

Las traducciones son generadas a través de traducción automática. En caso de conflicto entre la traducción y la version original de inglés, prevalecerá la version en inglés.

# Versiones de Amazon EMR 7.x
<a name="emr-release-7x"></a>

Esta sección contiene las versiones de las aplicaciones, las notas de la versión, las versiones de los componentes y las clasificaciones de configuración de cada versión 7.x de Amazon EMR.

Al lanzar un clúster, puede elegir entre varias versiones de Amazon EMR. Esto le permite probar y utilizar versiones de la aplicación que cumplan con sus requisitos de compatibilidad. El número de versión se especifica con la *etiqueta de versión*. Las etiquetas de versión tienen el formato `emr-x.x.x` Por ejemplo, `emr-7.12.0`.

Las nuevas versiones de Amazon EMR estarán disponibles en diferentes regiones durante un periodo de varios días, comenzando por la primera región en la fecha de lanzamiento inicial. Es posible que la versión de lanzamiento más reciente no esté disponible en su región durante este periodo.

Para ver una tabla completa de versiones de las aplicaciones en cada versión 7.x de Amazon EMR, consulte [Versiones de las aplicaciones en las versiones 7.x de Amazon EMR](emr-release-app-versions-7.x.md).

**Topics**
+ [Versiones de las aplicaciones en las versiones 7.x de Amazon EMR](emr-release-app-versions-7.x.md)
+ [Amazon EMR versión 7.12.0](emr-7120-release.md)
+ [Amazon EMR versión 7.11.0](emr-7110-release.md)
+ [Amazon EMR versión 7.10.0](emr-7100-release.md)
+ [Amazon EMR versión 7.9.0](emr-790-release.md)
+ [Amazon EMR versión 7.8.0](emr-780-release.md)
+ [Amazon EMR versión 7.7.0](emr-770-release.md)
+ [Amazon EMR versión 7.6.0](emr-760-release.md)
+ [Amazon EMR versión 7.5.0](emr-750-release.md)
+ [Amazon EMR versión 7.4.0](emr-740-release.md)
+ [Amazon EMR, versión 7.3.0](emr-730-release.md)
+ [Amazon EMR, versión 7.2.0](emr-720-release.md)
+ [Versión 7.1.0 de Amazon EMR](emr-710-release.md)
+ [Amazon EMR, versión 7.0.0](emr-700-release.md)

# Versiones de las aplicaciones en las versiones 7.x de Amazon EMR
<a name="emr-release-app-versions-7.x"></a>

En la siguiente tabla, se enumeran las versiones de las aplicaciones que están disponibles en cada versión 7.x de Amazon EMR.


**Información sobre la versión de la aplicación**  

|  | emr-7.12.0 | emr-7.11.0 | emr-7.10.0 | emr-7.9.0 | emr-7.8.0 | emr-7.7.0 | emr-7.6.0 | emr-7.5.0 | emr-7.4.0 | emr-7.3.0 | emr-7.2.0 | emr-7.1.0 | emr-7.0.0 | 
| --- | --- | --- | --- | --- | --- | --- | --- | --- | --- | --- | --- | --- | --- | 
| AWS SDK for Java | 2.35.5, 1.12.792 | 2.35.5, 1.12.792 | 2.31.48, 1.12.782 | 2.31.16, 1.12.782 | 2.29.52, 1.12.780 | 2.29.44, 1.12.780 | 2.29.25, 1.12.779 | 2.28.8, 1.12.772 | 2.28.8, 1.12.772 | 2.25,70, 1.12.747 | 2.23.18, 1.12.705 | 2.23.18, 1.12.656 | 2.20.160-amzn-0, 1.12.569 | 
| Python | 3.9, 3.11 | 3.9, 3.11 | 3.9, 3.11 | 3.9, 3.11 | 3.9, 3.11 | 3.9, 3.11 | 3.9, 3.11 | 3.9, 3.11 | 3.9, 3.11 | 3.9, 3.11 | 3.9, 3.11 | 3.9, 3.11 | 3.9 | 
| Scala | 2.12.18 | 2.12.18 | 2.12.18 | 2.12.18 | 2.12.18 | 2.12.18 | 2.12.18 | 2.12.18 | 2.12.18 | 2.12.18 | 2.12.17 | 2.12.17 | 2.12.17 | 
| AmazonCloudWatchAgent | 1.300032.2-amzn-0 | 1.300032.2-amzn-0 | 1.300032.2-amzn-0 | 1.300032.2-amzn-0 | 1.300032.2-amzn-0 | 1.300032.2-amzn-0 | 1.300032.2-amzn-0 | 1.300032.2-amzn-0 | 1.300032.2-amzn-0 | 1.300032.2-amzn-0 | 1.300032.2-amzn-0 | 1.300032.2-amzn-0 | 1.300031.1-amzn-0 | 
| Delta | 3.3.2-amzn-1 | 3.3.2-amzn-0 | 3.3.0-amzn-2 | 3.3.0-amzn-1 | 3.3.0-amzn-0 | 3.2.1-amzn-2 | 3.2.1-amzn-1 | 3.2.1-amzn-0 | 3.2.0-amzn-1 | 3.2.0-amzn-0 | 3.1.0 | 3.0.0 | 3.0.0 | 
| Flink | 1.20.0-amzn-6 | 1.20.0-amzn-5 | 1.20.0-amzn-4 | 1.20.0-amzn-3 | 1.20.0-amzn-2 | 1.20.0-amzn-1 | 1.20.0-amzn-0 | 1.19.1-amzn-1 | 1.19.1-amzn-0 | 1.18.1-amzn-2 | 1.18.1-amzn-1 | 1.18.1-amzn-0 | 1.18.0-amzn-0 | 
| Ganglia |  -  |  -  |  -  |  -  |  -  |  -  |  -  |  -  |  -  |  -  |  -  |  -  |  -  | 
| HBase | 2.6.2-amzn-3 | 2.6.2-amzn-2 | 2.6.2-amzn-1 | 2.6.2-amzn-0 | 2.6.1-amzn-2 | 2.6.1-amzn-1 | 2.6.1-amzn-0 | 2.5.10-amzn-0 | 2.5.5-amzn-0 | 2.4.17-amzn-7 | 2.4.17-amzn-6 | 2.4.17-amzn-5 | 2.4.17-amzn-4 | 
| HCatalog | 3.1.3-amzn-21 | 3.1.3-amzn-20 | 3.1.3-amzn-19 | 3.1.3-amzn-18 | 3.1.3-amzn-17 | 3.1.3-amzn-16 | 3.1.3-amzn-15 | 3.1.3-amzn-14 | 3.1.3-amzn-13 | 3.1.3-amzn-12 | 3.1.3-amzn-11 | 3.1.3-amzn-10 | 3.1.3-amzn-9 | 
| Hadoop | 3.4.1-amzn-4 | 3.4.1-amzn-3 | 3.4.1-amzn-2 | 3.4.1-amzn-1 | 3.4.1-amzn-0 | 3.4.0-amzn-3 | 3.4.0-amzn-2 | 3.4.0-amzn-1 | 3.4.0-amzn-0 | 3.3.6-amzn-5 | 3.3.6-amzn-4 | 3.3.6-amzn-3 | 3.3.6-amzn-2 | 
| Hive | 3.1.3-amzn-21 | 3.1.3-amzn-20 | 3.1.3-amzn-19 | 3.1.3-amzn-18 | 3.1.3-amzn-17 | 3.1.3-amzn-16 | 3.1.3-amzn-15 | 3.1.3-amzn-14 | 3.1.3-amzn-13 | 3.1.3-amzn-12 | 3.1.3-amzn-11 | 3.1.3-amzn-10 | 3.1.3-amzn-9 | 
| Hudi | 1.0.2-amzn-1 | 1.0.2-amzn-0 | 0.15.0-amzn-7 | 0.15.0-amzn-6 | 0.15.0-amzn-5 | 0.15.0-amzn-4 | 0.15.0-amzn-3 | 0.15.0-amzn-2 | 0.15.0-amzn-1 | 0.15.0-amzn-0 | 0.14.1-amzn-1 | 0.14.1-amzn-0 | 0.14.0-amzn-1 | 
| Hue | 4.11.0 | 4.11.0 | 4.11.0 | 4.11.0 | 4.11.0 | 4.11.0 | 4.11.0 | 4.11.0 | 4.11.0 | 4.11.0 | 4.11.0 | 4.11.0 | 4.11.0 | 
| Iceberg | 1.10.0-amzn-0 | 1.9.1-amzn-0 | 1.8.1-amzn-0 | 1.7.1-amzn-2 | 1.7.1-amzn-1 | 1.7.1-amzn-0 | 1.6.1-amzn-2 | 1.6.1-amzn-1 | 1.6.1-amzn-0 | 1.5.2-amzn-0 | 1.5.0-amzn-0 | 1.4.3-amzn-0 | 1.4.2-amzn-0 | 
| JupyterEnterpriseGateway | 2.6.0 | 2.6.0 | 2.6.0 | 2.6.0 | 2.6.0 | 2.6.0 | 2.6.0 | 2.6.0 | 2.6.0 | 2.6.0 | 2.6.0 | 2.6.0 | 2.6.0 | 
| JupyterHub | 1.5.0 | 1.5.0 | 1.5.0 | 1.5.0 | 1.5.0 | 1.5.0 | 1.5.0 | 1.5.0 | 1.5.0 | 1.5.0 | 1.5.0 | 1.5.0 | 1.5.0 | 
| Livy | 0.8.0-incubating | 0.8.0-incubating | 0.8.0-incubating | 0.8.0-incubating | 0.8.0-incubating | 0.8.0-incubating | 0.8.0-incubating | 0.8.0-incubating | 0.8.0-incubating | 0.8.0-incubating | 0.8.0-incubating | 0.8.0-incubating | 0.7.1-incubating | 
| MXNet |  -  |  -  |  -  |  -  |  -  |  -  |  -  |  -  |  -  |  -  | 1.9.1 | 1.9.1 | 1.9.1 | 
| Mahout |  -  |  -  |  -  |  -  |  -  |  -  |  -  |  -  |  -  |  -  |  -  |  -  |  -  | 
| Oozie | 5.2.1 | 5.2.1 | 5.2.1 | 5.2.1 | 5.2.1 | 5.2.1 | 5.2.1 | 5.2.1 | 5.2.1 | 5.2.1 | 5.2.1 | 5.2.1 | 5.2.1 | 
| Phoenix | 5.2.1 | 5.2.1 | 5.2.1 | 5.2.1 | 5.2.1 | 5.2.1 | 5.2.0 | 5.2.0 | 5.2.0 | 5.1.3 | 5.1.3 | 5.1.3 | 5.1.3 | 
| Pig | 0.17.0 | 0.17.0 | 0.17.0 | 0.17.0 | 0.17.0 | 0.17.0 | 0.17.0 | 0.17.0 | 0.17.0 | 0.17.0 | 0.17.0 | 0.17.0 | 0.17.0 | 
| Presto | 0.287-amzn-6 | 0.287-amzn-5 | 0.287-amzn-4 | 0.287-amzn-3 | 0.287-amzn-2 | 0.287-amzn-1 | 0.287-amzn-1 | 0.287-amzn-0 | 0.287-amzn-0 | 0.285-amzn-1 | 0.285-amzn-0 | 0.284-amzn-0 | 0.283-amzn-1 | 
| Spark | 3.5.6-amzn-1 | 3.5.6-amzn-0 | 3.5.5-amzn-1 | 3.5.5-amzn-0 | 3.5.4-amzn-0 | 3.5.3-amzn-1 | 3.5.3-amzn-0 | 3.5.2-amzn-1 | 3.5.2-amzn-0 | 3.5.1-amzn-1 | 3.5.1-amzn-0 | 3.5.0-amzn-1 | 3.5.0-amzn-0 | 
| Sqoop |  -  |  -  |  -  |  -  |  -  |  -  |  -  |  -  | 1.4.7 | 1.4.7 | 1.4.7 | 1.4.7 | 1.4.7 | 
| TensorFlow | 2.19.0 | 2.19.0 | 2.18.0 | 2.16.1 | 2.16.1 | 2.16.1 | 2.16.1 | 2.16.1 | 2.16.1 | 2.16.1 | 2.11.0 | 2.11.0 | 2.11.0 | 
| Tez | 0.10.2-amzn-19 | 0.10.2-amzn-18 | 0.10.2-amzn-17 | 0.10.2-amzn-16 | 0.10.2-amzn-15 | 0.10.2-amzn-14 | 0.10.2-amzn-13 | 0.10.2-amzn-12 | 0.10.2-amzn-11 | 0.10.2-amzn-10 | 0.10.2-amzn-9 | 0.10.2-amzn-8 | 0.10.2-amzn-7 | 
| Trino (PrestoSQL) | 476-amzn-1 | 475-amzn-0 | 470-amzn-0 | 467-amzn-2 | 467-amzn-1 | 467-amzn-0 | 457-amzn-0 | 446-amzn-0 | 446-amzn-0 | 442-amzn-0 | 436-amzn-0 | 435-amzn-0 | 426-amzn-1 | 
| Zeppelin | 0.11.1 | 0.11.1 | 0.11.1 | 0.11.1 | 0.11.1 | 0.11.1 | 0.11.1 | 0.11.1 | 0.11.1 | 0.11.1 | 0.10.1 | 0.10.1 | 0.10.1 | 
| ZooKeeper | 3.9.3-amzn-4 | 3.9.3-amzn-3 | 3.9.3-amzn-2 | 3.9.3-amzn-1 | 3.9.3-amzn-0 | 3.9.2-amzn-1 | 3.9.2-amzn-0 | 3.9.2-amzn-0 | 3.9.2-amzn-0 | 3.9.1-amzn-1 | 3.9.1-amzn-1 | 3.9.1-amzn-0 | 3.5.10 | 

# Amazon EMR versión 7.12.0
<a name="emr-7120-release"></a>

## Ciclo de vida compatible con la versión 7.12.0
<a name="emr-7120-supported-lifecycle"></a>

En la siguiente tabla se describen las fechas de ciclo de vida admitidas para la versión 7.12.0 de Amazon EMR.


| Fase de soporte | Date | 
| --- | --- | 
| Fecha de lanzamiento inicial | 21 de noviembre de 2025 | 
| Soporte estándar hasta | 21 de noviembre de 2027 | 
| Fin del soporte | 22 de noviembre de 2027 | 
| Fin de vida útil | 21 de noviembre de 2028 | 

## Versiones de la aplicación 7.12.0
<a name="emr-7120-app-versions"></a>

Esta versión incluye las siguientes aplicaciones: [https://docs.aws.amazon.com/AmazonCloudWatch/latest/monitoring/Install-CloudWatch-Agent.html](https://docs.aws.amazon.com/AmazonCloudWatch/latest/monitoring/Install-CloudWatch-Agent.html), [https://delta.io/](https://delta.io/), [https://flink.apache.org/](https://flink.apache.org/), [http://hbase.apache.org/](http://hbase.apache.org/), [https://cwiki.apache.org/confluence/display/Hive/HCatalog](https://cwiki.apache.org/confluence/display/Hive/HCatalog), [http://hadoop.apache.org/docs/current/](http://hadoop.apache.org/docs/current/), [http://hive.apache.org/](http://hive.apache.org/), [https://hudi.apache.org](https://hudi.apache.org), [http://gethue.com/](http://gethue.com/), [https://iceberg.apache.org/](https://iceberg.apache.org/), [https://jupyter-enterprise-gateway.readthedocs.io/en/latest/](https://jupyter-enterprise-gateway.readthedocs.io/en/latest/), [https://jupyterhub.readthedocs.io/en/latest/#](https://jupyterhub.readthedocs.io/en/latest/#), [https://livy.incubator.apache.org/](https://livy.incubator.apache.org/), [http://oozie.apache.org/](http://oozie.apache.org/), [https://phoenix.apache.org/](https://phoenix.apache.org/), [http://pig.apache.org/](http://pig.apache.org/), [https://prestodb.io/](https://prestodb.io/), [https://spark.apache.org/docs/latest/](https://spark.apache.org/docs/latest/), [https://www.tensorflow.org/](https://www.tensorflow.org/), [https://tez.apache.org/](https://tez.apache.org/), [https://trino.io/](https://trino.io/), [https://zeppelin.incubator.apache.org/](https://zeppelin.incubator.apache.org/) y [https://zookeeper.apache.org](https://zookeeper.apache.org).

En la siguiente tabla se enumeran las versiones de la aplicación disponibles en esta versión de Amazon EMR y las versiones de la aplicación en las tres versiones anteriores de Amazon EMR (cuando corresponda).

Para ver un historial completo de las versiones de la aplicación disponibles para cada versión de Amazon EMR, consulte los temas siguientes:
+ [Versiones de las aplicaciones en las versiones 7.x de Amazon EMR](emr-release-app-versions-7.x.md)
+ [Versiones de la aplicación en las versiones 6.x de Amazon EMR](emr-release-app-versions-6.x.md)
+ [Versiones de la aplicación en las versiones 5.x de Amazon EMR](emr-release-app-versions-5.x.md)
+ [Versiones de la aplicación en las versiones 4.x de Amazon EMR](emr-release-app-versions-4.x.md)


**Información sobre la versión de la aplicación**  

|  | emr-7.12.0 | emr-7.11.0 | emr-7.10.0 | emr-7.9.0 | 
| --- | --- | --- | --- | --- | 
| AWS SDK for Java | 2.35.5, 1.12.792 | 2.35.5, 1.12.792 | 2.31.48, 1.12.782 | 2.31.16, 1.12.782 | 
| Python | 3.9, 3.11 | 3.9, 3.11 | 3.9, 3.11 | 3.9, 3.11 | 
| Scala | 2.12.18 | 2.12.18 | 2.12.18 | 2.12.18 | 
| AmazonCloudWatchAgent | 1.300032.2-amzn-0 | 1.300032.2-amzn-0 | 1.300032.2-amzn-0 | 1.300032.2-amzn-0 | 
| Delta | 3.3.2-amzn-1 | 3.3.2-amzn-0 | 3.3.0-amzn-2 | 3.3.0-amzn-1 | 
| Flink | 1.20.0-amzn-6 | 1.20.0-amzn-5 | 1.20.0-amzn-4 | 1.20.0-amzn-3 | 
| Ganglia |  -  |  -  |  -  |  -  | 
| HBase | 2.6.2-amzn-3 | 2.6.2-amzn-2 | 2.6.2-amzn-1 | 2.6.2-amzn-0 | 
| HCatalog | 3.1.3-amzn-21 | 3.1.3-amzn-20 | 3.1.3-amzn-19 | 3.1.3-amzn-18 | 
| Hadoop | 3.4.1-amzn-4 | 3.4.1-amzn-3 | 3.4.1-amzn-2 | 3.4.1-amzn-1 | 
| Hive | 3.1.3-amzn-21 | 3.1.3-amzn-20 | 3.1.3-amzn-19 | 3.1.3-amzn-18 | 
| Hudi | 1.0.2-amzn-1 | 1.0.2-amzn-0 | 0.15.0-amzn-7 | 0.15.0-amzn-6 | 
| Hue | 4.11.0 | 4.11.0 | 4.11.0 | 4.11.0 | 
| Iceberg | 1.10.0-amzn-0 | 1.9.1-amzn-0 | 1.8.1-amzn-0 | 1.7.1-amzn-2 | 
| JupyterEnterpriseGateway | 2.6.0 | 2.6.0 | 2.6.0 | 2.6.0 | 
| JupyterHub | 1.5.0 | 1.5.0 | 1.5.0 | 1.5.0 | 
| Livy | 0.8.0-incubating | 0.8.0-incubating | 0.8.0-incubating | 0.8.0-incubating | 
| MXNet |  -  |  -  |  -  |  -  | 
| Mahout |  -  |  -  |  -  |  -  | 
| Oozie | 5.2.1 | 5.2.1 | 5.2.1 | 5.2.1 | 
| Phoenix | 5.2.1 | 5.2.1 | 5.2.1 | 5.2.1 | 
| Pig | 0.17.0 | 0.17.0 | 0.17.0 | 0.17.0 | 
| Presto | 0.287-amzn-6 | 0.287-amzn-5 | 0.287-amzn-4 | 0.287-amzn-3 | 
| Spark | 3.5.6-amzn-1 | 3.5.6-amzn-0 | 3.5.5-amzn-1 | 3.5.5-amzn-0 | 
| Sqoop |  -  |  -  |  -  |  -  | 
| TensorFlow | 2.19.0 | 2.19.0 | 2.18.0 | 2.16.1 | 
| Tez | 0.10.2-amzn-19 | 0.10.2-amzn-18 | 0.10.2-amzn-17 | 0.10.2-amzn-16 | 
| Trino (PrestoSQL) | 476-amzn-1 | 475-amzn-0 | 470-amzn-0 | 467-amzn-2 | 
| Zeppelin | 0.11.1 | 0.11.1 | 0.11.1 | 0.11.1 | 
| ZooKeeper | 3.9.3-amzn-4 | 3.9.3-amzn-3 | 3.9.3-amzn-2 | 3.9.3-amzn-1 | 

# 7.12.0 Vulnerabilidades y exposiciones comunes
<a name="7120-common-vulnerabilities-exposures"></a>

La siguiente tabla muestra todo lo CVEs que no afecta a los clústeres de EMR que se ejecutan en las configuraciones recomendadas de Amazon EMR 7.12.0. Amazon EMR depende del código abierto original para la disponibilidad de las correcciones y proporcionará la última versión estable como parte de los componentes del motor principal en un plazo de 90 días a partir de su verificación por parte de Amazon EMR.

Esta tabla se actualizó el 13 de noviembre de 2025.


| ID de CVE | Gravedad | URL de detalles del CVE | 
| --- | --- | --- | 
|  CVE-2015-1832  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2015-1832](https://nvd.nist.gov/vuln/detail/CVE-2015-1832)  | 
|  CVE-2016-5018  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2016-5018)-2016-5018  | 
|  CVE-2017-15095  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2017-15095)-2017-15095  | 
|  CVE-2017-17485  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2017-17485](https://nvd.nist.gov/vuln/detail/CVE-2017-17485)  | 
|  CVE-2017-7525  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2017-7525)-2017-7525  | 
|  CVE-2018-11307  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2018-11307](https://nvd.nist.gov/vuln/detail/CVE-2018-11307)  | 
|  CVE-2018-11307  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2018-11307](https://nvd.nist.gov/vuln/detail/CVE-2018-11307)  | 
|  CVE-2018-14718  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-14718)-2018-14718  | 
|  CVE-2018-14718  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-14718)-2018-14718  | 
|  CVE-2018-14719  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-14719)-2018-14719  | 
|  CVE-2018-14719  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-14719)-2018-14719  | 
|  CVE-2018-14720  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-14720)-2018-14720  | 
|  CVE-2018-14720  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-14720)-2018-14720  | 
|  CVE-2018-14721  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-14721)-2018-14721  | 
|  CVE-2018-14721  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-14721)-2018-14721  | 
|  CVE-2018-19360  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2018-19360](https://nvd.nist.gov/vuln/detail/CVE-2018-19360)  | 
|  CVE-2018-19360  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2018-19360](https://nvd.nist.gov/vuln/detail/CVE-2018-19360)  | 
|  CVE-2018-19361  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2018-19361](https://nvd.nist.gov/vuln/detail/CVE-2018-19361)  | 
|  CVE-2018-19361  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2018-19361](https://nvd.nist.gov/vuln/detail/CVE-2018-19361)  | 
|  CVE-2018-19362  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2018-19362](https://nvd.nist.gov/vuln/detail/CVE-2018-19362)  | 
|  CVE-2018-19362  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2018-19362](https://nvd.nist.gov/vuln/detail/CVE-2018-19362)  | 
|  CVE-2018-7489  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2018-7489](https://nvd.nist.gov/vuln/detail/CVE-2018-7489)  | 
|  CVE-2018-7489  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2018-7489](https://nvd.nist.gov/vuln/detail/CVE-2018-7489)  | 
|  CVE-2019-10202  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2019-10202](https://nvd.nist.gov/vuln/detail/CVE-2019-10202)  | 
|  CVE-2019-14379  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2019-14379](https://nvd.nist.gov/vuln/detail/CVE-2019-14379)  | 
|  CVE-2019-14379  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2019-14379](https://nvd.nist.gov/vuln/detail/CVE-2019-14379)  | 
|  CVE-2019-14540  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-14540)-2019-14540  | 
|  CVE-2019-14540  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-14540)-2019-14540  | 
|  CVE-2019-14892  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-14892)-2019-14892  | 
|  CVE-2019-14892  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-14892)-2019-14892  | 
|  CVE-2019-14893  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-14893)-2019-14893  | 
|  CVE-2019-14893  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-14893)-2019-14893  | 
|  CVE-2019-16335  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2019-16335](https://nvd.nist.gov/vuln/detail/CVE-2019-16335)  | 
|  CVE-2019-16335  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2019-16335](https://nvd.nist.gov/vuln/detail/CVE-2019-16335)  | 
|  CVE-2019-16942  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-16942)-2019-16942  | 
|  CVE-2019-16942  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-16942)-2019-16942  | 
|  CVE-2019-16943  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-16943)-2019-16943  | 
|  CVE-2019-16943  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-16943)-2019-16943  | 
|  CVE-2019-17267  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2019-17267](https://nvd.nist.gov/vuln/detail/CVE-2019-17267)  | 
|  CVE-2019-17267  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2019-17267](https://nvd.nist.gov/vuln/detail/CVE-2019-17267)  | 
|  CVE-2019-17531  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-17531)-2019-17531  | 
|  CVE-2019-17531  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-17531)-2019-17531  | 
|  CVE-2019-20330  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2019-20330](https://nvd.nist.gov/vuln/detail/CVE-2019-20330)  | 
|  CVE-2019-20330  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2019-20330](https://nvd.nist.gov/vuln/detail/CVE-2019-20330)  | 
|  CVE-2020-8840  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-8840](https://nvd.nist.gov/vuln/detail/CVE-2020-8840)  | 
|  CVE-2020-8840  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-8840](https://nvd.nist.gov/vuln/detail/CVE-2020-8840)  | 
|  CVE-2020-9546  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-9546](https://nvd.nist.gov/vuln/detail/CVE-2020-9546)  | 
|  CVE-2020-9546  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-9546](https://nvd.nist.gov/vuln/detail/CVE-2020-9546)  | 
|  CVE-2020-9547  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-9547](https://nvd.nist.gov/vuln/detail/CVE-2020-9547)  | 
|  CVE-2020-9547  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-9547](https://nvd.nist.gov/vuln/detail/CVE-2020-9547)  | 
|  CVE-2020-9548  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-9548](https://nvd.nist.gov/vuln/detail/CVE-2020-9548)  | 
|  CVE-2020-9548  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-9548](https://nvd.nist.gov/vuln/detail/CVE-2020-9548)  | 
|  CVE-2022-1471  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2022-1471](https://nvd.nist.gov/vuln/detail/CVE-2022-1471)  | 
|  CVE-2022-1471  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2022-1471](https://nvd.nist.gov/vuln/detail/CVE-2022-1471)  | 
|  CVE-2022-37865  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-202237865](https://nvd.nist.gov/vuln/detail/CVE-2022-37865)  | 
|  CVE-2022-39135  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-202239135](https://nvd.nist.gov/vuln/detail/CVE-2022-39135)  | 
|  CVE-2022-46337  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-202246337](https://nvd.nist.gov/vuln/detail/CVE-2022-46337)  | 
|  CVE-2022-46337  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-202246337](https://nvd.nist.gov/vuln/detail/CVE-2022-46337)  | 
|  CVE-2024-51504  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-51504](https://nvd.nist.gov/vuln/detail/CVE-2024-51504)  | 
|  CVE-2024-51504  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-51504](https://nvd.nist.gov/vuln/detail/CVE-2024-51504)  | 
|  CVE-2024-52046  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-52046](https://nvd.nist.gov/vuln/detail/CVE-2024-52046)  | 
|  CVE-2024-52046  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-52046](https://nvd.nist.gov/vuln/detail/CVE-2024-52046)  | 
|  CVE-2024-53990  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-53990](https://nvd.nist.gov/vuln/detail/CVE-2024-53990)  | 
|  CVE-2025-30065  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2025-30065](https://nvd.nist.gov/vuln/detail/CVE-2025-30065)  | 
|  CVE-2025-30065  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2025-30065](https://nvd.nist.gov/vuln/detail/CVE-2025-30065)  | 
|  CVE-2014-3643  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2014-3643](https://nvd.nist.gov/vuln/detail/CVE-2014-3643)  | 
|  CVE-2015-5237  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2015-5237)-2015-5237  | 
|  CVE-2015-5237  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2015-5237)-2015-5237  | 
|  CVE-2016-6796  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2016-6796)-2016-6796  | 
|  CVE-2018-1000180  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2018-1000180](https://nvd.nist.gov/vuln/detail/CVE-2018-1000180)  | 
|  CVE-2018-1000180  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2018-1000180](https://nvd.nist.gov/vuln/detail/CVE-2018-1000180)  | 
|  CVE-2018-12022  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2018-12022](https://nvd.nist.gov/vuln/detail/CVE-2018-12022)  | 
|  CVE-2018-12022  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2018-12022](https://nvd.nist.gov/vuln/detail/CVE-2018-12022)  | 
|  CVE-2018-12023  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2018-12023](https://nvd.nist.gov/vuln/detail/CVE-2018-12023)  | 
|  CVE-2018-12023  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2018-12023](https://nvd.nist.gov/vuln/detail/CVE-2018-12023)  | 
|  CVE-2018-5968  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-5968)-2018-5968  | 
|  CVE-2019-0205  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2019-0205](https://nvd.nist.gov/vuln/detail/CVE-2019-0205)  | 
|  CVE-2019-0205  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2019-0205](https://nvd.nist.gov/vuln/detail/CVE-2019-0205)  | 
|  CVE-2019-10172  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2019-10172](https://nvd.nist.gov/vuln/detail/CVE-2019-10172)  | 
|  CVE-2019-12086  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-12086)-2019-12086  | 
|  CVE-2019-12086  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-12086)-2019-12086  | 
|  CVE-2019-14439  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-14439)-2019-14439  | 
|  CVE-2019-14439  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-14439)-2019-14439  | 
|  CVE-2020-10650  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-10650](https://nvd.nist.gov/vuln/detail/CVE-2020-10650)  | 
|  CVE-2020-10650  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-10650](https://nvd.nist.gov/vuln/detail/CVE-2020-10650)  | 
|  CVE-2020-10672  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-10672](https://nvd.nist.gov/vuln/detail/CVE-2020-10672)  | 
|  CVE-2020-10672  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-10672](https://nvd.nist.gov/vuln/detail/CVE-2020-10672)  | 
|  CVE-2020-10673  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-10673](https://nvd.nist.gov/vuln/detail/CVE-2020-10673)  | 
|  CVE-2020-10673  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-10673](https://nvd.nist.gov/vuln/detail/CVE-2020-10673)  | 
|  CVE-2020-10968  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-10968)-2020-10968  | 
|  CVE-2020-10968  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-10968)-2020-10968  | 
|  CVE-2020-10969  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-10969)-2020-10969  | 
|  CVE-2020-10969  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-10969)-2020-10969  | 
|  CVE-2020-11111  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-11111](https://nvd.nist.gov/vuln/detail/CVE-2020-11111)  | 
|  CVE-2020-11111  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-11111](https://nvd.nist.gov/vuln/detail/CVE-2020-11111)  | 
|  CVE-2020-11112  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-11112](https://nvd.nist.gov/vuln/detail/CVE-2020-11112)  | 
|  CVE-2020-11112  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-11112](https://nvd.nist.gov/vuln/detail/CVE-2020-11112)  | 
|  CVE-2020-11113  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-11113](https://nvd.nist.gov/vuln/detail/CVE-2020-11113)  | 
|  CVE-2020-11113  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-11113](https://nvd.nist.gov/vuln/detail/CVE-2020-11113)  | 
|  CVE-2020-11619  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-11619)-2020-11619  | 
|  CVE-2020-11619  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-11619)-2020-11619  | 
|  CVE-2020-11620  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-11620](https://nvd.nist.gov/vuln/detail/CVE-2020-11620)  | 
|  CVE-2020-11620  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-11620](https://nvd.nist.gov/vuln/detail/CVE-2020-11620)  | 
|  CVE-2020-13949  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-13949)-2020-13949  | 
|  CVE-2020-13949  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-13949)-2020-13949  | 
|  CVE-2020-13949  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-13949)-2020-13949  | 
|  CVE-2020-14060  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-14060)-2020-14060  | 
|  CVE-2020-14060  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-14060)-2020-14060  | 
|  CVE-2020-14061  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-14061)-2020-14061  | 
|  CVE-2020-14061  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-14061)-2020-14061  | 
|  CVE-2020-14062  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-14062)-2020-14062  | 
|  CVE-2020-14062  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-14062)-2020-14062  | 
|  CVE-2020-14195  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-14195](https://nvd.nist.gov/vuln/detail/CVE-2020-14195)  | 
|  CVE-2020-14195  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-14195](https://nvd.nist.gov/vuln/detail/CVE-2020-14195)  | 
|  CVE-2020-24616  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-24616](https://nvd.nist.gov/vuln/detail/CVE-2020-24616)  | 
|  CVE-2020-24616  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-24616](https://nvd.nist.gov/vuln/detail/CVE-2020-24616)  | 
|  CVE-2020-24750  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-24750](https://nvd.nist.gov/vuln/detail/CVE-2020-24750)  | 
|  CVE-2020-24750  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-24750](https://nvd.nist.gov/vuln/detail/CVE-2020-24750)  | 
|  CVE-2020-25649  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-25649](https://nvd.nist.gov/vuln/detail/CVE-2020-25649)  | 
|  CVE-2020-28052  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-28052](https://nvd.nist.gov/vuln/detail/CVE-2020-28052)  | 
|  CVE-2020-35490  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-35490](https://nvd.nist.gov/vuln/detail/CVE-2020-35490)  | 
|  CVE-2020-35490  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-35490](https://nvd.nist.gov/vuln/detail/CVE-2020-35490)  | 
|  CVE-2020-35491  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-35491](https://nvd.nist.gov/vuln/detail/CVE-2020-35491)  | 
|  CVE-2020-35491  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-35491](https://nvd.nist.gov/vuln/detail/CVE-2020-35491)  | 
|  CVE-2020-35728  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-35728](https://nvd.nist.gov/vuln/detail/CVE-2020-35728)  | 
|  CVE-2020-35728  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-35728](https://nvd.nist.gov/vuln/detail/CVE-2020-35728)  | 
|  CVE-2020-36179  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36179](https://nvd.nist.gov/vuln/detail/CVE-2020-36179)  | 
|  CVE-2020-36179  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36179](https://nvd.nist.gov/vuln/detail/CVE-2020-36179)  | 
|  CVE-2020-36180  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36180](https://nvd.nist.gov/vuln/detail/CVE-2020-36180)  | 
|  CVE-2020-36180  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36180](https://nvd.nist.gov/vuln/detail/CVE-2020-36180)  | 
|  CVE-2020-36181  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36181](https://nvd.nist.gov/vuln/detail/CVE-2020-36181)  | 
|  CVE-2020-36181  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36181](https://nvd.nist.gov/vuln/detail/CVE-2020-36181)  | 
|  CVE-2020-36182  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36182](https://nvd.nist.gov/vuln/detail/CVE-2020-36182)  | 
|  CVE-2020-36182  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36182](https://nvd.nist.gov/vuln/detail/CVE-2020-36182)  | 
|  CVE-2020-36183  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36183](https://nvd.nist.gov/vuln/detail/CVE-2020-36183)  | 
|  CVE-2020-36183  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36183](https://nvd.nist.gov/vuln/detail/CVE-2020-36183)  | 
|  CVE-2020-36184  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36184](https://nvd.nist.gov/vuln/detail/CVE-2020-36184)  | 
|  CVE-2020-36184  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36184](https://nvd.nist.gov/vuln/detail/CVE-2020-36184)  | 
|  CVE-2020-36185  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36185](https://nvd.nist.gov/vuln/detail/CVE-2020-36185)  | 
|  CVE-2020-36185  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36185](https://nvd.nist.gov/vuln/detail/CVE-2020-36185)  | 
|  CVE-2020-36186  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36186](https://nvd.nist.gov/vuln/detail/CVE-2020-36186)  | 
|  CVE-2020-36186  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36186](https://nvd.nist.gov/vuln/detail/CVE-2020-36186)  | 
|  CVE-2020-36187  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36187](https://nvd.nist.gov/vuln/detail/CVE-2020-36187)  | 
|  CVE-2020-36187  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36187](https://nvd.nist.gov/vuln/detail/CVE-2020-36187)  | 
|  CVE-2020-36188  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36188](https://nvd.nist.gov/vuln/detail/CVE-2020-36188)  | 
|  CVE-2020-36188  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36188](https://nvd.nist.gov/vuln/detail/CVE-2020-36188)  | 
|  CVE-2020-36189  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36189](https://nvd.nist.gov/vuln/detail/CVE-2020-36189)  | 
|  CVE-2020-36189  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36189](https://nvd.nist.gov/vuln/detail/CVE-2020-36189)  | 
|  CVE-2020-36518  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36518](https://nvd.nist.gov/vuln/detail/CVE-2020-36518)  | 
|  CVE-2020-36518  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36518](https://nvd.nist.gov/vuln/detail/CVE-2020-36518)  | 
|  CVE-2021-0341  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2021-0341](https://nvd.nist.gov/vuln/detail/CVE-2021-0341)  | 
|  CVE-2021-20190  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2021-20190](https://nvd.nist.gov/vuln/detail/CVE-2021-20190)  | 
|  CVE-2021-20190  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2021-20190](https://nvd.nist.gov/vuln/detail/CVE-2021-20190)  | 
|  CVE-2021-31684  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2021-31684](https://nvd.nist.gov/vuln/detail/CVE-2021-31684)  | 
|  CVE-2021-34538  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2021-34538](https://nvd.nist.gov/vuln/detail/CVE-2021-34538)  | 
|  CVE-2021-34538  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2021-34538](https://nvd.nist.gov/vuln/detail/CVE-2021-34538)  | 
|  CVE-2021-34538  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2021-34538](https://nvd.nist.gov/vuln/detail/CVE-2021-34538)  | 
|  CVE-2022-25647  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-202225647](https://nvd.nist.gov/vuln/detail/CVE-2022-25647)  | 
|  CVE-2022-25647  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-202225647](https://nvd.nist.gov/vuln/detail/CVE-2022-25647)  | 
|  CVE-2022-25857  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-202225857](https://nvd.nist.gov/vuln/detail/CVE-2022-25857)  | 
|  CVE-2022-3171  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2022-3171](https://nvd.nist.gov/vuln/detail/CVE-2022-3171)  | 
|  CVE-2022-3171  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2022-3171](https://nvd.nist.gov/vuln/detail/CVE-2022-3171)  | 
|  CVE-2022-3509  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2022-3509](https://nvd.nist.gov/vuln/detail/CVE-2022-3509)  | 
|  CVE-2022-3509  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2022-3509](https://nvd.nist.gov/vuln/detail/CVE-2022-3509)  | 
|  CVE-2022-3510  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-20223510](https://nvd.nist.gov/vuln/detail/CVE-2022-3510)  | 
|  CVE-2022-36364  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-202236364](https://nvd.nist.gov/vuln/detail/CVE-2022-36364)  | 
|  CVE-2022-37866  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-202237866](https://nvd.nist.gov/vuln/detail/CVE-2022-37866)  | 
|  CVE-2022-40149  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-202240149](https://nvd.nist.gov/vuln/detail/CVE-2022-40149)  | 
|  CVE-2022-40149  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-202240149](https://nvd.nist.gov/vuln/detail/CVE-2022-40149)  | 
|  CVE-2022-40150  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-202240150](https://nvd.nist.gov/vuln/detail/CVE-2022-40150)  | 
|  CVE-2022-40150  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-202240150](https://nvd.nist.gov/vuln/detail/CVE-2022-40150)  | 
|  CVE-2022-41404  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-41404)-2022-41404  | 
|  CVE-2022-42003  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2022-42003](https://nvd.nist.gov/vuln/detail/CVE-2022-42003)  | 
|  CVE-2022-42003  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2022-42003](https://nvd.nist.gov/vuln/detail/CVE-2022-42003)  | 
|  CVE-2022-42003  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2022-42003](https://nvd.nist.gov/vuln/detail/CVE-2022-42003)  | 
|  CVE-2022-42003  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2022-42003](https://nvd.nist.gov/vuln/detail/CVE-2022-42003)  | 
|  CVE-2022-42004  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2022-42004](https://nvd.nist.gov/vuln/detail/CVE-2022-42004)  | 
|  CVE-2022-42004  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2022-42004](https://nvd.nist.gov/vuln/detail/CVE-2022-42004)  | 
|  CVE-2022-42004  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2022-42004](https://nvd.nist.gov/vuln/detail/CVE-2022-42004)  | 
|  CVE-2022-45685  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-202245685](https://nvd.nist.gov/vuln/detail/CVE-2022-45685)  | 
|  CVE-2022-45685  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-202245685](https://nvd.nist.gov/vuln/detail/CVE-2022-45685)  | 
|  CVE-2022-45693  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-202245693](https://nvd.nist.gov/vuln/detail/CVE-2022-45693)  | 
|  CVE-2022-45693  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-202245693](https://nvd.nist.gov/vuln/detail/CVE-2022-45693)  | 
|  CVE-2022-46751  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-202246751](https://nvd.nist.gov/vuln/detail/CVE-2022-46751)  | 
|  CVE-2022-46751  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-202246751](https://nvd.nist.gov/vuln/detail/CVE-2022-46751)  | 
|  CVE-2023-1370  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-1370](https://nvd.nist.gov/vuln/detail/CVE-2023-1370)  | 
|  CVE-2023-1436  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-1436](https://nvd.nist.gov/vuln/detail/CVE-2023-1436)  | 
|  CVE-2023-1436  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-1436](https://nvd.nist.gov/vuln/detail/CVE-2023-1436)  | 
|  CVE-2023-2976  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-2976](https://nvd.nist.gov/vuln/detail/CVE-2023-2976)  | 
|  CVE-2023-2976  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-2976](https://nvd.nist.gov/vuln/detail/CVE-2023-2976)  | 
|  CVE-2023-2976  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-2976](https://nvd.nist.gov/vuln/detail/CVE-2023-2976)  | 
|  CVE-2023-2976  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-2976](https://nvd.nist.gov/vuln/detail/CVE-2023-2976)  | 
|  CVE-2023-2976  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-2976](https://nvd.nist.gov/vuln/detail/CVE-2023-2976)  | 
|  CVE-2023-2976  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-2976](https://nvd.nist.gov/vuln/detail/CVE-2023-2976)  | 
|  CVE-2023-2976  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-2976](https://nvd.nist.gov/vuln/detail/CVE-2023-2976)  | 
|  CVE-2023-2976  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-2976](https://nvd.nist.gov/vuln/detail/CVE-2023-2976)  | 
|  CVE-2023-2976  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-2976](https://nvd.nist.gov/vuln/detail/CVE-2023-2976)  | 
|  CVE-2023-6378  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-6378](https://nvd.nist.gov/vuln/detail/CVE-2023-6378)  | 
|  CVE-2023-6378  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-6378](https://nvd.nist.gov/vuln/detail/CVE-2023-6378)  | 
|  CVE-2023-6481  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-6481](https://nvd.nist.gov/vuln/detail/CVE-2023-6481)  | 
|  CVE-2023-6481  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-6481](https://nvd.nist.gov/vuln/detail/CVE-2023-6481)  | 
|  CVE-2024-13009  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-13009](https://nvd.nist.gov/vuln/detail/CVE-2024-13009)  | 
|  CVE-2024-13009  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-13009](https://nvd.nist.gov/vuln/detail/CVE-2024-13009)  | 
|  CVE-2024-29857  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-29857](https://nvd.nist.gov/vuln/detail/CVE-2024-29857)  | 
|  CVE-2024-29857  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-29857](https://nvd.nist.gov/vuln/detail/CVE-2024-29857)  | 
|  CVE-2024-29857  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-29857](https://nvd.nist.gov/vuln/detail/CVE-2024-29857)  | 
|  CVE-2024-29857  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-29857](https://nvd.nist.gov/vuln/detail/CVE-2024-29857)  | 
|  CVE-2024-30172  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-30172](https://nvd.nist.gov/vuln/detail/CVE-2024-30172)  | 
|  CVE-2024-30172  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-30172](https://nvd.nist.gov/vuln/detail/CVE-2024-30172)  | 
|  CVE-2024-34447  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-34447](https://nvd.nist.gov/vuln/detail/CVE-2024-34447)  | 
|  CVE-2024-34447  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-34447](https://nvd.nist.gov/vuln/detail/CVE-2024-34447)  | 
|  CVE-2024-36114  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-36114](https://nvd.nist.gov/vuln/detail/CVE-2024-36114)  | 
|  CVE-2024-47561  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-47561](https://nvd.nist.gov/vuln/detail/CVE-2024-47561)  | 
|  CVE-2024-7254  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-7254](https://nvd.nist.gov/vuln/detail/CVE-2024-7254)  | 
|  CVE-2024-7254  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-7254](https://nvd.nist.gov/vuln/detail/CVE-2024-7254)  | 
|  CVE-2024-7254  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-7254](https://nvd.nist.gov/vuln/detail/CVE-2024-7254)  | 
|  CVE-2024-7254  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-7254](https://nvd.nist.gov/vuln/detail/CVE-2024-7254)  | 
|  CVE-2024-7254  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-7254](https://nvd.nist.gov/vuln/detail/CVE-2024-7254)  | 
|  CVE-2024-7254  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-7254](https://nvd.nist.gov/vuln/detail/CVE-2024-7254)  | 
|  CVE-2024-7254  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-7254](https://nvd.nist.gov/vuln/detail/CVE-2024-7254)  | 
|  CVE-2024-9823  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-9823](https://nvd.nist.gov/vuln/detail/CVE-2024-9823)  | 
|  CVE-2025-24970  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2025-24970](https://nvd.nist.gov/vuln/detail/CVE-2025-24970)  | 
|  CVE-2025-24970  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2025-24970](https://nvd.nist.gov/vuln/detail/CVE-2025-24970)  | 
|  CVE-2025-27553  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2025-27553](https://nvd.nist.gov/vuln/detail/CVE-2025-27553)  | 
|  CVE-2025-27817  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2025-27817](https://nvd.nist.gov/vuln/detail/CVE-2025-27817)  | 
|  CVE-2025-46762  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2025-46762](https://nvd.nist.gov/vuln/detail/CVE-2025-46762)  | 
|  CVE-2025-46762  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2025-46762](https://nvd.nist.gov/vuln/detail/CVE-2025-46762)  | 
|  CVE-2025-46762  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2025-46762](https://nvd.nist.gov/vuln/detail/CVE-2025-46762)  | 
|  CVE-2025-48734  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2025-48734](https://nvd.nist.gov/vuln/detail/CVE-2025-48734)  | 
|  CVE-2025-52434  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2025-52434](https://nvd.nist.gov/vuln/detail/CVE-2025-52434)  | 
|  CVE-2025-52999  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2025-52999](https://nvd.nist.gov/vuln/detail/CVE-2025-52999)  | 
|  CVE-2025-52999  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2025-52999](https://nvd.nist.gov/vuln/detail/CVE-2025-52999)  | 
|  CVE-2025-52999  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2025-52999](https://nvd.nist.gov/vuln/detail/CVE-2025-52999)  | 
|  CVE-2025-52999  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2025-52999](https://nvd.nist.gov/vuln/detail/CVE-2025-52999)  | 
|  CVE-2025-52999  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2025-52999](https://nvd.nist.gov/vuln/detail/CVE-2025-52999)  | 
|  CVE-2025-52999  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2025-52999](https://nvd.nist.gov/vuln/detail/CVE-2025-52999)  | 
|  CVE-2025-55163  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2025-55163](https://nvd.nist.gov/vuln/detail/CVE-2025-55163)  | 
|  CVE-2025-58056  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2025-58056](https://nvd.nist.gov/vuln/detail/CVE-2025-58056)  | 
|  CVE-2025-58057  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2025-58057](https://nvd.nist.gov/vuln/detail/CVE-2025-58057)  | 
|  CVE-2025-58057  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2025-58057](https://nvd.nist.gov/vuln/detail/CVE-2025-58057)  | 
|  CVE-2025-58057  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2025-58057](https://nvd.nist.gov/vuln/detail/CVE-2025-58057)  | 
|  CVE-2025-59250  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2025-59250](https://nvd.nist.gov/vuln/detail/CVE-2025-59250)  | 
|  CVE-2012-5783  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2012-5783](https://nvd.nist.gov/vuln/detail/CVE-2012-5783)  | 
|  CVE-2012-5783  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2012-5783](https://nvd.nist.gov/vuln/detail/CVE-2012-5783)  | 
|  CVE-2012-6153  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2012-6153](https://nvd.nist.gov/vuln/detail/CVE-2012-6153)  | 
|  CVE-2012-6153  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2012-6153](https://nvd.nist.gov/vuln/detail/CVE-2012-6153)  | 
|  CVE-2018-10237  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2018-10237](https://nvd.nist.gov/vuln/detail/CVE-2018-10237)  | 
|  CVE-2018-10237  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2018-10237](https://nvd.nist.gov/vuln/detail/CVE-2018-10237)  | 
|  CVE-2018-10237  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2018-10237](https://nvd.nist.gov/vuln/detail/CVE-2018-10237)  | 
|  CVE-2018-10237  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2018-10237](https://nvd.nist.gov/vuln/detail/CVE-2018-10237)  | 
|  CVE-2018-10237  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2018-10237](https://nvd.nist.gov/vuln/detail/CVE-2018-10237)  | 
|  CVE-2018-11798  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2018-11798](https://nvd.nist.gov/vuln/detail/CVE-2018-11798)  | 
|  CVE-2018-1313  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2018-1313](https://nvd.nist.gov/vuln/detail/CVE-2018-1313)  | 
|  CVE-2019-12384  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-12384)-2019-12384  | 
|  CVE-2019-12384  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-12384)-2019-12384  | 
|  CVE-2019-12814  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-12814)-2019-12814  | 
|  CVE-2019-12814  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-12814)-2019-12814  | 
|  CVE-2020-13955  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-13955)-2020-13955  | 
|  CVE-2020-13956  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-13956)-2020-13956  | 
|  CVE-2020-15250  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-15250](https://nvd.nist.gov/vuln/detail/CVE-2020-15250)  | 
|  CVE-2020-15250  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-15250](https://nvd.nist.gov/vuln/detail/CVE-2020-15250)  | 
|  CVE-2020-15522  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-15522)-2020-15522  | 
|  CVE-2020-15522  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-15522)-2020-15522  | 
|  CVE-2020-15522  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-15522)-2020-15522  | 
|  CVE-2020-17521  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-17521)-2020-17521  | 
|  CVE-2020-17521  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-17521)-2020-17521  | 
|  CVE-2020-1945  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-1945](https://nvd.nist.gov/vuln/detail/CVE-2020-1945)  | 
|  CVE-2020-26939  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-26939](https://nvd.nist.gov/vuln/detail/CVE-2020-26939)  | 
|  CVE-2020-26939  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-26939](https://nvd.nist.gov/vuln/detail/CVE-2020-26939)  | 
|  CVE-2020-26939  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-26939](https://nvd.nist.gov/vuln/detail/CVE-2020-26939)  | 
|  CVE-2021-22569  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2021-22569](https://nvd.nist.gov/vuln/detail/CVE-2021-22569)  | 
|  CVE-2021-22569  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2021-22569](https://nvd.nist.gov/vuln/detail/CVE-2021-22569)  | 
|  CVE-2021-27568  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2021-27568](https://nvd.nist.gov/vuln/detail/CVE-2021-27568)  | 
|  CVE-2021-28170  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2021-28170](https://nvd.nist.gov/vuln/detail/CVE-2021-28170)  | 
|  CVE-2021-29425  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2021-29425](https://nvd.nist.gov/vuln/detail/CVE-2021-29425)  | 
|  CVE-2021-36373  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2021-36373](https://nvd.nist.gov/vuln/detail/CVE-2021-36373)  | 
|  CVE-2021-36374  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2021-36374](https://nvd.nist.gov/vuln/detail/CVE-2021-36374)  | 
|  CVE-202238749  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-202238749](https://nvd.nist.gov/vuln/detail/CVE-2022-38749)  | 
|  CVE-202238750  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-202238750](https://nvd.nist.gov/vuln/detail/CVE-2022-38750)  | 
|  CVE-202238751  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-202238751](https://nvd.nist.gov/vuln/detail/CVE-2022-38751)  | 
|  CVE-202238752  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-202238752](https://nvd.nist.gov/vuln/detail/CVE-2022-38752)  | 
|  CVE-2022-41854  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-41854)-2022-41854  | 
|  CVE-2023-0833  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-0833](https://nvd.nist.gov/vuln/detail/CVE-2023-0833)  | 
|  CVE-2023-33201  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-33201](https://nvd.nist.gov/vuln/detail/CVE-2023-33201)  | 
|  CVE-2023-33201  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-33201](https://nvd.nist.gov/vuln/detail/CVE-2023-33201)  | 
|  CVE-2023-33201  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-33201](https://nvd.nist.gov/vuln/detail/CVE-2023-33201)  | 
|  CVE-2023-33201  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-33201](https://nvd.nist.gov/vuln/detail/CVE-2023-33201)  | 
|  CVE-2023-33202  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-33202](https://nvd.nist.gov/vuln/detail/CVE-2023-33202)  | 
|  CVE-2023-33202  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-33202](https://nvd.nist.gov/vuln/detail/CVE-2023-33202)  | 
|  CVE-2023-33202  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-33202](https://nvd.nist.gov/vuln/detail/CVE-2023-33202)  | 
|  CVE-2023-33202  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-33202](https://nvd.nist.gov/vuln/detail/CVE-2023-33202)  | 
|  CVE-2023-42503  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-42503](https://nvd.nist.gov/vuln/detail/CVE-2023-42503)  | 
|  CVE-2023-51074  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-51074](https://nvd.nist.gov/vuln/detail/CVE-2023-51074)  | 
|  CVE-2024-12798  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-12798](https://nvd.nist.gov/vuln/detail/CVE-2024-12798)  | 
|  CVE-2024-12798  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-12798](https://nvd.nist.gov/vuln/detail/CVE-2024-12798)  | 
|  CVE-2024-12798  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-12798](https://nvd.nist.gov/vuln/detail/CVE-2024-12798)  | 
|  CVE-2024-12798  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-12798](https://nvd.nist.gov/vuln/detail/CVE-2024-12798)  | 
|  CVE-2024-12798  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-12798](https://nvd.nist.gov/vuln/detail/CVE-2024-12798)  | 
|  CVE-2024-12798  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-12798](https://nvd.nist.gov/vuln/detail/CVE-2024-12798)  | 
|  CVE-2024-23944  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-23944](https://nvd.nist.gov/vuln/detail/CVE-2024-23944)  | 
|  CVE-2024-23945  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-23945](https://nvd.nist.gov/vuln/detail/CVE-2024-23945)  | 
|  CVE-2024-23945  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-23945](https://nvd.nist.gov/vuln/detail/CVE-2024-23945)  | 
|  CVE-2024-23953  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-23953](https://nvd.nist.gov/vuln/detail/CVE-2024-23953)  | 
|  CVE-2024-23953  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-23953](https://nvd.nist.gov/vuln/detail/CVE-2024-23953)  | 
|  CVE-2024-25710  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-25710](https://nvd.nist.gov/vuln/detail/CVE-2024-25710)  | 
|  CVE-2024-25710  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-25710](https://nvd.nist.gov/vuln/detail/CVE-2024-25710)  | 
|  CVE-2024-26308  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-26308](https://nvd.nist.gov/vuln/detail/CVE-2024-26308)  | 
|  CVE-2024-26308  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-26308](https://nvd.nist.gov/vuln/detail/CVE-2024-26308)  | 
|  CVE-2024-29025  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-29025](https://nvd.nist.gov/vuln/detail/CVE-2024-29025)  | 
|  CVE-2024-29869  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-29869](https://nvd.nist.gov/vuln/detail/CVE-2024-29869)  | 
|  CVE-2024-29869  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-29869](https://nvd.nist.gov/vuln/detail/CVE-2024-29869)  | 
|  CVE-2024-30171  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-30171](https://nvd.nist.gov/vuln/detail/CVE-2024-30171)  | 
|  CVE-2024-30171  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-30171](https://nvd.nist.gov/vuln/detail/CVE-2024-30171)  | 
|  CVE-2024-30171  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-30171](https://nvd.nist.gov/vuln/detail/CVE-2024-30171)  | 
|  CVE-2024-30171  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-30171](https://nvd.nist.gov/vuln/detail/CVE-2024-30171)  | 
|  CVE-2024-31141  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-31141](https://nvd.nist.gov/vuln/detail/CVE-2024-31141)  | 
|  CVE-2024-47535  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-47535](https://nvd.nist.gov/vuln/detail/CVE-2024-47535)  | 
|  CVE-2024-47535  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-47535](https://nvd.nist.gov/vuln/detail/CVE-2024-47535)  | 
|  CVE-2024-47554  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-47554](https://nvd.nist.gov/vuln/detail/CVE-2024-47554)  | 
|  CVE-2024-47554  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-47554](https://nvd.nist.gov/vuln/detail/CVE-2024-47554)  | 
|  CVE-2024-47554  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-47554](https://nvd.nist.gov/vuln/detail/CVE-2024-47554)  | 
|  CVE-2024-56128  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-56128](https://nvd.nist.gov/vuln/detail/CVE-2024-56128)  | 
|  CVE-2024-6763  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-6763](https://nvd.nist.gov/vuln/detail/CVE-2024-6763)  | 
|  CVE-2024-6763  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-6763](https://nvd.nist.gov/vuln/detail/CVE-2024-6763)  | 
|  CVE-2024-6763  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-6763](https://nvd.nist.gov/vuln/detail/CVE-2024-6763)  | 
|  CVE-2024-6763  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-6763](https://nvd.nist.gov/vuln/detail/CVE-2024-6763)  | 
|  CVE-2024-6763  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-6763](https://nvd.nist.gov/vuln/detail/CVE-2024-6763)  | 
|  CVE-2024-8184  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-8184](https://nvd.nist.gov/vuln/detail/CVE-2024-8184)  | 
|  CVE-2025-11226  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2025-11226](https://nvd.nist.gov/vuln/detail/CVE-2025-11226)  | 
|  CVE-2025-11226  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2025-11226](https://nvd.nist.gov/vuln/detail/CVE-2025-11226)  | 
|  CVE-2025-11226  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2025-11226](https://nvd.nist.gov/vuln/detail/CVE-2025-11226)  | 
|  CVE-2025-25193  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2025-25193](https://nvd.nist.gov/vuln/detail/CVE-2025-25193)  | 
|  CVE-2025-25193  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2025-25193](https://nvd.nist.gov/vuln/detail/CVE-2025-25193)  | 
|  CVE-2025-30474  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2025-30474](https://nvd.nist.gov/vuln/detail/CVE-2025-30474)  | 
|  CVE-2025-3588  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2025-3588](https://nvd.nist.gov/vuln/detail/CVE-2025-3588)  | 
|  CVE-2025-46392  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2025-46392](https://nvd.nist.gov/vuln/detail/CVE-2025-46392)  | 
|  CVE-2025-48924  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2025-48924](https://nvd.nist.gov/vuln/detail/CVE-2025-48924)  | 
|  CVE-2025-48924  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2025-48924](https://nvd.nist.gov/vuln/detail/CVE-2025-48924)  | 
|  CVE-2025-48924  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2025-48924](https://nvd.nist.gov/vuln/detail/CVE-2025-48924)  | 
|  CVE-2025-48924  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2025-48924](https://nvd.nist.gov/vuln/detail/CVE-2025-48924)  | 
|  CVE-2025-48924  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2025-48924](https://nvd.nist.gov/vuln/detail/CVE-2025-48924)  | 
|  CVE-2025-48924  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2025-48924](https://nvd.nist.gov/vuln/detail/CVE-2025-48924)  | 
|  CVE-2025-48924  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2025-48924](https://nvd.nist.gov/vuln/detail/CVE-2025-48924)  | 
|  CVE-2025-48924  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2025-48924](https://nvd.nist.gov/vuln/detail/CVE-2025-48924)  | 
|  CVE-2025-49128  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2025-49128](https://nvd.nist.gov/vuln/detail/CVE-2025-49128)  | 
|  CVE-2025-49128  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2025-49128](https://nvd.nist.gov/vuln/detail/CVE-2025-49128)  | 
|  CVE-2025-49128  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2025-49128](https://nvd.nist.gov/vuln/detail/CVE-2025-49128)  | 
|  CVE-2025-53864  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2025-53864](https://nvd.nist.gov/vuln/detail/CVE-2025-53864)  | 
|  CVE-2025-58457  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2025-58457](https://nvd.nist.gov/vuln/detail/CVE-2025-58457)  | 
|  CVE-2025-58457  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2025-58457](https://nvd.nist.gov/vuln/detail/CVE-2025-58457)  | 
|  CVE-2025-59419  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2025-59419](https://nvd.nist.gov/vuln/detail/CVE-2025-59419)  | 
|  CVE-2025-59419  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2025-59419](https://nvd.nist.gov/vuln/detail/CVE-2025-59419)  | 
|  CVE-2025-8885  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2025-8885](https://nvd.nist.gov/vuln/detail/CVE-2025-8885)  | 
|  CVE-2025-8885  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2025-8885](https://nvd.nist.gov/vuln/detail/CVE-2025-8885)  | 
|  CVE-2025-8916  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2025-8916](https://nvd.nist.gov/vuln/detail/CVE-2025-8916)  | 
|  CVE-2025-8916  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2025-8916](https://nvd.nist.gov/vuln/detail/CVE-2025-8916)  | 
|  CVE-2025-8916  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2025-8916](https://nvd.nist.gov/vuln/detail/CVE-2025-8916)  | 
|  CVE-2025-8916  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2025-8916](https://nvd.nist.gov/vuln/detail/CVE-2025-8916)  | 
|  CVE-2020-8908  |  BAJA  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-8908](https://nvd.nist.gov/vuln/detail/CVE-2020-8908)  | 
|  CVE-2020-8908  |  BAJA  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-8908](https://nvd.nist.gov/vuln/detail/CVE-2020-8908)  | 
|  CVE-2020-8908  |  BAJA  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-8908](https://nvd.nist.gov/vuln/detail/CVE-2020-8908)  | 
|  CVE-2020-8908  |  BAJA  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-8908](https://nvd.nist.gov/vuln/detail/CVE-2020-8908)  | 
|  CVE-2020-8908  |  BAJA  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-8908](https://nvd.nist.gov/vuln/detail/CVE-2020-8908)  | 
|  CVE-2020-8908  |  BAJA  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-8908](https://nvd.nist.gov/vuln/detail/CVE-2020-8908)  | 
|  CVE-2020-8908  |  BAJA  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-8908](https://nvd.nist.gov/vuln/detail/CVE-2020-8908)  | 
|  CVE-2020-8908  |  BAJA  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-8908](https://nvd.nist.gov/vuln/detail/CVE-2020-8908)  | 
|  CVE-2020-8908  |  BAJA  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-8908](https://nvd.nist.gov/vuln/detail/CVE-2020-8908)  | 
|  CVE-2024-12801  |  BAJA  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-12801](https://nvd.nist.gov/vuln/detail/CVE-2024-12801)  | 
|  CVE-2024-12801  |  BAJA  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-12801](https://nvd.nist.gov/vuln/detail/CVE-2024-12801)  | 
|  CVE-2024-12801  |  BAJA  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-12801](https://nvd.nist.gov/vuln/detail/CVE-2024-12801)  | 
|  CVE-2025-46551  |  BAJA  |  [https://nvd.nist. gov/vuln/detail/CVE-2025-46551](https://nvd.nist.gov/vuln/detail/CVE-2025-46551)  | 

