Amazon Linux AMI : kernel (ALAS-2015-523)
High Nessus Plugin ID 83493
SynopsisThe remote Amazon Linux AMI host is missing a security update.
DescriptionA buffer overflow flaw was found in the way the Linux kernel's Intel AES-NI instructions optimized version of the RFC4106 GCM mode decryption functionality handled fragmented packets. A remote attacker could use this flaw to crash, or potentially escalate their privileges on, a system over a connection with an active AEC-GCM mode IPSec security association. (CVE-2015-3331)
It was found that the Linux kernel's ping socket implementation did not properly handle socket unhashing during spurious disconnects, which could lead to a use-after-free flaw. On x86-64 architecture systems, a local user able to create ping sockets could use this flaw to crash the system. On non-x86-64 architecture systems, a local user able to create ping sockets could use this flaw to escalate their privileges on the system. (CVE-2015-3636)
SolutionRun 'yum clean all' followed by 'yum update kernel' to update your system. You will need to reboot your system in order for the new kernel to be running.