Summary: | net-p2p/bitcoind: Information leak via RPC calls (CVE-2021-3195) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Sam James <sam> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | IN_PROGRESS --- | ||
Severity: | minor | CC: | luke-jr+gentoobugs, O01eg, proxy-maint |
Priority: | Normal | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
See Also: | https://github.com/bitcoin/bitcoin/issues/20866 | ||
Whiteboard: | B4 [upstream] | ||
Package list: | Runtime testing required: | --- |
Description
Sam James
2021-01-25 02:01:14 UTC
This isn't an actual security issue. Not sure why someone created a CVE for it. (In reply to Luke-Jr from comment #1) > This isn't an actual security issue. Not sure why someone created a CVE for > it. I am not super familiar with this software but this does seem like a security issue. Imagine if the same user running bitcoind had write access to a directory served by an httpd or nfs or something. You could dump a secret to a public directory. It's a peculiar enough setup that it might never get exploited by anyone, but that's no reason to not treat it as a security issue. If you have RPC access, you are assumed to be the user running bitcoind and have full access to the wallet already. Package list is empty or all packages have requested keywords. Package list is empty or all packages have requested keywords. Package list is empty or all packages have requested keywords. Package list is empty or all packages have requested keywords. Package list is empty or all packages have requested keywords. Package list is empty or all packages have requested keywords. |