Amazon Linux: Security Advisory (ALAS-2013-225)
Information
Severity
Severity
Low
Family
Family
Amazon Linux Local Security Checks
CVSSv2 Base
CVSSv2 Base
1.9
CVSSv2 Vector
CVSSv2 Vector
AV:L/AC:M/Au:N/C:P/I:N/A:N
Solution Type
Solution Type
Vendor Patch
Created
Created
6 years ago
Modified
Modified
5 months ago
Summary
The remote host is missing an update announced via the referenced Security Advisory.
Insight
Insight
GnuPG before 1.4.14, and Libgcrypt before 1.5.3 as used in GnuPG 2.0.x and possibly other products, allows local users to obtain private RSA keys via a cache side-channel attack involving the L3 cache, aka Flush+Reload.
Solution
Solution
Run yum update gnupg to update your system.
Common Vulnerabilities and Exposures (CVE)
Download Mageni to scan and fix this vulnerability. It is free and easy.
Processing. Please wait...
Free for 7-days then $4 USD monthly regardless of how many IPs, scans, users, or deployments you have. No Contracts, Cancel at Anytime and 7-days Money-Back Guarantee.