

# Amazon Linux 2 version 2.0.20220719.0 release notes
<a name="relnotes-20220802"></a>

These are the release notes for Amazon Linux 2 version 2.0.20220719.0.

## Major updates
<a name="major-updates-20220802"></a>

None.

## Package updates
<a name="package-updates-20220802"></a>

Amazon Linux 2 includes the following packages.


| Packages | 
| --- | 
|  `amazon-ssm-agent-3.1.1575.0-1.amzn2.aarch64`  | 
|  `amazon-ssm-agent-3.1.1575.0-1.amzn2.x86_64`  | 
|  `curl-7.79.1-4.amzn2.0.1.aarch64`  | 
|  `curl-7.79.1-4.amzn2.0.1.x86_64`  | 
|  `expat-2.1.0-14.amzn2.0.1.aarch64`  | 
|  `expat-2.1.0-14.amzn2.0.1.x86_64`  | 
|  `glibc-2.26-59.amzn2.aarch64`  | 
|  `glibc-2.26-59.amzn2.x86_64`  | 
|  `glibc-all-langpacks-2.26-59.amzn2.aarch64`  | 
|  `glibc-all-langpacks-2.26-59.amzn2.x86_64`  | 
|  `glibc-common-2.26-59.amzn2.aarch64`  | 
|  `glibc-common-2.26-59.amzn2.x86_64`  | 
|  `glibc-devel-2.26-59.amzn2.x86_64`  | 
|  `glibc-headers-2.26-59.amzn2.x86_64`  | 
|  `glibc-langpack-en-2.26-59.amzn2.aarch64`  | 
|  `glibc-langpack-en-2.26-59.amzn2.x86_64`  | 
|  `glibc-locale-source-2.26-59.amzn2.aarch64`  | 
|  `glibc-locale-source-2.26-59.amzn2.x86_64`  | 
|  `glibc-minimal-langpack-2.26-59.amzn2.aarch64`  | 
|  `glibc-minimal-langpack-2.26-59.amzn2.x86_64`  | 
|  `initscripts-9.49.47-1.amzn2.0.2.aarch64`  | 
|  `initscripts-9.49.47-1.amzn2.0.2.x86_64`  | 
|  `iproute-5.10.0-2.amzn2.0.3.aarch64`  | 
|  `iproute-5.10.0-2.amzn2.0.3.x86_64`  | 
|  `kernel-4.14.287-215.504.amzn2.aarch64`  | 
|  `kernel-4.14.287-215.504.amzn2.x86_64`  | 
|  `kernel-5.10.130-118.517.amzn2.aarch64`  | 
|  `kernel-5.10.130-118.517.amzn2.x86_64`  | 
|  `kernel-devel-4.14.287-215.504.amzn2.x86_64`  | 
|  `kernel-headers-4.14.287-215.504.amzn2.x86_64`  | 
|  `kernel-tools-4.14.287-215.504.amzn2.aarch64`  | 
|  `kernel-tools-4.14.287-215.504.amzn2.x86_64`  | 
|  `kernel-tools-5.10.130-118.517.amzn2.aarch64`  | 
|  `kernel-tools-5.10.130-118.517.amzn2.x86_64`  | 
|  `libcrypt-2.26-59.amzn2.aarch64`  | 
|  `libcrypt-2.26-59.amzn2.x86_64`  | 
|  `libcurl-7.79.1-4.amzn2.0.1.aarch64`  | 
|  `libcurl-7.79.1-4.amzn2.0.1.x86_64`  | 
|  `libxml2-2.9.1-6.amzn2.5.5.aarch64`  | 
|  `libxml2-2.9.1-6.amzn2.5.5.x86_64`  | 
|  `libxml2-python-2.9.1-6.amzn2.5.5.aarch64`  | 
|  `libxml2-python-2.9.1-6.amzn2.5.5.x86_64`  | 
|  `systemtap-runtime-4.5-1.amzn2.0.1.aarch64`  | 
|  `systemtap-runtime-4.5-1.amzn2.0.1.x86_64`  | 
|  `vim-common-8.2.5172-1.amzn2.0.1.aarch64`  | 
|  `vim-common-8.2.5172-1.amzn2.0.1.x86_64`  | 
|  `vim-data-8.2.5172-1.amzn2.0.1.noarch`  | 
|  `vim-enhanced-8.2.5172-1.amzn2.0.1.aarch64`  | 
|  `vim-enhanced-8.2.5172-1.amzn2.0.1.x86_64`  | 
|  `vim-filesystem-8.2.5172-1.amzn2.0.1.noarch`  | 
|  `vim-minimal-8.2.5172-1.amzn2.0.1.aarch64`  | 
|  `vim-minimal-8.2.5172-1.amzn2.0.1.x86_64`  | 
|  `yum-3.4.3-158.amzn2.0.6.noarch`  | 

