

# Amazon Linux 2 version 2.0.20230307.0 release notes
<a name="relnotes-20230309"></a>

These are the release notes for Amazon Linux 2 version 2.0.20230307.0.

## Major updates
<a name="major-updates-20230309"></a>

None.

## Package updates
<a name="package-updates-20230309"></a>

The following packages were updated.


|  | 
| --- |
|  `awscli-1.18.147-1.amzn2.0.2.noarch`  | 
|  `cpio-2.12-11.amzn2.aarch64`  | 
|  `cpio-2.12-11.amzn2.x86_64`  | 
|  `curl-7.88.1-1.amzn2.0.1.aarch64`  | 
|  `curl-7.88.1-1.amzn2.0.1.x86_64`  | 
|  `libcurl-7.88.1-1.amzn2.0.1.aarch64`  | 
|  `libcurl-7.88.1-1.amzn2.0.1.x86_64`  | 
|  `libdb-5.3.21-24.amzn2.0.4.aarch64`  | 
|  `libdb-5.3.21-24.amzn2.0.4.x86_64`  | 
|  `libdb-utils-5.3.21-24.amzn2.0.4.aarch64`  | 
|  `libdb-utils-5.3.21-24.amzn2.0.4.x86_64`  | 
|  `python-2.7.18-1.amzn2.0.6.aarch64`  | 
|  `python-2.7.18-1.amzn2.0.6.x86_64`  | 
|  `python-devel-2.7.18-1.amzn2.0.6.aarch64`  | 
|  `python-devel-2.7.18-1.amzn2.0.6.x86_64`  | 
|  `python-libs-2.7.18-1.amzn2.0.6.aarch64`  | 
|  `python-libs-2.7.18-1.amzn2.0.6.x86_64`  | 
|  `python2-botocore-1.18.6-1.amzn2.0.3.noarch`  | 
|  `python2-setuptools-41.2.0-4.amzn2.0.3.noarch`  | 
|  `sudo-1.8.23-10.amzn2.3.1.aarch64`  | 
|  `sudo-1.8.23-10.amzn2.3.1.x86_64`  | 
|  `vim-common-9.0.1314-1.amzn2.0.1.aarch64`  | 
|  `vim-common-9.0.1314-1.amzn2.0.1.x86_64`  | 
|  `vim-data-9.0.1314-1.amzn2.0.1.noarch`  | 
|  `vim-enhanced-9.0.1314-1.amzn2.0.1.aarch64`  | 
|  `vim-enhanced-9.0.1314-1.amzn2.0.1.x86_64`  | 
|  `vim-filesystem-9.0.1314-1.amzn2.0.1.noarch`  | 
|  `vim-minimal-9.0.1314-1.amzn2.0.1.aarch64`  | 
|  `vim-minimal-9.0.1314-1.amzn2.0.1.x86_64`  | 
|  `xorg-x11-server-Xorg-1.20.4-22.amzn2.x86_64`  | 
|  `xorg-x11-server-common-1.20.4-22.amzn2.x86_64`  | 

**cpio-2.12-11.amzn2**

CVEs fixed:
+ [CVE-2021-38185](https://alas.aws.amazon.com/cve/html/CVE-2021-38185.html)

**libdb-5.3.21-24.amzn2.0.4**, **libdb-utils-5.3.21-24.amzn2.0.4**

CVEs fixed:
+ [CVE-2017-10140](https://alas.aws.amazon.com/cve/html/CVE-2017-10140.html)

**python-2.7.18-1.amzn2.0.6**, **python-devel-2.7.18-1.amzn2.0.6**, **python-libs-2.7.18-1.amzn2.0.6**

CVEs fixed:
+ [CVE-2022-45061](https://alas.aws.amazon.com/cve/html/CVE-2022-45061.html)
+ [CVE-2023-24329](https://alas.aws.amazon.com/cve/html/CVE-2023-24329.html)

**python2-setuptools-41.2.0-4.amzn2.0.3**

CVEs fixed:
+ [CVE-2022-40897](https://alas.aws.amazon.com/cve/html/CVE-2022-40897.html)

**sudo-1.8.23-10.amzn2.3.1**

CVEs fixed:
+ [CVE-2023-22809](https://alas.aws.amazon.com/cve/html/CVE-2021-38185.html)

**vim-common-9.0.1314-1.amzn2.0.1**, **vim-data-9.0.1314-1.amzn2.0.1**, **vim-enhanced-9.0.1314-1.amzn2.0.1**, **vim-filesystem-9.0.1314-1.amzn2.0.1**,, **vim-minimal-9.0.1314-1.amzn2.0.1**

CVEs fixed:
+ [CVE-2022-2522](https://alas.aws.amazon.com/cve/html/CVE-2022-2522.html)
+ [CVE-2022-2571](https://alas.aws.amazon.com/cve/html/CVE-2022-2571.html)
+ [CVE-2022-2580](https://alas.aws.amazon.com/cve/html/CVE-2022-2580.html)
+ [CVE-2022-2581](https://alas.aws.amazon.com/cve/html/CVE-2022-2581.html)
+ [CVE-2022-2874](https://alas.aws.amazon.com/cve/html/CVE-2022-2874.html)
+ [CVE-2022-3134](https://alas.aws.amazon.com/cve/html/CVE-2022-3134.html)
+ [CVE-2022-3153](https://alas.aws.amazon.com/cve/html/CVE-2022-3153.html)
+ [CVE-2022-3234](https://alas.aws.amazon.com/cve/html/CVE-2022-3234.html)
+ [CVE-2022-3235](https://alas.aws.amazon.com/cve/html/CVE-2022-3235.html)
+ [CVE-2022-3256](https://alas.aws.amazon.com/cve/html/CVE-2022-3256.html)
+ [CVE-2022-3278](https://alas.aws.amazon.com/cve/html/CVE-2022-3278.html)
+ [CVE-2022-3296](https://alas.aws.amazon.com/cve/html/CVE-2022-3296.html)
+ [CVE-2022-3297](https://alas.aws.amazon.com/cve/html/CVE-2022-3297.html)
+ [CVE-2022-3324](https://alas.aws.amazon.com/cve/html/CVE-2022-3324.html)
+ [CVE-2022-3352](https://alas.aws.amazon.com/cve/html/CVE-2022-3352.html)
+ [CVE-2022-3491](https://alas.aws.amazon.com/cve/html/CVE-2022-3491.html)
+ [CVE-2022-47024](https://alas.aws.amazon.com/cve/html/CVE-2022-47024.html)
+ [CVE-2023-0051](https://alas.aws.amazon.com/cve/html/CVE-2023-0051.html)
+ [CVE-2023-0054](https://alas.aws.amazon.com/cve/html/CVE-2023-0054.html)
+ [CVE-2023-0288](https://alas.aws.amazon.com/cve/html/CVE-2023-0288.html)
+ [CVE-2023-0433](https://alas.aws.amazon.com/cve/html/CVE-2023-0433.html)
+ [CVE-2023-0512](https://alas.aws.amazon.com/cve/html/CVE-2023-0512.html)

**xorg-x11-server-Xorg-1.20.4-22.amzn2**, **xorg-x11-server-common-1.20.4-22.amzn2**

CVEs fixed:
+ [CVE-2023-0494](https://alas.aws.amazon.com/cve/html/CVE-2023-0494.html)