Skip to content

Witness Block Parsing DoS Vulnerability

High
Roasbeef published GHSA-hc82-w9v8-83pr Nov 17, 2022

Package

gomod btcd (Go)

Affected versions

< v0.23.3

Patched versions

v0.23.3
gomod lnd (Go)
< v0.15.4-beta
v0.15.4-beta

Description

Impact

All lnd nodes before version v0.15.4 are vulnerable to a block parsing bug that can cause a node to enter a degraded state once encountered. In this degraded state, nodes can continue to make payments and forward HTLCs, and close out channels. Opening channels is prohibited, and also on chain transaction events will be undetected.

This can cause loss of funds if a CSV expiry is researched during a breach attempt or a CLTV delta expires forgetting the funds in the HTLC.

Patches

A patch is available starting with lnd v0.15.4.

Workarounds

Nodes can use the lncli updatechanpolicy RPC call to increase their CLTV value to a very high amount or increase their fee policies. This will prevent nodes from routing through your node, meaning that no pending HTLCs can be present.

References

#7096

https://github.com/lightningnetwork/lnd/releases/tag/v0.15.4-beta

Severity

High
8.1
/ 10

CVSS base metrics

Attack vector
Network
Attack complexity
High
Privileges required
None
User interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

CVE ID

CVE-2022-39389

Weaknesses