Amazon Linux AMI Security Advisory: ALAS-2014-352
Advisory Release Date: 2014-06-05 15:38 Pacific
Advisory Updated Date: 2014-09-19 10:20 Pacific
A flaw was found in the way GnuTLS parsed session IDs from ServerHello messages of the TLS/SSL handshake. A malicious server could use this flaw to send an excessively long session ID value, which would trigger a buffer overflow in a connecting TLS/SSL client application using GnuTLS, causing the client application to crash or, possibly, execute arbitrary code. (CVE-2014-3466)
Run yum update gnutls to update your system.