

# Amazon Linux 2 version 2.0.20231020.1 release notes
<a name="relnotes-20231024"></a>

These are the release notes for Amazon Linux 2 version 2.0.20231020.1.

## Major updates
<a name="major-updates-20231024"></a>

None.

## Package updates
<a name="package-updates-20231024"></a>

The following packages were updated.


|  | 
| --- |
|  `amazon-ssm-agent-3.2.1705.0-1.amzn2.aarch64`  | 
|  `amazon-ssm-agent-3.2.1705.0-1.amzn2.x86_64`  | 
|  `grub2-2.06-14.amzn2.0.2.aarch64`  | 
|  `grub2-2.06-14.amzn2.0.2.x86_64`  | 
|  `grub2-common-2.06-14.amzn2.0.2.noarch`  | 
|  `grub2-efi-aa64-2.06-14.amzn2.0.2.aarch64`  | 
|  `grub2-efi-aa64-ec2-2.06-14.amzn2.0.2.aarch64`  | 
|  `grub2-efi-aa64-modules-2.06-14.amzn2.0.2.noarch`  | 
|  `grub2-efi-x64-ec2-2.06-14.amzn2.0.2.x86_64`  | 
|  `grub2-pc-2.06-14.amzn2.0.2.x86_64`  | 
|  `grub2-pc-modules-2.06-14.amzn2.0.2.noarch`  | 
|  `grub2-tools-2.06-14.amzn2.0.2.aarch64`  | 
|  `grub2-tools-2.06-14.amzn2.0.2.x86_64`  | 
|  `grub2-tools-minimal-2.06-14.amzn2.0.2.aarch64`  | 
|  `grub2-tools-minimal-2.06-14.amzn2.0.2.x86_64`  | 
|  `jbigkit-libs-2.0-11.amzn2.0.3.aarch64`  | 
|  `jbigkit-libs-2.0-11.amzn2.0.3.x86_64`  | 
|  `kernel-5.10.197-186.748.amzn2.aarch64`  | 
|  `kernel-5.10.197-186.748.amzn2.x86_64`  | 
|  `kernel-tools-5.10.197-186.748.amzn2.aarch64`  | 
|  `kernel-tools-5.10.197-186.748.amzn2.x86_64`  | 
|  `libX11-1.6.7-3.amzn2.0.4.x86_64`  | 
|  `libX11-common-1.6.7-3.amzn2.0.4.noarch`  | 
|  `libsepol-2.5-10.amzn2.0.1.aarch64`  | 
|  `libsepol-2.5-10.amzn2.0.1.x86_64`  | 
|  `libtiff-4.0.3-35.amzn2.0.19.aarch64`  | 
|  `libtiff-4.0.3-35.amzn2.0.19.x86_64`  | 
|  `sudo-1.8.23-10.amzn2.3.5.aarch64`  | 
|  `sudo-1.8.23-10.amzn2.3.5.x86_64`  | 
|  `vim-common-9.0.1882-1.amzn2.0.2.aarch64`  | 
|  `vim-common-9.0.1882-1.amzn2.0.2.x86_64`  | 
|  `vim-data-9.0.1882-1.amzn2.0.2.noarch`  | 
|  `vim-enhanced-9.0.1882-1.amzn2.0.2.aarch64`  | 
|  `vim-enhanced-9.0.1882-1.amzn2.0.2.x86_64`  | 
|  `vim-filesystem-9.0.1882-1.amzn2.0.2.noarch`  | 
|  `vim-minimal-9.0.1882-1.amzn2.0.2.aarch64`  | 
|  `vim-minimal-9.0.1882-1.amzn2.0.2.x86_64`  | 
|  `xxd-9.0.1882-1.amzn2.0.2.aarch64`  | 
|  `xxd-9.0.1882-1.amzn2.0.2.x86_64`  | 
|  `yum-3.4.3-158.amzn2.0.7.noarch`  | 

