Note:
This project will be discontinued after December 13, 2021. [more]
Product:
Lightning_network_daemon
(Lightning_network_daemon_project)Repositories |
Unknown: This might be proprietary software. |
#Vulnerabilities | 4 |
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2022-11-17 | CVE-2022-39389 | Lightning Network Daemon (lnd) is an implementation of a lightning bitcoin overlay network node. All lnd nodes before version `v0.15.4` are vulnerable to a block parsing bug that can cause a node to enter a degraded state once encountered. In this degraded state, nodes can continue to make payments and forward HTLCs, and close out channels. Opening channels is prohibited, and also on chain transaction events will be undetected. This can cause loss of funds if a CSV expiry is researched... | Btcd, Lightning_network_daemon | 6.5 | ||
2021-10-04 | CVE-2021-41593 | Lightning Labs lnd before 0.13.3-beta allows loss of funds because of dust HTLC exposure. | Lightning_network_daemon | 8.6 | ||
2020-10-21 | CVE-2020-26896 | Prior to 0.11.0-beta, LND (Lightning Network Daemon) had a vulnerability in its invoice database. While claiming on-chain a received HTLC output, it didn't verify that the corresponding outgoing off-chain HTLC was already settled before releasing the preimage. In the case of a hash-and-amount collision with an invoice, the preimage for an expected payment was instead released. A malicious peer could have deliberately intercepted an HTLC intended for the victim node, probed the preimage... | Lightning_network_daemon | 8.2 | ||
2020-10-21 | CVE-2020-26895 | Prior to 0.10.0-beta, LND (Lightning Network Daemon) would have accepted a counterparty high-S signature and broadcast tx-relay invalid local commitment/HTLC transactions. This can be exploited by any peer with an open channel regardless of the victim situation (e.g., routing node, payment-receiver, or payment-sender). The impact is a loss of funds in certain situations. | Lightning_network_daemon | 5.3 |