The primary focus of Patch Manager, a tool in AWS Systems Manager, is on installing operating systems security-related updates on managed nodes. By default, Patch Manager doesn't install all available patches, but rather a smaller set of patches focused on security.
For Linux-based operating system types that report a severity level for patches,
Patch Manager uses the severity level reported by the software publisher for the update
notice or individual patch. Patch Manager doesn't derive severity levels from third-party
sources, such as the Common Vulnerability
Scoring System
Note
On all Linux-based systems supported by Patch Manager, you can choose a different source repository configured for the managed node, typically to install nonsecurity updates. For information, see How to specify an alternative patch source repository (Linux).
Choose from the following tabs to learn how Patch Manager selects security patches for your operating system.
Preconfigured repositories are handled differently on Amazon Linux 1 and Amazon Linux 2 than on Amazon Linux 2022 and Amazon Linux 2023.
On Amazon Linux 1 and Amazon Linux 2, the Systems Manager patch baseline service uses preconfigured repositories on the managed node. There are usually two preconfigured repositories (repos) on a node:
On Amazon Linux 1
-
Repo ID:
amzn-main/latest
Repo name:
amzn-main-Base
-
Repo ID:
amzn-updates/latest
Repo name:
amzn-updates-Base
On Amazon Linux 2
-
Repo ID:
amzn2-core/2/
architecture
Repo name:
Amazon Linux 2 core repository
-
Repo ID:
amzn2extra-docker/2/
architecture
Repo name:
Amazon Extras repo for docker
Note
architecture
can be x86_64 or
aarch64.
When you create an Amazon Linux 2023 (AL2023) instance, it contains the updates that were available in the version of AL2023 and the specific AMI you selected. Your AL2023 instance doesn't automatically receive additional critical and important security updates at launch time. Instead, with the deterministic upgrades through versioned repositories feature supported for AL2023, which is turned on by default, you can apply updates based on a schedule that meets your specific needs. For more information, see Deterministic upgrades through versioned repositories in the Amazon Linux 2023 User Guide.
On Amazon Linux 2022, the preconfigured repositories are tied to locked versions of package updates. When new Amazon Machine Images (AMIs) for Amazon Linux 2022 are released, they are locked to a specific version. For patch updates, Patch Manager retrieves the latest locked version of the patch update repository and then updates packages on the managed node based on the content of that locked version.
On AL2023, the preconfigured repository is the following:
-
Repo ID:
amazonlinux
Repo name: Amazon Linux 2023 repository
On Amazon Linux 2022 (preview release), the preconfigured repositories are tied to locked versions of package updates. When new Amazon Machine Images (AMIs) for Amazon Linux 2022 are released, they are locked to a specific version. For patch updates, Patch Manager retrieves the latest locked version of the patch update repository and then updates packages on the managed node based on the content of that locked version.
On Amazon Linux 2022, the preconfigured repository is the following:
-
Repo ID:
amazonlinux
Repo name: Amazon Linux 2022 repository
Note
All updates are downloaded from the remote repos configured on the managed node. Therefore, the node must have outbound access to the internet in order to connect to the repos so the patching can be performed.
Amazon Linux 1 and Amazon Linux 2 managed nodes use Yum as the package manager. Amazon Linux 2022 and Amazon Linux 2023 use DNF as the package manager.
Both package managers use the concept of an update notice as a file named
updateinfo.xml
. An update notice is simply a
collection of packages that fix specific problems. All packages that are
in an update notice are considered Security by Patch Manager. Individual
packages aren't assigned classifications or severity levels. For this
reason, Patch Manager assigns the attributes of an update notice to the
related packages.
Note
If you select the Include non-security
updates check box in the Create patch
baseline page, then packages that aren't classified
in an updateinfo.xml
file (or a package that
contains a file without properly formatted Classification, Severity,
and Date values) can be included in the prefiltered list of patches.
However, in order for a patch to be applied, the patch must still
meet the user-specified patch baseline rules.
For more information about the Include non-security updates option, see How patches are installed and How patch baseline rules work on Linux-based systems.