## Notas de la versión 7.12.0
<a name="emr-7120-relnotes"></a>

Las siguientes notas de la versión incluyen información sobre la versión 7.12.0 de Amazon EMR.
+ **Nuevas características**
  + **Almacenamiento sin servidor para EMR Serverless: Amazon EMR** serverless presenta el almacenamiento sin servidor, con la versión 7.12 y posteriores de EMR, que elimina el aprovisionamiento de discos locales para las cargas de trabajo de Apache Spark. EMR Serverless gestiona automáticamente las operaciones de datos intermedias, como la reproducción aleatoria, sin cargos de almacenamiento. El almacenamiento sin servidor separa el almacenamiento del cómputo, lo que permite a Spark liberar a los trabajadores inmediatamente cuando están inactivos en lugar de mantenerlos activos para conservar los datos temporales. Para obtener más información, consulte [aws.amazon.com/serverless-storage-for-emr-serverless](aws.amazon.com/serverless-storage-for-emr-serverless). 
  + Actualizaciones de **aplicaciones: las actualizaciones** de aplicaciones Amazon EMR 7.12.0 incluyen Delta 3.3.2-amzn-1, Flink 1.20.0-amzn-6, HBase 2.6.2-amzn-3, 3.1.3-amzn-21, Hadoop 3.4.1-amzn-4, Hive HCatalog 3.1.3-amzn-21, Hudi 1.0.2-amzn-1, Iceberg 1.10.0-amzn-0, Presto 0.287-amzn-6, Spark 3.5.6-amzn-1, Tez 0.10.2-amzn-19, Trino 476-amzn-1 y 3.9.3-amzn-4. ZooKeeper 
  + **Vistas materializadas de Iceberg**: a partir de Amazon EMR 7.12.0, Amazon EMR Spark admite la creación y administración de vistas materializadas de iceberg (MV)
  + **Acceso completo a la mesa de Hudi: a** partir de Amazon EMR 7.12.0, Amazon EMR ahora admite el control del acceso completo a las tablas (FTA) para Apache Hudi en Apache Spark en función de las políticas definidas en Lake Formation. Esta función permite realizar operaciones de lectura y escritura desde sus trabajos de Amazon EMR Spark en las tablas registradas de Lake Formation cuando el rol de trabajo tiene acceso total a las tablas.
  + **Actualización de la versión de Iceberg**: Amazon EMR 7.12.0 es compatible con la versión 1.10 de Apache Iceberg
  + **Genere compatibilidad nativa con el FGAC mediante Lake Formation**: puede realizar DDL/DML operaciones (como CREATE, ALTER, DELETE, DROP) con un control de acceso detallado para las tablas de Apache Hive, Apache Iceberg y Delta Lake registradas en Lake Formation.
  + **Contexto de auditoría para los trabajos de Spark**: a partir de Amazon EMR 7.12.0, el contexto de auditoría para los trabajos de Amazon EMR Spark con clústeres habilitados para Lake Formation estará disponible para las llamadas a las API de Glue y AWS Lake Formation en los registros. CloudTrail 
  + Amazon EMR 7.12.0 mejora el proceso de autenticación de credenciales de GetClusterSessionCredentials sesión, lo que reduce significativamente la latencia de las sesiones interactivas de Livy y el acceso a la interfaz de usuario en el clúster en los clústeres habilitados para IAM Identity Center en comparación con las versiones anteriores de Amazon EMR.
  + A partir de Amazon EMR 7.12.0, Amazon HBase EMR en S3 ha agregado una función de precalentamiento de réplica y lectura para simplificar las actualizaciones de las versiones de Amazon EMR. Esta función se puede utilizar para actualizar los HBase clústeres existentes desde y hacia Amazon EMR versión 7.12 o superior
+ **Problemas y limitaciones conocidos**
  + **Compatibilidad con Athena SQL**
    + Athena SQL no puede leer la tabla Iceberg tipo V3 creada por Amazon EMR Spark debido al siguiente error: GENERIC\$1INTERNAL\$1ERROR: No se puede leer la versión 3 no compatible.
    + Se produce un error al escribir datos con Amazon EMR Spark en tablas iceberg creadas con Athena debido al siguiente error: la propiedad 'write.object-storage.path' ha quedado obsoleta y se eliminará en la versión 2.0; utilice 'write.data.path' en su lugar.
  + **Iceberg Materialized Views (MV)**: Amazon EMR 7.12.0 tiene un soporte limitado para la cláusula view SQL para la creación de vistas materializadas, la reescritura de consultas y la actualización incremental. Puede encontrar más información en la página de documentación de características de las vistas materializadas de Iceberg.
  + **Es necesario utilizar Hudi FTA para la venta de credenciales durante la ejecución del trabajo**. HoodieCredentialedHadoopStorage Establezca la siguiente configuración cuando ejecute los trabajos de Hudi:
    + `hoodie.storage.class=org.apache.spark.sql.hudi.storage.HoodieCredentialedHadoopStorage`
  + La compatibilidad con la escritura de FTA de Hudi solo funciona con las configuraciones predeterminadas de Hudi. Los ajustes de Hudi personalizados o no predeterminados podrían no ser totalmente compatibles y podrían causar un comportamiento inesperado. El modo de escritura FTA tampoco admite la agrupación en clústeres para las tablas Hudi Merge-On-Read (MOR).
+ **Cambios, mejoras y problemas resueltos**
  + A partir de EMR 7.12.0, EMR admite el ARN de clave KMS para los registros de chispas alojados en el servicio a través de un servidor de historial de chispas persistente. Las versiones anteriores de EMR solo admitían KeyID.
  + A partir de EMR 7.12.0, EMR solucionó un problema con Hue que impedía el uso de un certificado SSL al alojar Hue en clústeres de EMR.

## Versiones Java predeterminadas de 7.12.0
<a name="emr-7120-jdk"></a>

La versión 7.12.0 de Amazon EMR incluye Amazon Corretto 17 (basado en OpenJDK) de forma predeterminada para las aplicaciones compatibles con Corretto 17 (JDK 17), con la excepción de Apache Livy.

En la siguiente tabla se muestran las versiones predeterminadas de Java para las aplicaciones de Amazon EMR 7.12.0.


| Aplicación | Versión de Java o Amazon Corretto (el valor predeterminado está en negrita) | 
| --- | --- | 
| Delta | 17, 11, 8 | 
| Flink | 17, 11, 8 | 
| HBase | 17, 11, 8 | 
| HCatalog | 17, 11, 8 | 
| Hadoop | 17, 11, 8 | 
| Hive | 17, 11, 8 | 
| Hudi | 17, 11, 8 | 
| Iceberg | 17, 11 | 
| Livy | 17, 11, 8 | 
| Oozie | 17, 11, 8 | 
| Phoenix | 17, 11, 8 | 
| PrestoDB | 8 | 
| Spark | 17, 11, 8 | 
| Spark RAPIDS | 17, 11, 8 | 
| Tez | 17, 11, 8 | 
| Trino | 21, 17 | 
| Zeppelin | 17, 11, 8 | 
| Pig | 17, 11, 8 | 
| ZooKeeper | 17, 11, 8 | 

## Versiones de componentes 7.12.0
<a name="emr-7120-components"></a>

A continuación, se muestran los componentes que Amazon EMR instala con esta versión. Algunos se instalan como parte de paquetes de aplicación de macrodatos. Otros son exclusivos de Amazon EMR y se instalan para ciertos procesos y características del sistema. Normalmente, estos componentes comienzan con `emr` o `aws`. Normalmente, los paquetes de aplicación de macrodatos de la versión más reciente de Amazon EMR son las versiones más recientes que pueden encontrarse en la comunidad. Intentamos que las versiones de la comunidad estén disponibles en Amazon EMR lo más rápido posible.

Algunos componentes de Amazon EMR son distintos de las versiones que se encuentran en la comunidad. Estos componentes tienen una etiqueta de versión con el formato `CommunityVersion-amzn-EmrVersion`. La `EmrVersion` empieza por 0. Por ejemplo, si un componente de la comunidad de código abierto llamado `myapp-component` con la versión 2.2 se ha modificado tres veces para incluirlo en diferentes versiones de lanzamiento de Amazon EMR, la versión que se mostrará será `2.2-amzn-2`.


| Componente | Versión | Description (Descripción) | 
| --- | --- | --- | 
| adot-java-agent | 1.31.0 | Un agente Java que recopila métricas de los daemons de las aplicaciones. | 
| delta | 3.3.2-amzn-1 | Delta Lake es un formato de tabla abierto para conjuntos de datos analíticos de gran tamaño | 
| emr-amazon-cloudwatch-agent | 1.300032.2-amzn-0 | Se trata de una aplicación que recopila métricas internas de nivel de sistema y métricas de aplicación personalizadas de las instancias de Amazon EC2. | 
| emr-ddb | 5.7.0 | Conector de Amazon DynamoDB para aplicaciones del ecosistema de Hadoop. | 
| emr-goodies | 3.21.0 | Bibliotecas especialmente prácticas para el ecosistema de Hadoop. | 
| emr-kinesis | 3.25,0 | Conector de Amazon Kinesis para aplicaciones del ecosistema de Hadoop. | 
| emr-notebook-env | 1.18.0 | Entorno de Conda para cuaderno de EMR que incluye una puerta de enlace empresarial de Jupyter | 
| emr-s3-dist-cp | 2.42,0 | Aplicación de copia distribuida optimizada para Amazon S3. | 
| emr-s3-select | 2.21.0 | Conector S3Select de EMR | 
| emr-wal-cli | 1.3.6 | CLI utilizada para eliminar o enumerar WAL de ERM. | 
| emrfs | 2.73,0 | Conector de Amazon S3 para aplicaciones del ecosistema de Hadoop. | 
| flink-client | 1.20.0-amzn-6 | Scripts y aplicaciones de cliente de línea de comando de Apache Flink. | 
| flink-jobmanager-config | 1.20.0-amzn-6 | Administración de recursos en nodos EMR para Apache Flink. JobManager | 
| hadoop-client | 3.4.1-amzn-4 | Los clientes de línea de comando de Hadoop como, por ejemplo "hdfs", "hadoop" o "yarn". | 
| hadoop-hdfs-datanode | 3.4.1-amzn-4 | Servicio de nivel de nodos de HDFS para el almacenamiento de bloques. | 
| hadoop-hdfs-library | 3.4.1-amzn-4 | Biblioteca y cliente de línea de comandos HDFS | 
| hadoop-hdfs-namenode | 3.4.1-amzn-4 | Servicio de HDFS para realizar un seguimiento de nombres de archivo y bloquear ubicaciones. | 
| hadoop-hdfs-zkfc | 3.4.1-amzn-4 | Servicio ZKFC para rastrear los nodos de nombres para el modo HA. | 
| hadoop-hdfs-journalnode | 3.4.1-amzn-4 | Servicio de HDFS para administrar los archivos de Hadoop periódico en clústeres de alta disponibilidad. | 
| hadoop-httpfs-server | 3.4.1-amzn-4 | Punto de enlace HTTP para operaciones HDFS. | 
| hadoop-kms-server | 3.4.1-amzn-4 | Servidor de administración de claves criptográficas basado en la API de Hadoop. KeyProvider  | 
| hadoop-mapred | 3.4.1-amzn-4 | MapReduce bibliotecas de motores de ejecución para ejecutar una aplicación. MapReduce  | 
| hadoop-yarn-nodemanager | 3.4.1-amzn-4 | Servicio de YARN para la administración de contenedores en un nodo individual. | 
| hadoop-yarn-resourcemanager | 3.4.1-amzn-4 | Servicio de YARN para la asignación y administración de recursos de clúster y aplicaciones distribuidas. | 
| hadoop-yarn-timeline-server | 3.4.1-amzn-4 | Servicio para recuperar información actual e histórica para aplicaciones de YARN. | 
| hbase-hmaster | 2.6.2-amzn-3 | Servicio para un HBase clúster responsable de la coordinación de las regiones y la ejecución de los comandos administrativos. | 
| hbase-region-server | 2.6.2-amzn-3 | Servicio para prestar servicio a una o más regiones. HBase  | 
| hbase-client | 2.6.2-amzn-3 | HBase cliente de línea de comandos. | 
| hbase-rest-server | 2.6.2-amzn-3 | Servicio que proporciona un punto final HTTP para. RESTful HBase | 
| hbase-thrift-server | 2.6.2-amzn-3 | Servicio que proporciona un punto final de Thrift para. HBase | 
| hbase-operator-tools | 2.6.2-amzn-3 | Herramienta de reparación de clústeres de Apache. HBase  | 
| hcatalog-client | 3.1.3-amzn-21 | El cliente de línea de comando "hcat" para manipular hcatalog-server. | 
| hcatalog-server | 3.1.3-amzn-21 | Prestación de servicios HCatalog, una capa de administración de tablas y almacenamiento para aplicaciones distribuidas. | 
| hcatalog-webhcat-server | 3.1.3-amzn-21 | Punto final HTTP que proporciona una interfaz REST para. HCatalog | 
| hive-client | 3.1.3-amzn-21 | Cliente de línea de comando de Hive. | 
| hive-hbase | 3.1.3-amzn-21 | Hive-hbase client. | 
| hive-metastore-server | 3.1.3-amzn-21 | Service para acceder al metaalmacén de Hive, un repositorio semántico que almacena metadatos para SQL en operaciones de Hadoop. | 
| hive-server2 | 3.1.3-amzn-21 | Servicio para aceptar consultas de Hive como solicitudes web. | 
| hudi | 1.0.2-amzn-1 | Marco de procesamiento incremental para impulsar la canalización de datos a baja latencia y alta eficiencia. | 
| hudi-presto | 1.0.2-amzn-1 | Biblioteca de paquetes para ejecutar Presto con Hudi. | 
| hudi-trino | 1.0.2-amzn-1 | Biblioteca de paquetes para ejecutar Trino con Hudi. | 
| hudi-spark | 1.0.2-amzn-1 | Biblioteca de paquetes para ejecutar Spark con Hudi. | 
| hue-server | 4.11.0 | Aplicación web para analizar datos con aplicaciones del ecosistema de Hadoop | 
| iceberg | 1.10.0-amzn-0 | Apache Iceberg es un formato de tabla abierto para conjuntos de datos analíticos muy grandes | 
| jupyterhub | 1.5.0 | Servidor multiusuario para blocs de notas Jupyter | 
| livy-server | 0.8.0-incubating | Interfaz de REST para interactuar con Apache Spark | 
| nginx | 1.12.1 | nginx [engine x] es un servidor HTTP y proxy inverso | 
| mariadb-server | 5.5.68\$1 | Servidor de base de datos de MariaDB. | 
| nvidia-cuda | 12.5.0 | Controladores Nvidia y conjunto de herramientas Cuda | 
| oozie-client | 5.2.1 | Cliente de línea de comando de Oozie. | 
| oozie-server | 5.2.1 | Servicio para aceptar solicitudes de flujo de trabajo de Oozie. | 
| opencv | 4.7.0 | Biblioteca de visión artificial de código abierto. | 
| phoenix-library | 5.2.1 | Las bibliotecas de Phoenix para servidor y cliente | 
| phoenix-connectors | 6.0.0 | Conectores de Apache Phoenix para Spark-3 | 
| phoenix-query-server | 6.0.0 | Un servidor ligero que proporciona acceso a JDBC, así como acceso de formato Protocol Buffers y JSON al API de Avatica  | 
| presto-coordinator | 0.287-amzn-6 | Servicio para aceptar las consultas y administrar la ejecución de consultas entre presto-workers. | 
| presto-worker | 0.287-amzn-6 | Service para ejecutar partes de una consulta. | 
| presto-client | 0.287-amzn-6 | Cliente de línea de comandos Presto que se instala en los nodos principales en espera de un clúster de HA donde el servidor Presto no se ha iniciado. | 
| trino-coordinator | 476-amzn-1 | Servicio para aceptar consultas y administrar la ejecución de consultas entre trino-workers. | 
| trino-worker | 476-amzn-1 | Service para ejecutar partes de una consulta. | 
| trino-client | 476-amzn-1 | Cliente de línea de comandos Trino que se instala en los maestros en espera de un clúster de HA donde el servidor Trino no se ha iniciado. | 
| pig-client | 0.17.0 | Cliente de línea de comando de Pig. | 
| r | 4.3.2 | Proyecto R para análisis estadístico | 
| ranger-kms-server | 2.0.0 | Sistema de administración de claves Apache Ranger | 
| spark-client | 3.5.6-amzn-1 | Clientes de línea de comando de Spark. | 
| spark-history-server | 3.5.6-amzn-1 | IU web para la visualización de eventos registrados durante la vida útil de una aplicación Spark completada. | 
| spark-on-yarn | 3.5.6-amzn-1 | Motor de ejecución en memoria para YARN. | 
| spark-yarn-slave | 3.5.6-amzn-1 | Bibliotecas de Apache Spark necesarias para esclavos de YARN. | 
| spark-rapids | 25.08.0-amzn-0 | El complemento Nvidia Spark RAPIDS que acelera Apache Spark con. GPUs | 
| tensorflow | 2.19.0 | TensorFlow biblioteca de software de código abierto para computación numérica de alto rendimiento. | 
| tez-on-yarn | 0.10.2-amzn-19 | La aplicación YARN de tez y bibliotecas. | 
| tez-on-worker | 0.10.2-amzn-19 | La aplicación YARN de tez y bibliotecas para nodos de trabajo. | 
| zeppelin-server | 0.11.1 | Bloc de notas basado en web que permite el análisis de datos interactivo. | 
| zookeeper-server | 3.9.3-amzn-4 | Servicio centralizado para mantener información de configuración, nomenclatura, proporcionar sincronización distribuida y proporcionar servicios de grupo. | 
| zookeeper-client | 3.9.3-amzn-4 | ZooKeeper cliente de línea de comandos. | 

## Clasificaciones de configuración de 7.12.0
<a name="emr-7120-class"></a>

Las clasificaciones de configuración le permiten personalizar las aplicaciones. Suelen corresponder a un archivo XML de configuración para la aplicación como, por ejemplo, `hive-site.xml`. Para obtener más información, consulte [Configuración de aplicaciones](emr-configure-apps.md).

Las acciones de reconfiguración se producen cuando se especifica una configuración para los grupos de instancias de un clúster en ejecución. Amazon EMR solo inicia acciones de reconfiguración para las clasificaciones que se modifican. Para obtener más información, consulte [Reconfiguración de un grupo de instancias en un clúster en ejecución](emr-configure-apps-running-cluster.md).


**clasificaciones emr-7.12.0**  

| Clasificaciones | Description (Descripción) | Acciones de reconfiguración | 
| --- | --- | --- | 
| capacity-scheduler | Cambiar los valores en el archivo capacity-scheduler.xml de Hadoop. | Restarts the ResourceManager service. | 
| container-executor | Cambie los valores en el archivo container-executor.cfg de Hadoop YARN. | Not available. | 
| container-log4j | Cambiar los valores en el archivo container-log4j.properties de Hadoop YARN. | Not available. | 
| core-site | Cambiar los valores en el archivo core-site.xml de Hadoop. | Restarts the Hadoop HDFS services Namenode, SecondaryNamenode, Datanode, ZKFC, and Journalnode. Restarts the Hadoop YARN services ResourceManager, NodeManager, ProxyServer, and TimelineServer. Additionally restarts Hadoop KMS, Ranger KMS, HiveServer2, Hive MetaStore, Hadoop Httpfs, and MapReduce-HistoryServer. | 
| docker-conf | Cambie la configuración relacionada con el docker. | Not available. | 
| emrfs-site | Cambiar la configuración de EMRFS. | Restarts the Hadoop HDFS services Namenode, SecondaryNamenode, Datanode, ZKFC, and Journalnode. Restarts the Hadoop YARN services ResourceManager, NodeManager, ProxyServer, and TimelineServer. Additionally restarts HBaseRegionserver, HBaseMaster, HBaseThrift, HBaseRest, HiveServer2, Hive MetaStore, Hadoop Httpfs, and MapReduce-HistoryServer. | 
| flink-conf | Cambiar la configuración de flink-conf.yaml. | Restarts Flink history server. | 
| flink-log4j | Cambiar la configuración de log4j.properties de Flink. | Restarts Flink history server. | 
| flink-log4j-session | Cambie la configuración de Flink log4j-session.properties para la sesión. Kubernetes/Yarn  | Restarts Flink history server. | 
| flink-log4j-cli | Cambiar la configuración de log4j-cli.properties de Flink. | Restarts Flink history server. | 
| hadoop-env | Cambiar los valores en el entorno de Hadoop para todos los componentes de Hadoop. | Restarts the Hadoop HDFS services Namenode, SecondaryNamenode, Datanode, ZKFC, and Journalnode. Restarts the Hadoop YARN services ResourceManager, NodeManager, ProxyServer, and TimelineServer. Additionally restarts PhoenixQueryserver, HiveServer2, Hive MetaStore, and MapReduce-HistoryServer. | 
| hadoop-log4j | Cambiar los valores en el archivo log4j.properties de Hadoop. | Restarts the Hadoop HDFS services SecondaryNamenode, Datanode, and Journalnode. Restarts the Hadoop YARN services ResourceManager, NodeManager, ProxyServer, and TimelineServer. Additionally restarts Hadoop KMS, Hadoop Httpfs, and MapReduce-HistoryServer. | 
| hadoop-ssl-server | Cambiar la configuración del servidor ssl de Hadoop | Not available. | 
| hadoop-ssl-client | Cambiar la configuración del cliente ssl de Hadoop | Not available. | 
| hbase | Configuraciones seleccionadas por Amazon EMR para Apache. HBase | Custom EMR specific property. Sets emrfs-site and hbase-site configs. See those for their associated restarts. | 
| hbase-env | Cambie los valores en su entorno HBase. | Restarts the HBase services RegionServer, HBaseMaster, ThriftServer, RestServer. | 
| hbase-log4j2 | Cambie los valores en el archivo HBase hbase-log4j2.properties. | Restarts the HBase services RegionServer, HBaseMaster, ThriftServer, RestServer. | 
| hbase-metrics | Cambie los valores en el archivo hadoop-metrics2-hbase.properties. HBase | Restarts the HBase services RegionServer, HBaseMaster, ThriftServer, RestServer. | 
| hbase-policy | Cambie los valores en HBase el archivo hbase-policy.xml. | Not available. | 
| hbase-site | Cambie los valores en HBase el archivo hbase-site.xml. | Restarts the HBase services RegionServer, HBaseMaster, ThriftServer, RestServer. Additionally restarts Phoenix QueryServer. | 
| hdfs-encryption-zones | Configurar zonas de cifrado de HDFS. | This classification should not be reconfigured. | 
| hdfs-env | Cambiar los valores en el entorno de HDFS. | Restarts Hadoop HDFS services Namenode, Datanode, and ZKFC. | 
| hdfs-site | Cambiar los valores en hdfs-site.xml de HDFS. | Restarts the Hadoop HDFS services Namenode, SecondaryNamenode, Datanode, ZKFC, and Journalnode. Additionally restarts Hadoop Httpfs. | 
| hcatalog-env | Cambie los valores en HCatalog el entorno. | Restarts Hive HCatalog Server. | 
| hcatalog-server-jndi | Cambie los valores en HCatalog jndi.properties. | Restarts Hive HCatalog Server. | 
| hcatalog-server-proto-hive-site | Cambie los valores en .xml HCatalog. proto-hive-site | Restarts Hive HCatalog Server. | 
| hcatalog-webhcat-env | Cambie los valores en el entorno HCat de la HCatalog Web. | Restarts Hive WebHCat server. | 
| hcatalog-webhcat-log4j2 | Cambie los valores en las propiedades HCatalog HCat log4j2.properties de la Web. | Restarts Hive WebHCat server. | 
| hcatalog-webhcat-site | Cambie los valores del archivo webhcat-site.xml de la HCatalog WebHCat. | Restarts Hive WebHCat server. | 
| hive | Configuración de Amazon EMR mantenida para Apache Hive. | Sets configurations to launch Hive LLAP service. | 
| hive-beeline-log4j2 | Cambiar los valores en el archivo beeline-log4j2.properties de Hive. | Not available. | 
| hive-parquet-logging | Cambiar los valores en el archivo parquet-logging.properties de Hive. | Not available. | 
| hive-env | Cambiar los valores en el entorno de Hive. | Restarts HiveServer2, HiveMetastore, and Hive HCatalog-Server. Runs Hive schemaTool CLI commands to verify hive-metastore. | 
| hive-exec-log4j2 | Cambie los valores en el archivo hive-exec-log 4j2.properties de Hive. | Not available. | 
| hive-llap-daemon-log4j2 | Cambie los valores en el archivo 4j2.properties de Hive. llap-daemon-log | Not available. | 
| hive-log4j2 | Cambiar los valores en el archivo hive-log4j2.properties de Hive. | Not available. | 
| hive-site | Cambiar los valores en el archivo hive-site.xml de Hive. | Restarts HiveServer2, HiveMetastore, and Hive HCatalog-Server. Runs Hive schemaTool CLI commands to verify hive-metastore. Also restarts Oozie and Zeppelin. | 
| hiveserver2-site | Cambiar los valores en el archivo hiveserver2-site.xml de Hive Server2. | Not available. | 
| hue-ini | Cambiar los valores en el archivo ini de Hue | Restarts Hue. Also activates Hue config override CLI commands to pick up new configurations. | 
| httpfs-env | Cambiar los valores en el entorno de HTTPFS. | Restarts Hadoop Httpfs service. | 
| httpfs-site | Cambiar los valores en el archivo httpfs-site.xml de Hadoop. | Restarts Hadoop Httpfs service. | 
| hadoop-kms-acls | Cambiar los valores en el archivo kms-acls.xml de Hadoop. | Not available. | 
| hadoop-kms-env | Cambiar los valores en el entorno de Hadoop KMS. | Restarts Hadoop-KMS service. | 
| hadoop-kms-java-home | Cambie la página de inicio de Java de KMS de Hadoop | Not available. | 
| hadoop-kms-log4j | Cambiar los valores en el archivo kms-log4j.properties de Hadoop. | Not available. | 
| hadoop-kms-site | Cambiar los valores en el archivo kms-site.xml de Hadoop. | Restarts Hadoop-KMS and Ranger-KMS service. | 
| hudi-env | Cambiar los valores en el entorno de Hudi. | Not available. | 
| hudi-defaults | Cambie los valores en el archivo hudi-defaults.conf de Hudi. | Not available. | 
| iceberg-defaults | Cambie los valores del archivo iceberg-defaults.conf de Iceberg. | Not available. | 
| delta-defaults | Cambie los valores del archivo delta-defaults.conf de Delta. | Not available. | 
| jupyter-notebook-conf | Cambiar los valores en el archivo jupyter\$1notebook\$1config.py de Jupyter Notebook. | Not available. | 
| jupyter-hub-conf | Cambie los valores en JupyterHubs el archivo jupyterhub\$1config.py. | Not available. | 
| jupyter-s3-conf | Configurar la persistencia en S3 del bloc de notas de Jupyter. | Not available. | 
| jupyter-sparkmagic-conf | Cambiar los valores en el archivo config.json de Sparkmagic. | Not available. | 
| livy-conf | Cambiar los valores en el archivo livy.conf de Livy. | Restarts Livy Server. | 
| livy-env | Cambiar los valores en el entorno de Livy. | Restarts Livy Server. | 
| livy-log4j2 | Cambiar la configuración de log4j2.properties de Livy. | Restarts Livy Server. | 
| mapred-env | Cambie los valores en el entorno de la MapReduce aplicación. | Restarts Hadoop MapReduce-HistoryServer. | 
| mapred-site | Cambie los valores en el archivo mapred-site.xml de la MapReduce aplicación. | Restarts Hadoop MapReduce-HistoryServer. | 
| oozie-env | Cambiar los valores en el entorno de Oozie. | Restarts Oozie. | 
| oozie-log4j | Cambiar los valores en el archivo oozie-log4j.properties de Oozie. | Restarts Oozie. | 
| oozie-site | Cambiar los valores en el archivo oozie-site.xml de Oozie. | Restarts Oozie. | 
| phoenix-hbase-metrics | Cambiar los valores en el archivo hadoop-metrics2-hbase.properties de Phoenix. | Not available. | 
| phoenix-hbase-site | Cambiar los valores en el archivo hbase-site.xml de Phoenix. | Not available. | 
| phoenix-log4j2 | Cambiar los valores en el archivo log4j2.properties de Phoenix. | Restarts Phoenix-QueryServer. | 
| phoenix-metrics | Cambiar los valores en el archivo hadoop-metrics2-phoenix.properties de Phoenix. | Not available. | 
| pig-env | Cambiar los valores en el entorno de Pig. | Not available. | 
| pig-properties | Cambiar los valores en el archivo pig.properties de Pig. | Restarts Oozie. | 
| pig-log4j | Cambiar los valores en el archivo log4j.properties de Pig. | Not available. | 
| presto-log | Cambiar los valores en el archivo log.properties de Presto. | Restarts Presto-Server (for PrestoDB) | 
| presto-config | Cambiar los valores en el archivo config.properties de Presto. | Restarts Presto-Server (for PrestoDB) | 
| presto-password-authenticator | Cambiar los valores en el archivo password-authenticator.properties de Presto. | Not available. | 
| presto-env | Cambiar valores en el archivo presto-env.sh de Presto. | Restarts Presto-Server (for PrestoDB) | 
| presto-node | Cambiar valores en el archivo node.properties de Presto. | Not available. | 
| presto-connector-blackhole | Cambiar los valores en el archivo blackhole.properties de Presto. | Not available. | 
| presto-connector-cassandra | Cambiar los valores en el archivo cassandra.properties de Presto. | Not available. | 
| presto-connector-hive | Cambiar los valores en el archivo hive.properties de Presto. | Restarts Presto-Server (for PrestoDB) | 
| presto-connector-jmx | Cambiar los valores en el archivo jmx.properties de Presto. | Not available. | 
| presto-connector-kafka | Cambiar los valores en el archivo kafka.properties de Presto. | Not available. | 
| presto-connector-lakeformation | Cambiar los valores en el archivo lakeformation.properties de Presto. | Restarts Presto-Server (for PrestoDB) | 
| presto-connector-localfile | Cambiar los valores en el archivo localfile.properties de Presto. | Not available. | 
| presto-connector-memory | Cambiar los valores del archivo memory.properties de Presto. | Not available. | 
| presto-connector-mongodb | Cambiar los valores en el archivo mongodb.properties de Presto. | Not available. | 
| presto-connector-mysql | Cambiar los valores en el archivo mysql.properties de Presto. | Not available. | 
| presto-connector-postgresql | Cambiar los valores en el archivo postgresql.properties de Presto. | Not available. | 
| presto-connector-raptor | Cambiar los valores en el archivo raptor.properties de Presto. | Not available. | 
| presto-connector-redis | Cambiar los valores en el archivo redis.properties de Presto. | Not available. | 
| presto-connector-redshift | Cambiar los valores en el archivo redshift.properties de Presto. | Not available. | 
| presto-connector-tpch | Cambiar los valores en el archivo tpch.properties de Presto. | Not available. | 
| presto-connector-tpcds | Cambiar los valores del archivo tpcds.properties de Presto. | Not available. | 
| trino-log | Cambiar los valores en el archivo log.properties de Trino. | Restarts Trino-Server (for Trino) | 
| trino-config | Cambiar los valores en el archivo config.properties de Trino. | Restarts Trino-Server (for Trino) | 
| trino-password-authenticator | Cambiar los valores en el archivo password-authenticator.properties de Trino. | Restarts Trino-Server (for Trino) | 
| trino-env | Cambie los valores del archivo trino-env.sh de Trino. | Restarts Trino-Server (for Trino) | 
| trino-node | Cambiar los valores en el archivo node.properties de Trino. | Not available. | 
| trino-connector-blackhole | Cambiar los valores en el archivo blackhole.properties de Trino. | Not available. | 
| trino-connector-cassandra | Cambiar los valores en el archivo cassandra.properties de Trino. | Not available. | 
| trino-connector-delta | Cambie los valores del archivo delta.properties de Trino. | Restarts Trino-Server (for Trino) | 
| trino-connector-hive | Cambiar los valores en el archivo hive.properties de Trino. | Restarts Trino-Server (for Trino) | 
| trino-exchange-manager | Cambie los valores del archivo exchange-manager.properties de Trino. | Restarts Trino-Server (for Trino) | 
| trino-connector-iceberg | Cambiar los valores en el archivo iceberg.properties de Trino. | Restarts Trino-Server (for Trino) | 
| trino-connector-hudi | Cambiar los valores en el archivo hudi.properties de Trino. | Restarts Trino-Server (for Trino) | 
| trino-connector-jmx | Cambiar los valores en el archivo jmx.properties de Trino. | Not available. | 
| trino-connector-kafka | Cambiar los valores en el archivo kafka.properties de Trino. | Not available. | 
| trino-connector-localfile | Cambiar los valores en el archivo localfile.properties de Trino. | Not available. | 
| trino-connector-memory | Cambiar los valores en el archivo memory.properties de Trino. | Not available. | 
| trino-connector-mongodb | Cambiar los valores en el archivo mongodb.properties de Trino. | Not available. | 
| trino-connector-mysql | Cambiar los valores en el archivo mysql.properties de Trino. | Not available. | 
| trino-connector-postgresql | Cambiar los valores en el archivo postgresql.properties de Trino. | Not available. | 
| trino-connector-raptor | Cambiar los valores en el archivo raptor.properties de Trino. | Not available. | 
| trino-connector-redis | Cambiar los valores en el archivo redis.properties de Trino. | Not available. | 
| trino-connector-redshift | Cambiar los valores en el archivo redshift.properties de Trino. | Not available. | 
| trino-connector-tpch | Cambiar los valores en el archivo tpch.properties de Trino. | Not available. | 
| trino-connector-tpcds | Cambiar los valores en el archivo tpcds.properties de Trino. | Not available. | 
| ranger-kms-dbks-site | Cambie los valores del archivo dbks-site.xml de Ranger KMS. | Restarts Ranger KMS Server. | 
| ranger-kms-site | Cambie los valores en el ranger-kms-site archivo.xml de Ranger KMS. | Restarts Ranger KMS Server. | 
| ranger-kms-env | Cambie los valores del entorno Ranger KMS. | Restarts Ranger KMS Server. | 
| ranger-kms-logback | Cambie los valores del archivo kms-logback.xml de Ranger KMS. | Not available. | 
| ranger-kms-db-ca | Cambie los valores del archivo CA en S3 para la conexión SSL de MySQL con Ranger KMS. | Not available. | 
| spark | Configuración de Amazon EMR mantenida para Apache Spark. | This property modifies spark-defaults. See actions there. | 
| spark-defaults | Cambiar los valores en el archivo spark-defaults.conf de Spark. | Restarts Spark history server and Spark thrift server. | 
| spark-env | Cambiar los valores en el entorno de Spark. | Restarts Spark history server and Spark thrift server. | 
| spark-hive-site | Cambiar los valores en el archivo hive-site.xml de Spark. | Not available. | 
| spark-log4j2 | Cambiar los valores en el archivo log4j2.properties de Spark. | Restarts Spark history server and Spark thrift server. | 
| spark-metrics | Cambiar los valores en el archivo metrics.properties de Spark. | Restarts Spark history server and Spark thrift server. | 
| tez-site | Cambiar los valores en el archivo tez-site.xml de Tez. | Restart Oozie and HiveServer2. | 
| yarn-env | Cambiar los valores en el entorno de YARN. | Restarts the Hadoop YARN services ResourceManager, NodeManager, ProxyServer, and TimelineServer. Additionally restarts MapReduce-HistoryServer. | 
| yarn-site | Cambiar los valores en el archivo yarn-site.xml de YARN. | Restarts the Hadoop YARN services ResourceManager, NodeManager, ProxyServer, and TimelineServer. Additionally restarts Livy Server and MapReduce-HistoryServer. | 
| zeppelin-env | Cambiar los valores en el entorno de Zeppelin. | Restarts Zeppelin. | 
| zeppelin-site | Cambie los ajustes de configuración de zeppelin-site.xml. | Restarts Zeppelin. | 
| zookeeper-config | Cambie los valores en el ZooKeeper archivo zoo.cfg. | Restarts Zookeeper server. | 
| zookeeper-logback | Cambie los valores en ZooKeeper el archivo logback.xml. | Restarts Zookeeper server. | 
| cloudwatch-logs | Configure la integración de CloudWatch registros para los nodos del clúster de EMR. | Not available. | 
| emr-metrics | Cambie la configuración de la métrica EMR para este nodo. | Restarts the CloudWatchAgent service. | 

## 7.12.0 registro de cambios
<a name="7120-changelog"></a>


**Registro de cambios de la versión 7.12.0 y de las notas de la versión**  

| Date | Event | Description (Descripción) | 
| --- | --- | --- | 
| 21-11-2021 | Publicación de documentos | Las notas de la versión 7.12.0 de Amazon EMR se publicaron por primera vez | 

# Amazon EMR versión 7.11.0
<a name="emr-7110-release"></a>

## Ciclo de vida compatible con la versión 7.11.0
<a name="emr-7110-supported-lifecycle"></a>

En la siguiente tabla se describen las fechas de ciclo de vida admitidas para la versión 7.11.0 de Amazon EMR.


| Fase de soporte | Date | 
| --- | --- | 
| Fecha de lanzamiento inicial | 3 de noviembre de 2025 | 
| Soporte estándar hasta | 03 de noviembre de 2027 | 
| Fin del soporte | 04 de noviembre de 2027 | 
| Fin de vida útil | 03 de noviembre de 2028 | 

## Versiones de la aplicación 7.11.0
<a name="emr-7110-app-versions"></a>

Esta versión incluye las siguientes aplicaciones: [https://docs.aws.amazon.com/AmazonCloudWatch/latest/monitoring/Install-CloudWatch-Agent.html](https://docs.aws.amazon.com/AmazonCloudWatch/latest/monitoring/Install-CloudWatch-Agent.html), [https://delta.io/](https://delta.io/), [https://flink.apache.org/](https://flink.apache.org/), [http://hbase.apache.org/](http://hbase.apache.org/), [https://cwiki.apache.org/confluence/display/Hive/HCatalog](https://cwiki.apache.org/confluence/display/Hive/HCatalog), [http://hadoop.apache.org/docs/current/](http://hadoop.apache.org/docs/current/), [http://hive.apache.org/](http://hive.apache.org/), [https://hudi.apache.org](https://hudi.apache.org), [http://gethue.com/](http://gethue.com/), [https://iceberg.apache.org/](https://iceberg.apache.org/), [https://jupyter-enterprise-gateway.readthedocs.io/en/latest/](https://jupyter-enterprise-gateway.readthedocs.io/en/latest/), [https://jupyterhub.readthedocs.io/en/latest/#](https://jupyterhub.readthedocs.io/en/latest/#), [https://livy.incubator.apache.org/](https://livy.incubator.apache.org/), [http://oozie.apache.org/](http://oozie.apache.org/), [https://phoenix.apache.org/](https://phoenix.apache.org/), [http://pig.apache.org/](http://pig.apache.org/), [https://prestodb.io/](https://prestodb.io/), [https://spark.apache.org/docs/latest/](https://spark.apache.org/docs/latest/), [https://www.tensorflow.org/](https://www.tensorflow.org/), [https://tez.apache.org/](https://tez.apache.org/), [https://trino.io/](https://trino.io/), [https://zeppelin.incubator.apache.org/](https://zeppelin.incubator.apache.org/) y [https://zookeeper.apache.org](https://zookeeper.apache.org).

En la siguiente tabla se enumeran las versiones de la aplicación disponibles en esta versión de Amazon EMR y las versiones de la aplicación en las tres versiones anteriores de Amazon EMR (cuando corresponda).

Para ver un historial completo de las versiones de la aplicación disponibles para cada versión de Amazon EMR, consulte los temas siguientes:
+ [Versiones de las aplicaciones en las versiones 7.x de Amazon EMR](emr-release-app-versions-7.x.md)
+ [Versiones de la aplicación en las versiones 6.x de Amazon EMR](emr-release-app-versions-6.x.md)
+ [Versiones de la aplicación en las versiones 5.x de Amazon EMR](emr-release-app-versions-5.x.md)
+ [Versiones de la aplicación en las versiones 4.x de Amazon EMR](emr-release-app-versions-4.x.md)


**Información sobre la versión de la aplicación**  

|  | emr-7.11.0 | emr-7.10.0 | emr-7.9.0 | emr-7.8.0 | 
| --- | --- | --- | --- | --- | 
| AWS SDK for Java | 2.35.5, 1.12.792 | 2.31.48, 1.12.782 | 2.31.16, 1.12.782 | 2.29.52, 1.12.780 | 
| Python | 3.9, 3.11 | 3.9, 3.11 | 3.9, 3.11 | 3.9, 3.11 | 
| Scala | 2.12.18 | 2.12.18 | 2.12.18 | 2.12.18 | 
| AmazonCloudWatchAgent | 1.300032.2-amzn-0 | 1.300032.2-amzn-0 | 1.300032.2-amzn-0 | 1.300032.2-amzn-0 | 
| Delta | 3.3.2-amzn-0 | 3.3.0-amzn-2 | 3.3.0-amzn-1 | 3.3.0-amzn-0 | 
| Flink | 1.20.0-amzn-5 | 1.20.0-amzn-4 | 1.20.0-amzn-3 | 1.20.0-amzn-2 | 
| Ganglia |  -  |  -  |  -  |  -  | 
| HBase | 2.6.2-amzn-2 | 2.6.2-amzn-1 | 2.6.2-amzn-0 | 2.6.1-amzn-2 | 
| HCatalog | 3.1.3-amzn-20 | 3.1.3-amzn-19 | 3.1.3-amzn-18 | 3.1.3-amzn-17 | 
| Hadoop | 3.4.1-amzn-3 | 3.4.1-amzn-2 | 3.4.1-amzn-1 | 3.4.1-amzn-0 | 
| Hive | 3.1.3-amzn-20 | 3.1.3-amzn-19 | 3.1.3-amzn-18 | 3.1.3-amzn-17 | 
| Hudi | 1.0.2-amzn-0 | 0.15.0-amzn-7 | 0.15.0-amzn-6 | 0.15.0-amzn-5 | 
| Hue | 4.11.0 | 4.11.0 | 4.11.0 | 4.11.0 | 
| Iceberg | 1.9.1-amzn-0 | 1.8.1-amzn-0 | 1.7.1-amzn-2 | 1.7.1-amzn-1 | 
| JupyterEnterpriseGateway | 2.6.0 | 2.6.0 | 2.6.0 | 2.6.0 | 
| JupyterHub | 1.5.0 | 1.5.0 | 1.5.0 | 1.5.0 | 
| Livy | 0.8.0-incubating | 0.8.0-incubating | 0.8.0-incubating | 0.8.0-incubating | 
| MXNet |  -  |  -  |  -  |  -  | 
| Mahout |  -  |  -  |  -  |  -  | 
| Oozie | 5.2.1 | 5.2.1 | 5.2.1 | 5.2.1 | 
| Phoenix | 5.2.1 | 5.2.1 | 5.2.1 | 5.2.1 | 
| Pig | 0.17.0 | 0.17.0 | 0.17.0 | 0.17.0 | 
| Presto | 0.287-amzn-5 | 0.287-amzn-4 | 0.287-amzn-3 | 0.287-amzn-2 | 
| Spark | 3.5.6-amzn-0 | 3.5.5-amzn-1 | 3.5.5-amzn-0 | 3.5.4-amzn-0 | 
| Sqoop |  -  |  -  |  -  |  -  | 
| TensorFlow | 2.19.0 | 2.18.0 | 2.16.1 | 2.16.1 | 
| Tez | 0.10.2-amzn-18 | 0.10.2-amzn-17 | 0.10.2-amzn-16 | 0.10.2-amzn-15 | 
| Trino (PrestoSQL) | 475-amzn-0 | 470-amzn-0 | 467-amzn-2 | 467-amzn-1 | 
| Zeppelin | 0.11.1 | 0.11.1 | 0.11.1 | 0.11.1 | 
| ZooKeeper | 3.9.3-amzn-3 | 3.9.3-amzn-2 | 3.9.3-amzn-1 | 3.9.3-amzn-0 | 

# 7.11.0 Vulnerabilidades y exposiciones comunes
<a name="7110-common-vulnerabilities-exposures"></a>

La siguiente tabla muestra todo lo CVEs que no afecta a los clústeres de EMR que se ejecutan en las configuraciones recomendadas de Amazon EMR 7.11.0. Amazon EMR depende del código abierto original para la disponibilidad de las correcciones y proporcionará la última versión estable como parte de los componentes del motor principal en un plazo de 90 días a partir de su verificación por parte de Amazon EMR.

