SynopsisThe remote Amazon Linux AMI host is missing a security update.
DescriptionThe Linux kernel did not properly suppress hugetlbfs support in x86 PV guests, which could allow local PV guest users to cause a denial of service (guest OS crash) by attempting to access a hugetlbfs mapped area. (CVE-2016-3961 / XSA-174)
A flaw was found in the way the Linux kernel's ASN.1 DER decoder processed certain certificate files with tags of indefinite length. A local, unprivileged user could use a specially crafted X.509 certificate DER file to crash the system or, potentially, escalate their privileges on the system. (CVE-2016-0758)
Multiple race conditions in the ext4 filesystem implementation in the Linux kernel before 4.5 allow local users to cause a denial of service (disk corruption) by writing to a page that is associated with a different user's file after unsynchronized hole punching and page-fault handling. (CVE-2015-8839)
The following flaws were also fixed in this version :
CVE-2016-4557 : Use after free vulnerability via double fdput
CVE-2016-4581 : Slave being first propagated copy causes oops in propagate_mnt
CVE-2016-4486 : Information leak in rtnetlink
CVE-2016-4485 : Information leak in llc module
CVE-2016-4558 : bpf: refcnt overflow
CVE-2016-4565 : infiniband: Unprivileged process can overwrite kernel memory using rdma_ucm.ko
CVE-2016-0758 : tags with indefinite length can corrupt pointers in asn1_find_indefinite_length()
CVE-2015-8839 : ext4 filesystem page fault race condition with fallocate call.
SolutionRun 'yum update kernel' to update your system.