

# Amazon Linux 2 version 2.0.20241113.1 release notes
<a name="relnotes-20241113"></a>

These are the release notes for Amazon Linux 2 version 2.0.20241113.1.

## Major updates
<a name="major-updates-20241113"></a>

None.

## Package updates
<a name="package-updates-20241113"></a>

The following packages were updated.


|  | 
| --- |
| cloud-init-19.3-46.amzn2.0.3.noarch | 
| ec2-utils-1.2-48.amzn2.noarch | 
| kernel-4.14.355-271.569.amzn2.aarch64 | 
| kernel-4.14.355-271.569.amzn2.x86\$164 | 
| kernel-5.10.228-219.884.amzn2.aarch64 | 
| kernel-5.10.228-219.884.amzn2.x86\$164 | 
| kernel-devel-4.14.355-271.569.amzn2.x86\$164 | 
| kernel-headers-4.14.355-271.569.amzn2.x86\$164 | 
| kernel-tools-4.14.355-271.569.amzn2.aarch64 | 
| kernel-tools-4.14.355-271.569.amzn2.x86\$164 | 
| kernel-tools-5.10.228-219.884.amzn2.aarch64 | 
| kernel-tools-5.10.228-219.884.amzn2.x86\$164 | 
| python3-3.7.16-1.amzn2.0.8.aarch64 | 
| python3-3.7.16-1.amzn2.0.8.x86\$164 | 
| python3-libs-3.7.16-1.amzn2.0.8.aarch64 | 
| python3-libs-3.7.16-1.amzn2.0.8.x86\$164 | 
| xorg-x11-server-Xorg-1.20.4-22.amzn2.0.7.x86\$164 | 
| xorg-x11-server-common-1.20.4-22.amzn2.0.7.x86\$164 | 

Packages with CVEs

**cloud-init-19.3-46.amzn2.0.3**
+ [CVE-2023-1786](https://alas.aws.amazon.com/cve/html/CVE-2023-1786.html)

**kernel-4.14.355-271.569.amzn2, kernel-devel-4.14.355-271.569.amzn2, kernel-headers-4.14.355-271.569.amzn2, kernel-tools-4.14.355-271.569.amzn2**
+ [CVE-2024-44987](https://alas.aws.amazon.com/cve/html/CVE-2024-44987.html)
+ [CVE-2024-46738](https://alas.aws.amazon.com/cve/html/CVE-2024-46738.html)
+ [CVE-2024-46743](https://alas.aws.amazon.com/cve/html/CVE-2024-46743.html)
+ [CVE-2024-46744](https://alas.aws.amazon.com/cve/html/CVE-2024-46744.html)
+ [CVE-2024-46745](https://alas.aws.amazon.com/cve/html/CVE-2024-46745.html)
+ [CVE-2024-46750](https://alas.aws.amazon.com/cve/html/CVE-2024-46750.html)
+ [CVE-2024-46759](https://alas.aws.amazon.com/cve/html/CVE-2024-46759.html)
+ [CVE-2024-46780](https://alas.aws.amazon.com/cve/html/CVE-2024-46780.html)
+ [CVE-2024-46781](https://alas.aws.amazon.com/cve/html/CVE-2024-46781.html)
+ [CVE-2024-46800](https://alas.aws.amazon.com/cve/html/CVE-2024-46800.html)
+ [CVE-2024-46829](https://alas.aws.amazon.com/cve/html/CVE-2024-46829.html)
+ [CVE-2024-46840](https://alas.aws.amazon.com/cve/html/CVE-2024-46840.html)

**python3-3.7.16-1.amzn2.0.8, python3-libs-3.7.16-1.amzn2.0.8**
+ [CVE-2024-6232](https://alas.aws.amazon.com/cve/html/CVE-2024-6232.html)

**xorg-x11-server-Xorg-1.20.4-22.amzn2.0.7, xorg-x11-server-common-1.20.4-22.amzn2.0.7**
+ [CVE-2024-9632](https://alas.aws.amazon.com/cve/html/CVE-2024-9632.html)