

# Amazon Linux 2 version 2.0.20231012.1 release notes
<a name="relnotes-20231016"></a>

These are the release notes for Amazon Linux 2 version 2.0.20231012.1.

## Major updates
<a name="major-updates-20231016"></a>

None.

## Package updates
<a name="package-updates-20231016"></a>

The following packages were updated.


|  | 
| --- |
|  `amazon-linux-extras-2.0.3-1.amzn2.noarch`  | 
|  `amazon-linux-extras-yum-plugin-2.0.3-1.amzn2.noarch`  | 
|  `amazon-ssm-agent-3.2.1630.0-1.amzn2.aarch64`  | 
|  `amazon-ssm-agent-3.2.1630.0-1.amzn2.x86_64`  | 
|  `bind-export-libs-9.11.4-26.P2.amzn2.13.5.aarch64`  | 
|  `bind-export-libs-9.11.4-26.P2.amzn2.13.5.x86_64`  | 
|  `bind-libs-9.11.4-26.P2.amzn2.13.5.aarch64`  | 
|  `bind-libs-9.11.4-26.P2.amzn2.13.5.x86_64`  | 
|  `bind-libs-lite-9.11.4-26.P2.amzn2.13.5.aarch64`  | 
|  `bind-libs-lite-9.11.4-26.P2.amzn2.13.5.x86_64`  | 
|  `bind-license-9.11.4-26.P2.amzn2.13.5.noarch`  | 
|  `bind-utils-9.11.4-26.P2.amzn2.13.5.aarch64`  | 
|  `bind-utils-9.11.4-26.P2.amzn2.13.5.x86_64`  | 
|  `curl-8.3.0-1.amzn2.0.4.aarch64`  | 
|  `curl-8.3.0-1.amzn2.0.4.x86_64`  | 
|  `ec2-hibinit-agent-1.0.2-6.amzn2.noarch`  | 
|  `expat-2.1.0-15.amzn2.0.3.aarch64`  | 
|  `expat-2.1.0-15.amzn2.0.3.x86_64`  | 
|  `kernel-4.14.326-245.539.amzn2.aarch64`  | 
|  `kernel-4.14.326-245.539.amzn2.x86_64`  | 
|  `kernel-5.10.196-185.743.amzn2.aarch64`  | 
|  `kernel-5.10.196-185.743.amzn2.x86_64`  | 
|  `kernel-devel-4.14.326-245.539.amzn2.x86_64`  | 
|  `kernel-headers-4.14.326-245.539.amzn2.x86_64`  | 
|  `kernel-tools-4.14.326-245.539.amzn2.aarch64`  | 
|  `kernel-tools-4.14.326-245.539.amzn2.x86_64`  | 
|  `kernel-tools-5.10.196-185.743.amzn2.aarch64`  | 
|  `kernel-tools-5.10.196-185.743.amzn2.x86_64`  | 
|  `libcurl-8.3.0-1.amzn2.0.4.aarch64`  | 
|  `libcurl-8.3.0-1.amzn2.0.4.x86_64`  | 
|  `libtiff-4.0.3-35.amzn2.0.16.aarch64`  | 
|  `libtiff-4.0.3-35.amzn2.0.16.x86_64`  | 
|  `mdadm-4.0-5.amzn2.0.3.aarch64`  | 
|  `mdadm-4.0-5.amzn2.0.3.x86_64`  | 
|  `python-pillow-2.0.0-23.gitd1c6db8.amzn2.0.8.aarch64`  | 
|  `python-pillow-2.0.0-23.gitd1c6db8.amzn2.0.8.x86_64`  | 
|  `system-release-2-16.amzn2.aarch64`  | 
|  `system-release-2-16.amzn2.x86_64`  | 
|  `vim-common-9.0.1882-1.amzn2.0.1.aarch64`  | 
|  `vim-common-9.0.1882-1.amzn2.0.1.x86_64`  | 
|  `vim-data-9.0.1882-1.amzn2.0.1.noarch`  | 
|  `vim-enhanced-9.0.1882-1.amzn2.0.1.aarch64`  | 
|  `vim-enhanced-9.0.1882-1.amzn2.0.1.x86_64`  | 
|  `vim-filesystem-9.0.1882-1.amzn2.0.1.noarch`  | 
|  `vim-minimal-9.0.1882-1.amzn2.0.1.aarch64`  | 
|  `vim-minimal-9.0.1882-1.amzn2.0.1.x86_64`  | 
|  `xxd-9.0.1882-1.amzn2.0.1.aarch64`  | 
|  `xxd-9.0.1882-1.amzn2.0.1.x86_64`  | 

Packages with CVEs:

**amazon-ssm-agent-3.2.1630.0-1.amzn2**

CVEs fixed:
+ [CVE-2023-29406](https://alas.aws.amazon.com/cve/html/CVE-2023-29406.html)
+ [CVE-2023-29409](https://alas.aws.amazon.com/cve/html/CVE-2023-29409.html)
+ [CVE-2023-3978](https://alas.aws.amazon.com/cve/html/CVE-2023-3978.html)

**bind-export-libs-9.11.4-26.P2.amzn2.13.5**, **bind-libs-9.11.4-26.P2.amzn2.13.5**, **bind-libs-lite-9.11.4-26.P2.amzn2.13.5**, **bind-license-9.11.4-26.P2.amzn2.13.5**, **bind-utils-9.11.4-26.P2.amzn2.13.5**

