On Mon, 2006-04-03 at 10:48 +0200, Hendrik Weimer wrote:
> Package: oprofile
> Version: 0.9.1-9
> Tags: security
> 
> As described in http://www.osreviews.net/reviews/devel/oprofile
> OProfile allows unprivileged users to profile all code on a
> system. This makes cryptographic services vulnerable to timing attacks
> (e.g. compromise of secret keys).

The closest to getting this to happen that I know of -- at 
least on a Debian system -- is for someone with root privilege
to have installed the oprofile kernel module (with either 
modprobe or opcontrol --init), and left in place (i.e., did 
not do either a modprobe -r or a opcontrol --deinit).  The 
kernel module is _not_ loaded by default, and without it, no
profiling occurs.

Hence, there's not much OProfile can do about this, as far as
I can tell.  If a user already has root privilege to install the
oprofile kernel module, I'm afraid compromising of secret keys is
the least of the problems.  If someone with root privilege left 
the module loaded, they probably should not have had root privilege,
in my estimation.

I could be completely wrong.  Would it be possible for you to
send me a demonstration of this scenario?  If you wish, send it
to me directly if you don't wish to publicize the flaw any more
than necessary.

Thanks in advance for your time and effort.

-- 
Ciao,
al
----------------------------------------------------------------------
Al Stone                                      Alter Ego:
Open Source and Linux R&D                     Debian Developer
Hewlett-Packard Company                       http://www.debian.org
E-mail: [EMAIL PROTECTED]                        [EMAIL PROTECTED]
----------------------------------------------------------------------



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to