Esta tabla se actualizó el 18 de noviembre de 2025.


| ID de CVE | Gravedad | URL de detalles del CVE | 
| --- | --- | --- | 
|  CVE-2015-1832  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2015-1832](https://nvd.nist.gov/vuln/detail/CVE-2015-1832)  | 
|  CVE-2016-5018  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2016-5018)-2016-5018  | 
|  CVE-2017-15095  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2017-15095)-2017-15095  | 
|  CVE-2017-17485  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2017-17485](https://nvd.nist.gov/vuln/detail/CVE-2017-17485)  | 
|  CVE-2017-7525  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2017-7525)-2017-7525  | 
|  CVE-2018-11307  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2018-11307](https://nvd.nist.gov/vuln/detail/CVE-2018-11307)  | 
|  CVE-2018-11307  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2018-11307](https://nvd.nist.gov/vuln/detail/CVE-2018-11307)  | 
|  CVE-2018-14718  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-14718)-2018-14718  | 
|  CVE-2018-14718  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-14718)-2018-14718  | 
|  CVE-2018-14719  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-14719)-2018-14719  | 
|  CVE-2018-14719  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-14719)-2018-14719  | 
|  CVE-2018-14720  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-14720)-2018-14720  | 
|  CVE-2018-14720  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-14720)-2018-14720  | 
|  CVE-2018-14721  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-14721)-2018-14721  | 
|  CVE-2018-14721  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-14721)-2018-14721  | 
|  CVE-2018-19360  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2018-19360](https://nvd.nist.gov/vuln/detail/CVE-2018-19360)  | 
|  CVE-2018-19360  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2018-19360](https://nvd.nist.gov/vuln/detail/CVE-2018-19360)  | 
|  CVE-2018-19361  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2018-19361](https://nvd.nist.gov/vuln/detail/CVE-2018-19361)  | 
|  CVE-2018-19361  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2018-19361](https://nvd.nist.gov/vuln/detail/CVE-2018-19361)  | 
|  CVE-2018-19362  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2018-19362](https://nvd.nist.gov/vuln/detail/CVE-2018-19362)  | 
|  CVE-2018-19362  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2018-19362](https://nvd.nist.gov/vuln/detail/CVE-2018-19362)  | 
|  CVE-2018-7489  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2018-7489](https://nvd.nist.gov/vuln/detail/CVE-2018-7489)  | 
|  CVE-2018-7489  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2018-7489](https://nvd.nist.gov/vuln/detail/CVE-2018-7489)  | 
|  CVE-2019-10202  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2019-10202](https://nvd.nist.gov/vuln/detail/CVE-2019-10202)  | 
|  CVE-2019-14379  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2019-14379](https://nvd.nist.gov/vuln/detail/CVE-2019-14379)  | 
|  CVE-2019-14379  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2019-14379](https://nvd.nist.gov/vuln/detail/CVE-2019-14379)  | 
|  CVE-2019-14540  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-14540)-2019-14540  | 
|  CVE-2019-14540  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-14540)-2019-14540  | 
|  CVE-2019-14892  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-14892)-2019-14892  | 
|  CVE-2019-14892  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-14892)-2019-14892  | 
|  CVE-2019-14893  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-14893)-2019-14893  | 
|  CVE-2019-14893  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-14893)-2019-14893  | 
|  CVE-2019-16335  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2019-16335](https://nvd.nist.gov/vuln/detail/CVE-2019-16335)  | 
|  CVE-2019-16335  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2019-16335](https://nvd.nist.gov/vuln/detail/CVE-2019-16335)  | 
|  CVE-2019-16942  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-16942)-2019-16942  | 
|  CVE-2019-16942  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-16942)-2019-16942  | 
|  CVE-2019-16943  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-16943)-2019-16943  | 
|  CVE-2019-16943  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-16943)-2019-16943  | 
|  CVE-2019-17267  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2019-17267](https://nvd.nist.gov/vuln/detail/CVE-2019-17267)  | 
|  CVE-2019-17267  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2019-17267](https://nvd.nist.gov/vuln/detail/CVE-2019-17267)  | 
|  CVE-2019-17531  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-17531)-2019-17531  | 
|  CVE-2019-17531  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-17531)-2019-17531  | 
|  CVE-2019-20330  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2019-20330](https://nvd.nist.gov/vuln/detail/CVE-2019-20330)  | 
|  CVE-2019-20330  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2019-20330](https://nvd.nist.gov/vuln/detail/CVE-2019-20330)  | 
|  CVE-2020-8840  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-8840](https://nvd.nist.gov/vuln/detail/CVE-2020-8840)  | 
|  CVE-2020-8840  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-8840](https://nvd.nist.gov/vuln/detail/CVE-2020-8840)  | 
|  CVE-2020-9546  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-9546](https://nvd.nist.gov/vuln/detail/CVE-2020-9546)  | 
|  CVE-2020-9546  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-9546](https://nvd.nist.gov/vuln/detail/CVE-2020-9546)  | 
|  CVE-2020-9547  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-9547](https://nvd.nist.gov/vuln/detail/CVE-2020-9547)  | 
|  CVE-2020-9547  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-9547](https://nvd.nist.gov/vuln/detail/CVE-2020-9547)  | 
|  CVE-2020-9548  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-9548](https://nvd.nist.gov/vuln/detail/CVE-2020-9548)  | 
|  CVE-2020-9548  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-9548](https://nvd.nist.gov/vuln/detail/CVE-2020-9548)  | 
|  CVE-2022-1471  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2022-1471](https://nvd.nist.gov/vuln/detail/CVE-2022-1471)  | 
|  CVE-2022-1471  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2022-1471](https://nvd.nist.gov/vuln/detail/CVE-2022-1471)  | 
|  CVE-2022-37865  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-202237865](https://nvd.nist.gov/vuln/detail/CVE-2022-37865)  | 
|  CVE-2022-39135  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-202239135](https://nvd.nist.gov/vuln/detail/CVE-2022-39135)  | 
|  CVE-2022-46337  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-202246337](https://nvd.nist.gov/vuln/detail/CVE-2022-46337)  | 
|  CVE-2022-46337  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-202246337](https://nvd.nist.gov/vuln/detail/CVE-2022-46337)  | 
|  CVE-2024-51504  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-51504](https://nvd.nist.gov/vuln/detail/CVE-2024-51504)  | 
|  CVE-2024-51504  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-51504](https://nvd.nist.gov/vuln/detail/CVE-2024-51504)  | 
|  CVE-2024-52046  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-52046](https://nvd.nist.gov/vuln/detail/CVE-2024-52046)  | 
|  CVE-2024-52046  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-52046](https://nvd.nist.gov/vuln/detail/CVE-2024-52046)  | 
|  CVE-2024-53990  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-53990](https://nvd.nist.gov/vuln/detail/CVE-2024-53990)  | 
|  CVE-2025-30065  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2025-30065](https://nvd.nist.gov/vuln/detail/CVE-2025-30065)  | 
|  CVE-2014-3643  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2014-3643](https://nvd.nist.gov/vuln/detail/CVE-2014-3643)  | 
|  CVE-2015-5237  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2015-5237)-2015-5237  | 
|  CVE-2015-5237  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2015-5237)-2015-5237  | 
|  CVE-2016-6796  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2016-6796)-2016-6796  | 
|  CVE-2018-1000180  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2018-1000180](https://nvd.nist.gov/vuln/detail/CVE-2018-1000180)  | 
|  CVE-2018-1000180  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2018-1000180](https://nvd.nist.gov/vuln/detail/CVE-2018-1000180)  | 
|  CVE-2018-12022  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2018-12022](https://nvd.nist.gov/vuln/detail/CVE-2018-12022)  | 
|  CVE-2018-12022  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2018-12022](https://nvd.nist.gov/vuln/detail/CVE-2018-12022)  | 
|  CVE-2018-12023  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2018-12023](https://nvd.nist.gov/vuln/detail/CVE-2018-12023)  | 
|  CVE-2018-12023  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2018-12023](https://nvd.nist.gov/vuln/detail/CVE-2018-12023)  | 
|  CVE-2018-5968  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-5968)-2018-5968  | 
|  CVE-2019-0205  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2019-0205](https://nvd.nist.gov/vuln/detail/CVE-2019-0205)  | 
|  CVE-2019-0205  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2019-0205](https://nvd.nist.gov/vuln/detail/CVE-2019-0205)  | 
|  CVE-2019-10172  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2019-10172](https://nvd.nist.gov/vuln/detail/CVE-2019-10172)  | 
|  CVE-2019-12086  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-12086)-2019-12086  | 
|  CVE-2019-12086  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-12086)-2019-12086  | 
|  CVE-2019-14439  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-14439)-2019-14439  | 
|  CVE-2019-14439  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-14439)-2019-14439  | 
|  CVE-2020-10650  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-10650](https://nvd.nist.gov/vuln/detail/CVE-2020-10650)  | 
|  CVE-2020-10650  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-10650](https://nvd.nist.gov/vuln/detail/CVE-2020-10650)  | 
|  CVE-2020-10672  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-10672](https://nvd.nist.gov/vuln/detail/CVE-2020-10672)  | 
|  CVE-2020-10672  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-10672](https://nvd.nist.gov/vuln/detail/CVE-2020-10672)  | 
|  CVE-2020-10673  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-10673](https://nvd.nist.gov/vuln/detail/CVE-2020-10673)  | 
|  CVE-2020-10673  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-10673](https://nvd.nist.gov/vuln/detail/CVE-2020-10673)  | 
|  CVE-2020-10968  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-10968)-2020-10968  | 
|  CVE-2020-10968  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-10968)-2020-10968  | 
|  CVE-2020-10969  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-10969)-2020-10969  | 
|  CVE-2020-10969  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-10969)-2020-10969  | 
|  CVE-2020-11111  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-11111](https://nvd.nist.gov/vuln/detail/CVE-2020-11111)  | 
|  CVE-2020-11111  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-11111](https://nvd.nist.gov/vuln/detail/CVE-2020-11111)  | 
|  CVE-2020-11112  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-11112](https://nvd.nist.gov/vuln/detail/CVE-2020-11112)  | 
|  CVE-2020-11112  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-11112](https://nvd.nist.gov/vuln/detail/CVE-2020-11112)  | 
|  CVE-2020-11113  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-11113](https://nvd.nist.gov/vuln/detail/CVE-2020-11113)  | 
|  CVE-2020-11113  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-11113](https://nvd.nist.gov/vuln/detail/CVE-2020-11113)  | 
|  CVE-2020-11619  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-11619)-2020-11619  | 
|  CVE-2020-11619  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-11619)-2020-11619  | 
|  CVE-2020-11620  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-11620](https://nvd.nist.gov/vuln/detail/CVE-2020-11620)  | 
|  CVE-2020-11620  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-11620](https://nvd.nist.gov/vuln/detail/CVE-2020-11620)  | 
|  CVE-2020-13949  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-13949)-2020-13949  | 
|  CVE-2020-13949  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-13949)-2020-13949  | 
|  CVE-2020-13949  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-13949)-2020-13949  | 
|  CVE-2020-14060  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-14060)-2020-14060  | 
|  CVE-2020-14060  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-14060)-2020-14060  | 
|  CVE-2020-14061  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-14061)-2020-14061  | 
|  CVE-2020-14061  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-14061)-2020-14061  | 
|  CVE-2020-14062  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-14062)-2020-14062  | 
|  CVE-2020-14062  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-14062)-2020-14062  | 
|  CVE-2020-14195  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-14195](https://nvd.nist.gov/vuln/detail/CVE-2020-14195)  | 
|  CVE-2020-14195  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-14195](https://nvd.nist.gov/vuln/detail/CVE-2020-14195)  | 
|  CVE-2020-24616  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-24616](https://nvd.nist.gov/vuln/detail/CVE-2020-24616)  | 
|  CVE-2020-24616  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-24616](https://nvd.nist.gov/vuln/detail/CVE-2020-24616)  | 
|  CVE-2020-24750  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-24750](https://nvd.nist.gov/vuln/detail/CVE-2020-24750)  | 
|  CVE-2020-24750  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-24750](https://nvd.nist.gov/vuln/detail/CVE-2020-24750)  | 
|  CVE-2020-25649  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-25649](https://nvd.nist.gov/vuln/detail/CVE-2020-25649)  | 
|  CVE-2020-28052  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-28052](https://nvd.nist.gov/vuln/detail/CVE-2020-28052)  | 
|  CVE-2020-35490  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-35490](https://nvd.nist.gov/vuln/detail/CVE-2020-35490)  | 
|  CVE-2020-35490  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-35490](https://nvd.nist.gov/vuln/detail/CVE-2020-35490)  | 
|  CVE-2020-35491  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-35491](https://nvd.nist.gov/vuln/detail/CVE-2020-35491)  | 
|  CVE-2020-35491  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-35491](https://nvd.nist.gov/vuln/detail/CVE-2020-35491)  | 
|  CVE-2020-35728  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-35728](https://nvd.nist.gov/vuln/detail/CVE-2020-35728)  | 
|  CVE-2020-35728  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-35728](https://nvd.nist.gov/vuln/detail/CVE-2020-35728)  | 
|  CVE-2020-36179  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36179](https://nvd.nist.gov/vuln/detail/CVE-2020-36179)  | 
|  CVE-2020-36179  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36179](https://nvd.nist.gov/vuln/detail/CVE-2020-36179)  | 
|  CVE-2020-36180  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36180](https://nvd.nist.gov/vuln/detail/CVE-2020-36180)  | 
|  CVE-2020-36180  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36180](https://nvd.nist.gov/vuln/detail/CVE-2020-36180)  | 
|  CVE-2020-36181  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36181](https://nvd.nist.gov/vuln/detail/CVE-2020-36181)  | 
|  CVE-2020-36181  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36181](https://nvd.nist.gov/vuln/detail/CVE-2020-36181)  | 
|  CVE-2020-36182  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36182](https://nvd.nist.gov/vuln/detail/CVE-2020-36182)  | 
|  CVE-2020-36182  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36182](https://nvd.nist.gov/vuln/detail/CVE-2020-36182)  | 
|  CVE-2020-36183  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36183](https://nvd.nist.gov/vuln/detail/CVE-2020-36183)  | 
|  CVE-2020-36183  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36183](https://nvd.nist.gov/vuln/detail/CVE-2020-36183)  | 
|  CVE-2020-36184  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36184](https://nvd.nist.gov/vuln/detail/CVE-2020-36184)  | 
|  CVE-2020-36184  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36184](https://nvd.nist.gov/vuln/detail/CVE-2020-36184)  | 
|  CVE-2020-36185  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36185](https://nvd.nist.gov/vuln/detail/CVE-2020-36185)  | 
|  CVE-2020-36185  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36185](https://nvd.nist.gov/vuln/detail/CVE-2020-36185)  | 
|  CVE-2020-36186  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36186](https://nvd.nist.gov/vuln/detail/CVE-2020-36186)  | 
|  CVE-2020-36186  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36186](https://nvd.nist.gov/vuln/detail/CVE-2020-36186)  | 
|  CVE-2020-36187  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36187](https://nvd.nist.gov/vuln/detail/CVE-2020-36187)  | 
|  CVE-2020-36187  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36187](https://nvd.nist.gov/vuln/detail/CVE-2020-36187)  | 
|  CVE-2020-36188  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36188](https://nvd.nist.gov/vuln/detail/CVE-2020-36188)  | 
|  CVE-2020-36188  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36188](https://nvd.nist.gov/vuln/detail/CVE-2020-36188)  | 
|  CVE-2020-36189  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36189](https://nvd.nist.gov/vuln/detail/CVE-2020-36189)  | 
|  CVE-2020-36189  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36189](https://nvd.nist.gov/vuln/detail/CVE-2020-36189)  | 
|  CVE-2020-36518  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36518](https://nvd.nist.gov/vuln/detail/CVE-2020-36518)  | 
|  CVE-2020-36518  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36518](https://nvd.nist.gov/vuln/detail/CVE-2020-36518)  | 
|  CVE-2021-0341  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2021-0341](https://nvd.nist.gov/vuln/detail/CVE-2021-0341)  | 
|  CVE-2021-20190  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2021-20190](https://nvd.nist.gov/vuln/detail/CVE-2021-20190)  | 
|  CVE-2021-20190  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2021-20190](https://nvd.nist.gov/vuln/detail/CVE-2021-20190)  | 
|  CVE-2021-31684  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2021-31684](https://nvd.nist.gov/vuln/detail/CVE-2021-31684)  | 
|  CVE-2021-34538  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2021-34538](https://nvd.nist.gov/vuln/detail/CVE-2021-34538)  | 
|  CVE-2021-34538  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2021-34538](https://nvd.nist.gov/vuln/detail/CVE-2021-34538)  | 
|  CVE-2021-34538  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2021-34538](https://nvd.nist.gov/vuln/detail/CVE-2021-34538)  | 
|  CVE-2022-25647  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-202225647](https://nvd.nist.gov/vuln/detail/CVE-2022-25647)  | 
|  CVE-2022-25647  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-202225647](https://nvd.nist.gov/vuln/detail/CVE-2022-25647)  | 
|  CVE-2022-25857  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-202225857](https://nvd.nist.gov/vuln/detail/CVE-2022-25857)  | 
|  CVE-2022-3171  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2022-3171](https://nvd.nist.gov/vuln/detail/CVE-2022-3171)  | 
|  CVE-2022-3171  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2022-3171](https://nvd.nist.gov/vuln/detail/CVE-2022-3171)  | 
|  CVE-2022-3509  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2022-3509](https://nvd.nist.gov/vuln/detail/CVE-2022-3509)  | 
|  CVE-2022-3509  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2022-3509](https://nvd.nist.gov/vuln/detail/CVE-2022-3509)  | 
|  CVE-2022-3510  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-20223510](https://nvd.nist.gov/vuln/detail/CVE-2022-3510)  | 
|  CVE-2022-36364  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-202236364](https://nvd.nist.gov/vuln/detail/CVE-2022-36364)  | 
|  CVE-2022-37866  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-202237866](https://nvd.nist.gov/vuln/detail/CVE-2022-37866)  | 
|  CVE-2022-40149  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-202240149](https://nvd.nist.gov/vuln/detail/CVE-2022-40149)  | 
|  CVE-2022-40149  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-202240149](https://nvd.nist.gov/vuln/detail/CVE-2022-40149)  | 
|  CVE-2022-40150  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-202240150](https://nvd.nist.gov/vuln/detail/CVE-2022-40150)  | 
|  CVE-2022-40150  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-202240150](https://nvd.nist.gov/vuln/detail/CVE-2022-40150)  | 
|  CVE-2022-41404  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-41404)-2022-41404  | 
|  CVE-2022-42003  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2022-42003](https://nvd.nist.gov/vuln/detail/CVE-2022-42003)  | 
|  CVE-2022-42003  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2022-42003](https://nvd.nist.gov/vuln/detail/CVE-2022-42003)  | 
|  CVE-2022-42003  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2022-42003](https://nvd.nist.gov/vuln/detail/CVE-2022-42003)  | 
|  CVE-2022-42003  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2022-42003](https://nvd.nist.gov/vuln/detail/CVE-2022-42003)  | 
|  CVE-2022-42003  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2022-42003](https://nvd.nist.gov/vuln/detail/CVE-2022-42003)  | 
|  CVE-2022-42004  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2022-42004](https://nvd.nist.gov/vuln/detail/CVE-2022-42004)  | 
|  CVE-2022-42004  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2022-42004](https://nvd.nist.gov/vuln/detail/CVE-2022-42004)  | 
|  CVE-2022-42004  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2022-42004](https://nvd.nist.gov/vuln/detail/CVE-2022-42004)  | 
|  CVE-2022-42004  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2022-42004](https://nvd.nist.gov/vuln/detail/CVE-2022-42004)  | 
|  CVE-2022-45685  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-202245685](https://nvd.nist.gov/vuln/detail/CVE-2022-45685)  | 
|  CVE-2022-45685  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-202245685](https://nvd.nist.gov/vuln/detail/CVE-2022-45685)  | 
|  CVE-2022-45693  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-202245693](https://nvd.nist.gov/vuln/detail/CVE-2022-45693)  | 
|  CVE-2022-45693  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-202245693](https://nvd.nist.gov/vuln/detail/CVE-2022-45693)  | 
|  CVE-2022-46751  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-202246751](https://nvd.nist.gov/vuln/detail/CVE-2022-46751)  | 
|  CVE-2022-46751  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-202246751](https://nvd.nist.gov/vuln/detail/CVE-2022-46751)  | 
|  CVE-2023-1370  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-1370](https://nvd.nist.gov/vuln/detail/CVE-2023-1370)  | 
|  CVE-2023-1436  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-1436](https://nvd.nist.gov/vuln/detail/CVE-2023-1436)  | 
|  CVE-2023-1436  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-1436](https://nvd.nist.gov/vuln/detail/CVE-2023-1436)  | 
|  CVE-2023-2976  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-2976](https://nvd.nist.gov/vuln/detail/CVE-2023-2976)  | 
|  CVE-2023-2976  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-2976](https://nvd.nist.gov/vuln/detail/CVE-2023-2976)  | 
|  CVE-2023-2976  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-2976](https://nvd.nist.gov/vuln/detail/CVE-2023-2976)  | 
|  CVE-2023-2976  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-2976](https://nvd.nist.gov/vuln/detail/CVE-2023-2976)  | 
|  CVE-2023-2976  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-2976](https://nvd.nist.gov/vuln/detail/CVE-2023-2976)  | 
|  CVE-2023-2976  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-2976](https://nvd.nist.gov/vuln/detail/CVE-2023-2976)  | 
|  CVE-2023-2976  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-2976](https://nvd.nist.gov/vuln/detail/CVE-2023-2976)  | 
|  CVE-2023-2976  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-2976](https://nvd.nist.gov/vuln/detail/CVE-2023-2976)  | 
|  CVE-2023-2976  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-2976](https://nvd.nist.gov/vuln/detail/CVE-2023-2976)  | 
|  CVE-2023-6378  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-6378](https://nvd.nist.gov/vuln/detail/CVE-2023-6378)  | 
|  CVE-2023-6378  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-6378](https://nvd.nist.gov/vuln/detail/CVE-2023-6378)  | 
|  CVE-2023-6481  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-6481](https://nvd.nist.gov/vuln/detail/CVE-2023-6481)  | 
|  CVE-2023-6481  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-6481](https://nvd.nist.gov/vuln/detail/CVE-2023-6481)  | 
|  CVE-2024-13009  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-13009](https://nvd.nist.gov/vuln/detail/CVE-2024-13009)  | 
|  CVE-2024-13009  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-13009](https://nvd.nist.gov/vuln/detail/CVE-2024-13009)  | 
|  CVE-2024-29857  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-29857](https://nvd.nist.gov/vuln/detail/CVE-2024-29857)  | 
|  CVE-2024-29857  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-29857](https://nvd.nist.gov/vuln/detail/CVE-2024-29857)  | 
|  CVE-2024-29857  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-29857](https://nvd.nist.gov/vuln/detail/CVE-2024-29857)  | 
|  CVE-2024-29857  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-29857](https://nvd.nist.gov/vuln/detail/CVE-2024-29857)  | 
|  CVE-2024-30172  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-30172](https://nvd.nist.gov/vuln/detail/CVE-2024-30172)  | 
|  CVE-2024-30172  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-30172](https://nvd.nist.gov/vuln/detail/CVE-2024-30172)  | 
|  CVE-2024-34447  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-34447](https://nvd.nist.gov/vuln/detail/CVE-2024-34447)  | 
|  CVE-2024-34447  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-34447](https://nvd.nist.gov/vuln/detail/CVE-2024-34447)  | 
|  CVE-2024-36114  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-36114](https://nvd.nist.gov/vuln/detail/CVE-2024-36114)  | 
|  CVE-2024-7254  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-7254](https://nvd.nist.gov/vuln/detail/CVE-2024-7254)  | 
|  CVE-2024-7254  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-7254](https://nvd.nist.gov/vuln/detail/CVE-2024-7254)  | 
|  CVE-2024-7254  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-7254](https://nvd.nist.gov/vuln/detail/CVE-2024-7254)  | 
|  CVE-2024-7254  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-7254](https://nvd.nist.gov/vuln/detail/CVE-2024-7254)  | 
|  CVE-2024-7254  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-7254](https://nvd.nist.gov/vuln/detail/CVE-2024-7254)  | 
|  CVE-2024-7254  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-7254](https://nvd.nist.gov/vuln/detail/CVE-2024-7254)  | 
|  CVE-2024-7254  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-7254](https://nvd.nist.gov/vuln/detail/CVE-2024-7254)  | 
|  CVE-2024-9823  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-9823](https://nvd.nist.gov/vuln/detail/CVE-2024-9823)  | 
|  CVE-2025-24970  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2025-24970](https://nvd.nist.gov/vuln/detail/CVE-2025-24970)  | 
|  CVE-2025-24970  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2025-24970](https://nvd.nist.gov/vuln/detail/CVE-2025-24970)  | 
|  CVE-2025-27553  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2025-27553](https://nvd.nist.gov/vuln/detail/CVE-2025-27553)  | 
|  CVE-2025-27817  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2025-27817](https://nvd.nist.gov/vuln/detail/CVE-2025-27817)  | 
|  CVE-2025-46762  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2025-46762](https://nvd.nist.gov/vuln/detail/CVE-2025-46762)  | 
|  CVE-2025-46762  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2025-46762](https://nvd.nist.gov/vuln/detail/CVE-2025-46762)  | 
|  CVE-2025-48734  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2025-48734](https://nvd.nist.gov/vuln/detail/CVE-2025-48734)  | 
|  CVE-2025-52434  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2025-52434](https://nvd.nist.gov/vuln/detail/CVE-2025-52434)  | 
|  CVE-2025-52999  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2025-52999](https://nvd.nist.gov/vuln/detail/CVE-2025-52999)  | 
|  CVE-2025-52999  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2025-52999](https://nvd.nist.gov/vuln/detail/CVE-2025-52999)  | 
|  CVE-2025-52999  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2025-52999](https://nvd.nist.gov/vuln/detail/CVE-2025-52999)  | 
|  CVE-2025-52999  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2025-52999](https://nvd.nist.gov/vuln/detail/CVE-2025-52999)  | 
|  CVE-2025-52999  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2025-52999](https://nvd.nist.gov/vuln/detail/CVE-2025-52999)  | 
|  CVE-2025-52999  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2025-52999](https://nvd.nist.gov/vuln/detail/CVE-2025-52999)  | 
|  CVE-2025-55163  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2025-55163](https://nvd.nist.gov/vuln/detail/CVE-2025-55163)  | 
|  CVE-2025-55163  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2025-55163](https://nvd.nist.gov/vuln/detail/CVE-2025-55163)  | 
|  CVE-2025-55163  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2025-55163](https://nvd.nist.gov/vuln/detail/CVE-2025-55163)  | 
|  CVE-2025-58056  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2025-58056](https://nvd.nist.gov/vuln/detail/CVE-2025-58056)  | 
|  CVE-2025-58056  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2025-58056](https://nvd.nist.gov/vuln/detail/CVE-2025-58056)  | 
|  CVE-2025-58056  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2025-58056](https://nvd.nist.gov/vuln/detail/CVE-2025-58056)  | 
|  CVE-2025-58056  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2025-58056](https://nvd.nist.gov/vuln/detail/CVE-2025-58056)  | 
|  CVE-2025-58057  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2025-58057](https://nvd.nist.gov/vuln/detail/CVE-2025-58057)  | 
|  CVE-2025-58057  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2025-58057](https://nvd.nist.gov/vuln/detail/CVE-2025-58057)  | 
|  CVE-2025-58057  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2025-58057](https://nvd.nist.gov/vuln/detail/CVE-2025-58057)  | 
|  CVE-2025-58057  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2025-58057](https://nvd.nist.gov/vuln/detail/CVE-2025-58057)  | 
|  CVE-2025-58057  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2025-58057](https://nvd.nist.gov/vuln/detail/CVE-2025-58057)  | 
|  CVE-2025-59250  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2025-59250](https://nvd.nist.gov/vuln/detail/CVE-2025-59250)  | 
|  CVE-2012-5783  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2012-5783](https://nvd.nist.gov/vuln/detail/CVE-2012-5783)  | 
|  CVE-2012-5783  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2012-5783](https://nvd.nist.gov/vuln/detail/CVE-2012-5783)  | 
|  CVE-2012-6153  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2012-6153](https://nvd.nist.gov/vuln/detail/CVE-2012-6153)  | 
|  CVE-2012-6153  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2012-6153](https://nvd.nist.gov/vuln/detail/CVE-2012-6153)  | 
|  CVE-2018-10237  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2018-10237](https://nvd.nist.gov/vuln/detail/CVE-2018-10237)  | 
|  CVE-2018-10237  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2018-10237](https://nvd.nist.gov/vuln/detail/CVE-2018-10237)  | 
|  CVE-2018-10237  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2018-10237](https://nvd.nist.gov/vuln/detail/CVE-2018-10237)  | 
|  CVE-2018-10237  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2018-10237](https://nvd.nist.gov/vuln/detail/CVE-2018-10237)  | 
|  CVE-2018-10237  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2018-10237](https://nvd.nist.gov/vuln/detail/CVE-2018-10237)  | 
|  CVE-2018-11798  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2018-11798](https://nvd.nist.gov/vuln/detail/CVE-2018-11798)  | 
|  CVE-2018-1313  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2018-1313](https://nvd.nist.gov/vuln/detail/CVE-2018-1313)  | 
|  CVE-2019-12384  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-12384)-2019-12384  | 
|  CVE-2019-12384  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-12384)-2019-12384  | 
|  CVE-2019-12814  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-12814)-2019-12814  | 
|  CVE-2019-12814  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-12814)-2019-12814  | 
|  CVE-2020-13955  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-13955)-2020-13955  | 
|  CVE-2020-13956  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-13956)-2020-13956  | 
|  CVE-2020-15250  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-15250](https://nvd.nist.gov/vuln/detail/CVE-2020-15250)  | 
|  CVE-2020-15250  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-15250](https://nvd.nist.gov/vuln/detail/CVE-2020-15250)  | 
|  CVE-2020-15522  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-15522)-2020-15522  | 
|  CVE-2020-15522  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-15522)-2020-15522  | 
|  CVE-2020-15522  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-15522)-2020-15522  | 
|  CVE-2020-17521  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-17521)-2020-17521  | 
|  CVE-2020-17521  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-17521)-2020-17521  | 
|  CVE-2020-1945  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-1945](https://nvd.nist.gov/vuln/detail/CVE-2020-1945)  | 
|  CVE-2020-26939  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-26939](https://nvd.nist.gov/vuln/detail/CVE-2020-26939)  | 
|  CVE-2020-26939  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-26939](https://nvd.nist.gov/vuln/detail/CVE-2020-26939)  | 
|  CVE-2020-26939  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-26939](https://nvd.nist.gov/vuln/detail/CVE-2020-26939)  | 
|  CVE-2021-22569  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2021-22569](https://nvd.nist.gov/vuln/detail/CVE-2021-22569)  | 
|  CVE-2021-22569  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2021-22569](https://nvd.nist.gov/vuln/detail/CVE-2021-22569)  | 
|  CVE-2021-27568  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2021-27568](https://nvd.nist.gov/vuln/detail/CVE-2021-27568)  | 
|  CVE-2021-28170  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2021-28170](https://nvd.nist.gov/vuln/detail/CVE-2021-28170)  | 
|  CVE-2021-29425  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2021-29425](https://nvd.nist.gov/vuln/detail/CVE-2021-29425)  | 
|  CVE-2021-36373  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2021-36373](https://nvd.nist.gov/vuln/detail/CVE-2021-36373)  | 
|  CVE-2021-36374  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2021-36374](https://nvd.nist.gov/vuln/detail/CVE-2021-36374)  | 
|  CVE-202238749  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-202238749](https://nvd.nist.gov/vuln/detail/CVE-2022-38749)  | 
|  CVE-202238750  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-202238750](https://nvd.nist.gov/vuln/detail/CVE-2022-38750)  | 
|  CVE-202238751  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-202238751](https://nvd.nist.gov/vuln/detail/CVE-2022-38751)  | 
|  CVE-202238752  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-202238752](https://nvd.nist.gov/vuln/detail/CVE-2022-38752)  | 
|  CVE-2022-41854  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-41854)-2022-41854  | 
|  CVE-2023-0833  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-0833](https://nvd.nist.gov/vuln/detail/CVE-2023-0833)  | 
|  CVE-2023-33201  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-33201](https://nvd.nist.gov/vuln/detail/CVE-2023-33201)  | 
|  CVE-2023-33201  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-33201](https://nvd.nist.gov/vuln/detail/CVE-2023-33201)  | 
|  CVE-2023-33201  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-33201](https://nvd.nist.gov/vuln/detail/CVE-2023-33201)  | 
|  CVE-2023-33201  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-33201](https://nvd.nist.gov/vuln/detail/CVE-2023-33201)  | 
|  CVE-2023-33202  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-33202](https://nvd.nist.gov/vuln/detail/CVE-2023-33202)  | 
|  CVE-2023-33202  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-33202](https://nvd.nist.gov/vuln/detail/CVE-2023-33202)  | 
|  CVE-2023-33202  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-33202](https://nvd.nist.gov/vuln/detail/CVE-2023-33202)  | 
|  CVE-2023-33202  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-33202](https://nvd.nist.gov/vuln/detail/CVE-2023-33202)  | 
|  CVE-2023-42503  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-42503](https://nvd.nist.gov/vuln/detail/CVE-2023-42503)  | 
|  CVE-2023-51074  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-51074](https://nvd.nist.gov/vuln/detail/CVE-2023-51074)  | 
|  CVE-2024-12798  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-12798](https://nvd.nist.gov/vuln/detail/CVE-2024-12798)  | 
|  CVE-2024-12798  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-12798](https://nvd.nist.gov/vuln/detail/CVE-2024-12798)  | 
|  CVE-2024-12798  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-12798](https://nvd.nist.gov/vuln/detail/CVE-2024-12798)  | 
|  CVE-2024-12798  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-12798](https://nvd.nist.gov/vuln/detail/CVE-2024-12798)  | 
|  CVE-2024-12798  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-12798](https://nvd.nist.gov/vuln/detail/CVE-2024-12798)  | 
|  CVE-2024-12798  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-12798](https://nvd.nist.gov/vuln/detail/CVE-2024-12798)  | 
|  CVE-2024-23944  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-23944](https://nvd.nist.gov/vuln/detail/CVE-2024-23944)  | 
|  CVE-2024-23945  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-23945](https://nvd.nist.gov/vuln/detail/CVE-2024-23945)  | 
|  CVE-2024-23945  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-23945](https://nvd.nist.gov/vuln/detail/CVE-2024-23945)  | 
|  CVE-2024-23953  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-23953](https://nvd.nist.gov/vuln/detail/CVE-2024-23953)  | 
|  CVE-2024-23953  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-23953](https://nvd.nist.gov/vuln/detail/CVE-2024-23953)  | 
|  CVE-2024-25710  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-25710](https://nvd.nist.gov/vuln/detail/CVE-2024-25710)  | 
|  CVE-2024-25710  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-25710](https://nvd.nist.gov/vuln/detail/CVE-2024-25710)  | 
|  CVE-2024-26308  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-26308](https://nvd.nist.gov/vuln/detail/CVE-2024-26308)  | 
|  CVE-2024-26308  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-26308](https://nvd.nist.gov/vuln/detail/CVE-2024-26308)  | 
|  CVE-2024-29025  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-29025](https://nvd.nist.gov/vuln/detail/CVE-2024-29025)  | 
|  CVE-2024-29869  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-29869](https://nvd.nist.gov/vuln/detail/CVE-2024-29869)  | 
|  CVE-2024-29869  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-29869](https://nvd.nist.gov/vuln/detail/CVE-2024-29869)  | 
|  CVE-2024-30171  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-30171](https://nvd.nist.gov/vuln/detail/CVE-2024-30171)  | 
|  CVE-2024-30171  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-30171](https://nvd.nist.gov/vuln/detail/CVE-2024-30171)  | 
|  CVE-2024-30171  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-30171](https://nvd.nist.gov/vuln/detail/CVE-2024-30171)  | 
|  CVE-2024-30171  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-30171](https://nvd.nist.gov/vuln/detail/CVE-2024-30171)  | 
|  CVE-2024-31141  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-31141](https://nvd.nist.gov/vuln/detail/CVE-2024-31141)  | 
|  CVE-2024-47535  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-47535](https://nvd.nist.gov/vuln/detail/CVE-2024-47535)  | 
|  CVE-2024-47535  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-47535](https://nvd.nist.gov/vuln/detail/CVE-2024-47535)  | 
|  CVE-2024-47554  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-47554](https://nvd.nist.gov/vuln/detail/CVE-2024-47554)  | 
|  CVE-2024-47554  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-47554](https://nvd.nist.gov/vuln/detail/CVE-2024-47554)  | 
|  CVE-2024-47554  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-47554](https://nvd.nist.gov/vuln/detail/CVE-2024-47554)  | 
|  CVE-2024-56128  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-56128](https://nvd.nist.gov/vuln/detail/CVE-2024-56128)  | 
|  CVE-2024-6763  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-6763](https://nvd.nist.gov/vuln/detail/CVE-2024-6763)  | 
|  CVE-2024-6763  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-6763](https://nvd.nist.gov/vuln/detail/CVE-2024-6763)  | 
|  CVE-2024-6763  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-6763](https://nvd.nist.gov/vuln/detail/CVE-2024-6763)  | 
|  CVE-2024-6763  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-6763](https://nvd.nist.gov/vuln/detail/CVE-2024-6763)  | 
|  CVE-2024-6763  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-6763](https://nvd.nist.gov/vuln/detail/CVE-2024-6763)  | 
|  CVE-2024-8184  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-8184](https://nvd.nist.gov/vuln/detail/CVE-2024-8184)  | 
|  CVE-2025-11226  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2025-11226](https://nvd.nist.gov/vuln/detail/CVE-2025-11226)  | 
|  CVE-2025-11226  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2025-11226](https://nvd.nist.gov/vuln/detail/CVE-2025-11226)  | 
|  CVE-2025-11226  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2025-11226](https://nvd.nist.gov/vuln/detail/CVE-2025-11226)  | 
|  CVE-2025-25193  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2025-25193](https://nvd.nist.gov/vuln/detail/CVE-2025-25193)  | 
|  CVE-2025-25193  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2025-25193](https://nvd.nist.gov/vuln/detail/CVE-2025-25193)  | 
|  CVE-2025-30474  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2025-30474](https://nvd.nist.gov/vuln/detail/CVE-2025-30474)  | 
|  CVE-2025-3588  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2025-3588](https://nvd.nist.gov/vuln/detail/CVE-2025-3588)  | 
|  CVE-2025-46392  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2025-46392](https://nvd.nist.gov/vuln/detail/CVE-2025-46392)  | 
|  CVE-2025-48924  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2025-48924](https://nvd.nist.gov/vuln/detail/CVE-2025-48924)  | 
|  CVE-2025-48924  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2025-48924](https://nvd.nist.gov/vuln/detail/CVE-2025-48924)  | 
|  CVE-2025-48924  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2025-48924](https://nvd.nist.gov/vuln/detail/CVE-2025-48924)  | 
|  CVE-2025-48924  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2025-48924](https://nvd.nist.gov/vuln/detail/CVE-2025-48924)  | 
|  CVE-2025-48924  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2025-48924](https://nvd.nist.gov/vuln/detail/CVE-2025-48924)  | 
|  CVE-2025-48924  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2025-48924](https://nvd.nist.gov/vuln/detail/CVE-2025-48924)  | 
|  CVE-2025-48924  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2025-48924](https://nvd.nist.gov/vuln/detail/CVE-2025-48924)  | 
|  CVE-2025-48924  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2025-48924](https://nvd.nist.gov/vuln/detail/CVE-2025-48924)  | 
|  CVE-2025-48924  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2025-48924](https://nvd.nist.gov/vuln/detail/CVE-2025-48924)  | 
|  CVE-2025-49128  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2025-49128](https://nvd.nist.gov/vuln/detail/CVE-2025-49128)  | 
|  CVE-2025-49128  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2025-49128](https://nvd.nist.gov/vuln/detail/CVE-2025-49128)  | 
|  CVE-2025-49128  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2025-49128](https://nvd.nist.gov/vuln/detail/CVE-2025-49128)  | 
|  CVE-2025-53864  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2025-53864](https://nvd.nist.gov/vuln/detail/CVE-2025-53864)  | 
|  CVE-2025-58457  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2025-58457](https://nvd.nist.gov/vuln/detail/CVE-2025-58457)  | 
|  CVE-2025-58457  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2025-58457](https://nvd.nist.gov/vuln/detail/CVE-2025-58457)  | 
|  CVE-2025-59419  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2025-59419](https://nvd.nist.gov/vuln/detail/CVE-2025-59419)  | 
|  CVE-2025-8885  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2025-8885](https://nvd.nist.gov/vuln/detail/CVE-2025-8885)  | 
|  CVE-2025-8885  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2025-8885](https://nvd.nist.gov/vuln/detail/CVE-2025-8885)  | 
|  CVE-2025-8916  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2025-8916](https://nvd.nist.gov/vuln/detail/CVE-2025-8916)  | 
|  CVE-2025-8916  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2025-8916](https://nvd.nist.gov/vuln/detail/CVE-2025-8916)  | 
|  CVE-2025-8916  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2025-8916](https://nvd.nist.gov/vuln/detail/CVE-2025-8916)  | 
|  CVE-2025-8916  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2025-8916](https://nvd.nist.gov/vuln/detail/CVE-2025-8916)  | 
|  CVE-2020-8908  |  BAJA  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-8908](https://nvd.nist.gov/vuln/detail/CVE-2020-8908)  | 
|  CVE-2020-8908  |  BAJA  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-8908](https://nvd.nist.gov/vuln/detail/CVE-2020-8908)  | 
|  CVE-2020-8908  |  BAJA  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-8908](https://nvd.nist.gov/vuln/detail/CVE-2020-8908)  | 
|  CVE-2020-8908  |  BAJA  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-8908](https://nvd.nist.gov/vuln/detail/CVE-2020-8908)  | 
|  CVE-2020-8908  |  BAJA  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-8908](https://nvd.nist.gov/vuln/detail/CVE-2020-8908)  | 
|  CVE-2020-8908  |  BAJA  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-8908](https://nvd.nist.gov/vuln/detail/CVE-2020-8908)  | 
|  CVE-2020-8908  |  BAJA  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-8908](https://nvd.nist.gov/vuln/detail/CVE-2020-8908)  | 
|  CVE-2020-8908  |  BAJA  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-8908](https://nvd.nist.gov/vuln/detail/CVE-2020-8908)  | 
|  CVE-2020-8908  |  BAJA  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-8908](https://nvd.nist.gov/vuln/detail/CVE-2020-8908)  | 
|  CVE-2024-12801  |  BAJA  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-12801](https://nvd.nist.gov/vuln/detail/CVE-2024-12801)  | 
|  CVE-2024-12801  |  BAJA  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-12801](https://nvd.nist.gov/vuln/detail/CVE-2024-12801)  | 
|  CVE-2024-12801  |  BAJA  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-12801](https://nvd.nist.gov/vuln/detail/CVE-2024-12801)  | 
|  CVE-2025-46551  |  BAJA  |  [https://nvd.nist. gov/vuln/detail/CVE-2025-46551](https://nvd.nist.gov/vuln/detail/CVE-2025-46551)  | 

## Notas de la versión 7.11.0
<a name="emr-7110-relnotes"></a>

Las siguientes notas de la versión incluyen información sobre la versión 7.11.0 de Amazon EMR.
+ **Nuevas características**
  + Actualizaciones de **aplicaciones: las actualizaciones** de aplicaciones Amazon EMR 7.11.0 incluyen Delta 3.3.2-amzn-0, Flink 1.20.0-amzn-5, HBase 2.6.2-amzn-2, 3.1.3-amzn-20, Hadoop 3.4.1-amzn-3, Hive HCatalog 3.1.3-amzn-20, Hudi 1.0.2-amzn-0, Iceberg 1.9.1-amzn-0, Presto 0.287-amzn-5, Spark 3.5.6-amzn-0, 2.19.0, Tez 0.10.2-amzn-18, Trino 475-amzn-0 y 3.9.3-amzn-3. TensorFlow ZooKeeper 
  + Amazon EMR en EC2 ahora admite las sesiones en segundo plano de los usuarios de IAM Identity Center
    + **Sesiones de usuario en segundo plano**: permite que las cargas de trabajo de Spark de larga duración sigan ejecutándose incluso después de que los usuarios cierren sesión en SageMaker Unified Studio, lo que permite sesiones de hasta 90 días
    + Configuración de **sesión en segundo plano flexible: configuración** de dos niveles (instancia de IAM Identity Center y clúster de Amazon EMR-EC2) con una duración de sesión en segundo plano personalizable de 15 minutos a 90 días (predeterminado: 7 días)
    + **Propagación de identidad confiable**: mantiene un contexto de identidad seguro durante todo el ciclo de vida de la sesión en segundo plano mediante la función de propagación de identidad confiable de Amazon EMR
    + **SageMaker Integración con Unified Studio**: las sesiones en segundo plano se inician mediante sesiones interactivas de Livy en SageMaker Unified Studio
  + **Sesiones de larga duración con identidades corporativas**: Amazon SageMaker Unified Studio ahora admite sesiones de larga duración con identidades corporativas a través de Trusted Identity Propagation (TIP) de IAM Identity Center. Los usuarios pueden lanzar libretas interactivas y sesiones de procesamiento de datos en Amazon EMR y AWS Glue que sigan utilizando credenciales corporativas, incluso cuando se cierre la sesión o caduquen. Las sesiones duran hasta 90 días (7 días por defecto) y, al mismo tiempo, mantienen los permisos de identidad y los controles de seguridad uniformes.

## Versiones Java predeterminadas de 7.11.0
<a name="emr-7110-jdk"></a>

La versión 7.11.0 de Amazon EMR incluye Amazon Corretto 17 (basado en OpenJDK) de forma predeterminada para las aplicaciones compatibles con Corretto 17 (JDK 17), con la excepción de Apache Livy.

En la siguiente tabla se muestran las versiones predeterminadas de Java para las aplicaciones de Amazon EMR 7.11.0.


| Aplicación | Versión de Java o Amazon Corretto (el valor predeterminado está en negrita) | 
| --- | --- | 
| Delta | 17, 11, 8 | 
| Flink | 17, 11, 8 | 
| HBase | 17, 11, 8 | 
| HCatalog | 17, 11, 8 | 
| Hadoop | 17, 11, 8 | 
| Hive | 17, 11, 8 | 
| Hudi | 17, 11, 8 | 
| Iceberg | 17, 11 | 
| Livy | 17, 11, 8 | 
| Oozie | 17, 11, 8 | 
| Phoenix | 17, 11, 8 | 
| PrestoDB | 8 | 
| Spark | 17, 11, 8 | 
| Spark RAPIDS | 17, 11, 8 | 
| Tez | 17, 11, 8 | 
| Trino | 21, 17 | 
| Zeppelin | 17, 11, 8 | 
| Pig | 17, 11, 8 | 
| ZooKeeper | 17, 11, 8 | 

## Versiones de componentes 7.11.0
<a name="emr-7110-components"></a>

A continuación, se muestran los componentes que Amazon EMR instala con esta versión. Algunos se instalan como parte de paquetes de aplicación de macrodatos. Otros son exclusivos de Amazon EMR y se instalan para ciertos procesos y características del sistema. Normalmente, estos componentes comienzan con `emr` o `aws`. Normalmente, los paquetes de aplicación de macrodatos de la versión más reciente de Amazon EMR son las versiones más recientes que pueden encontrarse en la comunidad. Intentamos que las versiones de la comunidad estén disponibles en Amazon EMR lo más rápido posible.

