

# Amazon Linux 2 version 2.0.20241001.0 release notes
<a name="relnotes-20241001"></a>

These are the release notes for Amazon Linux 2 version 2.0.20241001.0.

## Major updates
<a name="major-updates-20241001"></a>

None.

## Package updates
<a name="package-updates-20241001"></a>

The following packages were updated.


|  | 
| --- |
| amazon-ssm-agent-3.3.859.0-1.amzn2.aarch64 | 
| amazon-ssm-agent-3.3.859.0-1.amzn2.x86\$164 | 
| kernel-4.14.352-268.568.amzn2.aarch64 | 
| kernel-4.14.352-268.568.amzn2.x86\$164 | 
| kernel-5.10.226-214.879.amzn2.aarch64 | 
| kernel-5.10.226-214.879.amzn2.x86\$164 | 
| kernel-devel-4.14.352-268.568.amzn2.x86\$164 | 
| kernel-headers-4.14.352-268.568.amzn2.x86\$164 | 
| kernel-tools-4.14.352-268.568.amzn2.aarch64 | 
| kernel-tools-4.14.352-268.568.amzn2.x86\$164 | 
| kernel-tools-5.10.226-214.879.amzn2.aarch64 | 
| kernel-tools-5.10.226-214.879.amzn2.x86\$164 | 
| libtiff-4.0.3-35.amzn2.0.21.aarch64 | 
| libtiff-4.0.3-35.amzn2.0.21.x86\$164 | 
| openssh-7.4p1-22.amzn2.0.8.aarch64 | 
| openssh-7.4p1-22.amzn2.0.8.x86\$164 | 
| openssh-clients-7.4p1-22.amzn2.0.8.aarch64 | 
| openssh-clients-7.4p1-22.amzn2.0.8.x86\$164 | 
| openssh-server-7.4p1-22.amzn2.0.8.aarch64 | 
| openssh-server-7.4p1-22.amzn2.0.8.x86\$164 | 
| python-pillow-2.0.0-23.gitd1c6db8.amzn2.0.13.aarch64 | 
| python-pillow-2.0.0-23.gitd1c6db8.amzn2.0.13.x86\$164 | 
| python2-setuptools-41.2.0-4.amzn2.0.5.noarch | 
| python3-setuptools-49.1.3-1.amzn2.0.5.noarch | 

Packages with CVEs

**amazon-ssm-agent-3.3.859.0-1.amzn2**
+ [CVE-2023-45288](https://alas.aws.amazon.com/cve/html/CVE-2023-45288.html)
+ [CVE-2024-24790](https://alas.aws.amazon.com/cve/html/CVE-2024-24790.html)

**kernel-4.14.352-268.568.amzn2, kernel-devel-4.14.352-268.568.amzn2, kernel-headers-4.14.352-268.568.amzn2, kernel-tools-4.14.352-268.568.amzn2**
+ [CVE-2024-39494](https://alas.aws.amazon.com/cve/html/CVE-2024-39494.html)

**kernel-5.10.226-214.879.amzn2, kernel-tools-5.10.226-214.879.amzn2**
+ [CVE-2022-48733](https://alas.aws.amazon.com/cve/html/CVE-2022-48733.html)
+ [CVE-2024-39494](https://alas.aws.amazon.com/cve/html/CVE-2024-39494.html)
+ [CVE-2024-44974](https://alas.aws.amazon.com/cve/html/CVE-2024-44974.html)
+ [CVE-2024-46713](https://alas.aws.amazon.com/cve/html/CVE-2024-46713.html)
+ [CVE-2024-46714](https://alas.aws.amazon.com/cve/html/CVE-2024-46714.html)
+ [CVE-2024-46719](https://alas.aws.amazon.com/cve/html/CVE-2024-46719.html)
+ [CVE-2024-46721](https://alas.aws.amazon.com/cve/html/CVE-2024-46721.html)
+ [CVE-2024-46722](https://alas.aws.amazon.com/cve/html/CVE-2024-46722.html)
+ [CVE-2024-46723](https://alas.aws.amazon.com/cve/html/CVE-2024-46723.html)
+ [CVE-2024-46724](https://alas.aws.amazon.com/cve/html/CVE-2024-46724.html)
+ [CVE-2024-46725](https://alas.aws.amazon.com/cve/html/CVE-2024-46725.html)
+ [CVE-2024-46731](https://alas.aws.amazon.com/cve/html/CVE-2024-46731.html)
+ [CVE-2024-46737](https://alas.aws.amazon.com/cve/html/CVE-2024-46737.html)
+ [CVE-2024-46738](https://alas.aws.amazon.com/cve/html/CVE-2024-46738.html)
+ [CVE-2024-46739](https://alas.aws.amazon.com/cve/html/CVE-2024-46739.html)
+ [CVE-2024-46743](https://alas.aws.amazon.com/cve/html/CVE-2024-46743.html)
+ [CVE-2024-46744](https://alas.aws.amazon.com/cve/html/CVE-2024-46744.html)
+ [CVE-2024-46745](https://alas.aws.amazon.com/cve/html/CVE-2024-46745.html)
+ [CVE-2024-46747](https://alas.aws.amazon.com/cve/html/CVE-2024-46747.html)
+ [CVE-2024-46750](https://alas.aws.amazon.com/cve/html/CVE-2024-46750.html)
+ [CVE-2024-46755](https://alas.aws.amazon.com/cve/html/CVE-2024-46755.html)
+ [CVE-2024-46759](https://alas.aws.amazon.com/cve/html/CVE-2024-46759.html)
+ [CVE-2024-46771](https://alas.aws.amazon.com/cve/html/CVE-2024-46771.html)
+ [CVE-2024-46777](https://alas.aws.amazon.com/cve/html/CVE-2024-46777.html)
+ [CVE-2024-46780](https://alas.aws.amazon.com/cve/html/CVE-2024-46780.html)
+ [CVE-2024-46781](https://alas.aws.amazon.com/cve/html/CVE-2024-46781.html)
+ [CVE-2024-46782](https://alas.aws.amazon.com/cve/html/CVE-2024-46782.html)
+ [CVE-2024-46783](https://alas.aws.amazon.com/cve/html/CVE-2024-46783.html)
+ [CVE-2024-46798](https://alas.aws.amazon.com/cve/html/CVE-2024-46798.html)
+ [CVE-2024-46800](https://alas.aws.amazon.com/cve/html/CVE-2024-46800.html)

**libtiff-4.0.3-35.amzn2.0.21**
+ [CVE-2024-7006](https://alas.aws.amazon.com/cve/html/CVE-2024-7006.html)

**python-pillow-2.0.0-23.gitd1c6db8.amzn2.0.13**
+ [CVE-2020-10177](https://alas.aws.amazon.com/cve/html/CVE-2020-10177.html)

**python3-setuptools-49.1.3-1.amzn2.0.5**
+ [CVE-2024-6345](https://alas.aws.amazon.com/cve/html/CVE-2024-6345.html)