Prior to 0.10.0-beta, LND (Lightning Network Daemon) would have accepted a counterparty high-S signature and broadcast tx-relay invalid local commitment/HTLC transactions. This can be exploited by any peer with an open channel regardless of the victim situation (e.g., routing node, payment-receiver, or payment-sender). The impact is a loss of funds in certain situations.
References
Link | Resource |
---|---|
https://lists.linuxfoundation.org/pipermail/lightning-dev/2020-October/002858.html | Mailing List Third Party Advisory |
https://lists.linuxfoundation.org/pipermail/lightning-dev/2020-October/002856.html | Mailing List Third Party Advisory |
https://gist.github.com/ariard/fb432a9d2cd3ba24fdc18ccc8c5c6eb4 | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Information
Published : 2020-10-20 19:15
Updated : 2020-10-30 12:17
NVD link : CVE-2020-26895
Mitre link : CVE-2020-26895
JSON object : View
CWE
CWE-354
Improper Validation of Integrity Check Value
Products Affected
lightning_network_daemon_project
- lightning_network_daemon