CVE fixed:
+ [CVE-2023-3341](https://alas.aws.amazon.com/cve/html/CVE-2023-3341.html)

**curl-8.3.0-1.amzn2.0.4**, **libcurl-8.3.0-1.amzn2.0.4**

CVEs fixed:
+ [CVE-2023-38545](https://alas.aws.amazon.com/cve/html/CVE-2023-38545.html)
+ [CVE-2023-38546](https://alas.aws.amazon.com/cve/html/CVE-2023-38546.html)

**expat-2.1.0-15.amzn2.0.3**

CVEs fixed:
+ [CVE-2022-23990](https://alas.aws.amazon.com/cve/html/CVE-2022-23990.html)
+ [CVE-2022-25313](https://alas.aws.amazon.com/cve/html/CVE-2022-25313.html)

 **kernel-4.14.326-245.539.amzn2**, **kernel-devel-4.14.326-245.539.amzn2**, **kernel-headers-4.14.326-245.539.amzn2**, **kernel-tools-4.14.326-245.539.amzn2** 

CVEs fixed:
+ [CVE-2023-3772](https://alas.aws.amazon.com/cve/html/CVE-2023-3772.html)
+ [CVE-2023-39192](https://alas.aws.amazon.com/cve/html/CVE-2023-39192.html)
+ [CVE-2023-39193](https://alas.aws.amazon.com/cve/html/CVE-2023-39193.html)
+ [CVE-2023-39194](https://alas.aws.amazon.com/cve/html/CVE-2023-39194.html)
+ [CVE-2023-4207](https://alas.aws.amazon.com/cve/html/CVE-2023-4207.html)
+ [CVE-2023-4622](https://alas.aws.amazon.com/cve/html/CVE-2023-4622.html)
+ [CVE-2023-4623](https://alas.aws.amazon.com/cve/html/CVE-2023-4623.html)
+ [CVE-2023-4921](https://alas.aws.amazon.com/cve/html/CVE-2023-4921.html)

**kernel-5.10.196-185.743.amzn2**, **kernel-tools-5.10.196-185.743.amzn2**

CVEs fixed:
+ [CVE-2023-39192](https://alas.aws.amazon.com/cve/html/CVE-2023-39192.html)
+ [CVE-2023-39193](https://alas.aws.amazon.com/cve/html/CVE-2023-39193.html)
+ [CVE-2023-42753](https://alas.aws.amazon.com/cve/html/CVE-2023-42753.html)
+ [CVE-2023-4623](https://alas.aws.amazon.com/cve/html/CVE-2023-4623.html)
+ [CVE-2023-4921](https://alas.aws.amazon.com/cve/html/CVE-2023-4921.html)

**libtiff-4.0.3-35.amzn2.0.16**

CVEs fixed:
+ [CVE-2023-25433](https://alas.aws.amazon.com/cve/html/CVE-2023-25433.html)
+ [CVE-2023-30774](https://alas.aws.amazon.com/cve/html/CVE-2023-30774.html)

**mdadm-4.0-5.amzn2.0.3**

CVEs fixed:
+ [CVE-2023-28736](https://alas.aws.amazon.com/cve/html/CVE-2023-28736.html)
+ [CVE-2023-28938](https://alas.aws.amazon.com/cve/html/CVE-2023-28938.html)

**python-pillow-2.0.0-23.gitd1c6db8.amzn2.0.8**

CVEs fixed:
+ [CVE-2014-1932](https://alas.aws.amazon.com/cve/html/CVE-2014-1932.html)
+ [CVE-2014-1933](https://alas.aws.amazon.com/cve/html/CVE-2014-1933.html)
+ [CVE-2014-3007](https://alas.aws.amazon.com/cve/html/CVE-2014-3007.html)

 **vim-common-9.0.1882-1.amzn2.0.1**, **vim-data-9.0.1882-1.amzn2.0.1**, **vim-enhanced-9.0.1882-1.amzn2.0.1**, **vim-filesystem-9.0.1882-1.amzn2.0.1**, **vim-minimal-9.0.1882-1.amzn2.0.1**, **xxd-9.0.1882-1.amzn2.0.1** 

CVEs fixed:
+ [CVE-2021-3236](https://alas.aws.amazon.com/cve/html/CVE-2021-3236.html)
+ [CVE-2023-4733](https://alas.aws.amazon.com/cve/html/CVE-2023-4733.html)
+ [CVE-2023-4734](https://alas.aws.amazon.com/cve/html/CVE-2023-4734.html)
+ [CVE-2023-4735](https://alas.aws.amazon.com/cve/html/CVE-2023-4735.html)
+ [CVE-2023-4738](https://alas.aws.amazon.com/cve/html/CVE-2023-4738.html)
+ [CVE-2023-4750](https://alas.aws.amazon.com/cve/html/CVE-2023-4750.html)
+ [CVE-2023-4751](https://alas.aws.amazon.com/cve/html/CVE-2023-4751.html)
+ [CVE-2023-4752](https://alas.aws.amazon.com/cve/html/CVE-2023-4752.html)
+ [CVE-2023-4781](https://alas.aws.amazon.com/cve/html/CVE-2023-4781.html)