Packages with CVEs

**amazon-ssm-agent-3.2.1705.0-1.amzn2**

CVEs fixed:
+ [CVE-2021-43565](https://alas.aws.amazon.com/cve/html/CVE-2021-43565.html)
+ [CVE-2022-41723](https://alas.aws.amazon.com/cve/html/CVE-2022-41723.html)
+ [CVE-2023-24538](https://alas.aws.amazon.com/cve/html/CVE-2023-24538.html)

**grub2-2.06-14.amzn2.0.2**, **grub2-common-2.06-14.amzn2.0.2**, **grub2-efi-aa64-2.06-14.amzn2.0.2**, **grub2-efi-aa64-ec2-2.06-14.amzn2.0.2**, **grub2-efi-aa64-modules-2.06-14.amzn2.0.2**, **grub2-efi-x64-ec2-2.06-14.amzn2.0.2**, **grub2-pc-2.06-14.amzn2.0.2**, **grub2-pc-modules-2.06-14.amzn2.0.2**, **grub2-tools-2.06-14.amzn2.0.2**, **grub2-tools-minimal-2.06-14.amzn2.0.2**

CVEs fixed:
+ [CVE-2023-4692](https://alas.aws.amazon.com/cve/html/CVE-2023-4692.html)
+ [CVE-2023-4693](https://alas.aws.amazon.com/cve/html/CVE-2023-4693.html)

**jbigkit-libs-2.0-11.amzn2.0.3**

CVE fixed:
+ [CVE-2022-1210](https://alas.aws.amazon.com/cve/html/CVE-2022-1210.html)

**kernel-5.10.197-186.748.amzn2**, **kernel-tools-5.10.197-186.748.amzn2**

CVEs fixed:
+ [CVE-2023-42755](https://alas.aws.amazon.com/cve/html/CVE-2023-42755.html)
+ [CVE-2023-5197](https://alas.aws.amazon.com/cve/html/CVE-2023-5197.html)

**libX11-1.6.7-3.amzn2.0.4**, **libX11-common-1.6.7-3.amzn2.0.4**

CVEs fixed:
+ [CVE-2023-43785](https://alas.aws.amazon.com/cve/html/CVE-2023-43785.html)
+ [CVE-2023-43787](https://alas.aws.amazon.com/cve/html/CVE-2023-43787.html)

**libsepol-2.5-10.amzn2.0.1**

CVEs fixed:
+ [CVE-2021-36084](https://alas.aws.amazon.com/cve/html/CVE-2021-36084.html)
+ [CVE-2021-36085](https://alas.aws.amazon.com/cve/html/CVE-2021-36085.html)
+ [CVE-2021-36086](https://alas.aws.amazon.com/cve/html/CVE-2021-36086.html)
+ [CVE-2021-36087](https://alas.aws.amazon.com/cve/html/CVE-2021-36087.html)

**libtiff-4.0.3-35.amzn2.0.19**

CVEs fixed:
+ [CVE-2020-18768](https://alas.aws.amazon.com/cve/html/CVE-2020-18768.html)
+ [CVE-2022-0891](https://alas.aws.amazon.com/cve/html/CVE-2022-0891.html)
+ [CVE-2023-3164](https://alas.aws.amazon.com/cve/html/CVE-2023-3164.html)

**sudo-1.8.23-10.amzn2.3.5**

CVEs fixed:
+ [CVE-2023-28486](https://alas.aws.amazon.com/cve/html/CVE-2023-28486.html)
+ [CVE-2023-28487](https://alas.aws.amazon.com/cve/html/CVE-2023-28487.html)

**vim-common-9.0.1882-1.amzn2.0.2**, **vim-data-9.0.1882-1.amzn2.0.2**, ** vim-enhanced-9.0.1882-1.amzn2.0.2**, **vim-filesystem-9.0.1882-1.amzn2.0.2**, **vim-minimal-9.0.1882-1.amzn2.0.2**, **xxd-9.0.1882-1.amzn2.0.2** 

CVE fixed:
+ [CVE-2023-5344](https://alas.aws.amazon.com/cve/html/CVE-2023-5344.html)