Package with CVEs:

**expat-2.1.0-14.amzn2.0.1**

CVEs fixed:
+ [CVE-2021-46143](https://alas.aws.amazon.com/cve/html/CVE-2021-46143.html)
+ [CVE-2022-22822](https://alas.aws.amazon.com/cve/html/CVE-2022-22822.html)
+ [CVE-2022-22823](https://alas.aws.amazon.com/cve/html/CVE-2022-22823.html)
+ [CVE-2022-22824](https://alas.aws.amazon.com/cve/html/CVE-2022-22824.html)
+ [CVE-2022-22825](https://alas.aws.amazon.com/cve/html/CVE-2022-22825.html)
+ [CVE-2022-22826](https://alas.aws.amazon.com/cve/html/CVE-2022-22826.html)
+ [CVE-2022-22827](https://alas.aws.amazon.com/cve/html/CVE-2022-22827.html)

## Kernel updates
<a name="kernel-updates-20220802"></a>

**kernel-4.14.287-215.504.amzn2**

CVEs fixed:
+ [CVE-2022-2318](https://alas.aws.amazon.com/cve/html/CVE-2022-2318.html)
+ [CVE-2022-26365](https://alas.aws.amazon.com/cve/html/CVE-2022-26365.html)
+ [CVE-2022-33740](https://alas.aws.amazon.com/cve/html/CVE-2022-33740.html)
+ [CVE-2022-33741](https://alas.aws.amazon.com/cve/html/CVE-2022-33741.html)
+ [CVE-2022-33742](https://alas.aws.amazon.com/cve/html/CVE-2022-33742.html)
+ [CVE-2022-33744](https://alas.aws.amazon.com/cve/html/CVE-2022-33744.html)

**kernel-5.10.130-118.517.amzn2**

CVEs fixed:
+ [CVE-2022-2318](https://alas.aws.amazon.com/cve/html/CVE-2022-2318.html)
+ [CVE-2022-26365](https://alas.aws.amazon.com/cve/html/CVE-2022-26365.html)
+ [CVE-2022-33740](https://alas.aws.amazon.com/cve/html/CVE-2022-33740.html)
+ [CVE-2022-33741](https://alas.aws.amazon.com/cve/html/CVE-2022-33741.html)
+ [CVE-2022-33742](https://alas.aws.amazon.com/cve/html/CVE-2022-33742.html)
+ [CVE-2022-33743](https://alas.aws.amazon.com/cve/html/CVE-2022-33743.html)
+ [CVE-2022-33744](https://alas.aws.amazon.com/cve/html/CVE-2022-33744.html)
+ [CVE-2022-34918](https://alas.aws.amazon.com/cve/html/CVE-2022-34918.html)
+ [CVE-2022-2318](https://alas.aws.amazon.com/cve/html/CVE-2022-2318.html)
+ [CVE-2022-26365](https://alas.aws.amazon.com/cve/html/CVE-2022-26365.html)
+ [CVE-2022-33740](https://alas.aws.amazon.com/cve/html/CVE-2022-33740.html)
+ [CVE-2022-33741](https://alas.aws.amazon.com/cve/html/CVE-2022-33741.html)
+ [CVE-2022-33742](https://alas.aws.amazon.com/cve/html/CVE-2022-33742.html)
+ [CVE-2022-33743](https://alas.aws.amazon.com/cve/html/CVE-2022-33743.html)
+ [CVE-2022-33744](https://alas.aws.amazon.com/cve/html/CVE-2022-33744.html)
+ [CVE-2022-34918](https://alas.aws.amazon.com/cve/html/CVE-2022-34918.html)