Algunos componentes de Amazon EMR son distintos de las versiones que se encuentran en la comunidad. Estos componentes tienen una etiqueta de versión con el formato `CommunityVersion-amzn-EmrVersion`. La `EmrVersion` empieza por 0. Por ejemplo, si un componente de la comunidad de código abierto llamado `myapp-component` con la versión 2.2 se ha modificado tres veces para incluirlo en diferentes versiones de lanzamiento de Amazon EMR, la versión que se mostrará será `2.2-amzn-2`.


| Componente | Versión | Description (Descripción) | 
| --- | --- | --- | 
| adot-java-agent | 1.31.0 | Un agente Java que recopila métricas de los daemons de las aplicaciones. | 
| delta | 3.3.2-amzn-0 | Delta Lake es un formato de tabla abierto para conjuntos de datos analíticos de gran tamaño | 
| emr-amazon-cloudwatch-agent | 1.300032.2-amzn-0 | Se trata de una aplicación que recopila métricas internas de nivel de sistema y métricas de aplicación personalizadas de las instancias de Amazon EC2. | 
| emr-ddb | 5.7.0 | Conector de Amazon DynamoDB para aplicaciones del ecosistema de Hadoop. | 
| emr-goodies | 3.20.0 | Bibliotecas especialmente prácticas para el ecosistema de Hadoop. | 
| emr-kinesis | 3.24.0 | Conector de Amazon Kinesis para aplicaciones del ecosistema de Hadoop. | 
| emr-notebook-env | 1.18.0 | Entorno de Conda para cuaderno de EMR que incluye una puerta de enlace empresarial de Jupyter | 
| emr-s3-dist-cp | 2.41.0 | Aplicación de copia distribuida optimizada para Amazon S3. | 
| emr-s3-select | 2.20.0 | Conector S3Select de EMR | 
| emr-wal-cli | 1.3.5 | CLI utilizada para eliminar o enumerar WAL de ERM. | 
| emrfs | 2.72.0 | Conector de Amazon S3 para aplicaciones del ecosistema de Hadoop. | 
| flink-client | 1.20.0-amzn-5 | Scripts y aplicaciones de cliente de línea de comando de Apache Flink. | 
| flink-jobmanager-config | 1.20.0-amzn-5 | Administración de recursos en nodos EMR para Apache Flink. JobManager | 
| hadoop-client | 3.4.1-amzn-3 | Los clientes de línea de comando de Hadoop como, por ejemplo "hdfs", "hadoop" o "yarn". | 
| hadoop-hdfs-datanode | 3.4.1-amzn-3 | Servicio de nivel de nodos de HDFS para el almacenamiento de bloques. | 
| hadoop-hdfs-library | 3.4.1-amzn-3 | Biblioteca y cliente de línea de comandos HDFS | 
| hadoop-hdfs-namenode | 3.4.1-amzn-3 | Servicio de HDFS para realizar un seguimiento de nombres de archivo y bloquear ubicaciones. | 
| hadoop-hdfs-zkfc | 3.4.1-amzn-3 | Servicio ZKFC para rastrear los nodos de nombres para el modo HA. | 
| hadoop-hdfs-journalnode | 3.4.1-amzn-3 | Servicio de HDFS para administrar los archivos de Hadoop periódico en clústeres de alta disponibilidad. | 
| hadoop-httpfs-server | 3.4.1-amzn-3 | Punto de enlace HTTP para operaciones HDFS. | 
| hadoop-kms-server | 3.4.1-amzn-3 | Servidor de administración de claves criptográficas basado en la API de Hadoop. KeyProvider  | 
| hadoop-mapred | 3.4.1-amzn-3 | MapReduce bibliotecas de motores de ejecución para ejecutar una aplicación. MapReduce  | 
| hadoop-yarn-nodemanager | 3.4.1-amzn-3 | Servicio de YARN para la administración de contenedores en un nodo individual. | 
| hadoop-yarn-resourcemanager | 3.4.1-amzn-3 | Servicio de YARN para la asignación y administración de recursos de clúster y aplicaciones distribuidas. | 
| hadoop-yarn-timeline-server | 3.4.1-amzn-3 | Servicio para recuperar información actual e histórica para aplicaciones de YARN. | 
| hbase-hmaster | 2.6.2-amzn-2 | Servicio para un HBase clúster responsable de la coordinación de las regiones y la ejecución de los comandos administrativos. | 
| hbase-region-server | 2.6.2-amzn-2 | Servicio para prestar servicio a una o más regiones. HBase  | 
| hbase-client | 2.6.2-amzn-2 | HBase cliente de línea de comandos. | 
| hbase-rest-server | 2.6.2-amzn-2 | Servicio que proporciona un punto final HTTP para. RESTful HBase | 
| hbase-thrift-server | 2.6.2-amzn-2 | Servicio que proporciona un punto final de Thrift para. HBase | 
| hbase-operator-tools | 2.6.2-amzn-2 | Herramienta de reparación de clústeres de Apache. HBase  | 
| hcatalog-client | 3.1.3-amzn-20 | El cliente de línea de comando "hcat" para manipular hcatalog-server. | 
| hcatalog-server | 3.1.3-amzn-20 | Prestación de servicios HCatalog, una capa de administración de tablas y almacenamiento para aplicaciones distribuidas. | 
| hcatalog-webhcat-server | 3.1.3-amzn-20 | Punto final HTTP que proporciona una interfaz REST para. HCatalog | 
| hive-client | 3.1.3-amzn-20 | Cliente de línea de comando de Hive. | 
| hive-hbase | 3.1.3-amzn-20 | Hive-hbase client. | 
| hive-metastore-server | 3.1.3-amzn-20 | Service para acceder al metaalmacén de Hive, un repositorio semántico que almacena metadatos para SQL en operaciones de Hadoop. | 
| hive-server2 | 3.1.3-amzn-20 | Servicio para aceptar consultas de Hive como solicitudes web. | 
| hudi | 1.0.2-amzn-0 | Marco de procesamiento incremental para impulsar la canalización de datos a baja latencia y alta eficiencia. | 
| hudi-presto | 1.0.2-amzn-0 | Biblioteca de paquetes para ejecutar Presto con Hudi. | 
| hudi-trino | 1.0.2-amzn-0 | Biblioteca de paquetes para ejecutar Trino con Hudi. | 
| hudi-spark | 1.0.2-amzn-0 | Biblioteca de paquetes para ejecutar Spark con Hudi. | 
| hue-server | 4.11.0 | Aplicación web para analizar datos con aplicaciones del ecosistema de Hadoop | 
| iceberg | 1.9.1-amzn-0 | Apache Iceberg es un formato de tabla abierto para conjuntos de datos analíticos muy grandes | 
| jupyterhub | 1.5.0 | Servidor multiusuario para blocs de notas Jupyter | 
| livy-server | 0.8.0-incubating | Interfaz de REST para interactuar con Apache Spark | 
| nginx | 1.12.1 | nginx [engine x] es un servidor HTTP y proxy inverso | 
| mariadb-server | 5.5.68\$1 | Servidor de base de datos de MariaDB. | 
| nvidia-cuda | 12.5.0 | Controladores Nvidia y conjunto de herramientas Cuda | 
| oozie-client | 5.2.1 | Cliente de línea de comando de Oozie. | 
| oozie-server | 5.2.1 | Servicio para aceptar solicitudes de flujo de trabajo de Oozie. | 
| opencv | 4.7.0 | Biblioteca de visión artificial de código abierto. | 
| phoenix-library | 5.2.1 | Las bibliotecas de Phoenix para servidor y cliente | 
| phoenix-connectors | 6.0.0 | Conectores de Apache Phoenix para Spark-3 | 
| phoenix-query-server | 6.0.0 | Un servidor ligero que proporciona acceso a JDBC, así como acceso de formato Protocol Buffers y JSON al API de Avatica  | 
| presto-coordinator | 0.287-amzn-5 | Servicio para aceptar las consultas y administrar la ejecución de consultas entre presto-workers. | 
| presto-worker | 0.287-amzn-5 | Service para ejecutar partes de una consulta. | 
| presto-client | 0.287-amzn-5 | Cliente de línea de comandos Presto que se instala en los nodos principales en espera de un clúster de HA donde el servidor Presto no se ha iniciado. | 
| trino-coordinator | 475-amzn-0 | Servicio para aceptar consultas y administrar la ejecución de consultas entre trino-workers. | 
| trino-worker | 475-amzn-0 | Service para ejecutar partes de una consulta. | 
| trino-client | 475-amzn-0 | Cliente de línea de comandos Trino que se instala en los maestros en espera de un clúster de HA donde el servidor Trino no se ha iniciado. | 
| pig-client | 0.17.0 | Cliente de línea de comando de Pig. | 
| r | 4.3.2 | Proyecto R para análisis estadístico | 
| ranger-kms-server | 2.0.0 | Sistema de administración de claves Apache Ranger | 
| spark-client | 3.5.6-amzn-0 | Clientes de línea de comando de Spark. | 
| spark-history-server | 3.5.6-amzn-0 | IU web para la visualización de eventos registrados durante la vida útil de una aplicación Spark completada. | 
| spark-on-yarn | 3.5.6-amzn-0 | Motor de ejecución en memoria para YARN. | 
| spark-yarn-slave | 3.5.6-amzn-0 | Bibliotecas de Apache Spark necesarias para esclavos de YARN. | 
| spark-rapids | 25.06.0-amzn-0 | El complemento Nvidia Spark RAPIDS que acelera Apache Spark con. GPUs | 
| tensorflow | 2.19.0 | TensorFlow biblioteca de software de código abierto para computación numérica de alto rendimiento. | 
| tez-on-yarn | 0.10.2-amzn-18 | La aplicación YARN de tez y bibliotecas. | 
| tez-on-worker | 0.10.2-amzn-18 | La aplicación YARN de tez y bibliotecas para nodos de trabajo. | 
| zeppelin-server | 0.11.1 | Bloc de notas basado en web que permite el análisis de datos interactivo. | 
| zookeeper-server | 3.9.3-amzn-3 | Servicio centralizado para mantener información de configuración, nomenclatura, proporcionar sincronización distribuida y proporcionar servicios de grupo. | 
| zookeeper-client | 3.9.3-amzn-3 | ZooKeeper cliente de línea de comandos. | 

## Clasificaciones de configuración de 7.11.0
<a name="emr-7110-class"></a>

Las clasificaciones de configuración le permiten personalizar las aplicaciones. Suelen corresponder a un archivo XML de configuración para la aplicación como, por ejemplo, `hive-site.xml`. Para obtener más información, consulte [Configuración de aplicaciones](emr-configure-apps.md).

Las acciones de reconfiguración se producen cuando se especifica una configuración para los grupos de instancias de un clúster en ejecución. Amazon EMR solo inicia acciones de reconfiguración para las clasificaciones que se modifican. Para obtener más información, consulte [Reconfiguración de un grupo de instancias en un clúster en ejecución](emr-configure-apps-running-cluster.md).


**clasificaciones emr-7.11.0**  

| Clasificaciones | Description (Descripción) | Acciones de reconfiguración | 
| --- | --- | --- | 
| capacity-scheduler | Cambiar los valores en el archivo capacity-scheduler.xml de Hadoop. | Restarts the ResourceManager service. | 
| container-executor | Cambie los valores en el archivo container-executor.cfg de Hadoop YARN. | Not available. | 
| container-log4j | Cambiar los valores en el archivo container-log4j.properties de Hadoop YARN. | Not available. | 
| core-site | Cambiar los valores en el archivo core-site.xml de Hadoop. | Restarts the Hadoop HDFS services Namenode, SecondaryNamenode, Datanode, ZKFC, and Journalnode. Restarts the Hadoop YARN services ResourceManager, NodeManager, ProxyServer, and TimelineServer. Additionally restarts Hadoop KMS, Ranger KMS, HiveServer2, Hive MetaStore, Hadoop Httpfs, and MapReduce-HistoryServer. | 
| docker-conf | Cambie la configuración relacionada con el docker. | Not available. | 
| emrfs-site | Cambiar la configuración de EMRFS. | Restarts the Hadoop HDFS services Namenode, SecondaryNamenode, Datanode, ZKFC, and Journalnode. Restarts the Hadoop YARN services ResourceManager, NodeManager, ProxyServer, and TimelineServer. Additionally restarts HBaseRegionserver, HBaseMaster, HBaseThrift, HBaseRest, HiveServer2, Hive MetaStore, Hadoop Httpfs, and MapReduce-HistoryServer. | 
| flink-conf | Cambiar la configuración de flink-conf.yaml. | Restarts Flink history server. | 
| flink-log4j | Cambiar la configuración de log4j.properties de Flink. | Restarts Flink history server. | 
| flink-log4j-session | Cambie la configuración de Flink log4j-session.properties para la sesión. Kubernetes/Yarn  | Restarts Flink history server. | 
| flink-log4j-cli | Cambiar la configuración de log4j-cli.properties de Flink. | Restarts Flink history server. | 
| hadoop-env | Cambiar los valores en el entorno de Hadoop para todos los componentes de Hadoop. | Restarts the Hadoop HDFS services Namenode, SecondaryNamenode, Datanode, ZKFC, and Journalnode. Restarts the Hadoop YARN services ResourceManager, NodeManager, ProxyServer, and TimelineServer. Additionally restarts PhoenixQueryserver, HiveServer2, Hive MetaStore, and MapReduce-HistoryServer. | 
| hadoop-log4j | Cambiar los valores en el archivo log4j.properties de Hadoop. | Restarts the Hadoop HDFS services SecondaryNamenode, Datanode, and Journalnode. Restarts the Hadoop YARN services ResourceManager, NodeManager, ProxyServer, and TimelineServer. Additionally restarts Hadoop KMS, Hadoop Httpfs, and MapReduce-HistoryServer. | 
| hadoop-ssl-server | Cambiar la configuración del servidor ssl de Hadoop | Not available. | 
| hadoop-ssl-client | Cambiar la configuración del cliente ssl de Hadoop | Not available. | 
| hbase | Configuraciones seleccionadas por Amazon EMR para Apache. HBase | Custom EMR specific property. Sets emrfs-site and hbase-site configs. See those for their associated restarts. | 
| hbase-env | Cambie los valores en su entorno HBase. | Restarts the HBase services RegionServer, HBaseMaster, ThriftServer, RestServer. | 
| hbase-log4j2 | Cambie los valores en el archivo HBase hbase-log4j2.properties. | Restarts the HBase services RegionServer, HBaseMaster, ThriftServer, RestServer. | 
| hbase-metrics | Cambie los valores en el archivo hadoop-metrics2-hbase.properties. HBase | Restarts the HBase services RegionServer, HBaseMaster, ThriftServer, RestServer. | 
| hbase-policy | Cambie los valores en HBase el archivo hbase-policy.xml. | Not available. | 
| hbase-site | Cambie los valores en HBase el archivo hbase-site.xml. | Restarts the HBase services RegionServer, HBaseMaster, ThriftServer, RestServer. Additionally restarts Phoenix QueryServer. | 
| hdfs-encryption-zones | Configurar zonas de cifrado de HDFS. | This classification should not be reconfigured. | 
| hdfs-env | Cambiar los valores en el entorno de HDFS. | Restarts Hadoop HDFS services Namenode, Datanode, and ZKFC. | 
| hdfs-site | Cambiar los valores en hdfs-site.xml de HDFS. | Restarts the Hadoop HDFS services Namenode, SecondaryNamenode, Datanode, ZKFC, and Journalnode. Additionally restarts Hadoop Httpfs. | 
| hcatalog-env | Cambie los valores en HCatalog el entorno. | Restarts Hive HCatalog Server. | 
| hcatalog-server-jndi | Cambie los valores en HCatalog jndi.properties. | Restarts Hive HCatalog Server. | 
| hcatalog-server-proto-hive-site | Cambie los valores en .xml HCatalog. proto-hive-site | Restarts Hive HCatalog Server. | 
| hcatalog-webhcat-env | Cambie los valores en el entorno HCat de la HCatalog Web. | Restarts Hive WebHCat server. | 
| hcatalog-webhcat-log4j2 | Cambie los valores en las propiedades HCatalog HCat log4j2.properties de la Web. | Restarts Hive WebHCat server. | 
| hcatalog-webhcat-site | Cambie los valores del archivo webhcat-site.xml de la HCatalog WebHCat. | Restarts Hive WebHCat server. | 
| hive | Configuración de Amazon EMR mantenida para Apache Hive. | Sets configurations to launch Hive LLAP service. | 
| hive-beeline-log4j2 | Cambiar los valores en el archivo beeline-log4j2.properties de Hive. | Not available. | 
| hive-parquet-logging | Cambiar los valores en el archivo parquet-logging.properties de Hive. | Not available. | 
| hive-env | Cambiar los valores en el entorno de Hive. | Restarts HiveServer2, HiveMetastore, and Hive HCatalog-Server. Runs Hive schemaTool CLI commands to verify hive-metastore. | 
| hive-exec-log4j2 | Cambie los valores en el archivo hive-exec-log 4j2.properties de Hive. | Not available. | 
| hive-llap-daemon-log4j2 | Cambie los valores en el archivo 4j2.properties de Hive. llap-daemon-log | Not available. | 
| hive-log4j2 | Cambiar los valores en el archivo hive-log4j2.properties de Hive. | Not available. | 
| hive-site | Cambiar los valores en el archivo hive-site.xml de Hive. | Restarts HiveServer2, HiveMetastore, and Hive HCatalog-Server. Runs Hive schemaTool CLI commands to verify hive-metastore. Also restarts Oozie and Zeppelin. | 
| hiveserver2-site | Cambiar los valores en el archivo hiveserver2-site.xml de Hive Server2. | Not available. | 
| hue-ini | Cambiar los valores en el archivo ini de Hue | Restarts Hue. Also activates Hue config override CLI commands to pick up new configurations. | 
| httpfs-env | Cambiar los valores en el entorno de HTTPFS. | Restarts Hadoop Httpfs service. | 
| httpfs-site | Cambiar los valores en el archivo httpfs-site.xml de Hadoop. | Restarts Hadoop Httpfs service. | 
| hadoop-kms-acls | Cambiar los valores en el archivo kms-acls.xml de Hadoop. | Not available. | 
| hadoop-kms-env | Cambiar los valores en el entorno de Hadoop KMS. | Restarts Hadoop-KMS service. | 
| hadoop-kms-java-home | Cambie la página de inicio de Java de KMS de Hadoop | Not available. | 
| hadoop-kms-log4j | Cambiar los valores en el archivo kms-log4j.properties de Hadoop. | Not available. | 
| hadoop-kms-site | Cambiar los valores en el archivo kms-site.xml de Hadoop. | Restarts Hadoop-KMS and Ranger-KMS service. | 
| hudi-env | Cambiar los valores en el entorno de Hudi. | Not available. | 
| hudi-defaults | Cambie los valores en el archivo hudi-defaults.conf de Hudi. | Not available. | 
| iceberg-defaults | Cambie los valores del archivo iceberg-defaults.conf de Iceberg. | Not available. | 
| delta-defaults | Cambie los valores del archivo delta-defaults.conf de Delta. | Not available. | 
| jupyter-notebook-conf | Cambiar los valores en el archivo jupyter\$1notebook\$1config.py de Jupyter Notebook. | Not available. | 
| jupyter-hub-conf | Cambie los valores en JupyterHubs el archivo jupyterhub\$1config.py. | Not available. | 
| jupyter-s3-conf | Configurar la persistencia en S3 del bloc de notas de Jupyter. | Not available. | 
| jupyter-sparkmagic-conf | Cambiar los valores en el archivo config.json de Sparkmagic. | Not available. | 
| livy-conf | Cambiar los valores en el archivo livy.conf de Livy. | Restarts Livy Server. | 
| livy-env | Cambiar los valores en el entorno de Livy. | Restarts Livy Server. | 
| livy-log4j2 | Cambiar la configuración de log4j2.properties de Livy. | Restarts Livy Server. | 
| mapred-env | Cambie los valores en el entorno de la MapReduce aplicación. | Restarts Hadoop MapReduce-HistoryServer. | 
| mapred-site | Cambie los valores en el archivo mapred-site.xml de la MapReduce aplicación. | Restarts Hadoop MapReduce-HistoryServer. | 
| oozie-env | Cambiar los valores en el entorno de Oozie. | Restarts Oozie. | 
| oozie-log4j | Cambiar los valores en el archivo oozie-log4j.properties de Oozie. | Restarts Oozie. | 
| oozie-site | Cambiar los valores en el archivo oozie-site.xml de Oozie. | Restarts Oozie. | 
| phoenix-hbase-metrics | Cambiar los valores en el archivo hadoop-metrics2-hbase.properties de Phoenix. | Not available. | 
| phoenix-hbase-site | Cambiar los valores en el archivo hbase-site.xml de Phoenix. | Not available. | 
| phoenix-log4j2 | Cambiar los valores en el archivo log4j2.properties de Phoenix. | Restarts Phoenix-QueryServer. | 
| phoenix-metrics | Cambiar los valores en el archivo hadoop-metrics2-phoenix.properties de Phoenix. | Not available. | 
| pig-env | Cambiar los valores en el entorno de Pig. | Not available. | 
| pig-properties | Cambiar los valores en el archivo pig.properties de Pig. | Restarts Oozie. | 
| pig-log4j | Cambiar los valores en el archivo log4j.properties de Pig. | Not available. | 
| presto-log | Cambiar los valores en el archivo log.properties de Presto. | Restarts Presto-Server (for PrestoDB) | 
| presto-config | Cambiar los valores en el archivo config.properties de Presto. | Restarts Presto-Server (for PrestoDB) | 
| presto-password-authenticator | Cambiar los valores en el archivo password-authenticator.properties de Presto. | Not available. | 
| presto-env | Cambiar valores en el archivo presto-env.sh de Presto. | Restarts Presto-Server (for PrestoDB) | 
| presto-node | Cambiar valores en el archivo node.properties de Presto. | Not available. | 
| presto-connector-blackhole | Cambiar los valores en el archivo blackhole.properties de Presto. | Not available. | 
| presto-connector-cassandra | Cambiar los valores en el archivo cassandra.properties de Presto. | Not available. | 
| presto-connector-hive | Cambiar los valores en el archivo hive.properties de Presto. | Restarts Presto-Server (for PrestoDB) | 
| presto-connector-jmx | Cambiar los valores en el archivo jmx.properties de Presto. | Not available. | 
| presto-connector-kafka | Cambiar los valores en el archivo kafka.properties de Presto. | Not available. | 
| presto-connector-lakeformation | Cambiar los valores en el archivo lakeformation.properties de Presto. | Restarts Presto-Server (for PrestoDB) | 
| presto-connector-localfile | Cambiar los valores en el archivo localfile.properties de Presto. | Not available. | 
| presto-connector-memory | Cambiar los valores del archivo memory.properties de Presto. | Not available. | 
| presto-connector-mongodb | Cambiar los valores en el archivo mongodb.properties de Presto. | Not available. | 
| presto-connector-mysql | Cambiar los valores en el archivo mysql.properties de Presto. | Not available. | 
| presto-connector-postgresql | Cambiar los valores en el archivo postgresql.properties de Presto. | Not available. | 
| presto-connector-raptor | Cambiar los valores en el archivo raptor.properties de Presto. | Not available. | 
| presto-connector-redis | Cambiar los valores en el archivo redis.properties de Presto. | Not available. | 
| presto-connector-redshift | Cambiar los valores en el archivo redshift.properties de Presto. | Not available. | 
| presto-connector-tpch | Cambiar los valores en el archivo tpch.properties de Presto. | Not available. | 
| presto-connector-tpcds | Cambiar los valores del archivo tpcds.properties de Presto. | Not available. | 
| trino-log | Cambiar los valores en el archivo log.properties de Trino. | Restarts Trino-Server (for Trino) | 
| trino-config | Cambiar los valores en el archivo config.properties de Trino. | Restarts Trino-Server (for Trino) | 
| trino-password-authenticator | Cambiar los valores en el archivo password-authenticator.properties de Trino. | Restarts Trino-Server (for Trino) | 
| trino-env | Cambie los valores del archivo trino-env.sh de Trino. | Restarts Trino-Server (for Trino) | 
| trino-node | Cambiar los valores en el archivo node.properties de Trino. | Not available. | 
| trino-connector-blackhole | Cambiar los valores en el archivo blackhole.properties de Trino. | Not available. | 
| trino-connector-cassandra | Cambiar los valores en el archivo cassandra.properties de Trino. | Not available. | 
| trino-connector-delta | Cambie los valores del archivo delta.properties de Trino. | Restarts Trino-Server (for Trino) | 
| trino-connector-hive | Cambiar los valores en el archivo hive.properties de Trino. | Restarts Trino-Server (for Trino) | 
| trino-exchange-manager | Cambie los valores del archivo exchange-manager.properties de Trino. | Restarts Trino-Server (for Trino) | 
| trino-connector-iceberg | Cambiar los valores en el archivo iceberg.properties de Trino. | Restarts Trino-Server (for Trino) | 
| trino-connector-hudi | Cambiar los valores en el archivo hudi.properties de Trino. | Restarts Trino-Server (for Trino) | 
| trino-connector-jmx | Cambiar los valores en el archivo jmx.properties de Trino. | Not available. | 
| trino-connector-kafka | Cambiar los valores en el archivo kafka.properties de Trino. | Not available. | 
| trino-connector-localfile | Cambiar los valores en el archivo localfile.properties de Trino. | Not available. | 
| trino-connector-memory | Cambiar los valores en el archivo memory.properties de Trino. | Not available. | 
| trino-connector-mongodb | Cambiar los valores en el archivo mongodb.properties de Trino. | Not available. | 
| trino-connector-mysql | Cambiar los valores en el archivo mysql.properties de Trino. | Not available. | 
| trino-connector-postgresql | Cambiar los valores en el archivo postgresql.properties de Trino. | Not available. | 
| trino-connector-raptor | Cambiar los valores en el archivo raptor.properties de Trino. | Not available. | 
| trino-connector-redis | Cambiar los valores en el archivo redis.properties de Trino. | Not available. | 
| trino-connector-redshift | Cambiar los valores en el archivo redshift.properties de Trino. | Not available. | 
| trino-connector-tpch | Cambiar los valores en el archivo tpch.properties de Trino. | Not available. | 
| trino-connector-tpcds | Cambiar los valores en el archivo tpcds.properties de Trino. | Not available. | 
| ranger-kms-dbks-site | Cambie los valores del archivo dbks-site.xml de Ranger KMS. | Restarts Ranger KMS Server. | 
| ranger-kms-site | Cambie los valores en el ranger-kms-site archivo.xml de Ranger KMS. | Restarts Ranger KMS Server. | 
| ranger-kms-env | Cambie los valores del entorno Ranger KMS. | Restarts Ranger KMS Server. | 
| ranger-kms-logback | Cambie los valores del archivo kms-logback.xml de Ranger KMS. | Not available. | 
| ranger-kms-db-ca | Cambie los valores del archivo CA en S3 para la conexión SSL de MySQL con Ranger KMS. | Not available. | 
| spark | Configuración de Amazon EMR mantenida para Apache Spark. | This property modifies spark-defaults. See actions there. | 
| spark-defaults | Cambiar los valores en el archivo spark-defaults.conf de Spark. | Restarts Spark history server and Spark thrift server. | 
| spark-env | Cambiar los valores en el entorno de Spark. | Restarts Spark history server and Spark thrift server. | 
| spark-hive-site | Cambiar los valores en el archivo hive-site.xml de Spark. | Not available. | 
| spark-log4j2 | Cambiar los valores en el archivo log4j2.properties de Spark. | Restarts Spark history server and Spark thrift server. | 
| spark-metrics | Cambiar los valores en el archivo metrics.properties de Spark. | Restarts Spark history server and Spark thrift server. | 
| tez-site | Cambiar los valores en el archivo tez-site.xml de Tez. | Restart Oozie and HiveServer2. | 
| yarn-env | Cambiar los valores en el entorno de YARN. | Restarts the Hadoop YARN services ResourceManager, NodeManager, ProxyServer, and TimelineServer. Additionally restarts MapReduce-HistoryServer. | 
| yarn-site | Cambiar los valores en el archivo yarn-site.xml de YARN. | Restarts the Hadoop YARN services ResourceManager, NodeManager, ProxyServer, and TimelineServer. Additionally restarts Livy Server and MapReduce-HistoryServer. | 
| zeppelin-env | Cambiar los valores en el entorno de Zeppelin. | Restarts Zeppelin. | 
| zeppelin-site | Cambie los ajustes de configuración de zeppelin-site.xml. | Restarts Zeppelin. | 
| zookeeper-config | Cambie los valores en el ZooKeeper archivo zoo.cfg. | Restarts Zookeeper server. | 
| zookeeper-logback | Cambie los valores en ZooKeeper el archivo logback.xml. | Restarts Zookeeper server. | 
| cloudwatch-logs | Configure la integración de CloudWatch registros para los nodos del clúster de EMR. | Not available. | 
| emr-metrics | Cambie la configuración de la métrica EMR para este nodo. | Restarts the CloudWatchAgent service. | 

## 7.11.0 registro de cambios
<a name="7110-changelog"></a>


**Registro de cambios de la versión 7.11.0 y de las notas de la versión**  

| Date | Event | Description (Descripción) | 
| --- | --- | --- | 
| 12/11/2020 | Publicación de documentos | Las notas de la versión 7.11.0 de Amazon EMR se publicaron por primera vez | 

# Amazon EMR versión 7.10.0
<a name="emr-7100-release"></a>

## Ciclo de vida compatible con 7.10.0
<a name="emr-7100-supported-lifecycle"></a>

En la siguiente tabla se describen las fechas de ciclo de vida admitidas para la versión 7.10.0 de Amazon EMR.


| Fase de soporte | Date | 
| --- | --- | 
| Fecha de lanzamiento inicial | 15 de agosto de 2025 | 
| Soporte estándar hasta | 15 de agosto de 2027 | 
| Fin del soporte | 16 de agosto de 2027 | 
| Fin de vida útil | 15 de agosto de 2028 | 

## Versiones de la aplicación 7.10.0
<a name="emr-7100-app-versions"></a>

Esta versión incluye las siguientes aplicaciones: [https://docs.aws.amazon.com/AmazonCloudWatch/latest/monitoring/Install-CloudWatch-Agent.html](https://docs.aws.amazon.com/AmazonCloudWatch/latest/monitoring/Install-CloudWatch-Agent.html), [https://delta.io/](https://delta.io/), [https://flink.apache.org/](https://flink.apache.org/), [http://hbase.apache.org/](http://hbase.apache.org/), [https://cwiki.apache.org/confluence/display/Hive/HCatalog](https://cwiki.apache.org/confluence/display/Hive/HCatalog), [http://hadoop.apache.org/docs/current/](http://hadoop.apache.org/docs/current/), [http://hive.apache.org/](http://hive.apache.org/), [https://hudi.apache.org](https://hudi.apache.org), [http://gethue.com/](http://gethue.com/), [https://iceberg.apache.org/](https://iceberg.apache.org/), [https://jupyter-enterprise-gateway.readthedocs.io/en/latest/](https://jupyter-enterprise-gateway.readthedocs.io/en/latest/), [https://jupyterhub.readthedocs.io/en/latest/#](https://jupyterhub.readthedocs.io/en/latest/#), [https://livy.incubator.apache.org/](https://livy.incubator.apache.org/), [http://oozie.apache.org/](http://oozie.apache.org/), [https://phoenix.apache.org/](https://phoenix.apache.org/), [http://pig.apache.org/](http://pig.apache.org/), [https://prestodb.io/](https://prestodb.io/), [https://spark.apache.org/docs/latest/](https://spark.apache.org/docs/latest/), [https://www.tensorflow.org/](https://www.tensorflow.org/), [https://tez.apache.org/](https://tez.apache.org/), [https://trino.io/](https://trino.io/), [https://zeppelin.incubator.apache.org/](https://zeppelin.incubator.apache.org/) y [https://zookeeper.apache.org](https://zookeeper.apache.org).

En la siguiente tabla se enumeran las versiones de la aplicación disponibles en esta versión de Amazon EMR y las versiones de la aplicación en las tres versiones anteriores de Amazon EMR (cuando corresponda).

Para ver un historial completo de las versiones de la aplicación disponibles para cada versión de Amazon EMR, consulte los temas siguientes:
+ [Versiones de las aplicaciones en las versiones 7.x de Amazon EMR](emr-release-app-versions-7.x.md)
+ [Versiones de la aplicación en las versiones 6.x de Amazon EMR](emr-release-app-versions-6.x.md)
+ [Versiones de la aplicación en las versiones 5.x de Amazon EMR](emr-release-app-versions-5.x.md)
+ [Versiones de la aplicación en las versiones 4.x de Amazon EMR](emr-release-app-versions-4.x.md)


**Información sobre la versión de la aplicación**  

|  | emr-7.10.0 | emr-7.9.0 | emr-7.8.0 | emr-7.7.0 | 
| --- | --- | --- | --- | --- | 
| AWS SDK for Java | 2.31.48, 1.12.782 | 2.31.16, 1.12.782 | 2.29.52, 1.12.780 | 2.29.44, 1.12.780 | 
| Python | 3.9, 3.11 | 3.9, 3.11 | 3.9, 3.11 | 3.9, 3.11 | 
| Scala | 2.12.18 | 2.12.18 | 2.12.18 | 2.12.18 | 
| AmazonCloudWatchAgent | 1.300032.2-amzn-0 | 1.300032.2-amzn-0 | 1.300032.2-amzn-0 | 1.300032.2-amzn-0 | 
| Delta | 3.3.0-amzn-2 | 3.3.0-amzn-1 | 3.3.0-amzn-0 | 3.2.1-amzn-2 | 
| Flink | 1.20.0-amzn-4 | 1.20.0-amzn-3 | 1.20.0-amzn-2 | 1.20.0-amzn-1 | 
| Ganglia |  -  |  -  |  -  |  -  | 
| HBase | 2.6.2-amzn-1 | 2.6.2-amzn-0 | 2.6.1-amzn-2 | 2.6.1-amzn-1 | 
| HCatalog | 3.1.3-amzn-19 | 3.1.3-amzn-18 | 3.1.3-amzn-17 | 3.1.3-amzn-16 | 
| Hadoop | 3.4.1-amzn-2 | 3.4.1-amzn-1 | 3.4.1-amzn-0 | 3.4.0-amzn-3 | 
| Hive | 3.1.3-amzn-19 | 3.1.3-amzn-18 | 3.1.3-amzn-17 | 3.1.3-amzn-16 | 
| Hudi | 0.15.0-amzn-7 | 0.15.0-amzn-6 | 0.15.0-amzn-5 | 0.15.0-amzn-4 | 
| Hue | 4.11.0 | 4.11.0 | 4.11.0 | 4.11.0 | 
| Iceberg | 1.8.1-amzn-0 | 1.7.1-amzn-2 | 1.7.1-amzn-1 | 1.7.1-amzn-0 | 
| JupyterEnterpriseGateway | 2.6.0 | 2.6.0 | 2.6.0 | 2.6.0 | 
| JupyterHub | 1.5.0 | 1.5.0 | 1.5.0 | 1.5.0 | 
| Livy | 0.8.0-incubating | 0.8.0-incubating | 0.8.0-incubating | 0.8.0-incubating | 
| MXNet |  -  |  -  |  -  |  -  | 
| Mahout |  -  |  -  |  -  |  -  | 
| Oozie | 5.2.1 | 5.2.1 | 5.2.1 | 5.2.1 | 
| Phoenix | 5.2.1 | 5.2.1 | 5.2.1 | 5.2.1 | 
| Pig | 0.17.0 | 0.17.0 | 0.17.0 | 0.17.0 | 
| Presto | 0.287-amzn-4 | 0.287-amzn-3 | 0.287-amzn-2 | 0.287-amzn-1 | 
| Spark | 3.5.5-amzn-1 | 3.5.5-amzn-0 | 3.5.4-amzn-0 | 3.5.3-amzn-1 | 
| Sqoop |  -  |  -  |  -  |  -  | 
| TensorFlow | 2.18.0 | 2.16.1 | 2.16.1 | 2.16.1 | 
| Tez | 0.10.2-amzn-17 | 0.10.2-amzn-16 | 0.10.2-amzn-15 | 0.10.2-amzn-14 | 
| Trino (PrestoSQL) | 470-amzn-0 | 467-amzn-2 | 467-amzn-1 | 467-amzn-0 | 
| Zeppelin | 0.11.1 | 0.11.1 | 0.11.1 | 0.11.1 | 
| ZooKeeper | 3.9.3-amzn-2 | 3.9.3-amzn-1 | 3.9.3-amzn-0 | 3.9.2-amzn-1 | 

# 7.10.0 Vulnerabilidades y exposiciones comunes
<a name="7100-common-vulnerabilities-exposures"></a>

La siguiente tabla muestra todo lo CVEs que no afecta a los clústeres de EMR que se ejecutan en las configuraciones recomendadas de Amazon EMR 7.10.0. Amazon EMR depende del código abierto original para la disponibilidad de las correcciones y proporcionará la última versión estable como parte de los componentes del motor principal en un plazo de 90 días a partir de su verificación por parte de Amazon EMR.

Esta tabla se actualizó el 25 de septiembre de 2025.


