

# Amazon Linux 2 version 2.0.20230906.0 release notes
<a name="relnotes-20230911"></a>

These are the release notes for Amazon Linux 2 version 2.0.20230906.0.

## Major updates
<a name="major-updates-20230911"></a>

None.

## Package updates
<a name="package-updates-20230911"></a>

The following packages were updated.


|  | 
| --- |
|  `amazon-ssm-agent-3.2.1377.0-1.amzn2.aarch64`  | 
|  `amazon-ssm-agent-3.2.1377.0-1.amzn2.x86_64`  | 
|  `bind-export-libs-9.11.4-26.P2.amzn2.13.3.aarch64`  | 
|  `bind-export-libs-9.11.4-26.P2.amzn2.13.3.x86_64`  | 
|  `bind-libs-9.11.4-26.P2.amzn2.13.3.aarch64`  | 
|  `bind-libs-9.11.4-26.P2.amzn2.13.3.x86_64`  | 
|  `bind-libs-lite-9.11.4-26.P2.amzn2.13.3.aarch64`  | 
|  `bind-libs-lite-9.11.4-26.P2.amzn2.13.3.x86_64`  | 
|  `bind-license-9.11.4-26.P2.amzn2.13.3.noarch`  | 
|  `bind-utils-9.11.4-26.P2.amzn2.13.3.aarch64`  | 
|  `bind-utils-9.11.4-26.P2.amzn2.13.3.x86_64`  | 
|  `ca-certificates-2021.2.50-72.amzn2.0.8.noarch`  | 
|  `curl-8.2.1-1.amzn2.0.2.aarch64`  | 
|  `curl-8.2.1-1.amzn2.0.2.x86_64`  | 
|  `dhclient-4.2.5-79.amzn2.1.4.aarch64`  | 
|  `dhclient-4.2.5-79.amzn2.1.4.x86_64`  | 
|  `dhcp-common-4.2.5-79.amzn2.1.4.aarch64`  | 
|  `dhcp-common-4.2.5-79.amzn2.1.4.x86_64`  | 
|  `dhcp-libs-4.2.5-79.amzn2.1.4.aarch64`  | 
|  `dhcp-libs-4.2.5-79.amzn2.1.4.x86_64`  | 
|  `ec2-hibinit-agent-1.0.2-5.amzn2.noarch`  | 
|  `kernel-4.14.322-244.539.amzn2.aarch64`  | 
|  `kernel-4.14.322-244.539.amzn2.x86_64`  | 
|  `kernel-5.10.192-182.736.amzn2.aarch64`  | 
|  `kernel-5.10.192-182.736.amzn2.x86_64`  | 
|  `kernel-devel-4.14.322-244.539.amzn2.x86_64`  | 
|  `kernel-headers-4.14.322-244.539.amzn2.x86_64`  | 
|  `kernel-tools-4.14.322-244.539.amzn2.aarch64`  | 
|  `kernel-tools-4.14.322-244.539.amzn2.x86_64`  | 
|  `kernel-tools-5.10.192-182.736.amzn2.aarch64`  | 
|  `kernel-tools-5.10.192-182.736.amzn2.x86_64`  | 
|  `krb5-libs-1.15.1-55.amzn2.2.6.aarch64`  | 
|  `krb5-libs-1.15.1-55.amzn2.2.6.x86_64`  | 
|  `libcurl-8.2.1-1.amzn2.0.2.aarch64`  | 
|  `libcurl-8.2.1-1.amzn2.0.2.x86_64`  | 
|  `libidn-1.28-4.amzn2.0.4.aarch64`  | 
|  `libidn-1.28-4.amzn2.0.4.x86_64`  | 
|  `libidn2-2.3.0-1.amzn2.0.2.aarch64`  | 
|  `libidn2-2.3.0-1.amzn2.0.2.x86_64`  | 
|  `libjpeg-turbo-2.0.90-2.amzn2.0.4.aarch64`  | 
|  `libjpeg-turbo-2.0.90-2.amzn2.0.4.x86_64`  | 
|  `libpng-1.5.13-8.amzn2.0.3.aarch64`  | 
|  `libpng-1.5.13-8.amzn2.0.3.x86_64`  | 
|  `libtasn1-4.10-1.amzn2.0.5.aarch64`  | 
|  `libtasn1-4.10-1.amzn2.0.5.x86_64`  | 
|  `libtiff-4.0.3-35.amzn2.0.12.aarch64`  | 
|  `libtiff-4.0.3-35.amzn2.0.12.x86_64`  | 
|  `libxml2-2.9.1-6.amzn2.5.10.aarch64`  | 
|  `libxml2-2.9.1-6.amzn2.5.10.x86_64`  | 
|  `libxml2-python-2.9.1-6.amzn2.5.10.aarch64`  | 
|  `libxml2-python-2.9.1-6.amzn2.5.10.x86_64`  | 
|  `python3-3.7.16-1.amzn2.0.4.aarch64`  | 
|  `python3-3.7.16-1.amzn2.0.4.x86_64`  | 
|  `python3-libs-3.7.16-1.amzn2.0.4.aarch64`  | 
|  `python3-libs-3.7.16-1.amzn2.0.4.x86_64`  | 
|  `sudo-1.8.23-10.amzn2.3.3.aarch64`  | 
|  `sudo-1.8.23-10.amzn2.3.3.x86_64`  | 

