On Mon, Apr 03, 2006 at 10:32:57AM -0600, Al Stone wrote:

> > As described in http://www.osreviews.net/reviews/devel/oprofile
> > OProfile allows unprivileged users to profile all code on a
> > system. This makes cryptographic services vulnerable to timing attacks
> > (e.g. compromise of secret keys).
> 
> I could be completely wrong.  Would it be possible for you to
> send me a demonstration of this scenario?  If you wish, send it
> to me directly if you don't wish to publicize the flaw any more
> than necessary.
> 

I assume he's referring to the fact that 'opreport' is runnable by
anyone. The most sensible way to work around this problem is to disable
read permissions for the sample directory, I suppose. Or not do any
profiling.

regards
john


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to