| ID de CVE | Gravedad | URL de detalles del CVE | 
| --- | --- | --- | 
|  CVE-2015-1832  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2015-1832](https://nvd.nist.gov/vuln/detail/CVE-2015-1832)  | 
|  CVE-2016-5018  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2016-5018)-2016-5018  | 
|  CVE-2017-15095  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2017-15095)-2017-15095  | 
|  CVE-2017-17485  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2017-17485](https://nvd.nist.gov/vuln/detail/CVE-2017-17485)  | 
|  CVE-2017-7525  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2017-7525)-2017-7525  | 
|  CVE-2018-11307  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2018-11307](https://nvd.nist.gov/vuln/detail/CVE-2018-11307)  | 
|  CVE-2018-11307  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2018-11307](https://nvd.nist.gov/vuln/detail/CVE-2018-11307)  | 
|  CVE-2018-14718  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-14718)-2018-14718  | 
|  CVE-2018-14718  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-14718)-2018-14718  | 
|  CVE-2018-14719  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-14719)-2018-14719  | 
|  CVE-2018-14719  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-14719)-2018-14719  | 
|  CVE-2018-14720  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-14720)-2018-14720  | 
|  CVE-2018-14720  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-14720)-2018-14720  | 
|  CVE-2018-14721  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-14721)-2018-14721  | 
|  CVE-2018-14721  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-14721)-2018-14721  | 
|  CVE-2018-19360  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2018-19360](https://nvd.nist.gov/vuln/detail/CVE-2018-19360)  | 
|  CVE-2018-19360  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2018-19360](https://nvd.nist.gov/vuln/detail/CVE-2018-19360)  | 
|  CVE-2018-19361  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2018-19361](https://nvd.nist.gov/vuln/detail/CVE-2018-19361)  | 
|  CVE-2018-19361  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2018-19361](https://nvd.nist.gov/vuln/detail/CVE-2018-19361)  | 
|  CVE-2018-19362  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2018-19362](https://nvd.nist.gov/vuln/detail/CVE-2018-19362)  | 
|  CVE-2018-19362  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2018-19362](https://nvd.nist.gov/vuln/detail/CVE-2018-19362)  | 
|  CVE-2018-7489  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2018-7489](https://nvd.nist.gov/vuln/detail/CVE-2018-7489)  | 
|  CVE-2018-7489  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2018-7489](https://nvd.nist.gov/vuln/detail/CVE-2018-7489)  | 
|  CVE-2019-10202  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2019-10202](https://nvd.nist.gov/vuln/detail/CVE-2019-10202)  | 
|  CVE-2019-14379  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2019-14379](https://nvd.nist.gov/vuln/detail/CVE-2019-14379)  | 
|  CVE-2019-14379  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2019-14379](https://nvd.nist.gov/vuln/detail/CVE-2019-14379)  | 
|  CVE-2019-14540  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-14540)-2019-14540  | 
|  CVE-2019-14540  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-14540)-2019-14540  | 
|  CVE-2019-14892  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-14892)-2019-14892  | 
|  CVE-2019-14892  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-14892)-2019-14892  | 
|  CVE-2019-14893  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-14893)-2019-14893  | 
|  CVE-2019-14893  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-14893)-2019-14893  | 
|  CVE-2019-16335  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2019-16335](https://nvd.nist.gov/vuln/detail/CVE-2019-16335)  | 
|  CVE-2019-16335  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2019-16335](https://nvd.nist.gov/vuln/detail/CVE-2019-16335)  | 
|  CVE-2019-16942  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-16942)-2019-16942  | 
|  CVE-2019-16942  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-16942)-2019-16942  | 
|  CVE-2019-16943  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-16943)-2019-16943  | 
|  CVE-2019-16943  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-16943)-2019-16943  | 
|  CVE-2019-17267  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2019-17267](https://nvd.nist.gov/vuln/detail/CVE-2019-17267)  | 
|  CVE-2019-17267  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2019-17267](https://nvd.nist.gov/vuln/detail/CVE-2019-17267)  | 
|  CVE-2019-17531  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-17531)-2019-17531  | 
|  CVE-2019-17531  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-17531)-2019-17531  | 
|  CVE-2019-20330  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2019-20330](https://nvd.nist.gov/vuln/detail/CVE-2019-20330)  | 
|  CVE-2019-20330  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2019-20330](https://nvd.nist.gov/vuln/detail/CVE-2019-20330)  | 
|  CVE-2020-8840  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-8840](https://nvd.nist.gov/vuln/detail/CVE-2020-8840)  | 
|  CVE-2020-8840  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-8840](https://nvd.nist.gov/vuln/detail/CVE-2020-8840)  | 
|  CVE-2020-9546  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-9546](https://nvd.nist.gov/vuln/detail/CVE-2020-9546)  | 
|  CVE-2020-9546  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-9546](https://nvd.nist.gov/vuln/detail/CVE-2020-9546)  | 
|  CVE-2020-9547  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-9547](https://nvd.nist.gov/vuln/detail/CVE-2020-9547)  | 
|  CVE-2020-9547  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-9547](https://nvd.nist.gov/vuln/detail/CVE-2020-9547)  | 
|  CVE-2020-9548  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-9548](https://nvd.nist.gov/vuln/detail/CVE-2020-9548)  | 
|  CVE-2020-9548  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-9548](https://nvd.nist.gov/vuln/detail/CVE-2020-9548)  | 
|  CVE-2022-1471  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2022-1471](https://nvd.nist.gov/vuln/detail/CVE-2022-1471)  | 
|  CVE-2022-1471  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2022-1471](https://nvd.nist.gov/vuln/detail/CVE-2022-1471)  | 
|  CVE-2022-37865  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-202237865](https://nvd.nist.gov/vuln/detail/CVE-2022-37865)  | 
|  CVE-2022-39135  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-202239135](https://nvd.nist.gov/vuln/detail/CVE-2022-39135)  | 
|  CVE-2022-42889  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-202242889](https://nvd.nist.gov/vuln/detail/CVE-2022-42889)  | 
|  CVE-2022-46337  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-202246337](https://nvd.nist.gov/vuln/detail/CVE-2022-46337)  | 
|  CVE-2022-46337  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-202246337](https://nvd.nist.gov/vuln/detail/CVE-2022-46337)  | 
|  CVE-2024-51504  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-51504](https://nvd.nist.gov/vuln/detail/CVE-2024-51504)  | 
|  CVE-2024-51504  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-51504](https://nvd.nist.gov/vuln/detail/CVE-2024-51504)  | 
|  CVE-2024-52046  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-52046](https://nvd.nist.gov/vuln/detail/CVE-2024-52046)  | 
|  CVE-2024-52046  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-52046](https://nvd.nist.gov/vuln/detail/CVE-2024-52046)  | 
|  CVE-2024-52577  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-52577](https://nvd.nist.gov/vuln/detail/CVE-2024-52577)  | 
|  CVE-2024-53990  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-53990](https://nvd.nist.gov/vuln/detail/CVE-2024-53990)  | 
|  CVE-2024-56325  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-56325](https://nvd.nist.gov/vuln/detail/CVE-2024-56325)  | 
|  CVE-2025-30065  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2025-30065](https://nvd.nist.gov/vuln/detail/CVE-2025-30065)  | 
|  CVE-2014-3643  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2014-3643](https://nvd.nist.gov/vuln/detail/CVE-2014-3643)  | 
|  CVE-2015-5237  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2015-5237)-2015-5237  | 
|  CVE-2015-5237  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2015-5237)-2015-5237  | 
|  CVE-2016-6796  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2016-6796)-2016-6796  | 
|  CVE-2018-1000180  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2018-1000180](https://nvd.nist.gov/vuln/detail/CVE-2018-1000180)  | 
|  CVE-2018-1000180  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2018-1000180](https://nvd.nist.gov/vuln/detail/CVE-2018-1000180)  | 
|  CVE-2018-12022  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2018-12022](https://nvd.nist.gov/vuln/detail/CVE-2018-12022)  | 
|  CVE-2018-12022  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2018-12022](https://nvd.nist.gov/vuln/detail/CVE-2018-12022)  | 
|  CVE-2018-12023  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2018-12023](https://nvd.nist.gov/vuln/detail/CVE-2018-12023)  | 
|  CVE-2018-12023  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2018-12023](https://nvd.nist.gov/vuln/detail/CVE-2018-12023)  | 
|  CVE-2018-5968  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-5968)-2018-5968  | 
|  CVE-2019-0205  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2019-0205](https://nvd.nist.gov/vuln/detail/CVE-2019-0205)  | 
|  CVE-2019-0205  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2019-0205](https://nvd.nist.gov/vuln/detail/CVE-2019-0205)  | 
|  CVE-2019-10172  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2019-10172](https://nvd.nist.gov/vuln/detail/CVE-2019-10172)  | 
|  CVE-2019-12086  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-12086)-2019-12086  | 
|  CVE-2019-12086  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-12086)-2019-12086  | 
|  CVE-2019-14439  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-14439)-2019-14439  | 
|  CVE-2019-14439  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-14439)-2019-14439  | 
|  CVE-2020-10650  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-10650](https://nvd.nist.gov/vuln/detail/CVE-2020-10650)  | 
|  CVE-2020-10650  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-10650](https://nvd.nist.gov/vuln/detail/CVE-2020-10650)  | 
|  CVE-2020-10672  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-10672](https://nvd.nist.gov/vuln/detail/CVE-2020-10672)  | 
|  CVE-2020-10672  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-10672](https://nvd.nist.gov/vuln/detail/CVE-2020-10672)  | 
|  CVE-2020-10673  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-10673](https://nvd.nist.gov/vuln/detail/CVE-2020-10673)  | 
|  CVE-2020-10673  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-10673](https://nvd.nist.gov/vuln/detail/CVE-2020-10673)  | 
|  CVE-2020-10968  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-10968)-2020-10968  | 
|  CVE-2020-10968  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-10968)-2020-10968  | 
|  CVE-2020-10969  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-10969)-2020-10969  | 
|  CVE-2020-10969  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-10969)-2020-10969  | 
|  CVE-2020-11111  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-11111](https://nvd.nist.gov/vuln/detail/CVE-2020-11111)  | 
|  CVE-2020-11111  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-11111](https://nvd.nist.gov/vuln/detail/CVE-2020-11111)  | 
|  CVE-2020-11112  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-11112](https://nvd.nist.gov/vuln/detail/CVE-2020-11112)  | 
|  CVE-2020-11112  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-11112](https://nvd.nist.gov/vuln/detail/CVE-2020-11112)  | 
|  CVE-2020-11113  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-11113](https://nvd.nist.gov/vuln/detail/CVE-2020-11113)  | 
|  CVE-2020-11113  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-11113](https://nvd.nist.gov/vuln/detail/CVE-2020-11113)  | 
|  CVE-2020-11619  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-11619)-2020-11619  | 
|  CVE-2020-11619  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-11619)-2020-11619  | 
|  CVE-2020-11620  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-11620](https://nvd.nist.gov/vuln/detail/CVE-2020-11620)  | 
|  CVE-2020-11620  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-11620](https://nvd.nist.gov/vuln/detail/CVE-2020-11620)  | 
|  CVE-2020-13949  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-13949)-2020-13949  | 
|  CVE-2020-13949  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-13949)-2020-13949  | 
|  CVE-2020-13949  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-13949)-2020-13949  | 
|  CVE-2020-14060  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-14060)-2020-14060  | 
|  CVE-2020-14060  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-14060)-2020-14060  | 
|  CVE-2020-14061  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-14061)-2020-14061  | 
|  CVE-2020-14061  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-14061)-2020-14061  | 
|  CVE-2020-14062  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-14062)-2020-14062  | 
|  CVE-2020-14062  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-14062)-2020-14062  | 
|  CVE-2020-14195  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-14195](https://nvd.nist.gov/vuln/detail/CVE-2020-14195)  | 
|  CVE-2020-14195  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-14195](https://nvd.nist.gov/vuln/detail/CVE-2020-14195)  | 
|  CVE-2020-24616  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-24616](https://nvd.nist.gov/vuln/detail/CVE-2020-24616)  | 
|  CVE-2020-24616  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-24616](https://nvd.nist.gov/vuln/detail/CVE-2020-24616)  | 
|  CVE-2020-24750  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-24750](https://nvd.nist.gov/vuln/detail/CVE-2020-24750)  | 
|  CVE-2020-24750  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-24750](https://nvd.nist.gov/vuln/detail/CVE-2020-24750)  | 
|  CVE-2020-25649  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-25649](https://nvd.nist.gov/vuln/detail/CVE-2020-25649)  | 
|  CVE-2020-28052  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-28052](https://nvd.nist.gov/vuln/detail/CVE-2020-28052)  | 
|  CVE-2020-35490  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-35490](https://nvd.nist.gov/vuln/detail/CVE-2020-35490)  | 
|  CVE-2020-35490  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-35490](https://nvd.nist.gov/vuln/detail/CVE-2020-35490)  | 
|  CVE-2020-35491  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-35491](https://nvd.nist.gov/vuln/detail/CVE-2020-35491)  | 
|  CVE-2020-35491  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-35491](https://nvd.nist.gov/vuln/detail/CVE-2020-35491)  | 
|  CVE-2020-35728  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-35728](https://nvd.nist.gov/vuln/detail/CVE-2020-35728)  | 
|  CVE-2020-35728  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-35728](https://nvd.nist.gov/vuln/detail/CVE-2020-35728)  | 
|  CVE-2020-36179  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36179](https://nvd.nist.gov/vuln/detail/CVE-2020-36179)  | 
|  CVE-2020-36179  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36179](https://nvd.nist.gov/vuln/detail/CVE-2020-36179)  | 
|  CVE-2020-36180  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36180](https://nvd.nist.gov/vuln/detail/CVE-2020-36180)  | 
|  CVE-2020-36180  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36180](https://nvd.nist.gov/vuln/detail/CVE-2020-36180)  | 
|  CVE-2020-36181  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36181](https://nvd.nist.gov/vuln/detail/CVE-2020-36181)  | 
|  CVE-2020-36181  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36181](https://nvd.nist.gov/vuln/detail/CVE-2020-36181)  | 
|  CVE-2020-36182  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36182](https://nvd.nist.gov/vuln/detail/CVE-2020-36182)  | 
|  CVE-2020-36182  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36182](https://nvd.nist.gov/vuln/detail/CVE-2020-36182)  | 
|  CVE-2020-36183  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36183](https://nvd.nist.gov/vuln/detail/CVE-2020-36183)  | 
|  CVE-2020-36183  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36183](https://nvd.nist.gov/vuln/detail/CVE-2020-36183)  | 
|  CVE-2020-36184  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36184](https://nvd.nist.gov/vuln/detail/CVE-2020-36184)  | 
|  CVE-2020-36184  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36184](https://nvd.nist.gov/vuln/detail/CVE-2020-36184)  | 
|  CVE-2020-36185  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36185](https://nvd.nist.gov/vuln/detail/CVE-2020-36185)  | 
|  CVE-2020-36185  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36185](https://nvd.nist.gov/vuln/detail/CVE-2020-36185)  | 
|  CVE-2020-36186  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36186](https://nvd.nist.gov/vuln/detail/CVE-2020-36186)  | 
|  CVE-2020-36186  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36186](https://nvd.nist.gov/vuln/detail/CVE-2020-36186)  | 
|  CVE-2020-36187  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36187](https://nvd.nist.gov/vuln/detail/CVE-2020-36187)  | 
|  CVE-2020-36187  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36187](https://nvd.nist.gov/vuln/detail/CVE-2020-36187)  | 
|  CVE-2020-36188  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36188](https://nvd.nist.gov/vuln/detail/CVE-2020-36188)  | 
|  CVE-2020-36188  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36188](https://nvd.nist.gov/vuln/detail/CVE-2020-36188)  | 
|  CVE-2020-36189  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36189](https://nvd.nist.gov/vuln/detail/CVE-2020-36189)  | 
|  CVE-2020-36189  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36189](https://nvd.nist.gov/vuln/detail/CVE-2020-36189)  | 
|  CVE-2020-36518  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36518](https://nvd.nist.gov/vuln/detail/CVE-2020-36518)  | 
|  CVE-2020-36518  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36518](https://nvd.nist.gov/vuln/detail/CVE-2020-36518)  | 
|  CVE-2021-20190  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2021-20190](https://nvd.nist.gov/vuln/detail/CVE-2021-20190)  | 
|  CVE-2021-20190  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2021-20190](https://nvd.nist.gov/vuln/detail/CVE-2021-20190)  | 
|  CVE-2021-31684  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2021-31684](https://nvd.nist.gov/vuln/detail/CVE-2021-31684)  | 
|  CVE-2021-34538  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2021-34538](https://nvd.nist.gov/vuln/detail/CVE-2021-34538)  | 
|  CVE-2021-34538  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2021-34538](https://nvd.nist.gov/vuln/detail/CVE-2021-34538)  | 
|  CVE-2021-34538  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2021-34538](https://nvd.nist.gov/vuln/detail/CVE-2021-34538)  | 
|  CVE-2022-25647  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-202225647](https://nvd.nist.gov/vuln/detail/CVE-2022-25647)  | 
|  CVE-2022-25647  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-202225647](https://nvd.nist.gov/vuln/detail/CVE-2022-25647)  | 
|  CVE-2022-25647  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-202225647](https://nvd.nist.gov/vuln/detail/CVE-2022-25647)  | 
|  CVE-2022-25857  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-202225857](https://nvd.nist.gov/vuln/detail/CVE-2022-25857)  | 
|  CVE-2022-3171  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2022-3171](https://nvd.nist.gov/vuln/detail/CVE-2022-3171)  | 
|  CVE-2022-3171  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2022-3171](https://nvd.nist.gov/vuln/detail/CVE-2022-3171)  | 
|  CVE-2022-3509  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2022-3509](https://nvd.nist.gov/vuln/detail/CVE-2022-3509)  | 
|  CVE-2022-3509  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2022-3509](https://nvd.nist.gov/vuln/detail/CVE-2022-3509)  | 
|  CVE-2022-3510  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-20223510](https://nvd.nist.gov/vuln/detail/CVE-2022-3510)  | 
|  CVE-2022-36364  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-202236364](https://nvd.nist.gov/vuln/detail/CVE-2022-36364)  | 
|  CVE-2022-37866  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-202237866](https://nvd.nist.gov/vuln/detail/CVE-2022-37866)  | 
|  CVE-2022-40149  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-202240149](https://nvd.nist.gov/vuln/detail/CVE-2022-40149)  | 
|  CVE-2022-40149  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-202240149](https://nvd.nist.gov/vuln/detail/CVE-2022-40149)  | 
|  CVE-2022-40150  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-202240150](https://nvd.nist.gov/vuln/detail/CVE-2022-40150)  | 
|  CVE-2022-40150  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-202240150](https://nvd.nist.gov/vuln/detail/CVE-2022-40150)  | 
|  CVE-2022-41404  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-41404)-2022-41404  | 
|  CVE-2022-42003  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2022-42003](https://nvd.nist.gov/vuln/detail/CVE-2022-42003)  | 
|  CVE-2022-42003  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2022-42003](https://nvd.nist.gov/vuln/detail/CVE-2022-42003)  | 
|  CVE-2022-42003  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2022-42003](https://nvd.nist.gov/vuln/detail/CVE-2022-42003)  | 
|  CVE-2022-42003  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2022-42003](https://nvd.nist.gov/vuln/detail/CVE-2022-42003)  | 
|  CVE-2022-42003  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2022-42003](https://nvd.nist.gov/vuln/detail/CVE-2022-42003)  | 
|  CVE-2022-42004  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2022-42004](https://nvd.nist.gov/vuln/detail/CVE-2022-42004)  | 
|  CVE-2022-42004  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2022-42004](https://nvd.nist.gov/vuln/detail/CVE-2022-42004)  | 
|  CVE-2022-42004  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2022-42004](https://nvd.nist.gov/vuln/detail/CVE-2022-42004)  | 
|  CVE-2022-42004  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2022-42004](https://nvd.nist.gov/vuln/detail/CVE-2022-42004)  | 
|  CVE-2022-45685  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-202245685](https://nvd.nist.gov/vuln/detail/CVE-2022-45685)  | 
|  CVE-2022-45685  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-202245685](https://nvd.nist.gov/vuln/detail/CVE-2022-45685)  | 
|  CVE-2022-45693  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-202245693](https://nvd.nist.gov/vuln/detail/CVE-2022-45693)  | 
|  CVE-2022-45693  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-202245693](https://nvd.nist.gov/vuln/detail/CVE-2022-45693)  | 
|  CVE-2022-46751  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-202246751](https://nvd.nist.gov/vuln/detail/CVE-2022-46751)  | 
|  CVE-2022-46751  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-202246751](https://nvd.nist.gov/vuln/detail/CVE-2022-46751)  | 
|  CVE-2023-1370  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-1370](https://nvd.nist.gov/vuln/detail/CVE-2023-1370)  | 
|  CVE-2023-1436  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-1436](https://nvd.nist.gov/vuln/detail/CVE-2023-1436)  | 
|  CVE-2023-1436  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-1436](https://nvd.nist.gov/vuln/detail/CVE-2023-1436)  | 
|  CVE-2023-2976  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-2976](https://nvd.nist.gov/vuln/detail/CVE-2023-2976)  | 
|  CVE-2023-2976  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-2976](https://nvd.nist.gov/vuln/detail/CVE-2023-2976)  | 
|  CVE-2023-2976  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-2976](https://nvd.nist.gov/vuln/detail/CVE-2023-2976)  | 
|  CVE-2023-2976  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-2976](https://nvd.nist.gov/vuln/detail/CVE-2023-2976)  | 
|  CVE-2023-2976  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-2976](https://nvd.nist.gov/vuln/detail/CVE-2023-2976)  | 
|  CVE-2023-2976  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-2976](https://nvd.nist.gov/vuln/detail/CVE-2023-2976)  | 
|  CVE-2023-2976  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-2976](https://nvd.nist.gov/vuln/detail/CVE-2023-2976)  | 
|  CVE-2023-2976  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-2976](https://nvd.nist.gov/vuln/detail/CVE-2023-2976)  | 
|  CVE-2023-2976  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-2976](https://nvd.nist.gov/vuln/detail/CVE-2023-2976)  | 
|  CVE-2023-2976  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-2976](https://nvd.nist.gov/vuln/detail/CVE-2023-2976)  | 
|  CVE-2023-39410  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-39410](https://nvd.nist.gov/vuln/detail/CVE-2023-39410)  | 
|  CVE-2023-6378  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-6378](https://nvd.nist.gov/vuln/detail/CVE-2023-6378)  | 
|  CVE-2023-6378  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-6378](https://nvd.nist.gov/vuln/detail/CVE-2023-6378)  | 
|  CVE-2023-6481  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-6481](https://nvd.nist.gov/vuln/detail/CVE-2023-6481)  | 
|  CVE-2023-6481  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-6481](https://nvd.nist.gov/vuln/detail/CVE-2023-6481)  | 
|  CVE-2024-13009  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-13009](https://nvd.nist.gov/vuln/detail/CVE-2024-13009)  | 
|  CVE-2024-13009  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-13009](https://nvd.nist.gov/vuln/detail/CVE-2024-13009)  | 
|  CVE-2024-29131  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-29131](https://nvd.nist.gov/vuln/detail/CVE-2024-29131)  | 
|  CVE-2024-29857  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-29857](https://nvd.nist.gov/vuln/detail/CVE-2024-29857)  | 
|  CVE-2024-29857  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-29857](https://nvd.nist.gov/vuln/detail/CVE-2024-29857)  | 
|  CVE-2024-29857  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-29857](https://nvd.nist.gov/vuln/detail/CVE-2024-29857)  | 
|  CVE-2024-29857  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-29857](https://nvd.nist.gov/vuln/detail/CVE-2024-29857)  | 
|  CVE-2024-30172  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-30172](https://nvd.nist.gov/vuln/detail/CVE-2024-30172)  | 
|  CVE-2024-30172  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-30172](https://nvd.nist.gov/vuln/detail/CVE-2024-30172)  | 
|  CVE-2024-34447  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-34447](https://nvd.nist.gov/vuln/detail/CVE-2024-34447)  | 
|  CVE-2024-34447  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-34447](https://nvd.nist.gov/vuln/detail/CVE-2024-34447)  | 
|  CVE-2024-36114  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-36114](https://nvd.nist.gov/vuln/detail/CVE-2024-36114)  | 
|  CVE-2024-36114  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-36114](https://nvd.nist.gov/vuln/detail/CVE-2024-36114)  | 
|  CVE-2024-47561  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-47561](https://nvd.nist.gov/vuln/detail/CVE-2024-47561)  | 
|  CVE-2024-57699  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-57699](https://nvd.nist.gov/vuln/detail/CVE-2024-57699)  | 
|  CVE-2024-7254  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-7254](https://nvd.nist.gov/vuln/detail/CVE-2024-7254)  | 
|  CVE-2024-7254  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-7254](https://nvd.nist.gov/vuln/detail/CVE-2024-7254)  | 
|  CVE-2024-7254  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-7254](https://nvd.nist.gov/vuln/detail/CVE-2024-7254)  | 
|  CVE-2024-7254  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-7254](https://nvd.nist.gov/vuln/detail/CVE-2024-7254)  | 
|  CVE-2024-7254  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-7254](https://nvd.nist.gov/vuln/detail/CVE-2024-7254)  | 
|  CVE-2024-7254  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-7254](https://nvd.nist.gov/vuln/detail/CVE-2024-7254)  | 
|  CVE-2024-7254  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-7254](https://nvd.nist.gov/vuln/detail/CVE-2024-7254)  | 
|  CVE-2024-9823  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-9823](https://nvd.nist.gov/vuln/detail/CVE-2024-9823)  | 
|  CVE-2025-1948  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2025-1948](https://nvd.nist.gov/vuln/detail/CVE-2025-1948)  | 
|  CVE-2025-24970  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2025-24970](https://nvd.nist.gov/vuln/detail/CVE-2025-24970)  | 
|  CVE-2025-24970  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2025-24970](https://nvd.nist.gov/vuln/detail/CVE-2025-24970)  | 
|  CVE-2025-27553  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2025-27553](https://nvd.nist.gov/vuln/detail/CVE-2025-27553)  | 
|  CVE-2025-27817  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2025-27817](https://nvd.nist.gov/vuln/detail/CVE-2025-27817)  | 
|  CVE-2025-27817  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2025-27817](https://nvd.nist.gov/vuln/detail/CVE-2025-27817)  | 
|  CVE-2025-27817  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2025-27817](https://nvd.nist.gov/vuln/detail/CVE-2025-27817)  | 
|  CVE-2025-27820  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2025-27820](https://nvd.nist.gov/vuln/detail/CVE-2025-27820)  | 
|  CVE-2025-27820  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2025-27820](https://nvd.nist.gov/vuln/detail/CVE-2025-27820)  | 
|  CVE-2025-30706  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2025-30706](https://nvd.nist.gov/vuln/detail/CVE-2025-30706)  | 
|  CVE-2025-30706  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2025-30706](https://nvd.nist.gov/vuln/detail/CVE-2025-30706)  | 
|  CVE-2025-46762  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2025-46762](https://nvd.nist.gov/vuln/detail/CVE-2025-46762)  | 
|  CVE-2025-48734  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2025-48734](https://nvd.nist.gov/vuln/detail/CVE-2025-48734)  | 
|  CVE-2025-48734  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2025-48734](https://nvd.nist.gov/vuln/detail/CVE-2025-48734)  | 
|  CVE-2025-49146  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2025-49146](https://nvd.nist.gov/vuln/detail/CVE-2025-49146)  | 
|  CVE-2025-5115  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2025-5115](https://nvd.nist.gov/vuln/detail/CVE-2025-5115)  | 
|  CVE-2025-52434  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2025-52434](https://nvd.nist.gov/vuln/detail/CVE-2025-52434)  | 
|  CVE-2025-52999  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2025-52999](https://nvd.nist.gov/vuln/detail/CVE-2025-52999)  | 
|  CVE-2025-52999  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2025-52999](https://nvd.nist.gov/vuln/detail/CVE-2025-52999)  | 
|  CVE-2025-52999  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2025-52999](https://nvd.nist.gov/vuln/detail/CVE-2025-52999)  | 
|  CVE-2025-52999  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2025-52999](https://nvd.nist.gov/vuln/detail/CVE-2025-52999)  | 
|  CVE-2025-52999  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2025-52999](https://nvd.nist.gov/vuln/detail/CVE-2025-52999)  | 
|  CVE-2025-52999  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2025-52999](https://nvd.nist.gov/vuln/detail/CVE-2025-52999)  | 
|  CVE-2025-55163  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2025-55163](https://nvd.nist.gov/vuln/detail/CVE-2025-55163)  | 
|  CVE-2025-55163  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2025-55163](https://nvd.nist.gov/vuln/detail/CVE-2025-55163)  | 
|  CVE-2025-58056  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2025-58056](https://nvd.nist.gov/vuln/detail/CVE-2025-58056)  | 
|  CVE-2025-58056  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2025-58056](https://nvd.nist.gov/vuln/detail/CVE-2025-58056)  | 
|  CVE-2025-58057  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2025-58057](https://nvd.nist.gov/vuln/detail/CVE-2025-58057)  | 
|  CVE-2025-58057  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2025-58057](https://nvd.nist.gov/vuln/detail/CVE-2025-58057)  | 
|  CVE-2025-58057  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2025-58057](https://nvd.nist.gov/vuln/detail/CVE-2025-58057)  | 
|  CVE-2025-58057  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2025-58057](https://nvd.nist.gov/vuln/detail/CVE-2025-58057)  | 
|  CVE-2012-5783  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2012-5783](https://nvd.nist.gov/vuln/detail/CVE-2012-5783)  | 
|  CVE-2012-5783  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2012-5783](https://nvd.nist.gov/vuln/detail/CVE-2012-5783)  | 
|  CVE-2012-6153  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2012-6153](https://nvd.nist.gov/vuln/detail/CVE-2012-6153)  | 
|  CVE-2012-6153  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2012-6153](https://nvd.nist.gov/vuln/detail/CVE-2012-6153)  | 
|  CVE-2018-10237  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2018-10237](https://nvd.nist.gov/vuln/detail/CVE-2018-10237)  | 
|  CVE-2018-10237  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2018-10237](https://nvd.nist.gov/vuln/detail/CVE-2018-10237)  | 
|  CVE-2018-10237  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2018-10237](https://nvd.nist.gov/vuln/detail/CVE-2018-10237)  | 
|  CVE-2018-10237  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2018-10237](https://nvd.nist.gov/vuln/detail/CVE-2018-10237)  | 
|  CVE-2018-10237  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2018-10237](https://nvd.nist.gov/vuln/detail/CVE-2018-10237)  | 
|  CVE-2018-11798  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2018-11798](https://nvd.nist.gov/vuln/detail/CVE-2018-11798)  | 
|  CVE-2018-1313  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2018-1313](https://nvd.nist.gov/vuln/detail/CVE-2018-1313)  | 
|  CVE-2019-12384  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-12384)-2019-12384  | 
|  CVE-2019-12384  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-12384)-2019-12384  | 
|  CVE-2019-12814  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-12814)-2019-12814  | 
|  CVE-2019-12814  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-12814)-2019-12814  | 
|  CVE-2020-13955  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-13955)-2020-13955  | 
|  CVE-2020-13956  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-13956)-2020-13956  | 
|  CVE-2020-15250  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-15250](https://nvd.nist.gov/vuln/detail/CVE-2020-15250)  | 
|  CVE-2020-15250  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-15250](https://nvd.nist.gov/vuln/detail/CVE-2020-15250)  | 
|  CVE-2020-15522  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-15522)-2020-15522  | 
|  CVE-2020-15522  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-15522)-2020-15522  | 
|  CVE-2020-15522  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-15522)-2020-15522  | 
|  CVE-2020-17521  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-17521)-2020-17521  | 
|  CVE-2020-17521  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-17521)-2020-17521  | 
|  CVE-2020-1945  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-1945](https://nvd.nist.gov/vuln/detail/CVE-2020-1945)  | 
|  CVE-2020-26939  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-26939](https://nvd.nist.gov/vuln/detail/CVE-2020-26939)  | 
|  CVE-2020-26939  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-26939](https://nvd.nist.gov/vuln/detail/CVE-2020-26939)  | 
|  CVE-2020-26939  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-26939](https://nvd.nist.gov/vuln/detail/CVE-2020-26939)  | 
|  CVE-2021-22569  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2021-22569](https://nvd.nist.gov/vuln/detail/CVE-2021-22569)  | 
|  CVE-2021-22569  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2021-22569](https://nvd.nist.gov/vuln/detail/CVE-2021-22569)  | 
|  CVE-2021-27568  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2021-27568](https://nvd.nist.gov/vuln/detail/CVE-2021-27568)  | 
|  CVE-2021-28170  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2021-28170](https://nvd.nist.gov/vuln/detail/CVE-2021-28170)  | 
|  CVE-2021-29425  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2021-29425](https://nvd.nist.gov/vuln/detail/CVE-2021-29425)  | 
|  CVE-2021-36373  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2021-36373](https://nvd.nist.gov/vuln/detail/CVE-2021-36373)  | 
|  CVE-2021-36374  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2021-36374](https://nvd.nist.gov/vuln/detail/CVE-2021-36374)  | 
|  CVE-202238749  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-202238749](https://nvd.nist.gov/vuln/detail/CVE-2022-38749)  | 
|  CVE-202238750  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-202238750](https://nvd.nist.gov/vuln/detail/CVE-2022-38750)  | 
|  CVE-202238751  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-202238751](https://nvd.nist.gov/vuln/detail/CVE-2022-38751)  | 
|  CVE-202238752  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-202238752](https://nvd.nist.gov/vuln/detail/CVE-2022-38752)  | 
|  CVE-2022-41854  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-41854)-2022-41854  | 
|  CVE-2023-0833  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-0833](https://nvd.nist.gov/vuln/detail/CVE-2023-0833)  | 
|  CVE-2023-33201  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-33201](https://nvd.nist.gov/vuln/detail/CVE-2023-33201)  | 
|  CVE-2023-33201  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-33201](https://nvd.nist.gov/vuln/detail/CVE-2023-33201)  | 
|  CVE-2023-33201  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-33201](https://nvd.nist.gov/vuln/detail/CVE-2023-33201)  | 
|  CVE-2023-33201  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-33201](https://nvd.nist.gov/vuln/detail/CVE-2023-33201)  | 
|  CVE-2023-33202  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-33202](https://nvd.nist.gov/vuln/detail/CVE-2023-33202)  | 
|  CVE-2023-33202  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-33202](https://nvd.nist.gov/vuln/detail/CVE-2023-33202)  | 
|  CVE-2023-33202  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-33202](https://nvd.nist.gov/vuln/detail/CVE-2023-33202)  | 
|  CVE-2023-33202  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-33202](https://nvd.nist.gov/vuln/detail/CVE-2023-33202)  | 
|  CVE-2023-42503  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-42503](https://nvd.nist.gov/vuln/detail/CVE-2023-42503)  | 
|  CVE-2023-51074  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-51074](https://nvd.nist.gov/vuln/detail/CVE-2023-51074)  | 
|  CVE-2024-12798  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-12798](https://nvd.nist.gov/vuln/detail/CVE-2024-12798)  | 
|  CVE-2024-12798  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-12798](https://nvd.nist.gov/vuln/detail/CVE-2024-12798)  | 
|  CVE-2024-12798  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-12798](https://nvd.nist.gov/vuln/detail/CVE-2024-12798)  | 
|  CVE-2024-12798  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-12798](https://nvd.nist.gov/vuln/detail/CVE-2024-12798)  | 
|  CVE-2024-12798  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-12798](https://nvd.nist.gov/vuln/detail/CVE-2024-12798)  | 
|  CVE-2024-12798  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-12798](https://nvd.nist.gov/vuln/detail/CVE-2024-12798)  | 
|  CVE-2024-23944  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-23944](https://nvd.nist.gov/vuln/detail/CVE-2024-23944)  | 
|  CVE-2024-23945  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-23945](https://nvd.nist.gov/vuln/detail/CVE-2024-23945)  | 
|  CVE-2024-23945  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-23945](https://nvd.nist.gov/vuln/detail/CVE-2024-23945)  | 
|  CVE-2024-23953  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-23953](https://nvd.nist.gov/vuln/detail/CVE-2024-23953)  | 
|  CVE-2024-23953  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-23953](https://nvd.nist.gov/vuln/detail/CVE-2024-23953)  | 
|  CVE-2024-25710  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-25710](https://nvd.nist.gov/vuln/detail/CVE-2024-25710)  | 
|  CVE-2024-25710  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-25710](https://nvd.nist.gov/vuln/detail/CVE-2024-25710)  | 
|  CVE-2024-26308  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-26308](https://nvd.nist.gov/vuln/detail/CVE-2024-26308)  | 
|  CVE-2024-26308  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-26308](https://nvd.nist.gov/vuln/detail/CVE-2024-26308)  | 
|  CVE-2024-29025  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-29025](https://nvd.nist.gov/vuln/detail/CVE-2024-29025)  | 
|  CVE-2024-29133  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-29133](https://nvd.nist.gov/vuln/detail/CVE-2024-29133)  | 
|  CVE-2024-29869  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-29869](https://nvd.nist.gov/vuln/detail/CVE-2024-29869)  | 
|  CVE-2024-29869  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-29869](https://nvd.nist.gov/vuln/detail/CVE-2024-29869)  | 
|  CVE-2024-30171  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-30171](https://nvd.nist.gov/vuln/detail/CVE-2024-30171)  | 
|  CVE-2024-30171  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-30171](https://nvd.nist.gov/vuln/detail/CVE-2024-30171)  | 
|  CVE-2024-30171  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-30171](https://nvd.nist.gov/vuln/detail/CVE-2024-30171)  | 
|  CVE-2024-30171  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-30171](https://nvd.nist.gov/vuln/detail/CVE-2024-30171)  | 
|  CVE-2024-31141  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-31141](https://nvd.nist.gov/vuln/detail/CVE-2024-31141)  | 
|  CVE-2024-47535  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-47535](https://nvd.nist.gov/vuln/detail/CVE-2024-47535)  | 
|  CVE-2024-47535  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-47535](https://nvd.nist.gov/vuln/detail/CVE-2024-47535)  | 
|  CVE-2024-47554  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-47554](https://nvd.nist.gov/vuln/detail/CVE-2024-47554)  | 
|  CVE-2024-47554  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-47554](https://nvd.nist.gov/vuln/detail/CVE-2024-47554)  | 
|  CVE-2024-47554  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-47554](https://nvd.nist.gov/vuln/detail/CVE-2024-47554)  | 
|  CVE-2024-47554  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-47554](https://nvd.nist.gov/vuln/detail/CVE-2024-47554)  | 
|  CVE-2024-52980  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-52980](https://nvd.nist.gov/vuln/detail/CVE-2024-52980)  | 
|  CVE-2024-56128  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-56128](https://nvd.nist.gov/vuln/detail/CVE-2024-56128)  | 
|  CVE-2024-6763  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-6763](https://nvd.nist.gov/vuln/detail/CVE-2024-6763)  | 
|  CVE-2024-6763  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-6763](https://nvd.nist.gov/vuln/detail/CVE-2024-6763)  | 
|  CVE-2024-6763  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-6763](https://nvd.nist.gov/vuln/detail/CVE-2024-6763)  | 
|  CVE-2024-6763  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-6763](https://nvd.nist.gov/vuln/detail/CVE-2024-6763)  | 
|  CVE-2024-6763  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-6763](https://nvd.nist.gov/vuln/detail/CVE-2024-6763)  | 
|  CVE-2024-8184  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-8184](https://nvd.nist.gov/vuln/detail/CVE-2024-8184)  | 
|  CVE-2025-22227  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2025-22227](https://nvd.nist.gov/vuln/detail/CVE-2025-22227)  | 
|  CVE-2025-25193  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2025-25193](https://nvd.nist.gov/vuln/detail/CVE-2025-25193)  | 
|  CVE-2025-25193  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2025-25193](https://nvd.nist.gov/vuln/detail/CVE-2025-25193)  | 
|  CVE-2025-25193  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2025-25193](https://nvd.nist.gov/vuln/detail/CVE-2025-25193)  | 
|  CVE-2025-30474  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2025-30474](https://nvd.nist.gov/vuln/detail/CVE-2025-30474)  | 
|  CVE-2025-3588  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2025-3588](https://nvd.nist.gov/vuln/detail/CVE-2025-3588)  | 
|  CVE-2025-46392  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2025-46392](https://nvd.nist.gov/vuln/detail/CVE-2025-46392)  | 
|  CVE-2025-46551  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2025-46551](https://nvd.nist.gov/vuln/detail/CVE-2025-46551)  | 
|  CVE-2025-48924  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2025-48924](https://nvd.nist.gov/vuln/detail/CVE-2025-48924)  | 
|  CVE-2025-48924  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2025-48924](https://nvd.nist.gov/vuln/detail/CVE-2025-48924)  | 
|  CVE-2025-48924  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2025-48924](https://nvd.nist.gov/vuln/detail/CVE-2025-48924)  | 
|  CVE-2025-48924  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2025-48924](https://nvd.nist.gov/vuln/detail/CVE-2025-48924)  | 
|  CVE-2025-48924  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2025-48924](https://nvd.nist.gov/vuln/detail/CVE-2025-48924)  | 
|  CVE-2025-48924  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2025-48924](https://nvd.nist.gov/vuln/detail/CVE-2025-48924)  | 
|  CVE-2025-48924  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2025-48924](https://nvd.nist.gov/vuln/detail/CVE-2025-48924)  | 
|  CVE-2025-48924  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2025-48924](https://nvd.nist.gov/vuln/detail/CVE-2025-48924)  | 
|  CVE-2025-48924  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2025-48924](https://nvd.nist.gov/vuln/detail/CVE-2025-48924)  | 
|  CVE-2025-48924  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2025-48924](https://nvd.nist.gov/vuln/detail/CVE-2025-48924)  | 
|  CVE-2025-49128  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2025-49128](https://nvd.nist.gov/vuln/detail/CVE-2025-49128)  | 
|  CVE-2025-49128  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2025-49128](https://nvd.nist.gov/vuln/detail/CVE-2025-49128)  | 
|  CVE-2025-49128  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2025-49128](https://nvd.nist.gov/vuln/detail/CVE-2025-49128)  | 
|  CVE-2025-49128  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2025-49128](https://nvd.nist.gov/vuln/detail/CVE-2025-49128)  | 
|  CVE-2025-53864  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2025-53864](https://nvd.nist.gov/vuln/detail/CVE-2025-53864)  | 
|  CVE-2025-53864  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2025-53864](https://nvd.nist.gov/vuln/detail/CVE-2025-53864)  | 
|  CVE-2025-58457  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2025-58457](https://nvd.nist.gov/vuln/detail/CVE-2025-58457)  | 
|  CVE-2025-58457  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2025-58457](https://nvd.nist.gov/vuln/detail/CVE-2025-58457)  | 
|  CVE-2025-58457  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2025-58457](https://nvd.nist.gov/vuln/detail/CVE-2025-58457)  | 
|  CVE-2025-8885  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2025-8885](https://nvd.nist.gov/vuln/detail/CVE-2025-8885)  | 
|  CVE-2025-8885  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2025-8885](https://nvd.nist.gov/vuln/detail/CVE-2025-8885)  | 
|  CVE-2025-8916  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2025-8916](https://nvd.nist.gov/vuln/detail/CVE-2025-8916)  | 
|  CVE-2025-8916  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2025-8916](https://nvd.nist.gov/vuln/detail/CVE-2025-8916)  | 
|  CVE-2025-8916  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2025-8916](https://nvd.nist.gov/vuln/detail/CVE-2025-8916)  | 
|  CVE-2025-8916  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2025-8916](https://nvd.nist.gov/vuln/detail/CVE-2025-8916)  | 
|  CVE-2020-8908  |  BAJA  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-8908](https://nvd.nist.gov/vuln/detail/CVE-2020-8908)  | 
|  CVE-2020-8908  |  BAJA  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-8908](https://nvd.nist.gov/vuln/detail/CVE-2020-8908)  | 
|  CVE-2020-8908  |  BAJA  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-8908](https://nvd.nist.gov/vuln/detail/CVE-2020-8908)  | 
|  CVE-2020-8908  |  BAJA  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-8908](https://nvd.nist.gov/vuln/detail/CVE-2020-8908)  | 
|  CVE-2020-8908  |  BAJA  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-8908](https://nvd.nist.gov/vuln/detail/CVE-2020-8908)  | 
|  CVE-2020-8908  |  BAJA  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-8908](https://nvd.nist.gov/vuln/detail/CVE-2020-8908)  | 
|  CVE-2020-8908  |  BAJA  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-8908](https://nvd.nist.gov/vuln/detail/CVE-2020-8908)  | 
|  CVE-2020-8908  |  BAJA  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-8908](https://nvd.nist.gov/vuln/detail/CVE-2020-8908)  | 
|  CVE-2020-8908  |  BAJA  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-8908](https://nvd.nist.gov/vuln/detail/CVE-2020-8908)  | 
|  CVE-2020-8908  |  BAJA  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-8908](https://nvd.nist.gov/vuln/detail/CVE-2020-8908)  | 
|  CVE-2024-12801  |  BAJA  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-12801](https://nvd.nist.gov/vuln/detail/CVE-2024-12801)  | 
|  CVE-2024-12801  |  BAJA  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-12801](https://nvd.nist.gov/vuln/detail/CVE-2024-12801)  | 
|  CVE-2024-12801  |  BAJA  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-12801](https://nvd.nist.gov/vuln/detail/CVE-2024-12801)  | 
|  CVE-2025-27496  |  BAJA  |  [https://nvd.nist. gov/vuln/detail/CVE-2025-27496](https://nvd.nist.gov/vuln/detail/CVE-2025-27496)  | 

## Notas de la versión 7.10.0
<a name="emr-7100-relnotes"></a>

Las siguientes notas de la versión incluyen información sobre la versión 7.10.0 de Amazon EMR.

**Nuevas características**
+ **Actualizaciones de la aplicación**: Amazon EMR 7.10.0 application upgrades include AWS SDK for Java 2.31.48/1.12.782, Delta 3.3.0-amzn-2, Hadoop 3.4.1-amzn-2, Hudi 0.15.0-amzn-7, Iceberg 1.8.1-amzn-0, Spark 3.5.5-amzn-1, and Zookeeper 3.9.3-amzn-2.
+ **Sistema de archivos S3A**: a partir de la versión EMR 7.10.0, el sistema de archivos S3A ha sustituido al EMRFS como conector EMR S3 predeterminado. Para obtener más información, consulte la [Guía de migración: EMRFS al sistema de archivos S3A](https://docs.aws.amazon.com/emr/latest/ReleaseGuide/emr-s3a-migrate.html).
+ **Soporte de streaming de Spark Kafka**: a partir de la versión EMR 7.10.0 aws-msk-iam-auth, se incluyen las dependencias 2.3.2 y commons-pool2 2.11.1 para las cargas de trabajo de streaming de Spark con fuentes de datos de Kafka. Están disponibles cuando se selecciona la aplicación Spark al lanzar el clúster. JARs 
+ **Conectores de streaming Flink**: a partir de la versión EMR 7.10.0, se incluyen 3.4.0 flink-sql-connector-kafka flink-sql-connector-kinesis, 5.0.0 aws-msk-iam-auth y 2.3.2 para las cargas de trabajo de streaming de Flink con fuentes de datos de Kafka y Kinesis. Estos conectores JARs están disponibles cuando se selecciona la aplicación Flink al lanzar el clúster.

**Problemas conocidos**
+ **Estado ACEPTADO**: la aplicación YARN está bloqueada en el estado aceptado debido al error de código abierto [YARN-11834](https://issues.apache.org/jira/browse/YARN-11834). Ponte en contacto con el equipo de AWS soporte si tienes este problema.
+ **ConcurrentModificationException excepción**[: YARN se reinicia con frecuencia con ConcurrentModificationException una excepción debido al error de código abierto YARN-11838.](https://issues.apache.org/jira/browse/YARN-11838) Ponte en contacto con el equipo de AWS soporte si encuentras este problema.
+ **Registros de aplicaciones YARN**: los registros de aplicaciones de YARN no están visibles en la interfaz de usuario de Resource Manager. Siga estos pasos para solucionar el problema:

  1. Actualice la configuración de `yarn.log.server.url` en yarn-site.xml al siguiente valor:

     ```
     <property>
       <name>yarn.log.server.url</name>
       <value>https://<private-dns-master-node>:19890/jobhistory/logs</value>
     </property>
     ```

  1. Reinicie el servicio de administrador de recursos de Hadoop: `systemctl restart hadoop-resourcemanager.service`
+ **Carga de registros de pasos**: es posible que algunos clústeres no puedan cargar los registros de pasos a su bucket de S3 debido a una condición de carrera. Ponte en contacto con el equipo de AWS soporte si te encuentras con este problema.
+  **HBase creación de tablas en el catálogo Hive with Glue**: desde EMR-7.3.0 hasta EMR-7.10.0, hay un error debido a la integración de Hive Iceberg, que hace que la HBase creación de tablas en Hive falle cuando se utiliza Glue Data Catalog como metaalmacén. Ponte en contacto con el equipo de soporte si tienes este problema. AWS 
+  **IU de Tez**: de EMR-7.3 a EMR-7.10, hay un error que hace que el acceso a la IU de Tez a través de la interfaz de usuario web de YARN Resource Manager falle cuando se habilita el cifrado en tránsito. Esto ocurre porque el proxy YARN intenta usar el protocolo HTTP, mientras que la interfaz de usuario de Tez requiere HTTPS. Modifique la configuración de `tez.tez-ui.history-url.base` en `tez-site` de `http` a `https` para resolver este problema.
+ Etiquetas de publicación y regiones compatibles.    
[\[See the AWS documentation website for more details\]](http://docs.aws.amazon.com/es_es/emr/latest/ReleaseGuide/emr-7100-release.html)

## Versiones Java predeterminadas de 7.10.0
<a name="emr-7100-jdk"></a>

La versión 7.10 y posteriores de Amazon EMR incluyen Amazon Corretto 17 (basado en OpenJDK) de forma predeterminada para las aplicaciones compatibles con Corretto 17 (JDK 17), con la excepción de Apache Livy.

En la siguiente tabla se muestran las versiones predeterminadas de Java para las aplicaciones de Amazon EMR 7.10.0. Si desea cambiar la JVM predeterminada del clúster, siga las instrucciones de [Configuración de aplicaciones para utilizar una máquina virtual de Java específica](configuring-java8.md) para cada aplicación que se ejecute en el clúster. Solo se puede usar una versión de tiempo de ejecución de Java en un clúster. Amazon EMR no admite la ejecución de distintos nodos o aplicaciones en distintas versiones de tiempo de ejecución en el mismo clúster.


| Aplicación | Versión de Java o Amazon Corretto (el valor predeterminado está en negrita) | 
| --- | --- | 
| Delta | 17, 11, 8 | 
| Flink | 17, 11, 8 | 
| HBase | 17, 11, 8 | 
| HCatalog | 17, 11, 8 | 
| Hadoop | 17, 11, 8 | 
| Hive | 17, 11, 8 | 
| Hudi | 17, 11, 8 | 
| Iceberg | 17, 11 | 
| Livy | 17, 11, 8 | 
| Oozie | 17, 11, 8 | 
| Phoenix | 17, 11, 8 | 
| PrestoDB | 8 | 
| Spark | 17, 11, 8 | 
| Spark RAPIDS | 17, 11, 8 | 
| Tez | 17, 11, 8 | 
| Trino | 21, 17 | 
| Zeppelin | 17, 11, 8 | 
| Pig | 17, 11, 8 | 
| ZooKeeper | 17, 11, 8 | 

## Versiones de componentes 7.10.0
<a name="emr-7100-components"></a>

A continuación, se muestran los componentes que Amazon EMR instala con esta versión. Algunos se instalan como parte de paquetes de aplicación de macrodatos. Otros son exclusivos de Amazon EMR y se instalan para ciertos procesos y características del sistema. Normalmente, estos componentes comienzan con `emr` o `aws`. Normalmente, los paquetes de aplicación de macrodatos de la versión más reciente de Amazon EMR son las versiones más recientes que pueden encontrarse en la comunidad. Intentamos que las versiones de la comunidad estén disponibles en Amazon EMR lo más rápido posible.

Algunos componentes de Amazon EMR son distintos de las versiones que se encuentran en la comunidad. Estos componentes tienen una etiqueta de versión con el formato `CommunityVersion-amzn-EmrVersion`. La `EmrVersion` empieza por 0. Por ejemplo, si un componente de la comunidad de código abierto llamado `myapp-component` con la versión 2.2 se ha modificado tres veces para incluirlo en diferentes versiones de lanzamiento de Amazon EMR, la versión que se mostrará será `2.2-amzn-2`.


| Componente | Versión | Description (Descripción) | 
| --- | --- | --- | 
| adot-java-agent | 1.31.0 | Un agente Java que recopila métricas de los daemons de las aplicaciones. | 
| delta | 3.3.0-amzn-2 | Delta Lake es un formato de tabla abierto para conjuntos de datos analíticos de gran tamaño | 
| emr-amazon-cloudwatch-agent | 1.300032.2-amzn-0 | Se trata de una aplicación que recopila métricas internas de nivel de sistema y métricas de aplicación personalizadas de las instancias de Amazon EC2. | 
| emr-ddb | 5.7.0 | Conector de Amazon DynamoDB para aplicaciones del ecosistema de Hadoop. | 
| emr-goodies | 3.19.0 | Bibliotecas especialmente prácticas para el ecosistema de Hadoop. | 
| emr-kinesis | 3,23,0 | Conector de Amazon Kinesis para aplicaciones del ecosistema de Hadoop. | 
| emr-notebook-env | 1.18.0 | Entorno de Conda para cuaderno de EMR que incluye una puerta de enlace empresarial de Jupyter | 
| emr-s3-dist-cp | 2.40.0 | Aplicación de copia distribuida optimizada para Amazon S3. | 
| emr-s3-select | 2.19.0 | Conector S3Select de EMR | 
| emr-wal-cli | 1.3.4 | CLI utilizada para eliminar o enumerar WAL de ERM. | 
| emrfs | 2.71,0 | Conector de Amazon S3 para aplicaciones del ecosistema de Hadoop. | 
| flink-client | 1.20.0-amzn-4 | Scripts y aplicaciones de cliente de línea de comando de Apache Flink. | 
| flink-jobmanager-config | 1.20.0-amzn-4 | Administración de recursos en nodos EMR para Apache Flink. JobManager | 
| hadoop-client | 3.4.1-amzn-2 | Los clientes de línea de comando de Hadoop como, por ejemplo "hdfs", "hadoop" o "yarn". | 
| hadoop-hdfs-datanode | 3.4.1-amzn-2 | Servicio de nivel de nodos de HDFS para el almacenamiento de bloques. | 
| hadoop-hdfs-library | 3.4.1-amzn-2 | Biblioteca y cliente de línea de comandos HDFS | 
| hadoop-hdfs-namenode | 3.4.1-amzn-2 | Servicio de HDFS para realizar un seguimiento de nombres de archivo y bloquear ubicaciones. | 
| hadoop-hdfs-journalnode | 3.4.1-amzn-2 | Servicio de HDFS para administrar los archivos de Hadoop periódico en clústeres de alta disponibilidad. | 
| hadoop-httpfs-server | 3.4.1-amzn-2 | Punto de enlace HTTP para operaciones HDFS. | 
| hadoop-kms-server | 3.4.1-amzn-2 | Servidor de administración de claves criptográficas basado en la API de Hadoop. KeyProvider  | 
| hadoop-mapred | 3.4.1-amzn-2 | MapReduce bibliotecas de motores de ejecución para ejecutar una aplicación. MapReduce  | 
| hadoop-yarn-nodemanager | 3.4.1-amzn-2 | Servicio de YARN para la administración de contenedores en un nodo individual. | 
| hadoop-yarn-resourcemanager | 3.4.1-amzn-2 | Servicio de YARN para la asignación y administración de recursos de clúster y aplicaciones distribuidas. | 
| hadoop-yarn-timeline-server | 3.4.1-amzn-2 | Servicio para recuperar información actual e histórica para aplicaciones de YARN. | 
| hbase-hmaster | 2.6.2-amzn-1 | Servicio para un HBase clúster responsable de la coordinación de las regiones y la ejecución de los comandos administrativos. | 
| hbase-region-server | 2.6.2-amzn-1 | Servicio para prestar servicio a una o más regiones. HBase  | 
| hbase-client | 2.6.2-amzn-1 | HBase cliente de línea de comandos. | 
| hbase-rest-server | 2.6.2-amzn-1 | Servicio que proporciona un punto final HTTP para. RESTful HBase | 
| hbase-thrift-server | 2.6.2-amzn-1 | Servicio que proporciona un punto final de Thrift a. HBase | 
| hbase-operator-tools | 2.6.2-amzn-1 | Herramienta de reparación de clústeres de Apache. HBase  | 
| hcatalog-client | 3.1.3-amzn-19 | El cliente de línea de comando "hcat" para manipular hcatalog-server. | 
| hcatalog-server | 3.1.3-amzn-19 | Prestación de servicios HCatalog, una capa de administración de tablas y almacenamiento para aplicaciones distribuidas. | 
| hcatalog-webhcat-server | 3.1.3-amzn-19 | Punto final HTTP que proporciona una interfaz REST para. HCatalog | 
| hive-client | 3.1.3-amzn-19 | Cliente de línea de comando de Hive. | 
| hive-hbase | 3.1.3-amzn-19 | Hive-hbase client. | 
| hive-metastore-server | 3.1.3-amzn-19 | Service para acceder al metaalmacén de Hive, un repositorio semántico que almacena metadatos para SQL en operaciones de Hadoop. | 
| hive-server2 | 3.1.3-amzn-19 | Servicio para aceptar consultas de Hive como solicitudes web. | 
| hudi | 0.15.0-amzn-7 | Marco de procesamiento incremental para impulsar la canalización de datos a baja latencia y alta eficiencia. | 
| hudi-presto | 0.15.0-amzn-7 | Biblioteca de paquetes para ejecutar Presto con Hudi. | 
| hudi-trino | 0.15.0-amzn-7 | Biblioteca de paquetes para ejecutar Trino con Hudi. | 
| hudi-spark | 0.15.0-amzn-7 | Biblioteca de paquetes para ejecutar Spark con Hudi. | 
| hue-server | 4.11.0 | Aplicación web para analizar datos con aplicaciones del ecosistema de Hadoop | 
| iceberg | 1.8.1-amzn-0 | Apache Iceberg es un formato de tabla abierto para conjuntos de datos analíticos muy grandes | 
| jupyterhub | 1.5.0 | Servidor multiusuario para blocs de notas Jupyter | 
| livy-server | 0.8.0-incubating | Interfaz de REST para interactuar con Apache Spark | 
| nginx | 1.12.1 | nginx [engine x] es un servidor HTTP y proxy inverso | 
| mariadb-server | 5.5.68\$1 | Servidor de base de datos de MariaDB. | 
| nvidia-cuda | 12.5.0 | Controladores Nvidia y conjunto de herramientas Cuda | 
| oozie-client | 5.2.1 | Cliente de línea de comando de Oozie. | 
| oozie-server | 5.2.1 | Servicio para aceptar solicitudes de flujo de trabajo de Oozie. | 
| opencv | 4.7.0 | Biblioteca de visión artificial de código abierto. | 
| phoenix-library | 5.2.1 | Las bibliotecas de Phoenix para servidor y cliente | 
| phoenix-connectors | 6.0.0 | Conectores de Apache Phoenix para Spark-3 | 
| phoenix-query-server | 6.0.0 | Un servidor ligero que proporciona acceso a JDBC, así como acceso de formato Protocol Buffers y JSON al API de Avatica  | 
| presto-coordinator | 0.287-amzn-4 | Servicio para aceptar las consultas y administrar la ejecución de consultas entre presto-workers. | 
| presto-worker | 0.287-amzn-4 | Service para ejecutar partes de una consulta. | 
| presto-client | 0.287-amzn-4 | Cliente de línea de comandos Presto que se instala en los nodos principales en espera de un clúster de HA donde el servidor Presto no se ha iniciado. | 
| trino-coordinator | 470-amzn-0 | Servicio para aceptar consultas y administrar la ejecución de consultas entre trino-workers. | 
| trino-worker | 470-amzn-0 | Service para ejecutar partes de una consulta. | 
| trino-client | 470-amzn-0 | Cliente de línea de comandos Trino que se instala en los maestros en espera de un clúster de HA donde el servidor Trino no se ha iniciado. | 
| pig-client | 0.17.0 | Cliente de línea de comando de Pig. | 
| r | 4.3.2 | Proyecto R para análisis estadístico | 
| ranger-kms-server | 2.0.0 | Sistema de administración de claves Apache Ranger | 
| spark-client | 3.5.5-amzn-1 | Clientes de línea de comando de Spark. | 
| spark-history-server | 3.5.5-amzn-1 | IU web para la visualización de eventos registrados durante la vida útil de una aplicación Spark completada. | 
| spark-on-yarn | 3.5.5-amzn-1 | Motor de ejecución en memoria para YARN. | 
| spark-yarn-slave | 3.5.5-amzn-1 | Bibliotecas de Apache Spark necesarias para esclavos de YARN. | 
| spark-rapids | 3.5.5-amzn-1 | El complemento Nvidia Spark RAPIDS que acelera Apache Spark con. GPUs | 
| tensorflow | 2.18.0 | TensorFlow biblioteca de software de código abierto para computación numérica de alto rendimiento. | 
| tez-on-yarn | 0.10.2-amzn-17 | La aplicación YARN de tez y bibliotecas. | 
| tez-on-worker | 0.10.2-amzn-17 | La aplicación YARN de tez y bibliotecas para nodos de trabajo. | 
| zeppelin-server | 0.11.1 | Bloc de notas basado en web que permite el análisis de datos interactivo. | 
| zookeeper-server | 3.9.3-amzn-2 | Servicio centralizado para mantener información de configuración, nomenclatura, proporcionar sincronización distribuida y proporcionar servicios de grupo. | 
| zookeeper-client | 3.9.3-amzn-2 | ZooKeeper cliente de línea de comandos. | 

## Clasificaciones de configuración de 7.10.0
<a name="emr-7100-class"></a>

Las clasificaciones de configuración le permiten personalizar las aplicaciones. Suelen corresponder a un archivo XML de configuración para la aplicación como, por ejemplo, `hive-site.xml`. Para obtener más información, consulte [Configuración de aplicaciones](emr-configure-apps.md).

Las acciones de reconfiguración se producen cuando se especifica una configuración para los grupos de instancias de un clúster en ejecución. Amazon EMR solo inicia acciones de reconfiguración para las clasificaciones que se modifican. Para obtener más información, consulte [Reconfiguración de un grupo de instancias en un clúster en ejecución](emr-configure-apps-running-cluster.md).


**clasificaciones emr-7.10.0**  

| Clasificaciones | Description (Descripción) | Acciones de reconfiguración | 
| --- | --- | --- | 
| capacity-scheduler | Cambiar los valores en el archivo capacity-scheduler.xml de Hadoop. | Restarts the ResourceManager service. | 
| container-executor | Cambie los valores en el archivo container-executor.cfg de Hadoop YARN. | Not available. | 
| container-log4j | Cambiar los valores en el archivo container-log4j.properties de Hadoop YARN. | Not available. | 
| core-site | Cambiar los valores en el archivo core-site.xml de Hadoop. | Restarts the Hadoop HDFS services Namenode, SecondaryNamenode, Datanode, ZKFC, and Journalnode. Restarts the Hadoop YARN services ResourceManager, NodeManager, ProxyServer, and TimelineServer. Additionally restarts Hadoop KMS, Ranger KMS, HiveServer2, Hive MetaStore, Hadoop Httpfs, and MapReduce-HistoryServer. | 
| docker-conf | Cambie la configuración relacionada con el docker. | Not available. | 
| emrfs-site | Cambiar la configuración de EMRFS. | Restarts the Hadoop HDFS services Namenode, SecondaryNamenode, Datanode, ZKFC, and Journalnode. Restarts the Hadoop YARN services ResourceManager, NodeManager, ProxyServer, and TimelineServer. Additionally restarts HBaseRegionserver, HBaseMaster, HBaseThrift, HBaseRest, HiveServer2, Hive MetaStore, Hadoop Httpfs, and MapReduce-HistoryServer. | 
| flink-conf | Cambiar la configuración de flink-conf.yaml. | Restarts Flink history server. | 
| flink-log4j | Cambiar la configuración de log4j.properties de Flink. | Restarts Flink history server. | 
| flink-log4j-session | Cambie la configuración de Flink log4j-session.properties para la sesión. Kubernetes/Yarn  | Restarts Flink history server. | 
| flink-log4j-cli | Cambiar la configuración de log4j-cli.properties de Flink. | Restarts Flink history server. | 
| hadoop-env | Cambiar los valores en el entorno de Hadoop para todos los componentes de Hadoop. | Restarts the Hadoop HDFS services Namenode, SecondaryNamenode, Datanode, ZKFC, and Journalnode. Restarts the Hadoop YARN services ResourceManager, NodeManager, ProxyServer, and TimelineServer. Additionally restarts PhoenixQueryserver, HiveServer2, Hive MetaStore, and MapReduce-HistoryServer. | 
| hadoop-log4j | Cambiar los valores en el archivo log4j.properties de Hadoop. | Restarts the Hadoop HDFS services SecondaryNamenode, Datanode, and Journalnode. Restarts the Hadoop YARN services ResourceManager, NodeManager, ProxyServer, and TimelineServer. Additionally restarts Hadoop KMS, Hadoop Httpfs, and MapReduce-HistoryServer. | 
| hadoop-ssl-server | Cambiar la configuración del servidor ssl de Hadoop | Not available. | 
| hadoop-ssl-client | Cambiar la configuración del cliente ssl de Hadoop | Not available. | 
| hbase | Configuraciones seleccionadas por Amazon EMR para Apache. HBase | Custom EMR specific property. Sets emrfs-site and hbase-site configs. See those for their associated restarts. | 
| hbase-env | Cambie los valores en su entorno HBase. | Restarts the HBase services RegionServer, HBaseMaster, ThriftServer, RestServer. | 
| hbase-log4j2 | Cambie los valores en el archivo HBase hbase-log4j2.properties. | Restarts the HBase services RegionServer, HBaseMaster, ThriftServer, RestServer. | 
| hbase-metrics | Cambie los valores en el archivo hadoop-metrics2-hbase.properties. HBase | Restarts the HBase services RegionServer, HBaseMaster, ThriftServer, RestServer. | 
| hbase-policy | Cambie los valores en HBase el archivo hbase-policy.xml. | Not available. | 
| hbase-site | Cambie los valores en HBase el archivo hbase-site.xml. | Restarts the HBase services RegionServer, HBaseMaster, ThriftServer, RestServer. Additionally restarts Phoenix QueryServer. | 
| hdfs-encryption-zones | Configurar zonas de cifrado de HDFS. | This classification should not be reconfigured. | 
| hdfs-env | Cambiar los valores en el entorno de HDFS. | Restarts Hadoop HDFS services Namenode, Datanode, and ZKFC. | 
| hdfs-site | Cambiar los valores en hdfs-site.xml de HDFS. | Restarts the Hadoop HDFS services Namenode, SecondaryNamenode, Datanode, ZKFC, and Journalnode. Additionally restarts Hadoop Httpfs. | 
| hcatalog-env | Cambie los valores en HCatalog el entorno. | Restarts Hive HCatalog Server. | 
| hcatalog-server-jndi | Cambie los valores en HCatalog jndi.properties. | Restarts Hive HCatalog Server. | 
| hcatalog-server-proto-hive-site | Cambie los valores en .xml HCatalog. proto-hive-site | Restarts Hive HCatalog Server. | 
| hcatalog-webhcat-env | Cambie los valores en el entorno HCat de la HCatalog Web. | Restarts Hive WebHCat server. | 
| hcatalog-webhcat-log4j2 | Cambie los valores en las propiedades HCatalog HCat log4j2.properties de la Web. | Restarts Hive WebHCat server. | 
| hcatalog-webhcat-site | Cambie los valores del archivo webhcat-site.xml de la HCatalog WebHCat. | Restarts Hive WebHCat server. | 
| hive | Configuración de Amazon EMR mantenida para Apache Hive. | Sets configurations to launch Hive LLAP service. | 
| hive-beeline-log4j2 | Cambiar los valores en el archivo beeline-log4j2.properties de Hive. | Not available. | 
| hive-parquet-logging | Cambiar los valores en el archivo parquet-logging.properties de Hive. | Not available. | 
| hive-env | Cambiar los valores en el entorno de Hive. | Restarts HiveServer2, HiveMetastore, and Hive HCatalog-Server. Runs Hive schemaTool CLI commands to verify hive-metastore. | 
| hive-exec-log4j2 | Cambie los valores en el archivo hive-exec-log 4j2.properties de Hive. | Not available. | 
| hive-llap-daemon-log4j2 | Cambie los valores en el archivo 4j2.properties de Hive. llap-daemon-log | Not available. | 
| hive-log4j2 | Cambiar los valores en el archivo hive-log4j2.properties de Hive. | Not available. | 
| hive-site | Cambiar los valores en el archivo hive-site.xml de Hive. | Restarts HiveServer2, HiveMetastore, and Hive HCatalog-Server. Runs Hive schemaTool CLI commands to verify hive-metastore. Also restarts Oozie and Zeppelin. | 
| hiveserver2-site | Cambiar los valores en el archivo hiveserver2-site.xml de Hive Server2. | Not available. | 
| hue-ini | Cambiar los valores en el archivo ini de Hue | Restarts Hue. Also activates Hue config override CLI commands to pick up new configurations. | 
| httpfs-env | Cambiar los valores en el entorno de HTTPFS. | Restarts Hadoop Httpfs service. | 
| httpfs-site | Cambiar los valores en el archivo httpfs-site.xml de Hadoop. | Restarts Hadoop Httpfs service. | 
| hadoop-kms-acls | Cambiar los valores en el archivo kms-acls.xml de Hadoop. | Not available. | 
| hadoop-kms-env | Cambiar los valores en el entorno de Hadoop KMS. | Restarts Hadoop-KMS service. | 
| hadoop-kms-java-home | Cambie la página de inicio de Java de KMS de Hadoop | Not available. | 
| hadoop-kms-log4j | Cambiar los valores en el archivo kms-log4j.properties de Hadoop. | Not available. | 
| hadoop-kms-site | Cambiar los valores en el archivo kms-site.xml de Hadoop. | Restarts Hadoop-KMS and Ranger-KMS service. | 
| hudi-env | Cambiar los valores en el entorno de Hudi. | Not available. | 
| hudi-defaults | Cambie los valores en el archivo hudi-defaults.conf de Hudi. | Not available. | 
| iceberg-defaults | Cambie los valores del archivo iceberg-defaults.conf de Iceberg. | Not available. | 
| delta-defaults | Cambie los valores del archivo delta-defaults.conf de Delta. | Not available. | 
| jupyter-notebook-conf | Cambiar los valores en el archivo jupyter\$1notebook\$1config.py de Jupyter Notebook. | Not available. | 
| jupyter-hub-conf | Cambie los valores en JupyterHubs el archivo jupyterhub\$1config.py. | Not available. | 
| jupyter-s3-conf | Configurar la persistencia en S3 del bloc de notas de Jupyter. | Not available. | 
| jupyter-sparkmagic-conf | Cambiar los valores en el archivo config.json de Sparkmagic. | Not available. | 
| livy-conf | Cambiar los valores en el archivo livy.conf de Livy. | Restarts Livy Server. | 
| livy-env | Cambiar los valores en el entorno de Livy. | Restarts Livy Server. | 
| livy-log4j2 | Cambiar la configuración de log4j2.properties de Livy. | Restarts Livy Server. | 
| mapred-env | Cambie los valores en el entorno de la MapReduce aplicación. | Restarts Hadoop MapReduce-HistoryServer. | 
| mapred-site | Cambie los valores en el archivo mapred-site.xml de la MapReduce aplicación. | Restarts Hadoop MapReduce-HistoryServer. | 
| oozie-env | Cambiar los valores en el entorno de Oozie. | Restarts Oozie. | 
| oozie-log4j | Cambiar los valores en el archivo oozie-log4j.properties de Oozie. | Restarts Oozie. | 
| oozie-site | Cambiar los valores en el archivo oozie-site.xml de Oozie. | Restarts Oozie. | 
| phoenix-hbase-metrics | Cambiar los valores en el archivo hadoop-metrics2-hbase.properties de Phoenix. | Not available. | 
| phoenix-hbase-site | Cambiar los valores en el archivo hbase-site.xml de Phoenix. | Not available. | 
| phoenix-log4j2 | Cambiar los valores en el archivo log4j2.properties de Phoenix. | Restarts Phoenix-QueryServer. | 
| phoenix-metrics | Cambiar los valores en el archivo hadoop-metrics2-phoenix.properties de Phoenix. | Not available. | 
| pig-env | Cambiar los valores en el entorno de Pig. | Not available. | 
| pig-properties | Cambiar los valores en el archivo pig.properties de Pig. | Restarts Oozie. | 
| pig-log4j | Cambiar los valores en el archivo log4j.properties de Pig. | Not available. | 
| presto-log | Cambiar los valores en el archivo log.properties de Presto. | Restarts Presto-Server (for PrestoDB) | 
| presto-config | Cambiar los valores en el archivo config.properties de Presto. | Restarts Presto-Server (for PrestoDB) | 
| presto-password-authenticator | Cambiar los valores en el archivo password-authenticator.properties de Presto. | Not available. | 
| presto-env | Cambiar valores en el archivo presto-env.sh de Presto. | Restarts Presto-Server (for PrestoDB) | 
| presto-node | Cambiar valores en el archivo node.properties de Presto. | Not available. | 
| presto-connector-blackhole | Cambiar los valores en el archivo blackhole.properties de Presto. | Not available. | 
| presto-connector-cassandra | Cambiar los valores en el archivo cassandra.properties de Presto. | Not available. | 
| presto-connector-hive | Cambiar los valores en el archivo hive.properties de Presto. | Restarts Presto-Server (for PrestoDB) | 
| presto-connector-jmx | Cambiar los valores en el archivo jmx.properties de Presto. | Not available. | 
| presto-connector-kafka | Cambiar los valores en el archivo kafka.properties de Presto. | Not available. | 
| presto-connector-lakeformation | Cambiar los valores en el archivo lakeformation.properties de Presto. | Restarts Presto-Server (for PrestoDB) | 
| presto-connector-localfile | Cambiar los valores en el archivo localfile.properties de Presto. | Not available. | 
| presto-connector-memory | Cambiar los valores del archivo memory.properties de Presto. | Not available. | 
| presto-connector-mongodb | Cambiar los valores en el archivo mongodb.properties de Presto. | Not available. | 
| presto-connector-mysql | Cambiar los valores en el archivo mysql.properties de Presto. | Not available. | 
| presto-connector-postgresql | Cambiar los valores en el archivo postgresql.properties de Presto. | Not available. | 
| presto-connector-raptor | Cambiar los valores en el archivo raptor.properties de Presto. | Not available. | 
| presto-connector-redis | Cambiar los valores en el archivo redis.properties de Presto. | Not available. | 
| presto-connector-redshift | Cambiar los valores en el archivo redshift.properties de Presto. | Not available. | 
| presto-connector-tpch | Cambiar los valores en el archivo tpch.properties de Presto. | Not available. | 
| presto-connector-tpcds | Cambiar los valores del archivo tpcds.properties de Presto. | Not available. | 
| trino-log | Cambiar los valores en el archivo log.properties de Trino. | Restarts Trino-Server (for Trino) | 
| trino-config | Cambiar los valores en el archivo config.properties de Trino. | Restarts Trino-Server (for Trino) | 
| trino-password-authenticator | Cambiar los valores en el archivo password-authenticator.properties de Trino. | Restarts Trino-Server (for Trino) | 
| trino-env | Cambie los valores del archivo trino-env.sh de Trino. | Restarts Trino-Server (for Trino) | 
| trino-node | Cambiar los valores en el archivo node.properties de Trino. | Not available. | 
| trino-connector-blackhole | Cambiar los valores en el archivo blackhole.properties de Trino. | Not available. | 
| trino-connector-cassandra | Cambiar los valores en el archivo cassandra.properties de Trino. | Not available. | 
| trino-connector-delta | Cambie los valores del archivo delta.properties de Trino. | Restarts Trino-Server (for Trino) | 
| trino-connector-hive | Cambiar los valores en el archivo hive.properties de Trino. | Restarts Trino-Server (for Trino) | 
| trino-exchange-manager | Cambie los valores del archivo exchange-manager.properties de Trino. | Restarts Trino-Server (for Trino) | 
| trino-connector-iceberg | Cambiar los valores en el archivo iceberg.properties de Trino. | Restarts Trino-Server (for Trino) | 
| trino-connector-hudi | Cambiar los valores en el archivo hudi.properties de Trino. | Restarts Trino-Server (for Trino) | 
| trino-connector-jmx | Cambiar los valores en el archivo jmx.properties de Trino. | Not available. | 
| trino-connector-kafka | Cambiar los valores en el archivo kafka.properties de Trino. | Not available. | 
| trino-connector-localfile | Cambiar los valores en el archivo localfile.properties de Trino. | Not available. | 
| trino-connector-memory | Cambiar los valores en el archivo memory.properties de Trino. | Not available. | 
| trino-connector-mongodb | Cambiar los valores en el archivo mongodb.properties de Trino. | Not available. | 
| trino-connector-mysql | Cambiar los valores en el archivo mysql.properties de Trino. | Not available. | 
| trino-connector-postgresql | Cambiar los valores en el archivo postgresql.properties de Trino. | Not available. | 
| trino-connector-raptor | Cambiar los valores en el archivo raptor.properties de Trino. | Not available. | 
| trino-connector-redis | Cambiar los valores en el archivo redis.properties de Trino. | Not available. | 
| trino-connector-redshift | Cambiar los valores en el archivo redshift.properties de Trino. | Not available. | 
| trino-connector-tpch | Cambiar los valores en el archivo tpch.properties de Trino. | Not available. | 
| trino-connector-tpcds | Cambiar los valores en el archivo tpcds.properties de Trino. | Not available. | 
| ranger-kms-dbks-site | Cambie los valores del archivo dbks-site.xml de Ranger KMS. | Restarts Ranger KMS Server. | 
| ranger-kms-site | Cambie los valores en el ranger-kms-site archivo.xml de Ranger KMS. | Restarts Ranger KMS Server. | 
| ranger-kms-env | Cambie los valores del entorno Ranger KMS. | Restarts Ranger KMS Server. | 
| ranger-kms-logback | Cambie los valores del archivo kms-logback.xml de Ranger KMS. | Not available. | 
| ranger-kms-db-ca | Cambie los valores del archivo CA en S3 para la conexión SSL de MySQL con Ranger KMS. | Not available. | 
| spark | Configuración de Amazon EMR mantenida para Apache Spark. | This property modifies spark-defaults. See actions there. | 
| spark-defaults | Cambiar los valores en el archivo spark-defaults.conf de Spark. | Restarts Spark history server and Spark thrift server. | 
| spark-env | Cambiar los valores en el entorno de Spark. | Restarts Spark history server and Spark thrift server. | 
| spark-hive-site | Cambiar los valores en el archivo hive-site.xml de Spark. | Not available. | 
| spark-log4j2 | Cambiar los valores en el archivo log4j2.properties de Spark. | Restarts Spark history server and Spark thrift server. | 
| spark-metrics | Cambiar los valores en el archivo metrics.properties de Spark. | Restarts Spark history server and Spark thrift server. | 
| tez-site | Cambiar los valores en el archivo tez-site.xml de Tez. | Restart Oozie and HiveServer2. | 
| yarn-env | Cambiar los valores en el entorno de YARN. | Restarts the Hadoop YARN services ResourceManager, NodeManager, ProxyServer, and TimelineServer. Additionally restarts MapReduce-HistoryServer. | 
| yarn-site | Cambiar los valores en el archivo yarn-site.xml de YARN. | Restarts the Hadoop YARN services ResourceManager, NodeManager, ProxyServer, and TimelineServer. Additionally restarts Livy Server and MapReduce-HistoryServer. | 
| zeppelin-env | Cambiar los valores en el entorno de Zeppelin. | Restarts Zeppelin. | 
| zeppelin-site | Cambie los ajustes de configuración de zeppelin-site.xml. | Restarts Zeppelin. | 
| zookeeper-config | Cambie los valores en el ZooKeeper archivo zoo.cfg. | Restarts Zookeeper server. | 
| zookeeper-logback | Cambie los valores en ZooKeeper el archivo logback.xml. | Restarts Zookeeper server. | 
| emr-metrics | Cambie la configuración de la métrica EMR para este nodo. | Restarts the CloudWatchAgent service. | 

