

# Amazon Linux 2 version 2.0.20230719.0 release notes
<a name="relnotes-20230725"></a>

These are the release notes for Amazon Linux 2 version 2.0.20230719.0.

## Major updates
<a name="major-updates-20230725"></a>

None.

## Package updates
<a name="package-updates-20230725"></a>

The following packages were updated.


|  | 
| --- |
|  `bind-export-libs-9.11.4-26.P2.amzn2.13.1.aarch64`  | 
|  `bind-export-libs-9.11.4-26.P2.amzn2.13.1.x86_64`  | 
|  `bind-libs-9.11.4-26.P2.amzn2.13.1.aarch64`  | 
|  `bind-libs-9.11.4-26.P2.amzn2.13.1.x86_64`  | 
|  `bind-libs-lite-9.11.4-26.P2.amzn2.13.1.aarch64`  | 
|  `bind-libs-lite-9.11.4-26.P2.amzn2.13.1.x86_64`  | 
|  `bind-license-9.11.4-26.P2.amzn2.13.1.noarch`  | 
|  `bind-utils-9.11.4-26.P2.amzn2.13.1.aarch64`  | 
|  `bind-utils-9.11.4-26.P2.amzn2.13.1.x86_64`  | 
|  `grub2-2.06-14.amzn2.aarch64`  | 
|  `grub2-2.06-14.amzn2.x86_64`  | 
|  `grub2-common-2.06-14.amzn2.noarch`  | 
|  `grub2-efi-aa64-2.06-14.amzn2.aarch64`  | 
|  `grub2-efi-aa64-ec2-2.06-14.amzn2.aarch64`  | 
|  `grub2-efi-aa64-modules-2.06-14.amzn2.noarch`  | 
|  `grub2-efi-x64-ec2-2.06-14.amzn2.x86_64`  | 
|  `grub2-pc-2.06-14.amzn2.x86_64`  | 
|  `grub2-pc-modules-2.06-14.amzn2.noarch`  | 
|  `grub2-tools-2.06-14.amzn2.aarch64`  | 
|  `grub2-tools-2.06-14.amzn2.x86_64`  | 
|  `grub2-tools-minimal-2.06-14.amzn2.aarch64`  | 
|  `grub2-tools-minimal-2.06-14.amzn2.x86_64`  | 
|  `kernel-4.14.320-242.534.amzn2.aarch64`  | 
|  `kernel-4.14.320-242.534.amzn2.x86_64`  | 
|  `kernel-5.10.184-175.749.amzn2.aarch64`  | 
|  `kernel-5.10.184-175.749.amzn2.x86_64`  | 
|  `kernel-devel-4.14.320-242.534.amzn2.x86_64`  | 
|  `kernel-headers-4.14.320-242.534.amzn2.x86_64`  | 
|  `kernel-tools-4.14.320-242.534.amzn2.aarch64`  | 
|  `kernel-tools-4.14.320-242.534.amzn2.x86_64`  | 
|  `kernel-tools-5.10.184-175.749.amzn2.aarch64`  | 
|  `kernel-tools-5.10.184-175.749.amzn2.x86_64`  | 
|  `libX11-1.6.7-3.amzn2.0.3.x86_64`  | 
|  `libX11-common-1.6.7-3.amzn2.0.3.noarch`  | 
|  `libcap-2.54-1.amzn2.0.2.aarch64`  | 
|  `libcap-2.54-1.amzn2.0.2.x86_64`  | 
|  `libtiff-4.0.3-35.amzn2.0.7.aarch64`  | 
|  `libtiff-4.0.3-35.amzn2.0.7.x86_64`  | 
|  `open-vm-tools-12.2.5-1.amzn2.x86_64`  | 
|  `python-pillow-2.0.0-23.gitd1c6db8.amzn2.0.7.aarch64`  | 
|  `python-pillow-2.0.0-23.gitd1c6db8.amzn2.0.7.x86_64`  | 
|  `python-requests-2.6.0-10.amzn2.0.1.noarch`  | 
|  `python2-rsa-3.4.1-1.amzn2.0.4.noarch`  | 
|  `python3-pip-20.2.2-1.amzn2.0.4.noarch`  | 
|  `tcpdump-4.9.2-4.amzn2.1.0.1.aarch64`  | 
|  `tcpdump-4.9.2-4.amzn2.1.0.1.x86_64`  | 

**bind-export-libs-9.11.4-26.P2.amzn2.13.1**, **bind-libs-9.11.4-26.P2.amzn2.13.1**, **bind-libs-lite-9.11.4-26.P2.amzn2.13.1**, **bind-license-9.11.4-26.P2.amzn2.13.1**, **bind-utils-9.11.4-26.P2.amzn2.13.1**

