call to increase their CLTV value to a very high amount or increase their fee policies. This will prevent nodes from routing through your node, meaning that no pending HTLCs can be present. ### References https://github.com/lightningnetwork/lnd/issues/7096 https://github.com/lightningnetwork/lnd/releases/tag/v0.15.4-beta
Metadata
Created: 2022-11-18T18:50:01Z
Modified: 2022-11-18T18:50:01Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/11/GHSA-hc82-w9v8-83pr/GHSA-hc82-w9v8-83pr.json
CWE IDs: ["CWE-20"]
Alternative ID: GHSA-hc82-w9v8-83pr
Finding: F184
Auto approve: 1