## 7.10.0 registro de cambios
<a name="7100-changelog"></a>


**Registro de cambios de la versión 7.10.0 y de las notas de la versión**  

| Date | Event | Description (Descripción) | 
| --- | --- | --- | 
| 15-08-2020 | Publicación de documentos | Las notas de la versión 7.10.0 de Amazon EMR se publicaron por primera vez | 
| 15 de agosto de 2025 | Implementación completa | [Amazon EMR 7.10.0 se ha implementado completamente en todas las regiones compatibles](https://aws.amazon.com/about-aws/global-infrastructure/regional-product-services/) | 
| 15 de agosto de 2025 | Versión limitada inicial | Amazon EMR 7.10.0 se implementó por primera vez en las regiones comerciales iniciales | 

# Amazon EMR versión 7.9.0
<a name="emr-790-release"></a>

## Ciclo de vida compatible con 7.9.0
<a name="emr-790-supported-lifecycle"></a>

En la siguiente tabla se describen las fechas de ciclo de vida admitidas para la versión 7.9.0 de Amazon EMR.


| Fase de soporte | Date | 
| --- | --- | 
| Fecha de lanzamiento inicial | 19 de mayo de 2025 | 
| Soporte estándar hasta | 19 de mayo de 2027 | 
| Fin del soporte | 20 de mayo de 2027 | 
| Fin de vida útil | 19 de mayo de 2028 | 

## Versiones de la aplicación 7.9.0
<a name="emr-790-app-versions"></a>

Esta versión incluye las siguientes aplicaciones: [https://docs.aws.amazon.com/AmazonCloudWatch/latest/monitoring/Install-CloudWatch-Agent.html](https://docs.aws.amazon.com/AmazonCloudWatch/latest/monitoring/Install-CloudWatch-Agent.html), [https://delta.io/](https://delta.io/), [https://flink.apache.org/](https://flink.apache.org/), [http://hbase.apache.org/](http://hbase.apache.org/), [https://cwiki.apache.org/confluence/display/Hive/HCatalog](https://cwiki.apache.org/confluence/display/Hive/HCatalog), [http://hadoop.apache.org/docs/current/](http://hadoop.apache.org/docs/current/), [http://hive.apache.org/](http://hive.apache.org/), [https://hudi.apache.org](https://hudi.apache.org), [http://gethue.com/](http://gethue.com/), [https://iceberg.apache.org/](https://iceberg.apache.org/), [https://jupyter-enterprise-gateway.readthedocs.io/en/latest/](https://jupyter-enterprise-gateway.readthedocs.io/en/latest/), [https://jupyterhub.readthedocs.io/en/latest/#](https://jupyterhub.readthedocs.io/en/latest/#), [https://livy.incubator.apache.org/](https://livy.incubator.apache.org/), [http://oozie.apache.org/](http://oozie.apache.org/), [https://phoenix.apache.org/](https://phoenix.apache.org/), [http://pig.apache.org/](http://pig.apache.org/), [https://prestodb.io/](https://prestodb.io/), [https://spark.apache.org/docs/latest/](https://spark.apache.org/docs/latest/), [https://www.tensorflow.org/](https://www.tensorflow.org/), [https://tez.apache.org/](https://tez.apache.org/), [https://trino.io/](https://trino.io/), [https://zeppelin.incubator.apache.org/](https://zeppelin.incubator.apache.org/) y [https://zookeeper.apache.org](https://zookeeper.apache.org).

En la siguiente tabla se enumeran las versiones de la aplicación disponibles en esta versión de Amazon EMR y las versiones de la aplicación en las tres versiones anteriores de Amazon EMR (cuando corresponda).

Para ver un historial completo de las versiones de la aplicación disponibles para cada versión de Amazon EMR, consulte los temas siguientes:
+ [Versiones de las aplicaciones en las versiones 7.x de Amazon EMR](emr-release-app-versions-7.x.md)
+ [Versiones de la aplicación en las versiones 6.x de Amazon EMR](emr-release-app-versions-6.x.md)
+ [Versiones de la aplicación en las versiones 5.x de Amazon EMR](emr-release-app-versions-5.x.md)
+ [Versiones de la aplicación en las versiones 4.x de Amazon EMR](emr-release-app-versions-4.x.md)


**Información sobre la versión de la aplicación**  

|  | emr-7.9.0 | emr-7.8.0 | emr-7.7.0 | emr-7.6.0 | 
| --- | --- | --- | --- | --- | 
| AWS SDK for Java | 2.31.16, 1.12.782 | 2.29.52, 1.12.780 | 2.29.44, 1.12.780 | 2.29.25, 1.12.779 | 
| Python | 3.9, 3.11 | 3.9, 3.11 | 3.9, 3.11 | 3.9, 3.11 | 
| Scala | 2.12.18 | 2.12.18 | 2.12.18 | 2.12.18 | 
| AmazonCloudWatchAgent | 1.300032.2-amzn-0 | 1.300032.2-amzn-0 | 1.300032.2-amzn-0 | 1.300032.2-amzn-0 | 
| Delta | 3.3.0-amzn-1 | 3.3.0-amzn-0 | 3.2.1-amzn-2 | 3.2.1-amzn-1 | 
| Flink | 1.20.0-amzn-3 | 1.20.0-amzn-2 | 1.20.0-amzn-1 | 1.20.0-amzn-0 | 
| Ganglia |  -  |  -  |  -  |  -  | 
| HBase | 2.6.2-amzn-0 | 2.6.1-amzn-2 | 2.6.1-amzn-1 | 2.6.1-amzn-0 | 
| HCatalog | 3.1.3-amzn-18 | 3.1.3-amzn-17 | 3.1.3-amzn-16 | 3.1.3-amzn-15 | 
| Hadoop | 3.4.1-amzn-1 | 3.4.1-amzn-0 | 3.4.0-amzn-3 | 3.4.0-amzn-2 | 
| Hive | 3.1.3-amzn-18 | 3.1.3-amzn-17 | 3.1.3-amzn-16 | 3.1.3-amzn-15 | 
| Hudi | 0.15.0-amzn-6 | 0.15.0-amzn-5 | 0.15.0-amzn-4 | 0.15.0-amzn-3 | 
| Hue | 4.11.0 | 4.11.0 | 4.11.0 | 4.11.0 | 
| Iceberg | 1.7.1-amzn-2 | 1.7.1-amzn-1 | 1.7.1-amzn-0 | 1.6.1-amzn-2 | 
| JupyterEnterpriseGateway | 2.6.0 | 2.6.0 | 2.6.0 | 2.6.0 | 
| JupyterHub | 1.5.0 | 1.5.0 | 1.5.0 | 1.5.0 | 
| Livy | 0.8.0-incubating | 0.8.0-incubating | 0.8.0-incubating | 0.8.0-incubating | 
| MXNet |  -  |  -  |  -  |  -  | 
| Mahout |  -  |  -  |  -  |  -  | 
| Oozie | 5.2.1 | 5.2.1 | 5.2.1 | 5.2.1 | 
| Phoenix | 5.2.1 | 5.2.1 | 5.2.1 | 5.2.0 | 
| Pig | 0.17.0 | 0.17.0 | 0.17.0 | 0.17.0 | 
| Presto | 0.287-amzn-3 | 0.287-amzn-2 | 0.287-amzn-1 | 0.287-amzn-1 | 
| Spark | 3.5.5-amzn-0 | 3.5.4-amzn-0 | 3.5.3-amzn-1 | 3.5.3-amzn-0 | 
| Sqoop |  -  |  -  |  -  |  -  | 
| TensorFlow | 2.16.1 | 2.16.1 | 2.16.1 | 2.16.1 | 
| Tez | 0.10.2-amzn-16 | 0.10.2-amzn-15 | 0.10.2-amzn-14 | 0.10.2-amzn-13 | 
| Trino (PrestoSQL) | 467-amzn-2 | 467-amzn-1 | 467-amzn-0 | 457-amzn-0 | 
| Zeppelin | 0.11.1 | 0.11.1 | 0.11.1 | 0.11.1 | 
| ZooKeeper | 3.9.3-amzn-1 | 3.9.3-amzn-0 | 3.9.2-amzn-1 | 3.9.2-amzn-0 | 

# 7.9.0 vulnerabilidades y exposiciones comunes
<a name="790-common-vulnerabilities-exposures"></a>

La siguiente tabla muestra todo lo CVEs que no afecta a los clústeres de EMR que se ejecutan en las configuraciones recomendadas de Amazon EMR 7.9.0. Amazon EMR depende del código abierto original para la disponibilidad de las correcciones y proporcionará la última versión estable como parte de los componentes del motor principal en un plazo de 90 días a partir de su verificación por parte de Amazon EMR.

Esta tabla se actualizó el 12 de mayo de 2025.


| ID de CVE | Gravedad | URL de detalles del CVE | 
| --- | --- | --- | 
|  CVE-2015-1832  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2015-1832](https://nvd.nist.gov/vuln/detail/CVE-2015-1832)  | 
|  CVE-2016-5018  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2016-5018)-2016-5018  | 
|  CVE-2017-15095  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2017-15095)-2017-15095  | 
|  CVE-2017-17485  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2017-17485](https://nvd.nist.gov/vuln/detail/CVE-2017-17485)  | 
|  CVE-2017-7525  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2017-7525)-2017-7525  | 
|  CVE-2018-11307  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2018-11307](https://nvd.nist.gov/vuln/detail/CVE-2018-11307)  | 
|  CVE-2018-11307  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2018-11307](https://nvd.nist.gov/vuln/detail/CVE-2018-11307)  | 
|  CVE-2018-14718  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-14718)-2018-14718  | 
|  CVE-2018-14718  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-14718)-2018-14718  | 
|  CVE-2018-14719  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-14719)-2018-14719  | 
|  CVE-2018-14719  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-14719)-2018-14719  | 
|  CVE-2018-14720  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-14720)-2018-14720  | 
|  CVE-2018-14720  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-14720)-2018-14720  | 
|  CVE-2018-14721  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-14721)-2018-14721  | 
|  CVE-2018-14721  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-14721)-2018-14721  | 
|  CVE-2018-19360  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2018-19360](https://nvd.nist.gov/vuln/detail/CVE-2018-19360)  | 
|  CVE-2018-19360  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2018-19360](https://nvd.nist.gov/vuln/detail/CVE-2018-19360)  | 
|  CVE-2018-19361  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2018-19361](https://nvd.nist.gov/vuln/detail/CVE-2018-19361)  | 
|  CVE-2018-19361  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2018-19361](https://nvd.nist.gov/vuln/detail/CVE-2018-19361)  | 
|  CVE-2018-19362  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2018-19362](https://nvd.nist.gov/vuln/detail/CVE-2018-19362)  | 
|  CVE-2018-19362  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2018-19362](https://nvd.nist.gov/vuln/detail/CVE-2018-19362)  | 
|  CVE-2018-7489  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2018-7489](https://nvd.nist.gov/vuln/detail/CVE-2018-7489)  | 
|  CVE-2018-7489  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2018-7489](https://nvd.nist.gov/vuln/detail/CVE-2018-7489)  | 
|  CVE-2019-10202  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2019-10202](https://nvd.nist.gov/vuln/detail/CVE-2019-10202)  | 
|  CVE-2019-14379  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2019-14379](https://nvd.nist.gov/vuln/detail/CVE-2019-14379)  | 
|  CVE-2019-14379  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2019-14379](https://nvd.nist.gov/vuln/detail/CVE-2019-14379)  | 
|  CVE-2019-14540  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-14540)-2019-14540  | 
|  CVE-2019-14540  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-14540)-2019-14540  | 
|  CVE-2019-14892  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-14892)-2019-14892  | 
|  CVE-2019-14892  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-14892)-2019-14892  | 
|  CVE-2019-14893  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-14893)-2019-14893  | 
|  CVE-2019-14893  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-14893)-2019-14893  | 
|  CVE-2019-16335  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2019-16335](https://nvd.nist.gov/vuln/detail/CVE-2019-16335)  | 
|  CVE-2019-16335  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2019-16335](https://nvd.nist.gov/vuln/detail/CVE-2019-16335)  | 
|  CVE-2019-16942  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-16942)-2019-16942  | 
|  CVE-2019-16942  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-16942)-2019-16942  | 
|  CVE-2019-16943  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-16943)-2019-16943  | 
|  CVE-2019-16943  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-16943)-2019-16943  | 
|  CVE-2019-17267  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2019-17267](https://nvd.nist.gov/vuln/detail/CVE-2019-17267)  | 
|  CVE-2019-17267  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2019-17267](https://nvd.nist.gov/vuln/detail/CVE-2019-17267)  | 
|  CVE-2019-17531  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-17531)-2019-17531  | 
|  CVE-2019-17531  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-17531)-2019-17531  | 
|  CVE-2019-20330  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2019-20330](https://nvd.nist.gov/vuln/detail/CVE-2019-20330)  | 
|  CVE-2019-20330  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2019-20330](https://nvd.nist.gov/vuln/detail/CVE-2019-20330)  | 
|  CVE-2020-8840  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-8840](https://nvd.nist.gov/vuln/detail/CVE-2020-8840)  | 
|  CVE-2020-8840  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-8840](https://nvd.nist.gov/vuln/detail/CVE-2020-8840)  | 
|  CVE-2020-9546  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-9546](https://nvd.nist.gov/vuln/detail/CVE-2020-9546)  | 
|  CVE-2020-9546  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-9546](https://nvd.nist.gov/vuln/detail/CVE-2020-9546)  | 
|  CVE-2020-9547  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-9547](https://nvd.nist.gov/vuln/detail/CVE-2020-9547)  | 
|  CVE-2020-9547  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-9547](https://nvd.nist.gov/vuln/detail/CVE-2020-9547)  | 
|  CVE-2020-9548  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-9548](https://nvd.nist.gov/vuln/detail/CVE-2020-9548)  | 
|  CVE-2020-9548  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-9548](https://nvd.nist.gov/vuln/detail/CVE-2020-9548)  | 
|  CVE-2022-1471  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2022-1471](https://nvd.nist.gov/vuln/detail/CVE-2022-1471)  | 
|  CVE-2022-1471  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2022-1471](https://nvd.nist.gov/vuln/detail/CVE-2022-1471)  | 
|  CVE-2022-37865  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-202237865](https://nvd.nist.gov/vuln/detail/CVE-2022-37865)  | 
|  CVE-2022-39135  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-202239135](https://nvd.nist.gov/vuln/detail/CVE-2022-39135)  | 
|  CVE-2022-42889  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-202242889](https://nvd.nist.gov/vuln/detail/CVE-2022-42889)  | 
|  CVE-2022-46337  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-202246337](https://nvd.nist.gov/vuln/detail/CVE-2022-46337)  | 
|  CVE-2022-46337  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-202246337](https://nvd.nist.gov/vuln/detail/CVE-2022-46337)  | 
|  CVE-2024-51504  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-51504](https://nvd.nist.gov/vuln/detail/CVE-2024-51504)  | 
|  CVE-2024-51504  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-51504](https://nvd.nist.gov/vuln/detail/CVE-2024-51504)  | 
|  CVE-2024-52046  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-52046](https://nvd.nist.gov/vuln/detail/CVE-2024-52046)  | 
|  CVE-2024-52046  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-52046](https://nvd.nist.gov/vuln/detail/CVE-2024-52046)  | 
|  CVE-2024-52577  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-52577](https://nvd.nist.gov/vuln/detail/CVE-2024-52577)  | 
|  CVE-2024-53990  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-53990](https://nvd.nist.gov/vuln/detail/CVE-2024-53990)  | 
|  CVE-2024-56325  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-56325](https://nvd.nist.gov/vuln/detail/CVE-2024-56325)  | 
|  CVE-2025-30065  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2025-30065](https://nvd.nist.gov/vuln/detail/CVE-2025-30065)  | 
|  CVE-2015-5237  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2015-5237)-2015-5237  | 
|  CVE-2015-5237  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2015-5237)-2015-5237  | 
|  CVE-2016-6796  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2016-6796)-2016-6796  | 
|  CVE-2018-1000180  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2018-1000180](https://nvd.nist.gov/vuln/detail/CVE-2018-1000180)  | 
|  CVE-2018-12022  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2018-12022](https://nvd.nist.gov/vuln/detail/CVE-2018-12022)  | 
|  CVE-2018-12022  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2018-12022](https://nvd.nist.gov/vuln/detail/CVE-2018-12022)  | 
|  CVE-2018-12023  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2018-12023](https://nvd.nist.gov/vuln/detail/CVE-2018-12023)  | 
|  CVE-2018-12023  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2018-12023](https://nvd.nist.gov/vuln/detail/CVE-2018-12023)  | 
|  CVE-2018-5968  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-5968)-2018-5968  | 
|  CVE-2019-0205  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2019-0205](https://nvd.nist.gov/vuln/detail/CVE-2019-0205)  | 
|  CVE-2019-0205  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2019-0205](https://nvd.nist.gov/vuln/detail/CVE-2019-0205)  | 
|  CVE-2019-10172  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2019-10172](https://nvd.nist.gov/vuln/detail/CVE-2019-10172)  | 
|  CVE-2019-12086  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-12086)-2019-12086  | 
|  CVE-2019-12086  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-12086)-2019-12086  | 
|  CVE-2019-14439  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-14439)-2019-14439  | 
|  CVE-2019-14439  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-14439)-2019-14439  | 
|  CVE-2020-10650  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-10650](https://nvd.nist.gov/vuln/detail/CVE-2020-10650)  | 
|  CVE-2020-10650  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-10650](https://nvd.nist.gov/vuln/detail/CVE-2020-10650)  | 
|  CVE-2020-10672  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-10672](https://nvd.nist.gov/vuln/detail/CVE-2020-10672)  | 
|  CVE-2020-10672  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-10672](https://nvd.nist.gov/vuln/detail/CVE-2020-10672)  | 
|  CVE-2020-10673  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-10673](https://nvd.nist.gov/vuln/detail/CVE-2020-10673)  | 
|  CVE-2020-10673  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-10673](https://nvd.nist.gov/vuln/detail/CVE-2020-10673)  | 
|  CVE-2020-10968  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-10968)-2020-10968  | 
|  CVE-2020-10968  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-10968)-2020-10968  | 
|  CVE-2020-10969  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-10969)-2020-10969  | 
|  CVE-2020-10969  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-10969)-2020-10969  | 
|  CVE-2020-11111  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-11111](https://nvd.nist.gov/vuln/detail/CVE-2020-11111)  | 
|  CVE-2020-11111  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-11111](https://nvd.nist.gov/vuln/detail/CVE-2020-11111)  | 
|  CVE-2020-11112  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-11112](https://nvd.nist.gov/vuln/detail/CVE-2020-11112)  | 
|  CVE-2020-11112  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-11112](https://nvd.nist.gov/vuln/detail/CVE-2020-11112)  | 
|  CVE-2020-11113  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-11113](https://nvd.nist.gov/vuln/detail/CVE-2020-11113)  | 
|  CVE-2020-11113  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-11113](https://nvd.nist.gov/vuln/detail/CVE-2020-11113)  | 
|  CVE-2020-11619  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-11619)-2020-11619  | 
|  CVE-2020-11619  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-11619)-2020-11619  | 
|  CVE-2020-11620  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-11620](https://nvd.nist.gov/vuln/detail/CVE-2020-11620)  | 
|  CVE-2020-11620  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-11620](https://nvd.nist.gov/vuln/detail/CVE-2020-11620)  | 
|  CVE-2020-13949  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-13949)-2020-13949  | 
|  CVE-2020-13949  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-13949)-2020-13949  | 
|  CVE-2020-13949  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-13949)-2020-13949  | 
|  CVE-2020-14060  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-14060)-2020-14060  | 
|  CVE-2020-14060  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-14060)-2020-14060  | 
|  CVE-2020-14061  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-14061)-2020-14061  | 
|  CVE-2020-14061  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-14061)-2020-14061  | 
|  CVE-2020-14062  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-14062)-2020-14062  | 
|  CVE-2020-14062  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-14062)-2020-14062  | 
|  CVE-2020-14195  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-14195](https://nvd.nist.gov/vuln/detail/CVE-2020-14195)  | 
|  CVE-2020-14195  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-14195](https://nvd.nist.gov/vuln/detail/CVE-2020-14195)  | 
|  CVE-2020-24616  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-24616](https://nvd.nist.gov/vuln/detail/CVE-2020-24616)  | 
|  CVE-2020-24616  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-24616](https://nvd.nist.gov/vuln/detail/CVE-2020-24616)  | 
|  CVE-2020-24750  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-24750](https://nvd.nist.gov/vuln/detail/CVE-2020-24750)  | 
|  CVE-2020-24750  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-24750](https://nvd.nist.gov/vuln/detail/CVE-2020-24750)  | 
|  CVE-2020-25649  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-25649](https://nvd.nist.gov/vuln/detail/CVE-2020-25649)  | 
|  CVE-2020-28052  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-28052](https://nvd.nist.gov/vuln/detail/CVE-2020-28052)  | 
|  CVE-2020-35490  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-35490](https://nvd.nist.gov/vuln/detail/CVE-2020-35490)  | 
|  CVE-2020-35490  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-35490](https://nvd.nist.gov/vuln/detail/CVE-2020-35490)  | 
|  CVE-2020-35491  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-35491](https://nvd.nist.gov/vuln/detail/CVE-2020-35491)  | 
|  CVE-2020-35491  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-35491](https://nvd.nist.gov/vuln/detail/CVE-2020-35491)  | 
|  CVE-2020-35728  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-35728](https://nvd.nist.gov/vuln/detail/CVE-2020-35728)  | 
|  CVE-2020-35728  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-35728](https://nvd.nist.gov/vuln/detail/CVE-2020-35728)  | 
|  CVE-2020-36179  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36179](https://nvd.nist.gov/vuln/detail/CVE-2020-36179)  | 
|  CVE-2020-36179  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36179](https://nvd.nist.gov/vuln/detail/CVE-2020-36179)  | 
|  CVE-2020-36180  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36180](https://nvd.nist.gov/vuln/detail/CVE-2020-36180)  | 
|  CVE-2020-36180  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36180](https://nvd.nist.gov/vuln/detail/CVE-2020-36180)  | 
|  CVE-2020-36181  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36181](https://nvd.nist.gov/vuln/detail/CVE-2020-36181)  | 
|  CVE-2020-36181  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36181](https://nvd.nist.gov/vuln/detail/CVE-2020-36181)  | 
|  CVE-2020-36182  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36182](https://nvd.nist.gov/vuln/detail/CVE-2020-36182)  | 
|  CVE-2020-36182  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36182](https://nvd.nist.gov/vuln/detail/CVE-2020-36182)  | 
|  CVE-2020-36183  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36183](https://nvd.nist.gov/vuln/detail/CVE-2020-36183)  | 
|  CVE-2020-36183  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36183](https://nvd.nist.gov/vuln/detail/CVE-2020-36183)  | 
|  CVE-2020-36184  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36184](https://nvd.nist.gov/vuln/detail/CVE-2020-36184)  | 
|  CVE-2020-36184  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36184](https://nvd.nist.gov/vuln/detail/CVE-2020-36184)  | 
|  CVE-2020-36185  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36185](https://nvd.nist.gov/vuln/detail/CVE-2020-36185)  | 
|  CVE-2020-36185  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36185](https://nvd.nist.gov/vuln/detail/CVE-2020-36185)  | 
|  CVE-2020-36186  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36186](https://nvd.nist.gov/vuln/detail/CVE-2020-36186)  | 
|  CVE-2020-36186  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36186](https://nvd.nist.gov/vuln/detail/CVE-2020-36186)  | 
|  CVE-2020-36187  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36187](https://nvd.nist.gov/vuln/detail/CVE-2020-36187)  | 
|  CVE-2020-36187  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36187](https://nvd.nist.gov/vuln/detail/CVE-2020-36187)  | 
|  CVE-2020-36188  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36188](https://nvd.nist.gov/vuln/detail/CVE-2020-36188)  | 
|  CVE-2020-36188  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36188](https://nvd.nist.gov/vuln/detail/CVE-2020-36188)  | 
|  CVE-2020-36189  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36189](https://nvd.nist.gov/vuln/detail/CVE-2020-36189)  | 
|  CVE-2020-36189  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36189](https://nvd.nist.gov/vuln/detail/CVE-2020-36189)  | 
|  CVE-2020-36518  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36518](https://nvd.nist.gov/vuln/detail/CVE-2020-36518)  | 
|  CVE-2020-36518  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36518](https://nvd.nist.gov/vuln/detail/CVE-2020-36518)  | 
|  CVE-2021-20190  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2021-20190](https://nvd.nist.gov/vuln/detail/CVE-2021-20190)  | 
|  CVE-2021-20190  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2021-20190](https://nvd.nist.gov/vuln/detail/CVE-2021-20190)  | 
|  CVE-2021-31684  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2021-31684](https://nvd.nist.gov/vuln/detail/CVE-2021-31684)  | 
|  CVE-2021-34538  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2021-34538](https://nvd.nist.gov/vuln/detail/CVE-2021-34538)  | 
|  CVE-2021-34538  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2021-34538](https://nvd.nist.gov/vuln/detail/CVE-2021-34538)  | 
|  CVE-2021-34538  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2021-34538](https://nvd.nist.gov/vuln/detail/CVE-2021-34538)  | 
|  CVE-2022-25647  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-202225647](https://nvd.nist.gov/vuln/detail/CVE-2022-25647)  | 
|  CVE-2022-25647  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-202225647](https://nvd.nist.gov/vuln/detail/CVE-2022-25647)  | 
|  CVE-2022-25647  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-202225647](https://nvd.nist.gov/vuln/detail/CVE-2022-25647)  | 
|  CVE-2022-25857  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-202225857](https://nvd.nist.gov/vuln/detail/CVE-2022-25857)  | 
|  CVE-2022-3171  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2022-3171](https://nvd.nist.gov/vuln/detail/CVE-2022-3171)  | 
|  CVE-2022-3171  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2022-3171](https://nvd.nist.gov/vuln/detail/CVE-2022-3171)  | 
|  CVE-2022-3171  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2022-3171](https://nvd.nist.gov/vuln/detail/CVE-2022-3171)  | 
|  CVE-2022-3509  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2022-3509](https://nvd.nist.gov/vuln/detail/CVE-2022-3509)  | 
|  CVE-2022-3509  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2022-3509](https://nvd.nist.gov/vuln/detail/CVE-2022-3509)  | 
|  CVE-2022-3509  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2022-3509](https://nvd.nist.gov/vuln/detail/CVE-2022-3509)  | 
|  CVE-2022-3510  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-20223510](https://nvd.nist.gov/vuln/detail/CVE-2022-3510)  | 
|  CVE-2022-3510  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-20223510](https://nvd.nist.gov/vuln/detail/CVE-2022-3510)  | 
|  CVE-2022-3510  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-20223510](https://nvd.nist.gov/vuln/detail/CVE-2022-3510)  | 
|  CVE-2022-36364  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-202236364](https://nvd.nist.gov/vuln/detail/CVE-2022-36364)  | 
|  CVE-2022-37866  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-202237866](https://nvd.nist.gov/vuln/detail/CVE-2022-37866)  | 
|  CVE-2022-40149  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-202240149](https://nvd.nist.gov/vuln/detail/CVE-2022-40149)  | 
|  CVE-2022-40149  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-202240149](https://nvd.nist.gov/vuln/detail/CVE-2022-40149)  | 
|  CVE-2022-40150  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-202240150](https://nvd.nist.gov/vuln/detail/CVE-2022-40150)  | 
|  CVE-2022-40150  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-202240150](https://nvd.nist.gov/vuln/detail/CVE-2022-40150)  | 
|  CVE-2022-42003  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2022-42003](https://nvd.nist.gov/vuln/detail/CVE-2022-42003)  | 
|  CVE-2022-42003  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2022-42003](https://nvd.nist.gov/vuln/detail/CVE-2022-42003)  | 
|  CVE-2022-42003  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2022-42003](https://nvd.nist.gov/vuln/detail/CVE-2022-42003)  | 
|  CVE-2022-42003  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2022-42003](https://nvd.nist.gov/vuln/detail/CVE-2022-42003)  | 
|  CVE-2022-42003  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2022-42003](https://nvd.nist.gov/vuln/detail/CVE-2022-42003)  | 
|  CVE-2022-42004  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2022-42004](https://nvd.nist.gov/vuln/detail/CVE-2022-42004)  | 
|  CVE-2022-42004  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2022-42004](https://nvd.nist.gov/vuln/detail/CVE-2022-42004)  | 
|  CVE-2022-42004  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2022-42004](https://nvd.nist.gov/vuln/detail/CVE-2022-42004)  | 
|  CVE-2022-42004  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2022-42004](https://nvd.nist.gov/vuln/detail/CVE-2022-42004)  | 
|  CVE-2022-45685  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-202245685](https://nvd.nist.gov/vuln/detail/CVE-2022-45685)  | 
|  CVE-2022-45685  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-202245685](https://nvd.nist.gov/vuln/detail/CVE-2022-45685)  | 
|  CVE-2022-45693  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-202245693](https://nvd.nist.gov/vuln/detail/CVE-2022-45693)  | 
|  CVE-2022-45693  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-202245693](https://nvd.nist.gov/vuln/detail/CVE-2022-45693)  | 
|  CVE-2022-46751  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-202246751](https://nvd.nist.gov/vuln/detail/CVE-2022-46751)  | 
|  CVE-2022-46751  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-202246751](https://nvd.nist.gov/vuln/detail/CVE-2022-46751)  | 
|  CVE-2023-1370  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-1370](https://nvd.nist.gov/vuln/detail/CVE-2023-1370)  | 
|  CVE-2023-1436  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-1436](https://nvd.nist.gov/vuln/detail/CVE-2023-1436)  | 
|  CVE-2023-1436  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-1436](https://nvd.nist.gov/vuln/detail/CVE-2023-1436)  | 
|  CVE-2023-2976  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-2976](https://nvd.nist.gov/vuln/detail/CVE-2023-2976)  | 
|  CVE-2023-2976  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-2976](https://nvd.nist.gov/vuln/detail/CVE-2023-2976)  | 
|  CVE-2023-2976  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-2976](https://nvd.nist.gov/vuln/detail/CVE-2023-2976)  | 
|  CVE-2023-2976  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-2976](https://nvd.nist.gov/vuln/detail/CVE-2023-2976)  | 
|  CVE-2023-2976  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-2976](https://nvd.nist.gov/vuln/detail/CVE-2023-2976)  | 
|  CVE-2023-2976  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-2976](https://nvd.nist.gov/vuln/detail/CVE-2023-2976)  | 
|  CVE-2023-2976  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-2976](https://nvd.nist.gov/vuln/detail/CVE-2023-2976)  | 
|  CVE-2023-2976  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-2976](https://nvd.nist.gov/vuln/detail/CVE-2023-2976)  | 
|  CVE-2023-2976  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-2976](https://nvd.nist.gov/vuln/detail/CVE-2023-2976)  | 
|  CVE-2023-2976  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-2976](https://nvd.nist.gov/vuln/detail/CVE-2023-2976)  | 
|  CVE-2023-3635  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-3635](https://nvd.nist.gov/vuln/detail/CVE-2023-3635)  | 
|  CVE-2023-39410  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-39410](https://nvd.nist.gov/vuln/detail/CVE-2023-39410)  | 
|  CVE-2023-5072  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-5072](https://nvd.nist.gov/vuln/detail/CVE-2023-5072)  | 
|  CVE-2023-6378  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-6378](https://nvd.nist.gov/vuln/detail/CVE-2023-6378)  | 
|  CVE-2023-6378  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-6378](https://nvd.nist.gov/vuln/detail/CVE-2023-6378)  | 
|  CVE-2023-6481  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-6481](https://nvd.nist.gov/vuln/detail/CVE-2023-6481)  | 
|  CVE-2023-6481  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-6481](https://nvd.nist.gov/vuln/detail/CVE-2023-6481)  | 
|  CVE-2024-13009  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-13009](https://nvd.nist.gov/vuln/detail/CVE-2024-13009)  | 
|  CVE-2024-13009  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-13009](https://nvd.nist.gov/vuln/detail/CVE-2024-13009)  | 
|  CVE-2024-29131  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-29131](https://nvd.nist.gov/vuln/detail/CVE-2024-29131)  | 
|  CVE-2024-29857  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-29857](https://nvd.nist.gov/vuln/detail/CVE-2024-29857)  | 
|  CVE-2024-29857  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-29857](https://nvd.nist.gov/vuln/detail/CVE-2024-29857)  | 
|  CVE-2024-29857  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-29857](https://nvd.nist.gov/vuln/detail/CVE-2024-29857)  | 
|  CVE-2024-30172  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-30172](https://nvd.nist.gov/vuln/detail/CVE-2024-30172)  | 
|  CVE-2024-30172  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-30172](https://nvd.nist.gov/vuln/detail/CVE-2024-30172)  | 
|  CVE-2024-34447  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-34447](https://nvd.nist.gov/vuln/detail/CVE-2024-34447)  | 
|  CVE-2024-34447  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-34447](https://nvd.nist.gov/vuln/detail/CVE-2024-34447)  | 
|  CVE-2024-36114  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-36114](https://nvd.nist.gov/vuln/detail/CVE-2024-36114)  | 
|  CVE-2024-36114  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-36114](https://nvd.nist.gov/vuln/detail/CVE-2024-36114)  | 
|  CVE-2024-47561  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-47561](https://nvd.nist.gov/vuln/detail/CVE-2024-47561)  | 
|  CVE-2024-57699  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-57699](https://nvd.nist.gov/vuln/detail/CVE-2024-57699)  | 
|  CVE-2024-7254  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-7254](https://nvd.nist.gov/vuln/detail/CVE-2024-7254)  | 
|  CVE-2024-7254  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-7254](https://nvd.nist.gov/vuln/detail/CVE-2024-7254)  | 
|  CVE-2024-7254  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-7254](https://nvd.nist.gov/vuln/detail/CVE-2024-7254)  | 
|  CVE-2024-7254  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-7254](https://nvd.nist.gov/vuln/detail/CVE-2024-7254)  | 
|  CVE-2024-7254  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-7254](https://nvd.nist.gov/vuln/detail/CVE-2024-7254)  | 
|  CVE-2024-7254  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-7254](https://nvd.nist.gov/vuln/detail/CVE-2024-7254)  | 
|  CVE-2025-1948  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2025-1948](https://nvd.nist.gov/vuln/detail/CVE-2025-1948)  | 
|  CVE-2025-1948  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2025-1948](https://nvd.nist.gov/vuln/detail/CVE-2025-1948)  | 
|  CVE-2025-24789  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2025-24789](https://nvd.nist.gov/vuln/detail/CVE-2025-24789)  | 
|  CVE-2025-24970  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2025-24970](https://nvd.nist.gov/vuln/detail/CVE-2025-24970)  | 
|  CVE-2025-24970  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2025-24970](https://nvd.nist.gov/vuln/detail/CVE-2025-24970)  | 
|  CVE-2025-24970  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2025-24970](https://nvd.nist.gov/vuln/detail/CVE-2025-24970)  | 
|  CVE-2025-27553  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2025-27553](https://nvd.nist.gov/vuln/detail/CVE-2025-27553)  | 
|  CVE-2025-27820  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2025-27820](https://nvd.nist.gov/vuln/detail/CVE-2025-27820)  | 
|  CVE-2025-27820  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2025-27820](https://nvd.nist.gov/vuln/detail/CVE-2025-27820)  | 
|  CVE-2025-46762  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2025-46762](https://nvd.nist.gov/vuln/detail/CVE-2025-46762)  | 
|  CVE-2012-5783  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2012-5783](https://nvd.nist.gov/vuln/detail/CVE-2012-5783)  | 
|  CVE-2012-6153  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2012-6153](https://nvd.nist.gov/vuln/detail/CVE-2012-6153)  | 
|  CVE-2018-10237  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2018-10237](https://nvd.nist.gov/vuln/detail/CVE-2018-10237)  | 
|  CVE-2018-10237  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2018-10237](https://nvd.nist.gov/vuln/detail/CVE-2018-10237)  | 
|  CVE-2018-10237  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2018-10237](https://nvd.nist.gov/vuln/detail/CVE-2018-10237)  | 
|  CVE-2018-10237  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2018-10237](https://nvd.nist.gov/vuln/detail/CVE-2018-10237)  | 
|  CVE-2018-10237  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2018-10237](https://nvd.nist.gov/vuln/detail/CVE-2018-10237)  | 
|  CVE-2018-11798  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2018-11798](https://nvd.nist.gov/vuln/detail/CVE-2018-11798)  | 
|  CVE-2018-1313  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2018-1313](https://nvd.nist.gov/vuln/detail/CVE-2018-1313)  | 
|  CVE-2019-12384  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-12384)-2019-12384  | 
|  CVE-2019-12384  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-12384)-2019-12384  | 
|  CVE-2019-12814  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-12814)-2019-12814  | 
|  CVE-2019-12814  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-12814)-2019-12814  | 
|  CVE-2020-13955  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-13955)-2020-13955  | 
|  CVE-2020-13956  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-13956)-2020-13956  | 
|  CVE-2020-15250  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-15250](https://nvd.nist.gov/vuln/detail/CVE-2020-15250)  | 
|  CVE-2020-15250  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-15250](https://nvd.nist.gov/vuln/detail/CVE-2020-15250)  | 
|  CVE-2020-15522  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-15522)-2020-15522  | 
|  CVE-2020-15522  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-15522)-2020-15522  | 
|  CVE-2020-17521  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-17521)-2020-17521  | 
|  CVE-2020-17521  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-17521)-2020-17521  | 
|  CVE-2020-1945  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-1945](https://nvd.nist.gov/vuln/detail/CVE-2020-1945)  | 
|  CVE-2020-26939  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-26939](https://nvd.nist.gov/vuln/detail/CVE-2020-26939)  | 
|  CVE-2020-26939  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-26939](https://nvd.nist.gov/vuln/detail/CVE-2020-26939)  | 
|  CVE-2021-22569  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2021-22569](https://nvd.nist.gov/vuln/detail/CVE-2021-22569)  | 
|  CVE-2021-22569  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2021-22569](https://nvd.nist.gov/vuln/detail/CVE-2021-22569)  | 
|  CVE-2021-22569  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2021-22569](https://nvd.nist.gov/vuln/detail/CVE-2021-22569)  | 
|  CVE-2021-22570  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2021-22570](https://nvd.nist.gov/vuln/detail/CVE-2021-22570)  | 
|  CVE-2021-22570  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2021-22570](https://nvd.nist.gov/vuln/detail/CVE-2021-22570)  | 
|  CVE-2021-27568  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2021-27568](https://nvd.nist.gov/vuln/detail/CVE-2021-27568)  | 
|  CVE-2021-28170  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2021-28170](https://nvd.nist.gov/vuln/detail/CVE-2021-28170)  | 
|  CVE-2021-29425  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2021-29425](https://nvd.nist.gov/vuln/detail/CVE-2021-29425)  | 
|  CVE-2021-36373  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2021-36373](https://nvd.nist.gov/vuln/detail/CVE-2021-36373)  | 
|  CVE-2021-36374  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2021-36374](https://nvd.nist.gov/vuln/detail/CVE-2021-36374)  | 
|  CVE-202238749  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-202238749](https://nvd.nist.gov/vuln/detail/CVE-2022-38749)  | 
|  CVE-202238750  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-202238750](https://nvd.nist.gov/vuln/detail/CVE-2022-38750)  | 
|  CVE-202238751  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-202238751](https://nvd.nist.gov/vuln/detail/CVE-2022-38751)  | 
|  CVE-202238752  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-202238752](https://nvd.nist.gov/vuln/detail/CVE-2022-38752)  | 
|  CVE-2022-41854  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-41854)-2022-41854  | 
|  CVE-2023-0833  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-0833](https://nvd.nist.gov/vuln/detail/CVE-2023-0833)  | 
|  CVE-2023-33201  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-33201](https://nvd.nist.gov/vuln/detail/CVE-2023-33201)  | 
|  CVE-2023-33201  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-33201](https://nvd.nist.gov/vuln/detail/CVE-2023-33201)  | 
|  CVE-2023-33201  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-33201](https://nvd.nist.gov/vuln/detail/CVE-2023-33201)  | 
|  CVE-2023-33202  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-33202](https://nvd.nist.gov/vuln/detail/CVE-2023-33202)  | 
|  CVE-2023-33202  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-33202](https://nvd.nist.gov/vuln/detail/CVE-2023-33202)  | 
|  CVE-2023-33202  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-33202](https://nvd.nist.gov/vuln/detail/CVE-2023-33202)  | 
|  CVE-2023-42503  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-42503](https://nvd.nist.gov/vuln/detail/CVE-2023-42503)  | 
|  CVE-2023-51074  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-51074](https://nvd.nist.gov/vuln/detail/CVE-2023-51074)  | 
|  CVE-2024-12798  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-12798](https://nvd.nist.gov/vuln/detail/CVE-2024-12798)  | 
|  CVE-2024-12798  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-12798](https://nvd.nist.gov/vuln/detail/CVE-2024-12798)  | 
|  CVE-2024-12798  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-12798](https://nvd.nist.gov/vuln/detail/CVE-2024-12798)  | 
|  CVE-2024-12798  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-12798](https://nvd.nist.gov/vuln/detail/CVE-2024-12798)  | 
|  CVE-2024-12798  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-12798](https://nvd.nist.gov/vuln/detail/CVE-2024-12798)  | 
|  CVE-2024-12798  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-12798](https://nvd.nist.gov/vuln/detail/CVE-2024-12798)  | 
|  CVE-2024-12798  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-12798](https://nvd.nist.gov/vuln/detail/CVE-2024-12798)  | 
|  CVE-2024-23944  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-23944](https://nvd.nist.gov/vuln/detail/CVE-2024-23944)  | 
|  CVE-2024-23945  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-23945](https://nvd.nist.gov/vuln/detail/CVE-2024-23945)  | 
|  CVE-2024-23945  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-23945](https://nvd.nist.gov/vuln/detail/CVE-2024-23945)  | 
|  CVE-2024-23953  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-23953](https://nvd.nist.gov/vuln/detail/CVE-2024-23953)  | 
|  CVE-2024-23953  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-23953](https://nvd.nist.gov/vuln/detail/CVE-2024-23953)  | 
|  CVE-2024-25710  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-25710](https://nvd.nist.gov/vuln/detail/CVE-2024-25710)  | 
|  CVE-2024-25710  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-25710](https://nvd.nist.gov/vuln/detail/CVE-2024-25710)  | 
|  CVE-2024-26308  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-26308](https://nvd.nist.gov/vuln/detail/CVE-2024-26308)  | 
|  CVE-2024-26308  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-26308](https://nvd.nist.gov/vuln/detail/CVE-2024-26308)  | 
|  CVE-2024-29025  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-29025](https://nvd.nist.gov/vuln/detail/CVE-2024-29025)  | 
|  CVE-2024-29133  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-29133](https://nvd.nist.gov/vuln/detail/CVE-2024-29133)  | 
|  CVE-2024-29869  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-29869](https://nvd.nist.gov/vuln/detail/CVE-2024-29869)  | 
|  CVE-2024-29869  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-29869](https://nvd.nist.gov/vuln/detail/CVE-2024-29869)  | 
|  CVE-2024-30171  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-30171](https://nvd.nist.gov/vuln/detail/CVE-2024-30171)  | 
|  CVE-2024-30171  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-30171](https://nvd.nist.gov/vuln/detail/CVE-2024-30171)  | 
|  CVE-2024-30171  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-30171](https://nvd.nist.gov/vuln/detail/CVE-2024-30171)  | 
|  CVE-2024-31141  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-31141](https://nvd.nist.gov/vuln/detail/CVE-2024-31141)  | 
|  CVE-2024-43382  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-43382](https://nvd.nist.gov/vuln/detail/CVE-2024-43382)  | 
|  CVE-2024-47535  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-47535](https://nvd.nist.gov/vuln/detail/CVE-2024-47535)  | 
|  CVE-2024-47535  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-47535](https://nvd.nist.gov/vuln/detail/CVE-2024-47535)  | 
|  CVE-2024-47535  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-47535](https://nvd.nist.gov/vuln/detail/CVE-2024-47535)  | 
|  CVE-2024-47554  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-47554](https://nvd.nist.gov/vuln/detail/CVE-2024-47554)  | 
|  CVE-2024-47554  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-47554](https://nvd.nist.gov/vuln/detail/CVE-2024-47554)  | 
|  CVE-2024-47554  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-47554](https://nvd.nist.gov/vuln/detail/CVE-2024-47554)  | 
|  CVE-2024-47554  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-47554](https://nvd.nist.gov/vuln/detail/CVE-2024-47554)  | 
|  CVE-2024-52980  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-52980](https://nvd.nist.gov/vuln/detail/CVE-2024-52980)  | 
|  CVE-2024-56128  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-56128](https://nvd.nist.gov/vuln/detail/CVE-2024-56128)  | 
|  CVE-2024-6763  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-6763](https://nvd.nist.gov/vuln/detail/CVE-2024-6763)  | 
|  CVE-2024-6763  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-6763](https://nvd.nist.gov/vuln/detail/CVE-2024-6763)  | 
|  CVE-2024-6763  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-6763](https://nvd.nist.gov/vuln/detail/CVE-2024-6763)  | 
|  CVE-2024-6763  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-6763](https://nvd.nist.gov/vuln/detail/CVE-2024-6763)  | 
|  CVE-2024-6763  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-6763](https://nvd.nist.gov/vuln/detail/CVE-2024-6763)  | 
|  CVE-2024-8184  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-8184](https://nvd.nist.gov/vuln/detail/CVE-2024-8184)  | 
|  CVE-2024-9823  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-9823](https://nvd.nist.gov/vuln/detail/CVE-2024-9823)  | 
|  CVE-2025-24790  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2025-24790](https://nvd.nist.gov/vuln/detail/CVE-2025-24790)  | 
|  CVE-2025-25193  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2025-25193](https://nvd.nist.gov/vuln/detail/CVE-2025-25193)  | 
|  CVE-2025-25193  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2025-25193](https://nvd.nist.gov/vuln/detail/CVE-2025-25193)  | 
|  CVE-2025-25193  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2025-25193](https://nvd.nist.gov/vuln/detail/CVE-2025-25193)  | 
|  CVE-2025-25193  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2025-25193](https://nvd.nist.gov/vuln/detail/CVE-2025-25193)  | 
|  CVE-2025-30474  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2025-30474](https://nvd.nist.gov/vuln/detail/CVE-2025-30474)  | 
|  CVE-2025-3588  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2025-3588](https://nvd.nist.gov/vuln/detail/CVE-2025-3588)  | 
|  CVE-2025-46551  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2025-46551](https://nvd.nist.gov/vuln/detail/CVE-2025-46551)  | 
|  CVE-2020-8908  |  BAJA  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-8908](https://nvd.nist.gov/vuln/detail/CVE-2020-8908)  | 
|  CVE-2020-8908  |  BAJA  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-8908](https://nvd.nist.gov/vuln/detail/CVE-2020-8908)  | 
|  CVE-2020-8908  |  BAJA  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-8908](https://nvd.nist.gov/vuln/detail/CVE-2020-8908)  | 
|  CVE-2020-8908  |  BAJA  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-8908](https://nvd.nist.gov/vuln/detail/CVE-2020-8908)  | 
|  CVE-2020-8908  |  BAJA  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-8908](https://nvd.nist.gov/vuln/detail/CVE-2020-8908)  | 
|  CVE-2020-8908  |  BAJA  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-8908](https://nvd.nist.gov/vuln/detail/CVE-2020-8908)  | 
|  CVE-2020-8908  |  BAJA  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-8908](https://nvd.nist.gov/vuln/detail/CVE-2020-8908)  | 
|  CVE-2020-8908  |  BAJA  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-8908](https://nvd.nist.gov/vuln/detail/CVE-2020-8908)  | 
|  CVE-2020-8908  |  BAJA  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-8908](https://nvd.nist.gov/vuln/detail/CVE-2020-8908)  | 
|  CVE-2020-8908  |  BAJA  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-8908](https://nvd.nist.gov/vuln/detail/CVE-2020-8908)  | 
|  CVE-2024-12801  |  BAJA  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-12801](https://nvd.nist.gov/vuln/detail/CVE-2024-12801)  | 
|  CVE-2024-12801  |  BAJA  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-12801](https://nvd.nist.gov/vuln/detail/CVE-2024-12801)  | 
|  CVE-2024-12801  |  BAJA  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-12801](https://nvd.nist.gov/vuln/detail/CVE-2024-12801)  | 
|  CVE-2024-12801  |  BAJA  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-12801](https://nvd.nist.gov/vuln/detail/CVE-2024-12801)  | 
|  CVE-2025-27496  |  BAJA  |  [https://nvd.nist. gov/vuln/detail/CVE-2025-27496](https://nvd.nist.gov/vuln/detail/CVE-2025-27496)  | 
|  CVE-2025-46392  |  SIN CLASIFICAR  |  [https://nvd.nist. gov/vuln/detail/CVE-2025-46392](https://nvd.nist.gov/vuln/detail/CVE-2025-46392)  | 

## Notas de la versión 7.9.0
<a name="emr-790-relnotes"></a>

Las siguientes notas de la versión incluyen información sobre la versión 7.9.0 de Amazon EMR.