CVE fixed:
+ [CVE-2023-2828](https://alas.aws.amazon.com/cve/html/CVE-2023-2828.html)

**grub2-2.06-14.amzn2**, **grub2-common-2.06-14.amzn2**, **grub2-efi-aa64-2.06-14.amzn2**, **grub2-efi-aa64-ec2-2.06-14.amzn2**, **grub2-efi-aa64-modules-2.06-14.amzn2**, **grub2-efi-x64-ec2-2.06-14.amzn2**, **grub2-pc-2.06-14.amzn2**, **grub2-pc-modules-2.06-14.amzn2**, **grub2-tools-2.06-14.amzn2**, **grub2-tools-minimal-2.06-14.amzn2**

CVEs fixed:
+ [CVE-2021-3695](https://alas.aws.amazon.com/cve/html/CVE-2021-3695.html)
+ [CVE-2021-3696](https://alas.aws.amazon.com/cve/html/CVE-2021-3696.html)
+ [CVE-2021-3697](https://alas.aws.amazon.com/cve/html/CVE-2021-3697.html)
+ [CVE-2022-2601](https://alas.aws.amazon.com/cve/html/CVE-2022-2601.html)
+ [CVE-2022-28733](https://alas.aws.amazon.com/cve/html/CVE-2022-28733.html)
+ [CVE-2022-28734](https://alas.aws.amazon.com/cve/html/CVE-2022-28734.html)
+ [CVE-2022-28735](https://alas.aws.amazon.com/cve/html/CVE-2022-28735.html)
+ [CVE-2022-28736](https://alas.aws.amazon.com/cve/html/CVE-2022-28736.html)
+ [CVE-2022-3775](https://alas.aws.amazon.com/cve/html/CVE-2022-3775.html)

**kernel-4.14.320-242.534.amzn2**, **kernel-devel-4.14.320-242.534.amzn2**, **kernel-headers-4.14.320-242.534.amzn2**, **kernel-tools-4.14.320-242.534.amzn2**

CVEs fixed:
+ [CVE-2023-3117](https://alas.aws.amazon.com/cve/html/CVE-2023-3117.html)
+ [CVE-2023-35001](https://alas.aws.amazon.com/cve/html/CVE-2023-35001.html)

**kernel-5.10.184-175.749.amzn2**, **kernel-tools-5.10.184-175.749.amzn2**

CVEs fixed:
+ [CVE-2023-3117](https://alas.aws.amazon.com/cve/html/CVE-2023-3117.html)
+ [CVE-2023-31248](https://alas.aws.amazon.com/cve/html/CVE-2023-31248.html)
+ [CVE-2023-35001](https://alas.aws.amazon.com/cve/html/CVE-2023-35001.html)

**libX11-1.6.7-3.amzn2.0.3**, **libX11-common-1.6.7-3.amzn2.0.3**

CVE fixed:
+ [CVE-2023-3138](https://alas.aws.amazon.com/cve/html/CVE-2023-3138.html)

**libcap-2.54-1.amzn2.0.2**

CVE fixed:
+ [CVE-2023-2602](https://alas.aws.amazon.com/cve/html/CVE-2023-2602.html)

**libtiff-4.0.3-35.amzn2.0.7**

CVE fixed:
+ [CVE-2023-3316](https://alas.aws.amazon.com/cve/html/CVE-2023-3316.html)

**open-vm-tools-12.2.5-1.amzn2**

CVE fixed:
+ [CVE-2023-20867](https://alas.aws.amazon.com/cve/html/CVE-2023-20867.html)

**python-pillow-2.0.0-23.gitd1c6db8.amzn2.0.7**

CVE fixed:
+ [CVE-2021-23437](https://alas.aws.amazon.com/cve/html/CVE-2021-23437.html)

**python-requests-2.6.0-10.amzn2.0.1**

CVE fixed:
+ [CVE-2023-32681](https://alas.aws.amazon.com/cve/html/CVE-2023-32681.html)

**python2-rsa-3.4.1-1.amzn2.0.4**

CVE fixed:
+ [CVE-2020-25658](https://alas.aws.amazon.com/cve/html/CVE-2020-25658.html)

**python3-pip-20.2.2-1.amzn2.0.4**

CVE fixed:
+ [CVE-2020-14422](https://alas.aws.amazon.com/cve/html/CVE-2020-14422.html)

**tcpdump-4.9.2-4.amzn2.1.0.1**

CVE fixed:
+ [CVE-2019-15167](https://alas.aws.amazon.com/cve/html/CVE-2019-15167.html)