**amazon-ssm-agent-3.2.1377.0-1.amzn2**

CVEs fixed:
+ [CVE-2021-43565](https://alas.aws.amazon.com/cve/html/CVE-2021-43565.html)
+ [CVE-2022-27191](https://alas.aws.amazon.com/cve/html/CVE-2022-27191.html)
+ [CVE-2022-27664](https://alas.aws.amazon.com/cve/html/CVE-2022-27664.html)
+ [CVE-2022-41723](https://alas.aws.amazon.com/cve/html/CVE-2022-41723.html)

**ca-certificates-2021.2.50-72.amzn2.0.8**

CVE fixed:
+ [CVE-2023-37920](https://alas.aws.amazon.com/cve/html/CVE-2023-37920.html)

**curl-8.2.1-1.amzn2.0.2**, **libcurl-8.2.1-1.amzn2.0.2**

CVEs fixed:
+ [CVE-2020-19909](https://alas.aws.amazon.com/cve/html/CVE-2020-19909.html)
+ [CVE-2023-28319](https://alas.aws.amazon.com/cve/html/CVE-2023-28319.html)
+ [CVE-2023-28321](https://alas.aws.amazon.com/cve/html/CVE-2023-28321.html)
+ [CVE-2023-28322](https://alas.aws.amazon.com/cve/html/CVE-2023-28322.html)

**kernel-4.14.322-244.539.amzn2**, **kernel-devel-4.14.322-244.539.amzn2**, **kernel-headers-4.14.322-244.539.amzn2**, **kernel-tools-4.14.322-244.539.amzn2**

CVE fixed:
+ [CVE-2023-20588](https://alas.aws.amazon.com/cve/html/CVE-2023-20588.html)

**kernel-5.10.192-182.736.amzn2**, **kernel-tools-5.10.192-182.736.amzn2**

CVEs fixed:
+ [CVE-2023-20588](https://alas.aws.amazon.com/cve/html/CVE-2023-20588.html)
+ [CVE-2023-3390](https://alas.aws.amazon.com/cve/html/CVE-2023-3390.html)
+ [CVE-2023-4004](https://alas.aws.amazon.com/cve/html/CVE-2023-4004.html)
+ [CVE-2023-4128](https://alas.aws.amazon.com/cve/html/CVE-2023-4128.html)
+ [CVE-2023-4147](https://alas.aws.amazon.com/cve/html/CVE-2023-4147.html)
+ [CVE-2023-4273](https://alas.aws.amazon.com/cve/html/CVE-2023-4273.html)

**krb5-libs-1.15.1-55.amzn2.2.6**

CVE fixed:
+ [CVE-2023-36054](https://alas.aws.amazon.com/cve/html/CVE-2023-36054.html)

**libtiff-4.0.3-35.amzn2.0.12**

CVEs fixed:
+ [CVE-2023-0795](https://alas.aws.amazon.com/cve/html/CVE-2023-0795.html)
+ [CVE-2023-0796](https://alas.aws.amazon.com/cve/html/CVE-2023-0796.html)
+ [CVE-2023-0797](https://alas.aws.amazon.com/cve/html/CVE-2023-0797.html)
+ [CVE-2023-0798](https://alas.aws.amazon.com/cve/html/CVE-2023-0798.html)
+ [CVE-2023-0799](https://alas.aws.amazon.com/cve/html/CVE-2023-0799.html)
+ [CVE-2023-0803](https://alas.aws.amazon.com/cve/html/CVE-2023-0803.html)

**python3-3.7.16-1.amzn2.0.4**, **python3-libs-3.7.16-1.amzn2.0.4**

CVE fixed:
+ [CVE-2023-40217](https://alas.aws.amazon.com/cve/html/CVE-2023-40217.html)