**Nuevas características**
+ **Actualizaciones de la aplicación**: Amazon EMR 7.9.0 application upgrades include AWS SDK for Java 2.31.16/1.12.782, Delta 3.3.0-amzn-1, Hadoop 3.4.1, Hudi 0.15.0-amzn-6, Iceberg 1.7.1-amzn-2, Spark 3.5.5, and Zookeeper 3.9.3.
+ **Compatibilidad de CM-CMK con la interfaz de usuario de aplicaciones persistentes**: esta característica amplía el cifrado SSE aplicado a los registros administrados en el bucket de servicio de EMR para respetar el uso de una clave maestra personalizada administrada por el cliente (CM-CMK). Esta característica permite a los clientes controlar la accesibilidad de los registros después de que el clúster finaliza.

**Problemas conocidos**
+ Cuando la opción de registro para EMR en EC2 está deshabilitada, los registros no están disponibles después de que el clúster finalice y la aplicación persistente no UIs contendrá ningún registro.
+ **Cifrado de KMS mediante el SecretAgent componente EMR-EC2**: se produce un error cuando se habilita el cifrado de KMS en reposo para los clústeres habilitados para Lake Formation en las versiones 7.8 y 7.9 de EMR. Los trabajos habilitados para la formación de lagos fracasarán con un. *NoSuchMethodError* Hay dos alternativas temporales:
  + Deshabilitar de manera temporal el cifrado en reposo con KMS en los clústeres afectados.
  + Póngase en contacto con AWS Support para solicitar un artefacto Bootstrap Action si se debe mantener el cifrado KMS.
**nota**  
**Corrección permanente**: en agosto de 2025, se implementó una actualización en todas las regiones para resolver este problema. Ya no es necesario deshabilitar el cifrado en reposo con KMS.
+ **Carga de registros de pasos**: es posible que algunos clústeres no puedan cargar los registros de pasos a su bucket de S3 debido a una condición de carrera. Ponte en contacto con el equipo de AWS soporte si tienes este problema.
+  **HBase creación de tablas en el catálogo Hive with Glue**: desde EMR-7.3.0 hasta EMR-7.10.0, hay un error debido a la integración de Hive Iceberg, que hace que la HBase creación de tablas en Hive falle cuando se utiliza Glue Data Catalog como metaalmacén. Ponte en contacto con el equipo de soporte si tienes este problema. AWS 
+  **IU de Tez**: de EMR-7.3 a EMR-7.10, hay un error que hace que el acceso a la IU de Tez a través de la interfaz de usuario web de YARN Resource Manager falle cuando se habilita el cifrado en tránsito. Esto ocurre porque el proxy YARN intenta usar el protocolo HTTP, mientras que la interfaz de usuario de Tez requiere HTTPS. Modifique la `tez.tez-ui.history-url.base` configuración en `tez-site` de `http` a `https` para resolver este problema.

**Cambios, mejoras y problemas resueltos**
+  A partir de Spark 3.3.1 (compatible con las versiones 6.10 y posteriores de EMR), todos los ejecutores de un host de desmantelamiento pasan a un nuevo `ExecutorState`, denominado estado de *RETIRADA*. Yarn no puede utilizar los ejecutores que se están retirando para asignar tareas y, por lo tanto, solicitará nuevos ejecutores, si es necesario, para las tareas que se están ejecutando. Por lo tanto, si deshabilita Spark DRA mientras usa EMR Managed Scaling, EMR Auto Scaling o cualquier mecanismo de escalado personalizado en los clústeres de EMR-EC2, Yarn puede solicitar el máximo de ejecutores permitidos para cada trabajo. Para evitar este problema, deje la propiedad `spark.dynamicAllocation.enabled` establecida en `TRUE` (que es la predeterminada) cuando utilice la combinación de características anterior. Además, también puede establecer restricciones de ejecutor mínimas y máximas si configura valores para las propiedades `spark.dynamicAllocation.maxExecutors` y `spark.dynamicAllocation.minExecutors` para sus trabajos de Spark, a fin de restringir el número de ejecutores asignados durante la ejecución del trabajo. 
+ *Obsolescencia de Oozie*: debido a que la versión de código abierto de Oozie (OSS Oozie) pasó al modo de desuso, Apache Oozie dejará de estar disponible a partir de la serie 8.x de Amazon EMR. Oozie seguirá incluido en la serie 7.x. Le recomendamos utilizar MWAA como alternativa a Oozie. Los clientes pueden utilizar la utilidad para GitHub migrar [oozie-to-airflow-emr](https://github.com/dgghosalaws/oozie-to-airflow-emr)los flujos de trabajo de Oozie existentes a MWAA.
+ *Empaquetado de contenedores en YARN*: a partir de la versión 7.9.0 de Amazon EMR, la política de empaquetado de contenedores está disponible para el planificador de capacidad de YARN, que se basa en la política de distribución en múltiples nodos de YARN.
+  Script *hudi-cli.sh*: el **hudi-cli.sh** quedó obsoleto desde la versión 7.9.0 de EMR y posteriores. **La versión 7.9.0 y superior de Amazon EMR usa .jar. hudi-cli-bundle** 
+ *Clústeres de EMR en una AL2023 AMI habilitada para FIPS*[: a partir de EMR 7.9, los clientes pueden lanzar clústeres de EMR en una AMI habilitada para FIPS. AL2023 ](https://docs.aws.amazon.com/linux/al2023/ug/fips-mode.html) Esta actualización modifica las firmas digitales y los algoritmos de hash utilizados por EMR para asegurar que todos los paquetes cumplan las pautas criptográficas recomendadas para FIPS 140-3. Nota: Esto no cubre el estado de la certificación FIPS del EMR AL2023 o consulte las preguntas frecuentes de la FIPS [AL2023 para obtener la información más reciente sobre el estado de validación de la FIPS](https://aws.amazon.com/linux/amazon-linux-2023/faqs/) 140-3.
+  *Latencia escalonada*: esta versión soluciona un problema donde la latencia de los pasos aumentaba al utilizar cifrado en tránsito sin seleccionar de manera explícita la aplicación Hadoop para su instalación. 
+  *Inicio de clúster con volúmenes cifrados con EBS*: esta versión corrige un problema en el que una llamada a KMS sobre volúmenes cifrados con EBS podía provocar fallas en el inicio del clúster de EMR. 
+     
[\[See the AWS documentation website for more details\]](http://docs.aws.amazon.com/es_es/emr/latest/ReleaseGuide/emr-790-release.html)

## Versiones Java predeterminadas de 7.9.0
<a name="emr-790-jdk"></a>

La versión 7.9 y posteriores de Amazon EMR incluyen Amazon Corretto 17 (basado en OpenJDK) de forma predeterminada para las aplicaciones compatibles con Corretto 17 (JDK 17), con la excepción de Apache Livy.

En la siguiente tabla se muestran las versiones predeterminadas de Java para las aplicaciones de Amazon EMR 7.9.0. Si desea cambiar la JVM predeterminada del clúster, siga las instrucciones de [Configuración de aplicaciones para utilizar una máquina virtual de Java específica](configuring-java8.md) para cada aplicación que se ejecute en el clúster. Solo se puede usar una versión de tiempo de ejecución de Java en un clúster. Amazon EMR no admite la ejecución de distintos nodos o aplicaciones en distintas versiones de tiempo de ejecución en el mismo clúster.


| Aplicación | Versión de Java o Amazon Corretto (el valor predeterminado está en negrita) | 
| --- | --- | 
| Delta | 17, 11, 8 | 
| Flink | 17, 11, 8 | 
| HBase | 17, 11, 8 | 
| HCatalog | 17, 11, 8 | 
| Hadoop | 17, 11, 8 | 
| Hive | 17, 11, 8 | 
| Hudi | 17, 11, 8 | 
| Iceberg | 17, 11 | 
| Livy | 17, 11, 8 | 
| Oozie | 17, 11, 8 | 
| Phoenix | 17, 11, 8 | 
| PrestoDB | 8 | 
| Spark | 17, 11, 8 | 
| Spark RAPIDS | 17, 11, 8 | 
| Tez | 17, 11, 8 | 
| Trino | 21, 17 | 
| Zeppelin | 17, 11, 8 | 
| Pig | 17, 11, 8 | 
| ZooKeeper | 17, 11, 8 | 

## Versiones de componentes 7.9.0
<a name="emr-790-components"></a>

A continuación, se muestran los componentes que Amazon EMR instala con esta versión. Algunos se instalan como parte de paquetes de aplicación de macrodatos. Otros son exclusivos de Amazon EMR y se instalan para ciertos procesos y características del sistema. Normalmente, estos componentes comienzan con `emr` o `aws`. Normalmente, los paquetes de aplicación de macrodatos de la versión más reciente de Amazon EMR son las versiones más recientes que pueden encontrarse en la comunidad. Intentamos que las versiones de la comunidad estén disponibles en Amazon EMR lo más rápido posible.

Algunos componentes de Amazon EMR son distintos de las versiones que se encuentran en la comunidad. Estos componentes tienen una etiqueta de versión con el formato `CommunityVersion-amzn-EmrVersion`. La `EmrVersion` empieza por 0. Por ejemplo, si un componente de la comunidad de código abierto llamado `myapp-component` con la versión 2.2 se ha modificado tres veces para incluirlo en diferentes versiones de lanzamiento de Amazon EMR, la versión que se mostrará será `2.2-amzn-2`.


| Componente | Versión | Description (Descripción) | 
| --- | --- | --- | 
| adot-java-agent | 1.31.0 | Un agente Java que recopila métricas de los daemons de las aplicaciones. | 
| delta | 3.3.0-amzn-1 | Delta Lake es un formato de tabla abierto para conjuntos de datos analíticos de gran tamaño | 
| emr-amazon-cloudwatch-agent | 1.300032.2-amzn-0 | Se trata de una aplicación que recopila métricas internas de nivel de sistema y métricas de aplicación personalizadas de las instancias de Amazon EC2. | 
| emr-ddb | 5.7.0 | Conector de Amazon DynamoDB para aplicaciones del ecosistema de Hadoop. | 
| emr-goodies | 3.18,0 | Bibliotecas especialmente prácticas para el ecosistema de Hadoop. | 
| emr-kinesis | 3.22.0 | Conector de Amazon Kinesis para aplicaciones del ecosistema de Hadoop. | 
| emr-notebook-env | 1.18.0 | Entorno de Conda para cuaderno de EMR que incluye una puerta de enlace empresarial de Jupyter | 
| emr-s3-dist-cp | 2.39.0 | Aplicación de copia distribuida optimizada para Amazon S3. | 
| emr-s3-select | 2.18.0 | Conector S3Select de EMR | 
| emr-wal-cli | 1.3.4 | CLI utilizada para eliminar o enumerar WAL de ERM. | 
| emrfs | 2.70,0 | Conector de Amazon S3 para aplicaciones del ecosistema de Hadoop. | 
| flink-client | 1.20.0-amzn-3 | Scripts y aplicaciones de cliente de línea de comando de Apache Flink. | 
| flink-jobmanager-config | 1.20.0-amzn-3 | Administración de recursos en nodos EMR para Apache Flink. JobManager | 
| hadoop-client | 3.4.1-amzn-1 | Los clientes de línea de comando de Hadoop como, por ejemplo "hdfs", "hadoop" o "yarn". | 
| hadoop-hdfs-datanode | 3.4.1-amzn-1 | Servicio de nivel de nodos de HDFS para el almacenamiento de bloques. | 
| hadoop-hdfs-library | 3.4.1-amzn-1 | Biblioteca y cliente de línea de comandos HDFS | 
| hadoop-hdfs-namenode | 3.4.1-amzn-1 | Servicio de HDFS para realizar un seguimiento de nombres de archivo y bloquear ubicaciones. | 
| hadoop-hdfs-journalnode | 3.4.1-amzn-1 | Servicio de HDFS para administrar los archivos de Hadoop periódico en clústeres de alta disponibilidad. | 
| hadoop-httpfs-server | 3.4.1-amzn-1 | Punto de enlace HTTP para operaciones HDFS. | 
| hadoop-kms-server | 3.4.1-amzn-1 | Servidor de administración de claves criptográficas basado en la API de Hadoop. KeyProvider  | 
| hadoop-mapred | 3.4.1-amzn-1 | MapReduce bibliotecas de motores de ejecución para ejecutar una aplicación. MapReduce  | 
| hadoop-yarn-nodemanager | 3.4.1-amzn-1 | Servicio de YARN para la administración de contenedores en un nodo individual. | 
| hadoop-yarn-resourcemanager | 3.4.1-amzn-1 | Servicio de YARN para la asignación y administración de recursos de clúster y aplicaciones distribuidas. | 
| hadoop-yarn-timeline-server | 3.4.1-amzn-1 | Servicio para recuperar información actual e histórica para aplicaciones de YARN. | 
| hbase-hmaster | 2.6.2-amzn-0 | Servicio para un HBase clúster responsable de la coordinación de las regiones y la ejecución de los comandos administrativos. | 
| hbase-region-server | 2.6.2-amzn-0 | Servicio para prestar servicio a una o más regiones. HBase  | 
| hbase-client | 2.6.2-amzn-0 | HBase cliente de línea de comandos. | 
| hbase-rest-server | 2.6.2-amzn-0 | Servicio que proporciona un punto final HTTP para. RESTful HBase | 
| hbase-thrift-server | 2.6.2-amzn-0 | Servicio que proporciona un punto final de Thrift para. HBase | 
| hbase-operator-tools | 2.6.2-amzn-0 | Herramienta de reparación de clústeres de Apache. HBase  | 
| hcatalog-client | 3.1.3-amzn-18 | El cliente de línea de comando "hcat" para manipular hcatalog-server. | 
| hcatalog-server | 3.1.3-amzn-18 | Prestación de servicios HCatalog, una capa de administración de tablas y almacenamiento para aplicaciones distribuidas. | 
| hcatalog-webhcat-server | 3.1.3-amzn-18 | Punto final HTTP que proporciona una interfaz REST para. HCatalog | 
| hive-client | 3.1.3-amzn-18 | Cliente de línea de comando de Hive. | 
| hive-hbase | 3.1.3-amzn-18 | Hive-hbase client. | 
| hive-metastore-server | 3.1.3-amzn-18 | Service para acceder al metaalmacén de Hive, un repositorio semántico que almacena metadatos para SQL en operaciones de Hadoop. | 
| hive-server2 | 3.1.3-amzn-18 | Servicio para aceptar consultas de Hive como solicitudes web. | 
| hudi | 0.15.0-amzn-6 | Marco de procesamiento incremental para impulsar la canalización de datos a baja latencia y alta eficiencia. | 
| hudi-presto | 0.15.0-amzn-6 | Biblioteca de paquetes para ejecutar Presto con Hudi. | 
| hudi-trino | 0.15.0-amzn-6 | Biblioteca de paquetes para ejecutar Trino con Hudi. | 
| hudi-spark | 0.15.0-amzn-6 | Biblioteca de paquetes para ejecutar Spark con Hudi. | 
| hue-server | 4.11.0 | Aplicación web para analizar datos con aplicaciones del ecosistema de Hadoop | 
| iceberg | 1.7.1-amzn-2 | Apache Iceberg es un formato de tabla abierto para conjuntos de datos analíticos muy grandes | 
| jupyterhub | 1.5.0 | Servidor multiusuario para blocs de notas Jupyter | 
| livy-server | 0.8.0-incubating | Interfaz de REST para interactuar con Apache Spark | 
| nginx | 1.12.1 | nginx [engine x] es un servidor HTTP y proxy inverso | 
| mariadb-server | 5.5.68\$1 | Servidor de base de datos de MariaDB. | 
| nvidia-cuda | 12.3.0 | Controladores Nvidia y conjunto de herramientas Cuda | 
| oozie-client | 5.2.1 | Cliente de línea de comando de Oozie. | 
| oozie-server | 5.2.1 | Servicio para aceptar solicitudes de flujo de trabajo de Oozie. | 
| opencv | 4.7.0 | Biblioteca de visión artificial de código abierto. | 
| phoenix-library | 5.2.1 | Las bibliotecas de Phoenix para servidor y cliente | 
| phoenix-connectors | 6.0.0 | Conectores de Apache Phoenix para Spark-3 | 
| phoenix-query-server | 6.0.0 | Un servidor ligero que proporciona acceso a JDBC, así como acceso de formato Protocol Buffers y JSON al API de Avatica  | 
| presto-coordinator | 0.287-amzn-3 | Servicio para aceptar las consultas y administrar la ejecución de consultas entre presto-workers. | 
| presto-worker | 0.287-amzn-3 | Service para ejecutar partes de una consulta. | 
| presto-client | 0.287-amzn-3 | Cliente de línea de comandos Presto que se instala en los nodos principales en espera de un clúster de HA donde el servidor Presto no se ha iniciado. | 
| trino-coordinator | 467-amzn-2 | Servicio para aceptar consultas y administrar la ejecución de consultas entre trino-workers. | 
| trino-worker | 467-amzn-2 | Service para ejecutar partes de una consulta. | 
| trino-client | 467-amzn-2 | Cliente de línea de comandos Trino que se instala en los maestros en espera de un clúster de HA donde el servidor Trino no se ha iniciado. | 
| pig-client | 0.17.0 | Cliente de línea de comando de Pig. | 
| r | 4.3.2 | Proyecto R para análisis estadístico | 
| ranger-kms-server | 2.0.0 | Sistema de administración de claves Apache Ranger | 
| spark-client | 3.5.5-amzn-0 | Clientes de línea de comando de Spark. | 
| spark-history-server | 3.5.5-amzn-0 | IU web para la visualización de eventos registrados durante la vida útil de una aplicación Spark completada. | 
| spark-on-yarn | 3.5.5-amzn-0 | Motor de ejecución en memoria para YARN. | 
| spark-yarn-slave | 3.5.5-amzn-0 | Bibliotecas de Apache Spark necesarias para esclavos de YARN. | 
| spark-rapids | 25.02.1-amzn-0 | El complemento Nvidia Spark RAPIDS que acelera Apache Spark con. GPUs | 
| tensorflow | 2.16.1 | TensorFlow biblioteca de software de código abierto para computación numérica de alto rendimiento. | 
| tez-on-yarn | 0.10.2-amzn-16 | La aplicación YARN de tez y bibliotecas. | 
| tez-on-worker | 0.10.2-amzn-16 | La aplicación YARN de tez y bibliotecas para nodos de trabajo. | 
| zeppelin-server | 0.11.1 | Bloc de notas basado en web que permite el análisis de datos interactivo. | 
| zookeeper-server | 3.9.3-amzn-1 | Servicio centralizado para mantener información de configuración, nomenclatura, proporcionar sincronización distribuida y proporcionar servicios de grupo. | 
| zookeeper-client | 3.9.3-amzn-1 | ZooKeeper cliente de línea de comandos. | 

## clasificaciones de configuración de 7.9.0
<a name="emr-790-class"></a>

Las clasificaciones de configuración le permiten personalizar las aplicaciones. Suelen corresponder a un archivo XML de configuración para la aplicación como, por ejemplo, `hive-site.xml`. Para obtener más información, consulte [Configuración de aplicaciones](emr-configure-apps.md).

Las acciones de reconfiguración se producen cuando se especifica una configuración para los grupos de instancias de un clúster en ejecución. Amazon EMR solo inicia acciones de reconfiguración para las clasificaciones que se modifican. Para obtener más información, consulte [Reconfiguración de un grupo de instancias en un clúster en ejecución](emr-configure-apps-running-cluster.md).


**clasificaciones emr-7.9.0**  

| Clasificaciones | Description (Descripción) | Acciones de reconfiguración | 
| --- | --- | --- | 
| capacity-scheduler | Cambiar los valores en el archivo capacity-scheduler.xml de Hadoop. | Restarts the ResourceManager service. | 
| container-executor | Cambie los valores en el archivo container-executor.cfg de Hadoop YARN. | Not available. | 
| container-log4j | Cambiar los valores en el archivo container-log4j.properties de Hadoop YARN. | Not available. | 
| core-site | Cambiar los valores en el archivo core-site.xml de Hadoop. | Restarts the Hadoop HDFS services Namenode, SecondaryNamenode, Datanode, ZKFC, and Journalnode. Restarts the Hadoop YARN services ResourceManager, NodeManager, ProxyServer, and TimelineServer. Additionally restarts Hadoop KMS, Ranger KMS, HiveServer2, Hive MetaStore, Hadoop Httpfs, and MapReduce-HistoryServer. | 
| docker-conf | Cambie la configuración relacionada con el docker. | Not available. | 
| emrfs-site | Cambiar la configuración de EMRFS. | Restarts the Hadoop HDFS services Namenode, SecondaryNamenode, Datanode, ZKFC, and Journalnode. Restarts the Hadoop YARN services ResourceManager, NodeManager, ProxyServer, and TimelineServer. Additionally restarts HBaseRegionserver, HBaseMaster, HBaseThrift, HBaseRest, HiveServer2, Hive MetaStore, Hadoop Httpfs, and MapReduce-HistoryServer. | 
| flink-conf | Cambiar la configuración de flink-conf.yaml. | Restarts Flink history server. | 
| flink-log4j | Cambiar la configuración de log4j.properties de Flink. | Restarts Flink history server. | 
| flink-log4j-session | Cambie la configuración de Flink log4j-session.properties para la sesión. Kubernetes/Yarn  | Restarts Flink history server. | 
| flink-log4j-cli | Cambiar la configuración de log4j-cli.properties de Flink. | Restarts Flink history server. | 
| hadoop-env | Cambiar los valores en el entorno de Hadoop para todos los componentes de Hadoop. | Restarts the Hadoop HDFS services Namenode, SecondaryNamenode, Datanode, ZKFC, and Journalnode. Restarts the Hadoop YARN services ResourceManager, NodeManager, ProxyServer, and TimelineServer. Additionally restarts PhoenixQueryserver, HiveServer2, Hive MetaStore, and MapReduce-HistoryServer. | 
| hadoop-log4j | Cambiar los valores en el archivo log4j.properties de Hadoop. | Restarts the Hadoop HDFS services SecondaryNamenode, Datanode, and Journalnode. Restarts the Hadoop YARN services ResourceManager, NodeManager, ProxyServer, and TimelineServer. Additionally restarts Hadoop KMS, Hadoop Httpfs, and MapReduce-HistoryServer. | 
| hadoop-ssl-server | Cambiar la configuración del servidor ssl de Hadoop | Not available. | 
| hadoop-ssl-client | Cambiar la configuración del cliente ssl de Hadoop | Not available. | 
| hbase | Configuraciones seleccionadas por Amazon EMR para Apache. HBase | Custom EMR specific property. Sets emrfs-site and hbase-site configs. See those for their associated restarts. | 
| hbase-env | Cambie los valores en su entorno HBase. | Restarts the HBase services RegionServer, HBaseMaster, ThriftServer, RestServer. | 
| hbase-log4j2 | Cambie los valores en el archivo HBase hbase-log4j2.properties. | Restarts the HBase services RegionServer, HBaseMaster, ThriftServer, RestServer. | 
| hbase-metrics | Cambie los valores en el archivo hadoop-metrics2-hbase.properties. HBase | Restarts the HBase services RegionServer, HBaseMaster, ThriftServer, RestServer. | 
| hbase-policy | Cambie los valores en HBase el archivo hbase-policy.xml. | Not available. | 
| hbase-site | Cambie los valores en HBase el archivo hbase-site.xml. | Restarts the HBase services RegionServer, HBaseMaster, ThriftServer, RestServer. Additionally restarts Phoenix QueryServer. | 
| hdfs-encryption-zones | Configurar zonas de cifrado de HDFS. | This classification should not be reconfigured. | 
| hdfs-env | Cambiar los valores en el entorno de HDFS. | Restarts Hadoop HDFS services Namenode, Datanode, and ZKFC. | 
| hdfs-site | Cambiar los valores en hdfs-site.xml de HDFS. | Restarts the Hadoop HDFS services Namenode, SecondaryNamenode, Datanode, ZKFC, and Journalnode. Additionally restarts Hadoop Httpfs. | 
| hcatalog-env | Cambie los valores en HCatalog el entorno. | Restarts Hive HCatalog Server. | 
| hcatalog-server-jndi | Cambie los valores en HCatalog jndi.properties. | Restarts Hive HCatalog Server. | 
| hcatalog-server-proto-hive-site | Cambie los valores en .xml HCatalog. proto-hive-site | Restarts Hive HCatalog Server. | 
| hcatalog-webhcat-env | Cambie los valores en el entorno HCat de la HCatalog Web. | Restarts Hive WebHCat server. | 
| hcatalog-webhcat-log4j2 | Cambie los valores en las propiedades HCatalog HCat log4j2.properties de la Web. | Restarts Hive WebHCat server. | 
| hcatalog-webhcat-site | Cambie los valores del archivo webhcat-site.xml de la HCatalog WebHCat. | Restarts Hive WebHCat server. | 
| hive | Configuración de Amazon EMR mantenida para Apache Hive. | Sets configurations to launch Hive LLAP service. | 
| hive-beeline-log4j2 | Cambiar los valores en el archivo beeline-log4j2.properties de Hive. | Not available. | 
| hive-parquet-logging | Cambiar los valores en el archivo parquet-logging.properties de Hive. | Not available. | 
| hive-env | Cambiar los valores en el entorno de Hive. | Restarts HiveServer2, HiveMetastore, and Hive HCatalog-Server. Runs Hive schemaTool CLI commands to verify hive-metastore. | 
| hive-exec-log4j2 | Cambie los valores en el archivo hive-exec-log 4j2.properties de Hive. | Not available. | 
| hive-llap-daemon-log4j2 | Cambie los valores en el archivo 4j2.properties de Hive. llap-daemon-log | Not available. | 
| hive-log4j2 | Cambiar los valores en el archivo hive-log4j2.properties de Hive. | Not available. | 
| hive-site | Cambiar los valores en el archivo hive-site.xml de Hive. | Restarts HiveServer2, HiveMetastore, and Hive HCatalog-Server. Runs Hive schemaTool CLI commands to verify hive-metastore. Also restarts Oozie and Zeppelin. | 
| hiveserver2-site | Cambiar los valores en el archivo hiveserver2-site.xml de Hive Server2. | Not available. | 
| hue-ini | Cambiar los valores en el archivo ini de Hue | Restarts Hue. Also activates Hue config override CLI commands to pick up new configurations. | 
| httpfs-env | Cambiar los valores en el entorno de HTTPFS. | Restarts Hadoop Httpfs service. | 
| httpfs-site | Cambiar los valores en el archivo httpfs-site.xml de Hadoop. | Restarts Hadoop Httpfs service. | 
| hadoop-kms-acls | Cambiar los valores en el archivo kms-acls.xml de Hadoop. | Not available. | 
| hadoop-kms-env | Cambiar los valores en el entorno de Hadoop KMS. | Restarts Hadoop-KMS service. | 
| hadoop-kms-java-home | Cambie la página de inicio de Java de KMS de Hadoop | Not available. | 
| hadoop-kms-log4j | Cambiar los valores en el archivo kms-log4j.properties de Hadoop. | Not available. | 
| hadoop-kms-site | Cambiar los valores en el archivo kms-site.xml de Hadoop. | Restarts Hadoop-KMS and Ranger-KMS service. | 
| hudi-env | Cambiar los valores en el entorno de Hudi. | Not available. | 
| hudi-defaults | Cambie los valores en el archivo hudi-defaults.conf de Hudi. | Not available. | 
| iceberg-defaults | Cambie los valores del archivo iceberg-defaults.conf de Iceberg. | Not available. | 
| delta-defaults | Cambie los valores del archivo delta-defaults.conf de Delta. | Not available. | 
| jupyter-notebook-conf | Cambiar los valores en el archivo jupyter\$1notebook\$1config.py de Jupyter Notebook. | Not available. | 
| jupyter-hub-conf | Cambie los valores en JupyterHubs el archivo jupyterhub\$1config.py. | Not available. | 
| jupyter-s3-conf | Configurar la persistencia en S3 del bloc de notas de Jupyter. | Not available. | 
| jupyter-sparkmagic-conf | Cambiar los valores en el archivo config.json de Sparkmagic. | Not available. | 
| livy-conf | Cambiar los valores en el archivo livy.conf de Livy. | Restarts Livy Server. | 
| livy-env | Cambiar los valores en el entorno de Livy. | Restarts Livy Server. | 
| livy-log4j2 | Cambiar la configuración de log4j2.properties de Livy. | Restarts Livy Server. | 
| mapred-env | Cambie los valores en el entorno de la MapReduce aplicación. | Restarts Hadoop MapReduce-HistoryServer. | 
| mapred-site | Cambie los valores en el archivo mapred-site.xml de la MapReduce aplicación. | Restarts Hadoop MapReduce-HistoryServer. | 
| oozie-env | Cambiar los valores en el entorno de Oozie. | Restarts Oozie. | 
| oozie-log4j | Cambiar los valores en el archivo oozie-log4j.properties de Oozie. | Restarts Oozie. | 
| oozie-site | Cambiar los valores en el archivo oozie-site.xml de Oozie. | Restarts Oozie. | 
| phoenix-hbase-metrics | Cambiar los valores en el archivo hadoop-metrics2-hbase.properties de Phoenix. | Not available. | 
| phoenix-hbase-site | Cambiar los valores en el archivo hbase-site.xml de Phoenix. | Not available. | 
| phoenix-log4j2 | Cambiar los valores en el archivo log4j2.properties de Phoenix. | Restarts Phoenix-QueryServer. | 
| phoenix-metrics | Cambiar los valores en el archivo hadoop-metrics2-phoenix.properties de Phoenix. | Not available. | 
| pig-env | Cambiar los valores en el entorno de Pig. | Not available. | 
| pig-properties | Cambiar los valores en el archivo pig.properties de Pig. | Restarts Oozie. | 
| pig-log4j | Cambiar los valores en el archivo log4j.properties de Pig. | Not available. | 
| presto-log | Cambiar los valores en el archivo log.properties de Presto. | Restarts Presto-Server (for PrestoDB) | 
| presto-config | Cambiar los valores en el archivo config.properties de Presto. | Restarts Presto-Server (for PrestoDB) | 
| presto-password-authenticator | Cambiar los valores en el archivo password-authenticator.properties de Presto. | Not available. | 
| presto-env | Cambiar valores en el archivo presto-env.sh de Presto. | Restarts Presto-Server (for PrestoDB) | 
| presto-node | Cambiar valores en el archivo node.properties de Presto. | Not available. | 
| presto-connector-blackhole | Cambiar los valores en el archivo blackhole.properties de Presto. | Not available. | 
| presto-connector-cassandra | Cambiar los valores en el archivo cassandra.properties de Presto. | Not available. | 
| presto-connector-hive | Cambiar los valores en el archivo hive.properties de Presto. | Restarts Presto-Server (for PrestoDB) | 
| presto-connector-jmx | Cambiar los valores en el archivo jmx.properties de Presto. | Not available. | 
| presto-connector-kafka | Cambiar los valores en el archivo kafka.properties de Presto. | Not available. | 
| presto-connector-lakeformation | Cambiar los valores en el archivo lakeformation.properties de Presto. | Restarts Presto-Server (for PrestoDB) | 
| presto-connector-localfile | Cambiar los valores en el archivo localfile.properties de Presto. | Not available. | 
| presto-connector-memory | Cambiar los valores del archivo memory.properties de Presto. | Not available. | 
| presto-connector-mongodb | Cambiar los valores en el archivo mongodb.properties de Presto. | Not available. | 
| presto-connector-mysql | Cambiar los valores en el archivo mysql.properties de Presto. | Not available. | 
| presto-connector-postgresql | Cambiar los valores en el archivo postgresql.properties de Presto. | Not available. | 
| presto-connector-raptor | Cambiar los valores en el archivo raptor.properties de Presto. | Not available. | 
| presto-connector-redis | Cambiar los valores en el archivo redis.properties de Presto. | Not available. | 
| presto-connector-redshift | Cambiar los valores en el archivo redshift.properties de Presto. | Not available. | 
| presto-connector-tpch | Cambiar los valores en el archivo tpch.properties de Presto. | Not available. | 
| presto-connector-tpcds | Cambiar los valores del archivo tpcds.properties de Presto. | Not available. | 
| trino-log | Cambiar los valores en el archivo log.properties de Trino. | Restarts Trino-Server (for Trino) | 
| trino-config | Cambiar los valores en el archivo config.properties de Trino. | Restarts Trino-Server (for Trino) | 
| trino-password-authenticator | Cambiar los valores en el archivo password-authenticator.properties de Trino. | Restarts Trino-Server (for Trino) | 
| trino-env | Cambie los valores del archivo trino-env.sh de Trino. | Restarts Trino-Server (for Trino) | 
| trino-node | Cambiar los valores en el archivo node.properties de Trino. | Not available. | 
| trino-connector-blackhole | Cambiar los valores en el archivo blackhole.properties de Trino. | Not available. | 
| trino-connector-cassandra | Cambiar los valores en el archivo cassandra.properties de Trino. | Not available. | 
| trino-connector-delta | Cambie los valores del archivo delta.properties de Trino. | Restarts Trino-Server (for Trino) | 
| trino-connector-hive | Cambiar los valores en el archivo hive.properties de Trino. | Restarts Trino-Server (for Trino) | 
| trino-exchange-manager | Cambie los valores del archivo exchange-manager.properties de Trino. | Restarts Trino-Server (for Trino) | 
| trino-connector-iceberg | Cambiar los valores en el archivo iceberg.properties de Trino. | Restarts Trino-Server (for Trino) | 
| trino-connector-hudi | Cambiar los valores en el archivo hudi.properties de Trino. | Restarts Trino-Server (for Trino) | 
| trino-connector-jmx | Cambiar los valores en el archivo jmx.properties de Trino. | Not available. | 
| trino-connector-kafka | Cambiar los valores en el archivo kafka.properties de Trino. | Not available. | 
| trino-connector-localfile | Cambiar los valores en el archivo localfile.properties de Trino. | Not available. | 
| trino-connector-memory | Cambiar los valores en el archivo memory.properties de Trino. | Not available. | 
| trino-connector-mongodb | Cambiar los valores en el archivo mongodb.properties de Trino. | Not available. | 
| trino-connector-mysql | Cambiar los valores en el archivo mysql.properties de Trino. | Not available. | 
| trino-connector-postgresql | Cambiar los valores en el archivo postgresql.properties de Trino. | Not available. | 
| trino-connector-raptor | Cambiar los valores en el archivo raptor.properties de Trino. | Not available. | 
| trino-connector-redis | Cambiar los valores en el archivo redis.properties de Trino. | Not available. | 
| trino-connector-redshift | Cambiar los valores en el archivo redshift.properties de Trino. | Not available. | 
| trino-connector-tpch | Cambiar los valores en el archivo tpch.properties de Trino. | Not available. | 
| trino-connector-tpcds | Cambiar los valores en el archivo tpcds.properties de Trino. | Not available. | 
| ranger-kms-dbks-site | Cambie los valores del archivo dbks-site.xml de Ranger KMS. | Restarts Ranger KMS Server. | 
| ranger-kms-site | Cambie los valores en el ranger-kms-site archivo.xml de Ranger KMS. | Restarts Ranger KMS Server. | 
| ranger-kms-env | Cambie los valores del entorno Ranger KMS. | Restarts Ranger KMS Server. | 
| ranger-kms-logback | Cambie los valores del archivo kms-logback.xml de Ranger KMS. | Not available. | 
| ranger-kms-db-ca | Cambie los valores del archivo CA en S3 para la conexión SSL de MySQL con Ranger KMS. | Not available. | 
| spark | Configuración de Amazon EMR mantenida para Apache Spark. | This property modifies spark-defaults. See actions there. | 
| spark-defaults | Cambiar los valores en el archivo spark-defaults.conf de Spark. | Restarts Spark history server and Spark thrift server. | 
| spark-env | Cambiar los valores en el entorno de Spark. | Restarts Spark history server and Spark thrift server. | 
| spark-hive-site | Cambiar los valores en el archivo hive-site.xml de Spark. | Not available. | 
| spark-log4j2 | Cambiar los valores en el archivo log4j2.properties de Spark. | Restarts Spark history server and Spark thrift server. | 
| spark-metrics | Cambiar los valores en el archivo metrics.properties de Spark. | Restarts Spark history server and Spark thrift server. | 
| tez-site | Cambiar los valores en el archivo tez-site.xml de Tez. | Restart Oozie and HiveServer2. | 
| yarn-env | Cambiar los valores en el entorno de YARN. | Restarts the Hadoop YARN services ResourceManager, NodeManager, ProxyServer, and TimelineServer. Additionally restarts MapReduce-HistoryServer. | 
| yarn-site | Cambiar los valores en el archivo yarn-site.xml de YARN. | Restarts the Hadoop YARN services ResourceManager, NodeManager, ProxyServer, and TimelineServer. Additionally restarts Livy Server and MapReduce-HistoryServer. | 
| zeppelin-env | Cambiar los valores en el entorno de Zeppelin. | Restarts Zeppelin. | 
| zeppelin-site | Cambie los ajustes de configuración de zeppelin-site.xml. | Restarts Zeppelin. | 
| zookeeper-config | Cambie los valores en el ZooKeeper archivo zoo.cfg. | Restarts Zookeeper server. | 
| zookeeper-logback | Cambie los valores en ZooKeeper el archivo logback.xml. | Restarts Zookeeper server. | 
| emr-metrics | Cambie la configuración de la métrica EMR para este nodo. | Restarts the CloudWatchAgent service. | 

## 7.9.0 registro de cambios
<a name="790-changelog"></a>


**Registro de cambios de la versión 7.9.0 y de las notas de la versión**  

| Date | Event | Description (Descripción) | 
| --- | --- | --- | 
| 2025-05-19 | Publicación de documentos | Las notas de la versión 7.9.0 de Amazon EMR se publicaron por primera vez | 
| 2025-05-19 | Implementación completa | [Amazon EMR 7.9.0 se ha implementado completamente en todas las regiones compatibles](https://aws.amazon.com/about-aws/global-infrastructure/regional-product-services/) | 
| 2025-05-19 | Versión limitada inicial | Amazon EMR 7.9.0 se implementó por primera vez en las regiones comerciales iniciales | 

# Amazon EMR versión 7.8.0
<a name="emr-780-release"></a>

## Ciclo de vida compatible con 7.8.0
<a name="emr-780-supported-lifecycle"></a>

En la siguiente tabla se describen las fechas de ciclo de vida admitidas para la versión 7.8.0 de Amazon EMR.


| Fase de soporte | Date | 
| --- | --- | 
| Fecha de lanzamiento inicial | 7 de marzo de 2025 | 
| Soporte estándar hasta | 6 de marzo de 2027 | 
| Fin del soporte | 7 de marzo de 2027 | 
| Fin de vida útil | 7 de marzo de 2028 | 

## Versiones de la aplicación 7.8.0
<a name="emr-780-app-versions"></a>

Esta versión incluye las siguientes aplicaciones: [https://docs.aws.amazon.com/AmazonCloudWatch/latest/monitoring/Install-CloudWatch-Agent.html](https://docs.aws.amazon.com/AmazonCloudWatch/latest/monitoring/Install-CloudWatch-Agent.html), [https://delta.io/](https://delta.io/), [https://flink.apache.org/](https://flink.apache.org/), [http://hbase.apache.org/](http://hbase.apache.org/), [https://cwiki.apache.org/confluence/display/Hive/HCatalog](https://cwiki.apache.org/confluence/display/Hive/HCatalog), [http://hadoop.apache.org/docs/current/](http://hadoop.apache.org/docs/current/), [http://hive.apache.org/](http://hive.apache.org/), [https://hudi.apache.org](https://hudi.apache.org), [http://gethue.com/](http://gethue.com/), [https://iceberg.apache.org/](https://iceberg.apache.org/), [https://jupyter-enterprise-gateway.readthedocs.io/en/latest/](https://jupyter-enterprise-gateway.readthedocs.io/en/latest/), [https://jupyterhub.readthedocs.io/en/latest/#](https://jupyterhub.readthedocs.io/en/latest/#), [https://livy.incubator.apache.org/](https://livy.incubator.apache.org/), [http://oozie.apache.org/](http://oozie.apache.org/), [https://phoenix.apache.org/](https://phoenix.apache.org/), [http://pig.apache.org/](http://pig.apache.org/), [https://prestodb.io/](https://prestodb.io/), [https://spark.apache.org/docs/latest/](https://spark.apache.org/docs/latest/), [https://www.tensorflow.org/](https://www.tensorflow.org/), [https://tez.apache.org/](https://tez.apache.org/), [https://trino.io/](https://trino.io/), [https://zeppelin.incubator.apache.org/](https://zeppelin.incubator.apache.org/) y [https://zookeeper.apache.org](https://zookeeper.apache.org).

En la siguiente tabla se enumeran las versiones de la aplicación disponibles en esta versión de Amazon EMR y las versiones de la aplicación en las tres versiones anteriores de Amazon EMR (cuando corresponda).

Para ver un historial completo de las versiones de la aplicación disponibles para cada versión de Amazon EMR, consulte los temas siguientes:
+ [Versiones de las aplicaciones en las versiones 7.x de Amazon EMR](emr-release-app-versions-7.x.md)
+ [Versiones de la aplicación en las versiones 6.x de Amazon EMR](emr-release-app-versions-6.x.md)
+ [Versiones de la aplicación en las versiones 5.x de Amazon EMR](emr-release-app-versions-5.x.md)
+ [Versiones de la aplicación en las versiones 4.x de Amazon EMR](emr-release-app-versions-4.x.md)


**Información sobre la versión de la aplicación**  

|  | emr-7.8.0 | emr-7.7.0 | emr-7.6.0 | emr-7.5.0 | 
| --- | --- | --- | --- | --- | 
| AWS SDK for Java | 2.29.52, 1.12.780 | 2.29.44, 1.12.780 | 2.29.25, 1.12.779 | 2.28.8, 1.12.772 | 
| Python | 3.9, 3.11 | 3.9, 3.11 | 3.9, 3.11 | 3.9, 3.11 | 
| Scala | 2.12.18 | 2.12.18 | 2.12.18 | 2.12.18 | 
| AmazonCloudWatchAgent | 1.300032.2-amzn-0 | 1.300032.2-amzn-0 | 1.300032.2-amzn-0 | 1.300032.2-amzn-0 | 
| Delta | 3.3.0-amzn-0 | 3.2.1-amzn-2 | 3.2.1-amzn-1 | 3.2.1-amzn-0 | 
| Flink | 1.20.0-amzn-2 | 1.20.0-amzn-1 | 1.20.0-amzn-0 | 1.19.1-amzn-1 | 
| Ganglia |  -  |  -  |  -  |  -  | 
| HBase | 2.6.1-amzn-2 | 2.6.1-amzn-1 | 2.6.1-amzn-0 | 2.5.10-amzn-0 | 
| HCatalog | 3.1.3-amzn-17 | 3.1.3-amzn-16 | 3.1.3-amzn-15 | 3.1.3-amzn-14 | 
| Hadoop | 3.4.1-amzn-0 | 3.4.0-amzn-3 | 3.4.0-amzn-2 | 3.4.0-amzn-1 | 
| Hive | 3.1.3-amzn-17 | 3.1.3-amzn-16 | 3.1.3-amzn-15 | 3.1.3-amzn-14 | 
| Hudi | 0.15.0-amzn-5 | 0.15.0-amzn-4 | 0.15.0-amzn-3 | 0.15.0-amzn-2 | 
| Hue | 4.11.0 | 4.11.0 | 4.11.0 | 4.11.0 | 
| Iceberg | 1.7.1-amzn-1 | 1.7.1-amzn-0 | 1.6.1-amzn-2 | 1.6.1-amzn-1 | 
| JupyterEnterpriseGateway | 2.6.0 | 2.6.0 | 2.6.0 | 2.6.0 | 
| JupyterHub | 1.5.0 | 1.5.0 | 1.5.0 | 1.5.0 | 
| Livy | 0.8.0-incubating | 0.8.0-incubating | 0.8.0-incubating | 0.8.0-incubating | 
| MXNet |  -  |  -  |  -  |  -  | 
| Mahout |  -  |  -  |  -  |  -  | 
| Oozie | 5.2.1 | 5.2.1 | 5.2.1 | 5.2.1 | 
| Phoenix | 5.2.1 | 5.2.1 | 5.2.0 | 5.2.0 | 
| Pig | 0.17.0 | 0.17.0 | 0.17.0 | 0.17.0 | 
| Presto | 0.287-amzn-2 | 0.287-amzn-1 | 0.287-amzn-1 | 0.287-amzn-0 | 
| Spark | 3.5.4-amzn-0 | 3.5.3-amzn-1 | 3.5.3-amzn-0 | 3.5.2-amzn-1 | 
| Sqoop |  -  |  -  |  -  |  -  | 
| TensorFlow | 2.16.1 | 2.16.1 | 2.16.1 | 2.16.1 | 
| Tez | 0.10.2-amzn-15 | 0.10.2-amzn-14 | 0.10.2-amzn-13 | 0.10.2-amzn-12 | 
| Trino (PrestoSQL) | 467-amzn-1 | 467-amzn-0 | 457-amzn-0 | 446-amzn-0 | 
| Zeppelin | 0.11.1 | 0.11.1 | 0.11.1 | 0.11.1 | 
| ZooKeeper | 3.9.3-amzn-0 | 3.9.2-amzn-1 | 3.9.2-amzn-0 | 3.9.2-amzn-0 | 

# Detalles de los componentes de la versión 7.8.0
<a name="emr-780-release-components-details"></a>

Consulte la siguiente tabla para obtener más información sobre los paquetes *Extras* de Amazon EMR 7.7.0.


| Aplicación | Tipo de aplicación | Package | Tipo de Package | Versión de paquete | 
| --- | --- | --- | --- | --- | 
|  AmazonCloudWatchAgent  |  Core  |  hadoop-hdfs-journalnode  |  Extras  |  3.4.1-amzn-0-1.amzn2023  | 
|  AmazonCloudWatchAgent  |  Core  |  ranger-kms  |  Extras  |  2.0.0-1.amzn2023  | 
|  AmazonCloudWatchAgent  |  Core  |  s3-dist-cp  |  Extras  |  2.38.0-1.amzn2023  | 
|  AmazonCloudWatchAgent  |  Core  |  ZooKeeper  |  Extras  |  3.9.3-amzn-0-1.amzn2023  | 
|  AmazonCloudWatchAgent  |  Core  |  zookeeper-server  |  Extras  |  3.9.3-amzn-0-1.amzn2023  | 
|  Flink  |  Core  |  hadoop-client  |  Extras  |  3.4.0. amzn.3-1.amzn2023  | 
|  Flink  |  Core  |  hadoop-hdfs  |  Extras  |  3.4.1-amzn-0-1.amzn2023  | 
|  Flink  |  Core  |  hadoop-hdfs-datanode  |  Extras  |  3.4.1-amzn-0-1.amzn2023  | 
|  Flink  |  Core  |  hadoop-hdfs-journalnode  |  Extras  |  3.4.1-amzn-0-1.amzn2023  | 
|  Flink  |  Core  |  hadoop-hdfs-namenode  |  Extras  |  3.4.1-amzn-0-1.amzn2023  | 
|  Flink  |  Core  |  hadoop-httpfs  |  Extras  |  3.4.1-amzn-0-1.amzn2023  | 
|  Flink  |  Core  |  hadoop-kms  |  Extras  |  3.4.1-amzn-0-1.amzn2023  | 
|  Flink  |  Core  |  hadoop-mapreduce  |  Extras  |  3.4.1-amzn-0-1.amzn2023  | 
|  Flink  |  Core  |  hadoop-mapreduce-historyserver  |  Extras  |  3.4.1-amzn-0-1.amzn2023  | 
|  Flink  |  Core  |  hadoop-yarn  |  Extras  |  3.4.1-amzn-0-1.amzn2023  | 
|  Flink  |  Core  |  hadoop-yarn-nodemanager  |  Extras  |  3.4.1-amzn-0-1.amzn2023  | 
|  Flink  |  Core  |  hadoop-yarn-proxyserver  |  Extras  |  3.4.1-amzn-0-1.amzn2023  | 
|  Flink  |  Core  |  hadoop-yarn-resourcemanager  |  Extras  |  3.4.1-amzn-0-1.amzn2023  | 
|  Flink  |  Core  |  hadoop-yarn-timelineserver  |  Extras  |  3.4.1-amzn-0-1.amzn2023  | 
|  Flink  |  Core  |  hudi  |  Extras  |  0.15.0-amzn-5-1.amzn2023  | 
|  Flink  |  Core  |  ranger-kms  |  Extras  |  2.0.0-1.amzn2023  | 
|  Flink  |  Core  |  hadoop  |  Extras  |  3.4.1-amzn-0-1.amzn2023  | 
|  HBase  |  Core  |  s3-dist-cp  |  Extras  |  2.38.0-1.amzn2023  | 
|  HCatalog  |  Core  |  hadoop-yarn-proxyserver  |  Extras  |  3.4.1-amzn-0-1.amzn2023  | 
|  HCatalog  |  Core  |  mariadb-connector-java  |  Extras  |    | 
|  Hive  |  Core  |  hadoop-httpfs  |  Extras  |  3.4.1-amzn-0-1.amzn2023  | 
|  Hive  |  Core  |  hadoop-yarn-proxyserver  |  Extras  |  3.4.1-amzn-0-1.amzn2023  | 
|  Hive  |  Core  |  hive-hbase  |  Extras  |  3.1.3-amzn-17-1.amzn2023  | 
|  Hive  |  Core  |  mariadb-connector-java  |  Extras  |  3.1.3-amzn-17-1  | 
|  Hive  |  Core  |  s3-dist-cp  |  Extras  |  2.38.0-1. amzn2023  | 
|  Phoenix  |  Core  |  s3-dist-cp  |  Extras  |  2.38.0-1.amzn2023  | 
|  Spark  |  Core  |  spark-datanucleus  |  Extras  |  3.5.3. amzn.1-1.amzn2023  | 
|  Tez  |  Core  |  hadoop-mapreduce  |  Extras  |  3.4.1-amzn-0-1.amzn2023  | 
|  Tez  |  Core  |  hadoop-mapreduce-historyserver  |  Extras  |  3.4.1-amzn-0-1.amzn2023  | 
|  Tez  |  Core  |  hadoop-yarn-proxyserver  |  Extras  |  3.4.1-amzn-0-1.amzn2023  | 
|  Trino  |  Core  |  bigtop-utils  |  Extras  |  1.2.0-1.amzn2023  | 
|  Trino  |  Core  |  hadoop-client  |  Extras  |  3.4.1. amzn.0-1.amzn2023  | 
|  Trino  |  Core  |  hadoop-hdfs  |  Extras  |  3.4.1. amzn.0-1.amzn2023  | 
|  Trino  |  Core  |  hadoop-hdfs-datanode  |  Extras  |  3.4.1. amzn.0-1.amzn2023  | 
|  Trino  |  Core  |  hadoop-hdfs-journalnode  |  Extras  |  3.4.1. amzn.0-1.amzn2023  | 
|  Trino  |  Core  |  hadoop-hdfs-namenode  |  Extras  |  3.4.1. amzn.0-1.amzn2023  | 
|  Trino  |  Core  |  hadoop-kms  |  Extras  |  3.4.1. amzn.0-1.amzn2023  | 
|  Trino  |  Core  |  hadoop-mapreduce  |  Extras  |  3.4.1. amzn.0-1.amzn2023  | 
|  Trino  |  Core  |  hadoop-mapreduce-historyserver  |  Extras  |  3.4.1. amzn.0-1.amzn2023  | 
|  Trino  |  Core  |  hadoop-yarn  |  Extras  |  3.4.1. amzn.0-1.amzn2023  | 
|  Trino  |  Core  |  hadoop-yarn-nodemanager  |  Extras  |  3.4.1. amzn.0-1.amzn2023  | 
|  Trino  |  Core  |  hadoop-yarn-proxyserver  |  Extras  |  3.4.1. amzn.0-1.amzn2023  | 
|  Trino  |  Core  |  hadoop-yarn-resourcemanager  |  Extras  |  3.4.1. amzn.0-1.amzn2023  | 
|  Trino  |  Core  |  hadoop-yarn-timelineserver  |  Extras  |  3.4.1. amzn.0-1.amzn2023  | 
|  Trino  |  Core  |  hive  |  Extras  |  3.1.3. amzn.17-1.amzn2023  | 
|  Trino  |  Core  |  hive-hcatalog-server  |  Extras  |  3.1.3. amzn.17-1.amzn2023  | 
|  Trino  |  Core  |  mariadb-connector-java  |  Extras  |  2.7.2-1  | 
|  Trino  |  Core  |  ranger-kms  |  Extras  |  2.0.0-1.amzn2023  | 
|  Trino  |  Core  |  ZooKeeper  |  Extras  |  3.9.3. amzn.0-1.amzn2023  | 
|  Trino  |  Core  |  zookeeper-server  |  Extras  |  3.9.3. amzn.0-1.amzn2023  | 
|  Trino  |  Core  |  bigtop-groovy  |  Extras  |  2.5.4-1.amzn2023  | 
|  Trino  |  Core  |  bigtop-jsvc  |  Extras  |  1.2.4-1.amzn2023  | 
|  Trino  |  Core  |  hadoop  |  Extras  |  3.4.1. amzn.0-1.amzn2023  | 
|  Trino  |  Core  |  hadoop-lzo  |  Extras  |  0.4.19-1.amzn2023  | 
|  Trino  |  Core  |  hive-hcatalog  |  Extras  |  3.1.3. amzn.17-1.amzn2023  | 
|  Trino  |  Core  |  hive-jdbc  |  Extras  |  3.1.3. amzn.17-1.amzn2023  | 
|  ZooKeeper  |  Core  |  emrfs  |  Extras  |  3.9.3. amzn.0-1.amzn2023  | 
|  ZooKeeper  |  Core  |  hadoop-client  |  Extras  |  3.9.3. amzn.0-1.amzn2023  | 
|  ZooKeeper  |  Core  |  hadoop-hdfs  |  Extras  |  3.9.3. amzn.0-1.amzn2023  | 
|  ZooKeeper  |  Core  |  hadoop-hdfs-datanode  |  Extras  |  3.9.3. amzn.0-1.amzn2023  | 
|  ZooKeeper  |  Core  |  hadoop-hdfs-journalnode  |  Extras  |  3.9.3. amzn.0-1.amzn2023  | 
|  ZooKeeper  |  Core  |  hadoop-hdfs-namenode  |  Extras  |  3.9.3. amzn.0-1.amzn2023  | 
|  ZooKeeper  |  Core  |  hadoop-httpfs  |  Extras  |  3.9.3. amzn.0-1.amzn2023  | 
|  ZooKeeper  |  Core  |  hadoop-kms  |  Extras  |  3.9.3. amzn.0-1.amzn2023  | 
|  ZooKeeper  |  Core  |  hadoop-mapreduce  |  Extras  |  3.4.1. amzn.0-1.amzn2023  | 
|  ZooKeeper  |  Core  |  hadoop-mapreduce-historyserver  |  Extras  |  3.4.1. amzn.0-1.amzn2023  | 
|  ZooKeeper  |  Core  |  hadoop-yarn  |  Extras  |  3.4.1. amzn.0-1.amzn2023  | 
|  ZooKeeper  |  Core  |  hadoop-yarn-nodemanager  |  Extras  |  3.4.1. amzn.0-1.amzn2023  | 
|  ZooKeeper  |  Core  |  hadoop-yarn-proxyserver  |  Extras  |  3.4.1. amzn.0-1.amzn2023  | 
|  ZooKeeper  |  Core  |  hadoop-yarn-resourcemanager  |  Extras  |  3.4.1. amzn.0-1.amzn2023  | 
|  ZooKeeper  |  Core  |  hadoop-yarn-timelineserver  |  Extras  |  3.4.1. amzn.0-1.amzn2023  | 
|  ZooKeeper  |  Core  |  ranger-kms  |  Extras  |  2.0.0-1.amzn2023  | 

# 7.8.0 vulnerabilidades y exposiciones comunes
<a name="780-common-vulnerabilities-exposures"></a>

La siguiente tabla muestra todo lo CVEs que no afecta a los clústeres de EMR que se ejecutan en las configuraciones recomendadas de Amazon EMR 7.8.0. Amazon EMR depende del código abierto original para la disponibilidad de las correcciones y proporcionará la última versión estable como parte de los componentes del motor principal en un plazo de 90 días a partir de su verificación por parte de Amazon EMR.

