Amazon Linux AMI Security Advisory: ALAS-2015-523
Advisory Release Date: 2015-05-14 14:27 Pacific
Advisory Updated Date: 2015-05-14 23:48 Pacific
A buffer overflow flaw was found in the way the Linux kernel's Intel AES-NI instructions optimized version of the RFC4106 GCM mode decryption functionality handled fragmented packets. A remote attacker could use this flaw to crash, or potentially escalate their privileges on, a system over a connection with an active AEC-GCM mode IPSec security association. (CVE-2015-3331 )
It was found that the Linux kernel's ping socket implementation did not properly handle socket unhashing during spurious disconnects, which could lead to a use-after-free flaw. On x86-64 architecture systems, a local user able to create ping sockets could use this flaw to crash the system. On non-x86-64 architecture systems, a local user able to create ping sockets could use this flaw to escalate their privileges on the system. (CVE-2015-3636 )
Run yum clean all followed by yum update kernel to update your system. You will need to reboot your system in order for the new kernel to be running.