Vulnerability Database
Blog
FAQ
Docs
CVE-2021-41593
See a problem?
Please try reporting it
to the source
first.
Source
https://nvd.nist.gov/vuln/detail/CVE-2021-41593
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2021-41593.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2021-41593
Published
2021-10-04T17:15:08Z
Modified
2025-05-28T10:26:04.886877Z
Severity
8.6 (High)
CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:L
CVSS Calculator
Summary
[none]
Details
Lightning Labs lnd before 0.13.3-beta allows loss of funds because of dust HTLC exposure.
References
https://lists.linuxfoundation.org/pipermail/lightning-dev/2020-May/002714.html
https://lists.linuxfoundation.org/pipermail/lightning-dev/2021-October/003257.html
https://lists.linuxfoundation.org/pipermail/lightning-dev/2021-October/003264.html
https://bitcoinmagazine.com/technical/good-griefing-a-lingering-vulnerability-on-lightning-network-that-still-needs-fixing
https://github.com/lightningnetwork/lnd/blob/master/docs/release-notes/release-notes-0.13.3.md
https://github.com/lightningnetwork/lnd/releases/tag/v0.13.3-beta
Affected packages
Git
/
github.com/lightningnetwork/lnd
Affected ranges
Type
GIT
Repo
https://github.com/lightningnetwork/lnd
Events
Introduced
0
Unknown introduced commit / All previous commits are affected
Fixed
4f567577db9d85b6f392f960b3aabddcad3cd02c
Fixed
4f567577db9d85b6f392f960b3aabddcad3cd02c
Affected versions
0.*
0.4-beta
cert/v1.*
cert/v1.0.0
cert/v1.0.1
cert/v1.0.2
cert/v1.0.3
clock/v1.*
clock/v1.0.0
clock/v1.0.1
healthcheck/v1.*
healthcheck/v1.0.0
kvdb/v1.*
kvdb/v1.0.0
queue/v1.*
queue/v1.0.1
queue/v1.0.2
queue/v1.0.3
queue/v1.0.4
Other
upstream
v0.*
v0.1-alpha
v0.1.1-alpha
v0.10.0-beta
v0.10.0-beta.rc1
v0.10.0-beta.rc2
v0.10.0-beta.rc3
v0.10.0-beta.rc4
v0.10.0-beta.rc5
v0.10.0-beta.rc6
v0.11
v0.11.0-beta
v0.11.0-beta.rc1
v0.11.0-beta.rc2
v0.11.0-beta.rc3
v0.11.0-beta.rc4
v0.12.0-beta
v0.12.0-beta.rc1
v0.12.0-beta.rc2
v0.12.0-beta.rc3
v0.12.0-beta.rc3-testbuild7
v0.12.0-beta.rc4
v0.12.0-beta.rc5
v0.12.0-beta.rc6
v0.13.0-beta
v0.13.0-beta.rc1
v0.13.0-beta.rc2
v0.13.0-beta.rc3
v0.13.0-beta.rc4
v0.13.0-beta.rc5
v0.13.1-beta
v0.13.1-beta.rc2
v0.13.2-beta
v0.13.3-beta.rc2
v0.2-alpha
v0.2.1-alpha
v0.3-alpha
v0.4-beta
v0.4.1-beta
v0.4.2-beta
v0.5-beta
v0.5-beta-rc1
v0.5-beta-rc2
v0.5.1-beta
v0.5.1-beta-rc1
v0.5.1-beta-rc2
v0.5.1-beta-rc3
v0.5.1-beta-rc4
v0.6-beta
v0.6-beta-rc1
v0.6-beta-rc2
v0.6-beta-rc3
v0.6-beta-rc4
v0.6.0-beta
v0.6.1-beta
v0.6.1-beta-rc1
v0.6.1-beta-rc2
v0.7.0-beta
v0.7.0-beta-rc1
v0.7.0-beta-rc2
v0.7.0-beta-rc3
v0.7.1-beta
v0.7.1-beta-rc1
v0.7.1-beta-rc2
v0.8.0-beta
v0.8.0-beta-rc1
v0.8.0-beta-rc2
v0.8.0-beta-rc3
v0.9.0-beta
v0.9.0-beta-rc1
v0.9.0-beta-rc2
v0.9.0-beta-rc3
v0.9.0-beta-rc4
CVE-2021-41593 - OSV