CVE-2021-43668: Denial of Service in Go-Ethereum
5.5
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.17715%
CWE
Published
11/23/2021
Updated
9/18/2023
KEV Status
No
Technology
Go
Technical Details
CVSS Vector
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
github.com/ethereum/go-ethereum | go | <= 1.10.9 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from a NULL pointer dereference in the github.com/syndtr/goleveldb/leveldb/table.(*Reader).newBlockIter
function within the syndtr/goleveldb
dependency, as evidenced by the stack trace pointing to reader.go:734
. This function is called when Go-Ethereum interacts with its LevelDB storage. The crash occurs due to improper handling of a nil bpool
in the dependency's code. However, the affected package listed is github.com/ethereum/go-ethereum
, and no specific functions within this package directly exhibit the vulnerability. The issue arises from the vulnerable dependency, not from Go-Ethereum's own code. Thus, no functions in the Go-Ethereum package itself are identified with high confidence as the root cause.