A flaw was found in the way the Linux kernel's Event Poll (epoll) subsystem handled large, nested epoll structures. A local, unprivileged user could use this flaw to cause a denial of service.
A malicious Network File System version 4 (NFSv4) server could return a crafted reply to a GETACL request, causing a denial of service on the client.
The rds_ib_xmit function in net/rds/ib_send.c in the Reliable Datagram Sockets (RDS) protocol implementation in the Linux kernel 3.7.4 and earlier allows local users to cause a denial of service (BUG_ON and kernel panic) by establishing an RDS connection with the source IP address equal to the IPoIB interface's own IP address, as demonstrated by rds-ping.
Run yum update kernel to update your system. You will need to reboot your system in order for the new kernel to be running.
i686: kernel-tools-debuginfo-3.2.22-35.60.amzn1.i686 kernel-headers-3.2.22-35.60.amzn1.i686 kernel-tools-3.2.22-35.60.amzn1.i686 kernel-devel-3.2.22-35.60.amzn1.i686 kernel-debuginfo-3.2.22-35.60.amzn1.i686 kernel-3.2.22-35.60.amzn1.i686 kernel-debuginfo-common-i686-3.2.22-35.60.amzn1.i686 noarch: kernel-doc-3.2.22-35.60.amzn1.noarch src: kernel-3.2.22-35.60.amzn1.src x86_64: kernel-tools-debuginfo-3.2.22-35.60.amzn1.x86_64 kernel-tools-3.2.22-35.60.amzn1.x86_64 kernel-devel-3.2.22-35.60.amzn1.x86_64 kernel-debuginfo-common-x86_64-3.2.22-35.60.amzn1.x86_64 kernel-debuginfo-3.2.22-35.60.amzn1.x86_64 kernel-3.2.22-35.60.amzn1.x86_64 kernel-headers-3.2.22-35.60.amzn1.x86_64