Esta tabla se actualizó el 6 de marzo de 2025.


| ID de CVE | Gravedad | URL de detalles del CVE | 
| --- | --- | --- | 
|  CVE-2015-1832  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2015-1832](https://nvd.nist.gov/vuln/detail/CVE-2015-1832)  | 
|  CVE-2016-5018  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2016-5018)-2016-5018  | 
|  CVE-2017-15095  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2017-15095)-2017-15095  | 
|  CVE-2017-17485  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2017-17485](https://nvd.nist.gov/vuln/detail/CVE-2017-17485)  | 
|  CVE-2017-7525  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2017-7525)-2017-7525  | 
|  CVE-2018-11307  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2018-11307](https://nvd.nist.gov/vuln/detail/CVE-2018-11307)  | 
|  CVE-2018-11307  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2018-11307](https://nvd.nist.gov/vuln/detail/CVE-2018-11307)  | 
|  CVE-2018-14718  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-14718)-2018-14718  | 
|  CVE-2018-14718  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-14718)-2018-14718  | 
|  CVE-2018-14719  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-14719)-2018-14719  | 
|  CVE-2018-14719  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-14719)-2018-14719  | 
|  CVE-2018-14720  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-14720)-2018-14720  | 
|  CVE-2018-14720  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-14720)-2018-14720  | 
|  CVE-2018-14721  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-14721)-2018-14721  | 
|  CVE-2018-14721  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-14721)-2018-14721  | 
|  CVE-2018-19360  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2018-19360](https://nvd.nist.gov/vuln/detail/CVE-2018-19360)  | 
|  CVE-2018-19360  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2018-19360](https://nvd.nist.gov/vuln/detail/CVE-2018-19360)  | 
|  CVE-2018-19361  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2018-19361](https://nvd.nist.gov/vuln/detail/CVE-2018-19361)  | 
|  CVE-2018-19361  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2018-19361](https://nvd.nist.gov/vuln/detail/CVE-2018-19361)  | 
|  CVE-2018-19362  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2018-19362](https://nvd.nist.gov/vuln/detail/CVE-2018-19362)  | 
|  CVE-2018-19362  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2018-19362](https://nvd.nist.gov/vuln/detail/CVE-2018-19362)  | 
|  CVE-2018-7489  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2018-7489](https://nvd.nist.gov/vuln/detail/CVE-2018-7489)  | 
|  CVE-2018-7489  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2018-7489](https://nvd.nist.gov/vuln/detail/CVE-2018-7489)  | 
|  CVE-2019-10202  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2019-10202](https://nvd.nist.gov/vuln/detail/CVE-2019-10202)  | 
|  CVE-2019-14379  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2019-14379](https://nvd.nist.gov/vuln/detail/CVE-2019-14379)  | 
|  CVE-2019-14379  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2019-14379](https://nvd.nist.gov/vuln/detail/CVE-2019-14379)  | 
|  CVE-2019-14540  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-14540)-2019-14540  | 
|  CVE-2019-14540  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-14540)-2019-14540  | 
|  CVE-2019-14892  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-14892)-2019-14892  | 
|  CVE-2019-14892  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-14892)-2019-14892  | 
|  CVE-2019-14893  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-14893)-2019-14893  | 
|  CVE-2019-14893  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-14893)-2019-14893  | 
|  CVE-2019-16335  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2019-16335](https://nvd.nist.gov/vuln/detail/CVE-2019-16335)  | 
|  CVE-2019-16335  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2019-16335](https://nvd.nist.gov/vuln/detail/CVE-2019-16335)  | 
|  CVE-2019-16942  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-16942)-2019-16942  | 
|  CVE-2019-16942  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-16942)-2019-16942  | 
|  CVE-2019-16943  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-16943)-2019-16943  | 
|  CVE-2019-16943  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-16943)-2019-16943  | 
|  CVE-2019-17267  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2019-17267](https://nvd.nist.gov/vuln/detail/CVE-2019-17267)  | 
|  CVE-2019-17267  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2019-17267](https://nvd.nist.gov/vuln/detail/CVE-2019-17267)  | 
|  CVE-2019-17531  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-17531)-2019-17531  | 
|  CVE-2019-17531  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-17531)-2019-17531  | 
|  CVE-2019-20330  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2019-20330](https://nvd.nist.gov/vuln/detail/CVE-2019-20330)  | 
|  CVE-2019-20330  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2019-20330](https://nvd.nist.gov/vuln/detail/CVE-2019-20330)  | 
|  CVE-2020-8840  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-8840](https://nvd.nist.gov/vuln/detail/CVE-2020-8840)  | 
|  CVE-2020-8840  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-8840](https://nvd.nist.gov/vuln/detail/CVE-2020-8840)  | 
|  CVE-2020-9546  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-9546](https://nvd.nist.gov/vuln/detail/CVE-2020-9546)  | 
|  CVE-2020-9546  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-9546](https://nvd.nist.gov/vuln/detail/CVE-2020-9546)  | 
|  CVE-2020-9547  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-9547](https://nvd.nist.gov/vuln/detail/CVE-2020-9547)  | 
|  CVE-2020-9547  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-9547](https://nvd.nist.gov/vuln/detail/CVE-2020-9547)  | 
|  CVE-2020-9548  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-9548](https://nvd.nist.gov/vuln/detail/CVE-2020-9548)  | 
|  CVE-2020-9548  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-9548](https://nvd.nist.gov/vuln/detail/CVE-2020-9548)  | 
|  CVE-2022-1471  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2022-1471](https://nvd.nist.gov/vuln/detail/CVE-2022-1471)  | 
|  CVE-2022-1471  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2022-1471](https://nvd.nist.gov/vuln/detail/CVE-2022-1471)  | 
|  CVE-2022-37865  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-202237865](https://nvd.nist.gov/vuln/detail/CVE-2022-37865)  | 
|  CVE-2022-39135  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-202239135](https://nvd.nist.gov/vuln/detail/CVE-2022-39135)  | 
|  CVE-2022-42889  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-202242889](https://nvd.nist.gov/vuln/detail/CVE-2022-42889)  | 
|  CVE-2022-46337  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-202246337](https://nvd.nist.gov/vuln/detail/CVE-2022-46337)  | 
|  CVE-2022-46337  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-202246337](https://nvd.nist.gov/vuln/detail/CVE-2022-46337)  | 
|  CVE-2024-47561  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-47561](https://nvd.nist.gov/vuln/detail/CVE-2024-47561)  | 
|  CVE-2024-47561  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-47561](https://nvd.nist.gov/vuln/detail/CVE-2024-47561)  | 
|  CVE-2024-47561  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-47561](https://nvd.nist.gov/vuln/detail/CVE-2024-47561)  | 
|  CVE-2024-47561  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-47561](https://nvd.nist.gov/vuln/detail/CVE-2024-47561)  | 
|  CVE-2024-47561  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-47561](https://nvd.nist.gov/vuln/detail/CVE-2024-47561)  | 
|  CVE-2024-52046  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-52046](https://nvd.nist.gov/vuln/detail/CVE-2024-52046)  | 
|  CVE-2024-52046  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-52046](https://nvd.nist.gov/vuln/detail/CVE-2024-52046)  | 
|  CVE-2024-53990  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-53990](https://nvd.nist.gov/vuln/detail/CVE-2024-53990)  | 
|  CVE-2024-53990  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-53990](https://nvd.nist.gov/vuln/detail/CVE-2024-53990)  | 
|  CVE-2015-5237  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2015-5237)-2015-5237  | 
|  CVE-2015-5237  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2015-5237)-2015-5237  | 
|  CVE-2016-6796  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2016-6796)-2016-6796  | 
|  CVE-2018-1000180  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2018-1000180](https://nvd.nist.gov/vuln/detail/CVE-2018-1000180)  | 
|  CVE-2018-12022  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2018-12022](https://nvd.nist.gov/vuln/detail/CVE-2018-12022)  | 
|  CVE-2018-12022  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2018-12022](https://nvd.nist.gov/vuln/detail/CVE-2018-12022)  | 
|  CVE-2018-12023  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2018-12023](https://nvd.nist.gov/vuln/detail/CVE-2018-12023)  | 
|  CVE-2018-12023  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2018-12023](https://nvd.nist.gov/vuln/detail/CVE-2018-12023)  | 
|  CVE-2018-5968  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-5968)-2018-5968  | 
|  CVE-2019-0205  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2019-0205](https://nvd.nist.gov/vuln/detail/CVE-2019-0205)  | 
|  CVE-2019-0205  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2019-0205](https://nvd.nist.gov/vuln/detail/CVE-2019-0205)  | 
|  CVE-2019-10172  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2019-10172](https://nvd.nist.gov/vuln/detail/CVE-2019-10172)  | 
|  CVE-2019-12086  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-12086)-2019-12086  | 
|  CVE-2019-12086  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-12086)-2019-12086  | 
|  CVE-2019-14439  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-14439)-2019-14439  | 
|  CVE-2019-14439  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-14439)-2019-14439  | 
|  CVE-2020-10650  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-10650](https://nvd.nist.gov/vuln/detail/CVE-2020-10650)  | 
|  CVE-2020-10650  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-10650](https://nvd.nist.gov/vuln/detail/CVE-2020-10650)  | 
|  CVE-2020-10672  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-10672](https://nvd.nist.gov/vuln/detail/CVE-2020-10672)  | 
|  CVE-2020-10672  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-10672](https://nvd.nist.gov/vuln/detail/CVE-2020-10672)  | 
|  CVE-2020-10673  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-10673](https://nvd.nist.gov/vuln/detail/CVE-2020-10673)  | 
|  CVE-2020-10673  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-10673](https://nvd.nist.gov/vuln/detail/CVE-2020-10673)  | 
|  CVE-2020-10968  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-10968)-2020-10968  | 
|  CVE-2020-10968  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-10968)-2020-10968  | 
|  CVE-2020-10969  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-10969)-2020-10969  | 
|  CVE-2020-10969  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-10969)-2020-10969  | 
|  CVE-2020-11111  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-11111](https://nvd.nist.gov/vuln/detail/CVE-2020-11111)  | 
|  CVE-2020-11111  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-11111](https://nvd.nist.gov/vuln/detail/CVE-2020-11111)  | 
|  CVE-2020-11112  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-11112](https://nvd.nist.gov/vuln/detail/CVE-2020-11112)  | 
|  CVE-2020-11112  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-11112](https://nvd.nist.gov/vuln/detail/CVE-2020-11112)  | 
|  CVE-2020-11113  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-11113](https://nvd.nist.gov/vuln/detail/CVE-2020-11113)  | 
|  CVE-2020-11113  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-11113](https://nvd.nist.gov/vuln/detail/CVE-2020-11113)  | 
|  CVE-2020-11619  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-11619)-2020-11619  | 
|  CVE-2020-11619  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-11619)-2020-11619  | 
|  CVE-2020-11620  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-11620](https://nvd.nist.gov/vuln/detail/CVE-2020-11620)  | 
|  CVE-2020-11620  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-11620](https://nvd.nist.gov/vuln/detail/CVE-2020-11620)  | 
|  CVE-2020-13936  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-13936)-2020-13936  | 
|  CVE-2020-13949  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-13949)-2020-13949  | 
|  CVE-2020-13949  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-13949)-2020-13949  | 
|  CVE-2020-13949  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-13949)-2020-13949  | 
|  CVE-2020-14060  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-14060)-2020-14060  | 
|  CVE-2020-14060  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-14060)-2020-14060  | 
|  CVE-2020-14061  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-14061)-2020-14061  | 
|  CVE-2020-14061  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-14061)-2020-14061  | 
|  CVE-2020-14062  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-14062)-2020-14062  | 
|  CVE-2020-14062  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-14062)-2020-14062  | 
|  CVE-2020-14195  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-14195](https://nvd.nist.gov/vuln/detail/CVE-2020-14195)  | 
|  CVE-2020-14195  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-14195](https://nvd.nist.gov/vuln/detail/CVE-2020-14195)  | 
|  CVE-2020-24616  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-24616](https://nvd.nist.gov/vuln/detail/CVE-2020-24616)  | 
|  CVE-2020-24616  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-24616](https://nvd.nist.gov/vuln/detail/CVE-2020-24616)  | 
|  CVE-2020-24750  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-24750](https://nvd.nist.gov/vuln/detail/CVE-2020-24750)  | 
|  CVE-2020-24750  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-24750](https://nvd.nist.gov/vuln/detail/CVE-2020-24750)  | 
|  CVE-2020-25649  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-25649](https://nvd.nist.gov/vuln/detail/CVE-2020-25649)  | 
|  CVE-2020-28052  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-28052](https://nvd.nist.gov/vuln/detail/CVE-2020-28052)  | 
|  CVE-2020-35490  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-35490](https://nvd.nist.gov/vuln/detail/CVE-2020-35490)  | 
|  CVE-2020-35490  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-35490](https://nvd.nist.gov/vuln/detail/CVE-2020-35490)  | 
|  CVE-2020-35491  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-35491](https://nvd.nist.gov/vuln/detail/CVE-2020-35491)  | 
|  CVE-2020-35491  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-35491](https://nvd.nist.gov/vuln/detail/CVE-2020-35491)  | 
|  CVE-2020-35728  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-35728](https://nvd.nist.gov/vuln/detail/CVE-2020-35728)  | 
|  CVE-2020-35728  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-35728](https://nvd.nist.gov/vuln/detail/CVE-2020-35728)  | 
|  CVE-2020-36179  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36179](https://nvd.nist.gov/vuln/detail/CVE-2020-36179)  | 
|  CVE-2020-36179  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36179](https://nvd.nist.gov/vuln/detail/CVE-2020-36179)  | 
|  CVE-2020-36180  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36180](https://nvd.nist.gov/vuln/detail/CVE-2020-36180)  | 
|  CVE-2020-36180  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36180](https://nvd.nist.gov/vuln/detail/CVE-2020-36180)  | 
|  CVE-2020-36181  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36181](https://nvd.nist.gov/vuln/detail/CVE-2020-36181)  | 
|  CVE-2020-36181  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36181](https://nvd.nist.gov/vuln/detail/CVE-2020-36181)  | 
|  CVE-2020-36182  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36182](https://nvd.nist.gov/vuln/detail/CVE-2020-36182)  | 
|  CVE-2020-36182  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36182](https://nvd.nist.gov/vuln/detail/CVE-2020-36182)  | 
|  CVE-2020-36183  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36183](https://nvd.nist.gov/vuln/detail/CVE-2020-36183)  | 
|  CVE-2020-36183  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36183](https://nvd.nist.gov/vuln/detail/CVE-2020-36183)  | 
|  CVE-2020-36184  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36184](https://nvd.nist.gov/vuln/detail/CVE-2020-36184)  | 
|  CVE-2020-36184  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36184](https://nvd.nist.gov/vuln/detail/CVE-2020-36184)  | 
|  CVE-2020-36185  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36185](https://nvd.nist.gov/vuln/detail/CVE-2020-36185)  | 
|  CVE-2020-36185  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36185](https://nvd.nist.gov/vuln/detail/CVE-2020-36185)  | 
|  CVE-2020-36186  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36186](https://nvd.nist.gov/vuln/detail/CVE-2020-36186)  | 
|  CVE-2020-36186  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36186](https://nvd.nist.gov/vuln/detail/CVE-2020-36186)  | 
|  CVE-2020-36187  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36187](https://nvd.nist.gov/vuln/detail/CVE-2020-36187)  | 
|  CVE-2020-36187  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36187](https://nvd.nist.gov/vuln/detail/CVE-2020-36187)  | 
|  CVE-2020-36188  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36188](https://nvd.nist.gov/vuln/detail/CVE-2020-36188)  | 
|  CVE-2020-36188  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36188](https://nvd.nist.gov/vuln/detail/CVE-2020-36188)  | 
|  CVE-2020-36189  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36189](https://nvd.nist.gov/vuln/detail/CVE-2020-36189)  | 
|  CVE-2020-36189  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36189](https://nvd.nist.gov/vuln/detail/CVE-2020-36189)  | 
|  CVE-2020-36518  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36518](https://nvd.nist.gov/vuln/detail/CVE-2020-36518)  | 
|  CVE-2020-36518  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36518](https://nvd.nist.gov/vuln/detail/CVE-2020-36518)  | 
|  CVE-2021-20190  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2021-20190](https://nvd.nist.gov/vuln/detail/CVE-2021-20190)  | 
|  CVE-2021-20190  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2021-20190](https://nvd.nist.gov/vuln/detail/CVE-2021-20190)  | 
|  CVE-2021-31684  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2021-31684](https://nvd.nist.gov/vuln/detail/CVE-2021-31684)  | 
|  CVE-2021-34538  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2021-34538](https://nvd.nist.gov/vuln/detail/CVE-2021-34538)  | 
|  CVE-2021-34538  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2021-34538](https://nvd.nist.gov/vuln/detail/CVE-2021-34538)  | 
|  CVE-2021-34538  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2021-34538](https://nvd.nist.gov/vuln/detail/CVE-2021-34538)  | 
|  CVE-2022-25647  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-202225647](https://nvd.nist.gov/vuln/detail/CVE-2022-25647)  | 
|  CVE-2022-25647  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-202225647](https://nvd.nist.gov/vuln/detail/CVE-2022-25647)  | 
|  CVE-2022-25647  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-202225647](https://nvd.nist.gov/vuln/detail/CVE-2022-25647)  | 
|  CVE-2022-25857  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-202225857](https://nvd.nist.gov/vuln/detail/CVE-2022-25857)  | 
|  CVE-2022-3171  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2022-3171](https://nvd.nist.gov/vuln/detail/CVE-2022-3171)  | 
|  CVE-2022-3171  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2022-3171](https://nvd.nist.gov/vuln/detail/CVE-2022-3171)  | 
|  CVE-2022-3509  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2022-3509](https://nvd.nist.gov/vuln/detail/CVE-2022-3509)  | 
|  CVE-2022-3509  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2022-3509](https://nvd.nist.gov/vuln/detail/CVE-2022-3509)  | 
|  CVE-2022-3510  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-20223510](https://nvd.nist.gov/vuln/detail/CVE-2022-3510)  | 
|  CVE-2022-3510  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-20223510](https://nvd.nist.gov/vuln/detail/CVE-2022-3510)  | 
|  CVE-2022-36364  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-202236364](https://nvd.nist.gov/vuln/detail/CVE-2022-36364)  | 
|  CVE-2022-37866  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-202237866](https://nvd.nist.gov/vuln/detail/CVE-2022-37866)  | 
|  CVE-2022-40149  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-202240149](https://nvd.nist.gov/vuln/detail/CVE-2022-40149)  | 
|  CVE-2022-40149  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-202240149](https://nvd.nist.gov/vuln/detail/CVE-2022-40149)  | 
|  CVE-2022-40150  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-202240150](https://nvd.nist.gov/vuln/detail/CVE-2022-40150)  | 
|  CVE-2022-40150  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-202240150](https://nvd.nist.gov/vuln/detail/CVE-2022-40150)  | 
|  CVE-2022-42003  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2022-42003](https://nvd.nist.gov/vuln/detail/CVE-2022-42003)  | 
|  CVE-2022-42003  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2022-42003](https://nvd.nist.gov/vuln/detail/CVE-2022-42003)  | 
|  CVE-2022-42003  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2022-42003](https://nvd.nist.gov/vuln/detail/CVE-2022-42003)  | 
|  CVE-2022-42003  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2022-42003](https://nvd.nist.gov/vuln/detail/CVE-2022-42003)  | 
|  CVE-2022-42003  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2022-42003](https://nvd.nist.gov/vuln/detail/CVE-2022-42003)  | 
|  CVE-2022-42004  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2022-42004](https://nvd.nist.gov/vuln/detail/CVE-2022-42004)  | 
|  CVE-2022-42004  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2022-42004](https://nvd.nist.gov/vuln/detail/CVE-2022-42004)  | 
|  CVE-2022-42004  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2022-42004](https://nvd.nist.gov/vuln/detail/CVE-2022-42004)  | 
|  CVE-2022-42004  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2022-42004](https://nvd.nist.gov/vuln/detail/CVE-2022-42004)  | 
|  CVE-2022-45685  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-202245685](https://nvd.nist.gov/vuln/detail/CVE-2022-45685)  | 
|  CVE-2022-45685  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-202245685](https://nvd.nist.gov/vuln/detail/CVE-2022-45685)  | 
|  CVE-2022-45693  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-202245693](https://nvd.nist.gov/vuln/detail/CVE-2022-45693)  | 
|  CVE-2022-45693  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-202245693](https://nvd.nist.gov/vuln/detail/CVE-2022-45693)  | 
|  CVE-2022-46751  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-202246751](https://nvd.nist.gov/vuln/detail/CVE-2022-46751)  | 
|  CVE-2022-46751  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-202246751](https://nvd.nist.gov/vuln/detail/CVE-2022-46751)  | 
|  CVE-2023-1370  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-1370](https://nvd.nist.gov/vuln/detail/CVE-2023-1370)  | 
|  CVE-2023-1370  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-1370](https://nvd.nist.gov/vuln/detail/CVE-2023-1370)  | 
|  CVE-2023-1436  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-1436](https://nvd.nist.gov/vuln/detail/CVE-2023-1436)  | 
|  CVE-2023-1436  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-1436](https://nvd.nist.gov/vuln/detail/CVE-2023-1436)  | 
|  CVE-2023-20883  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-20883](https://nvd.nist.gov/vuln/detail/CVE-2023-20883)  | 
|  CVE-2023-25194  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-25194](https://nvd.nist.gov/vuln/detail/CVE-2023-25194)  | 
|  CVE-2023-2976  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-2976](https://nvd.nist.gov/vuln/detail/CVE-2023-2976)  | 
|  CVE-2023-2976  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-2976](https://nvd.nist.gov/vuln/detail/CVE-2023-2976)  | 
|  CVE-2023-2976  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-2976](https://nvd.nist.gov/vuln/detail/CVE-2023-2976)  | 
|  CVE-2023-2976  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-2976](https://nvd.nist.gov/vuln/detail/CVE-2023-2976)  | 
|  CVE-2023-2976  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-2976](https://nvd.nist.gov/vuln/detail/CVE-2023-2976)  | 
|  CVE-2023-2976  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-2976](https://nvd.nist.gov/vuln/detail/CVE-2023-2976)  | 
|  CVE-2023-2976  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-2976](https://nvd.nist.gov/vuln/detail/CVE-2023-2976)  | 
|  CVE-2023-2976  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-2976](https://nvd.nist.gov/vuln/detail/CVE-2023-2976)  | 
|  CVE-2023-2976  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-2976](https://nvd.nist.gov/vuln/detail/CVE-2023-2976)  | 
|  CVE-2023-2976  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-2976](https://nvd.nist.gov/vuln/detail/CVE-2023-2976)  | 
|  CVE-2023-34453  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-34453](https://nvd.nist.gov/vuln/detail/CVE-2023-34453)  | 
|  CVE-2023-34454  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-34454](https://nvd.nist.gov/vuln/detail/CVE-2023-34454)  | 
|  CVE-2023-34455  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-34455](https://nvd.nist.gov/vuln/detail/CVE-2023-34455)  | 
|  CVE-2023-3635  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-3635](https://nvd.nist.gov/vuln/detail/CVE-2023-3635)  | 
|  CVE-2023-3635  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-3635](https://nvd.nist.gov/vuln/detail/CVE-2023-3635)  | 
|  CVE-2023-39410  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-39410](https://nvd.nist.gov/vuln/detail/CVE-2023-39410)  | 
|  CVE-2023-39410  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-39410](https://nvd.nist.gov/vuln/detail/CVE-2023-39410)  | 
|  CVE-2023-39410  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-39410](https://nvd.nist.gov/vuln/detail/CVE-2023-39410)  | 
|  CVE-2023-39410  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-39410](https://nvd.nist.gov/vuln/detail/CVE-2023-39410)  | 
|  CVE-2023-43642  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-43642](https://nvd.nist.gov/vuln/detail/CVE-2023-43642)  | 
|  CVE-2023-5072  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-5072](https://nvd.nist.gov/vuln/detail/CVE-2023-5072)  | 
|  CVE-2023-6378  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-6378](https://nvd.nist.gov/vuln/detail/CVE-2023-6378)  | 
|  CVE-2023-6378  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-6378](https://nvd.nist.gov/vuln/detail/CVE-2023-6378)  | 
|  CVE-2023-6481  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-6481](https://nvd.nist.gov/vuln/detail/CVE-2023-6481)  | 
|  CVE-2023-6481  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-6481](https://nvd.nist.gov/vuln/detail/CVE-2023-6481)  | 
|  CVE-2024-7254  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-7254](https://nvd.nist.gov/vuln/detail/CVE-2024-7254)  | 
|  CVE-2024-7254  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-7254](https://nvd.nist.gov/vuln/detail/CVE-2024-7254)  | 
|  CVE-2024-7254  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-7254](https://nvd.nist.gov/vuln/detail/CVE-2024-7254)  | 
|  CVE-2024-7254  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-7254](https://nvd.nist.gov/vuln/detail/CVE-2024-7254)  | 
|  CVE-2024-7254  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-7254](https://nvd.nist.gov/vuln/detail/CVE-2024-7254)  | 
|  CVE-2024-7254  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-7254](https://nvd.nist.gov/vuln/detail/CVE-2024-7254)  | 
|  CVE-2024-7254  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-7254](https://nvd.nist.gov/vuln/detail/CVE-2024-7254)  | 
|  CVE-2012-5783  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2012-5783](https://nvd.nist.gov/vuln/detail/CVE-2012-5783)  | 
|  CVE-2012-6153  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2012-6153](https://nvd.nist.gov/vuln/detail/CVE-2012-6153)  | 
|  CVE-2018-10237  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2018-10237](https://nvd.nist.gov/vuln/detail/CVE-2018-10237)  | 
|  CVE-2018-10237  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2018-10237](https://nvd.nist.gov/vuln/detail/CVE-2018-10237)  | 
|  CVE-2018-10237  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2018-10237](https://nvd.nist.gov/vuln/detail/CVE-2018-10237)  | 
|  CVE-2018-10237  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2018-10237](https://nvd.nist.gov/vuln/detail/CVE-2018-10237)  | 
|  CVE-2018-10237  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2018-10237](https://nvd.nist.gov/vuln/detail/CVE-2018-10237)  | 
|  CVE-2018-10237  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2018-10237](https://nvd.nist.gov/vuln/detail/CVE-2018-10237)  | 
|  CVE-2018-11798  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2018-11798](https://nvd.nist.gov/vuln/detail/CVE-2018-11798)  | 
|  CVE-2018-1313  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2018-1313](https://nvd.nist.gov/vuln/detail/CVE-2018-1313)  | 
|  CVE-2019-10219  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2019-10219](https://nvd.nist.gov/vuln/detail/CVE-2019-10219)  | 
|  CVE-2019-12384  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-12384)-2019-12384  | 
|  CVE-2019-12384  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-12384)-2019-12384  | 
|  CVE-2019-12814  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-12814)-2019-12814  | 
|  CVE-2019-12814  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-12814)-2019-12814  | 
|  CVE-2020-10693  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-10693](https://nvd.nist.gov/vuln/detail/CVE-2020-10693)  | 
|  CVE-2020-13955  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-13955)-2020-13955  | 
|  CVE-2020-13956  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-13956)-2020-13956  | 
|  CVE-2020-15250  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-15250](https://nvd.nist.gov/vuln/detail/CVE-2020-15250)  | 
|  CVE-2020-15250  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-15250](https://nvd.nist.gov/vuln/detail/CVE-2020-15250)  | 
|  CVE-2020-15522  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-15522)-2020-15522  | 
|  CVE-2020-15522  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-15522)-2020-15522  | 
|  CVE-2020-17521  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-17521)-2020-17521  | 
|  CVE-2020-17521  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-17521)-2020-17521  | 
|  CVE-2020-1945  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-1945](https://nvd.nist.gov/vuln/detail/CVE-2020-1945)  | 
|  CVE-2020-26939  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-26939](https://nvd.nist.gov/vuln/detail/CVE-2020-26939)  | 
|  CVE-2020-26939  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-26939](https://nvd.nist.gov/vuln/detail/CVE-2020-26939)  | 
|  CVE-2020-29582  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-29582](https://nvd.nist.gov/vuln/detail/CVE-2020-29582)  | 
|  CVE-2021-22569  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2021-22569](https://nvd.nist.gov/vuln/detail/CVE-2021-22569)  | 
|  CVE-2021-22569  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2021-22569](https://nvd.nist.gov/vuln/detail/CVE-2021-22569)  | 
|  CVE-2021-22570  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2021-22570](https://nvd.nist.gov/vuln/detail/CVE-2021-22570)  | 
|  CVE-2021-22570  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2021-22570](https://nvd.nist.gov/vuln/detail/CVE-2021-22570)  | 
|  CVE-2021-27568  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2021-27568](https://nvd.nist.gov/vuln/detail/CVE-2021-27568)  | 
|  CVE-2021-28170  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2021-28170](https://nvd.nist.gov/vuln/detail/CVE-2021-28170)  | 
|  CVE-2021-28170  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2021-28170](https://nvd.nist.gov/vuln/detail/CVE-2021-28170)  | 
|  CVE-2021-28170  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2021-28170](https://nvd.nist.gov/vuln/detail/CVE-2021-28170)  | 
|  CVE-2021-28170  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2021-28170](https://nvd.nist.gov/vuln/detail/CVE-2021-28170)  | 
|  CVE-2021-29425  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2021-29425](https://nvd.nist.gov/vuln/detail/CVE-2021-29425)  | 
|  CVE-2021-36373  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2021-36373](https://nvd.nist.gov/vuln/detail/CVE-2021-36373)  | 
|  CVE-2021-36374  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2021-36374](https://nvd.nist.gov/vuln/detail/CVE-2021-36374)  | 
|  CVE-2021-38153  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2021-38153](https://nvd.nist.gov/vuln/detail/CVE-2021-38153)  | 
|  CVE-202224329  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-202224329](https://nvd.nist.gov/vuln/detail/CVE-2022-24329)  | 
|  CVE-202238749  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-202238749](https://nvd.nist.gov/vuln/detail/CVE-2022-38749)  | 
|  CVE-202238750  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-202238750](https://nvd.nist.gov/vuln/detail/CVE-2022-38750)  | 
|  CVE-202238751  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-202238751](https://nvd.nist.gov/vuln/detail/CVE-2022-38751)  | 
|  CVE-202238752  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-202238752](https://nvd.nist.gov/vuln/detail/CVE-2022-38752)  | 
|  CVE-2022-41854  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-41854)-2022-41854  | 
|  CVE-2023-0833  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-0833](https://nvd.nist.gov/vuln/detail/CVE-2023-0833)  | 
|  CVE-2023-20863  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-20863](https://nvd.nist.gov/vuln/detail/CVE-2023-20863)  | 
|  CVE-2023-33201  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-33201](https://nvd.nist.gov/vuln/detail/CVE-2023-33201)  | 
|  CVE-2023-33201  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-33201](https://nvd.nist.gov/vuln/detail/CVE-2023-33201)  | 
|  CVE-2023-33201  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-33201](https://nvd.nist.gov/vuln/detail/CVE-2023-33201)  | 
|  CVE-2023-33201  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-33201](https://nvd.nist.gov/vuln/detail/CVE-2023-33201)  | 
|  CVE-2023-33201  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-33201](https://nvd.nist.gov/vuln/detail/CVE-2023-33201)  | 
|  CVE-2023-33202  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-33202](https://nvd.nist.gov/vuln/detail/CVE-2023-33202)  | 
|  CVE-2023-33202  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-33202](https://nvd.nist.gov/vuln/detail/CVE-2023-33202)  | 
|  CVE-2023-33202  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-33202](https://nvd.nist.gov/vuln/detail/CVE-2023-33202)  | 
|  CVE-2023-33202  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-33202](https://nvd.nist.gov/vuln/detail/CVE-2023-33202)  | 
|  CVE-2023-33202  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-33202](https://nvd.nist.gov/vuln/detail/CVE-2023-33202)  | 
|  CVE-2023-42503  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-42503](https://nvd.nist.gov/vuln/detail/CVE-2023-42503)  | 
|  CVE-2023-51074  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-51074](https://nvd.nist.gov/vuln/detail/CVE-2023-51074)  | 
|  CVE-2023-51074  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-51074](https://nvd.nist.gov/vuln/detail/CVE-2023-51074)  | 
|  CVE-2024-12798  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-12798](https://nvd.nist.gov/vuln/detail/CVE-2024-12798)  | 
|  CVE-2024-12798  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-12798](https://nvd.nist.gov/vuln/detail/CVE-2024-12798)  | 
|  CVE-2024-12798  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-12798](https://nvd.nist.gov/vuln/detail/CVE-2024-12798)  | 
|  CVE-2024-12798  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-12798](https://nvd.nist.gov/vuln/detail/CVE-2024-12798)  | 
|  CVE-2024-12798  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-12798](https://nvd.nist.gov/vuln/detail/CVE-2024-12798)  | 
|  CVE-2024-12798  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-12798](https://nvd.nist.gov/vuln/detail/CVE-2024-12798)  | 
|  CVE-2024-25710  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-25710](https://nvd.nist.gov/vuln/detail/CVE-2024-25710)  | 
|  CVE-2024-25710  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-25710](https://nvd.nist.gov/vuln/detail/CVE-2024-25710)  | 
|  CVE-2024-25710  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-25710](https://nvd.nist.gov/vuln/detail/CVE-2024-25710)  | 
|  CVE-2024-26308  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-26308](https://nvd.nist.gov/vuln/detail/CVE-2024-26308)  | 
|  CVE-2024-26308  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-26308](https://nvd.nist.gov/vuln/detail/CVE-2024-26308)  | 
|  CVE-2024-26308  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-26308](https://nvd.nist.gov/vuln/detail/CVE-2024-26308)  | 
|  CVE-2024-38820  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-38820](https://nvd.nist.gov/vuln/detail/CVE-2024-38820)  | 
|  CVE-2024-38820  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-38820](https://nvd.nist.gov/vuln/detail/CVE-2024-38820)  | 
|  CVE-2024-6763  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-6763](https://nvd.nist.gov/vuln/detail/CVE-2024-6763)  | 
|  CVE-2024-6763  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-6763](https://nvd.nist.gov/vuln/detail/CVE-2024-6763)  | 
|  CVE-2024-6763  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-6763](https://nvd.nist.gov/vuln/detail/CVE-2024-6763)  | 
|  CVE-2024-6763  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-6763](https://nvd.nist.gov/vuln/detail/CVE-2024-6763)  | 
|  CVE-2024-6763  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-6763](https://nvd.nist.gov/vuln/detail/CVE-2024-6763)  | 
|  CVE-2024-8184  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-8184](https://nvd.nist.gov/vuln/detail/CVE-2024-8184)  | 
|  CVE-2020-8908  |  BAJA  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-8908](https://nvd.nist.gov/vuln/detail/CVE-2020-8908)  | 
|  CVE-2020-8908  |  BAJA  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-8908](https://nvd.nist.gov/vuln/detail/CVE-2020-8908)  | 
|  CVE-2020-8908  |  BAJA  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-8908](https://nvd.nist.gov/vuln/detail/CVE-2020-8908)  | 
|  CVE-2020-8908  |  BAJA  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-8908](https://nvd.nist.gov/vuln/detail/CVE-2020-8908)  | 
|  CVE-2020-8908  |  BAJA  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-8908](https://nvd.nist.gov/vuln/detail/CVE-2020-8908)  | 
|  CVE-2020-8908  |  BAJA  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-8908](https://nvd.nist.gov/vuln/detail/CVE-2020-8908)  | 
|  CVE-2020-8908  |  BAJA  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-8908](https://nvd.nist.gov/vuln/detail/CVE-2020-8908)  | 
|  CVE-2020-8908  |  BAJA  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-8908](https://nvd.nist.gov/vuln/detail/CVE-2020-8908)  | 
|  CVE-2020-8908  |  BAJA  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-8908](https://nvd.nist.gov/vuln/detail/CVE-2020-8908)  | 
|  CVE-2020-8908  |  BAJA  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-8908](https://nvd.nist.gov/vuln/detail/CVE-2020-8908)  | 
|  CVE-2024-12801  |  BAJA  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-12801](https://nvd.nist.gov/vuln/detail/CVE-2024-12801)  | 
|  CVE-2024-12801  |  BAJA  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-12801](https://nvd.nist.gov/vuln/detail/CVE-2024-12801)  | 
|  CVE-2024-12801  |  BAJA  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-12801](https://nvd.nist.gov/vuln/detail/CVE-2024-12801)  | 
|  CVE-2024-12801  |  BAJA  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-12801](https://nvd.nist.gov/vuln/detail/CVE-2024-12801)  | 
|  GHSA-chfm-68vv-pvw5  |  BAJA  |  [https://nvd.nist. gov/vuln/detail/GHSA-chfm-68vv-pvw5](https://nvd.nist.gov/vuln/detail/GHSA-chfm-68vv-pvw5)  | 
|  CVE-2024-23454  |  SIN CLASIFICAR  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-23454](https://nvd.nist.gov/vuln/detail/CVE-2024-23454)  | 
|  CVE-2024-23944  |  SIN CLASIFICAR  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-23944](https://nvd.nist.gov/vuln/detail/CVE-2024-23944)  | 
|  CVE-2024-23945  |  SIN CLASIFICAR  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-23945](https://nvd.nist.gov/vuln/detail/CVE-2024-23945)  | 
|  CVE-2024-23945  |  SIN CLASIFICAR  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-23945](https://nvd.nist.gov/vuln/detail/CVE-2024-23945)  | 
|  CVE-2024-23953  |  SIN CLASIFICAR  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-23953](https://nvd.nist.gov/vuln/detail/CVE-2024-23953)  | 
|  CVE-2024-23953  |  SIN CLASIFICAR  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-23953](https://nvd.nist.gov/vuln/detail/CVE-2024-23953)  | 
|  CVE-2024-27137  |  SIN CLASIFICAR  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-27137](https://nvd.nist.gov/vuln/detail/CVE-2024-27137)  | 
|  CVE-2024-29025  |  SIN CLASIFICAR  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-29025](https://nvd.nist.gov/vuln/detail/CVE-2024-29025)  | 
|  CVE-2024-29131  |  SIN CLASIFICAR  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-29131](https://nvd.nist.gov/vuln/detail/CVE-2024-29131)  | 
|  CVE-2024-29133  |  SIN CLASIFICAR  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-29133](https://nvd.nist.gov/vuln/detail/CVE-2024-29133)  | 
|  CVE-2024-29857  |  SIN CLASIFICAR  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-29857](https://nvd.nist.gov/vuln/detail/CVE-2024-29857)  | 
|  CVE-2024-29857  |  SIN CLASIFICAR  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-29857](https://nvd.nist.gov/vuln/detail/CVE-2024-29857)  | 
|  CVE-2024-29857  |  SIN CLASIFICAR  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-29857](https://nvd.nist.gov/vuln/detail/CVE-2024-29857)  | 
|  CVE-2024-29857  |  SIN CLASIFICAR  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-29857](https://nvd.nist.gov/vuln/detail/CVE-2024-29857)  | 
|  CVE-2024-29869  |  SIN CLASIFICAR  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-29869](https://nvd.nist.gov/vuln/detail/CVE-2024-29869)  | 
|  CVE-2024-29869  |  SIN CLASIFICAR  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-29869](https://nvd.nist.gov/vuln/detail/CVE-2024-29869)  | 
|  CVE-2024-30171  |  SIN CLASIFICAR  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-30171](https://nvd.nist.gov/vuln/detail/CVE-2024-30171)  | 
|  CVE-2024-30171  |  SIN CLASIFICAR  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-30171](https://nvd.nist.gov/vuln/detail/CVE-2024-30171)  | 
|  CVE-2024-30171  |  SIN CLASIFICAR  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-30171](https://nvd.nist.gov/vuln/detail/CVE-2024-30171)  | 
|  CVE-2024-30171  |  SIN CLASIFICAR  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-30171](https://nvd.nist.gov/vuln/detail/CVE-2024-30171)  | 
|  CVE-2024-30172  |  SIN CLASIFICAR  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-30172](https://nvd.nist.gov/vuln/detail/CVE-2024-30172)  | 
|  CVE-2024-30172  |  SIN CLASIFICAR  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-30172](https://nvd.nist.gov/vuln/detail/CVE-2024-30172)  | 
|  CVE-2024-31141  |  SIN CLASIFICAR  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-31141](https://nvd.nist.gov/vuln/detail/CVE-2024-31141)  | 
|  CVE-2024-31141  |  SIN CLASIFICAR  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-31141](https://nvd.nist.gov/vuln/detail/CVE-2024-31141)  | 
|  CVE-2024-34447  |  SIN CLASIFICAR  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-34447](https://nvd.nist.gov/vuln/detail/CVE-2024-34447)  | 
|  CVE-2024-34447  |  SIN CLASIFICAR  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-34447](https://nvd.nist.gov/vuln/detail/CVE-2024-34447)  | 
|  CVE-2024-36114  |  SIN CLASIFICAR  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-36114](https://nvd.nist.gov/vuln/detail/CVE-2024-36114)  | 
|  CVE-2024-36114  |  SIN CLASIFICAR  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-36114](https://nvd.nist.gov/vuln/detail/CVE-2024-36114)  | 
|  CVE-2024-36114  |  SIN CLASIFICAR  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-36114](https://nvd.nist.gov/vuln/detail/CVE-2024-36114)  | 
|  CVE-2024-36114  |  SIN CLASIFICAR  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-36114](https://nvd.nist.gov/vuln/detail/CVE-2024-36114)  | 
|  CVE-2024-38808  |  SIN CLASIFICAR  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-38808](https://nvd.nist.gov/vuln/detail/CVE-2024-38808)  | 
|  CVE-2024-47535  |  SIN CLASIFICAR  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-47535](https://nvd.nist.gov/vuln/detail/CVE-2024-47535)  | 
|  CVE-2024-47535  |  SIN CLASIFICAR  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-47535](https://nvd.nist.gov/vuln/detail/CVE-2024-47535)  | 
|  CVE-2024-47535  |  SIN CLASIFICAR  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-47535](https://nvd.nist.gov/vuln/detail/CVE-2024-47535)  | 
|  CVE-2024-47554  |  SIN CLASIFICAR  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-47554](https://nvd.nist.gov/vuln/detail/CVE-2024-47554)  | 
|  CVE-2024-47554  |  SIN CLASIFICAR  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-47554](https://nvd.nist.gov/vuln/detail/CVE-2024-47554)  | 
|  CVE-2024-47554  |  SIN CLASIFICAR  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-47554](https://nvd.nist.gov/vuln/detail/CVE-2024-47554)  | 
|  CVE-2024-47554  |  SIN CLASIFICAR  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-47554](https://nvd.nist.gov/vuln/detail/CVE-2024-47554)  | 
|  CVE-2024-51504  |  SIN CLASIFICAR  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-51504](https://nvd.nist.gov/vuln/detail/CVE-2024-51504)  | 
|  CVE-2024-51504  |  SIN CLASIFICAR  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-51504](https://nvd.nist.gov/vuln/detail/CVE-2024-51504)  | 
|  CVE-2024-56128  |  SIN CLASIFICAR  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-56128](https://nvd.nist.gov/vuln/detail/CVE-2024-56128)  | 
|  CVE-2024-56128  |  SIN CLASIFICAR  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-56128](https://nvd.nist.gov/vuln/detail/CVE-2024-56128)  | 
|  CVE-2024-57699  |  SIN CLASIFICAR  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-57699](https://nvd.nist.gov/vuln/detail/CVE-2024-57699)  | 
|  CVE-2024-9823  |  SIN CLASIFICAR  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-9823](https://nvd.nist.gov/vuln/detail/CVE-2024-9823)  | 
|  CVE-2025-23015  |  SIN CLASIFICAR  |  [https://nvd.nist. gov/vuln/detail/CVE-2025-23015](https://nvd.nist.gov/vuln/detail/CVE-2025-23015)  | 
|  CVE-2025-24860  |  SIN CLASIFICAR  |  [https://nvd.nist. gov/vuln/detail/CVE-2025-24860](https://nvd.nist.gov/vuln/detail/CVE-2025-24860)  | 
|  CVE-2025-24970  |  SIN CLASIFICAR  |  [https://nvd.nist. gov/vuln/detail/CVE-2025-24970](https://nvd.nist.gov/vuln/detail/CVE-2025-24970)  | 
|  CVE-2025-24970  |  SIN CLASIFICAR  |  [https://nvd.nist. gov/vuln/detail/CVE-2025-24970](https://nvd.nist.gov/vuln/detail/CVE-2025-24970)  | 
|  CVE-2025-24970  |  SIN CLASIFICAR  |  [https://nvd.nist. gov/vuln/detail/CVE-2025-24970](https://nvd.nist.gov/vuln/detail/CVE-2025-24970)  | 
|  CVE-2025-24970  |  SIN CLASIFICAR  |  [https://nvd.nist. gov/vuln/detail/CVE-2025-24970](https://nvd.nist.gov/vuln/detail/CVE-2025-24970)  | 
|  CVE-2025-25193  |  SIN CLASIFICAR  |  [https://nvd.nist. gov/vuln/detail/CVE-2025-25193](https://nvd.nist.gov/vuln/detail/CVE-2025-25193)  | 
|  CVE-2025-25193  |  SIN CLASIFICAR  |  [https://nvd.nist. gov/vuln/detail/CVE-2025-25193](https://nvd.nist.gov/vuln/detail/CVE-2025-25193)  | 
|  CVE-2025-25193  |  SIN CLASIFICAR  |  [https://nvd.nist. gov/vuln/detail/CVE-2025-25193](https://nvd.nist.gov/vuln/detail/CVE-2025-25193)  | 
|  CVE-2025-25193  |  SIN CLASIFICAR  |  [https://nvd.nist. gov/vuln/detail/CVE-2025-25193](https://nvd.nist.gov/vuln/detail/CVE-2025-25193)  | 
|  CVE-2025-25193  |  SIN CLASIFICAR  |  [https://nvd.nist. gov/vuln/detail/CVE-2025-25193](https://nvd.nist.gov/vuln/detail/CVE-2025-25193)  | 

## Notas de la versión 7.8.0
<a name="emr-780-relnotes"></a>

Las siguientes notas de la versión incluyen información sobre la versión 7.8.0 de Amazon EMR.

**Nuevas características**
+ **Actualizaciones de la aplicación**: Amazon EMR 7.8.0 application upgrades include AWS SDK for Java 2.29.52/1.12.780, Delta 3.3.0-amzn-0, Hadoop 3.4.1, Hudi 0.15.0-amzn-5, Iceberg 1.7.1-amzn-1, Spark 3.5.4, and Zookeeper 3.9.3.

**Problemas conocidos**
+ **Cifrado de KMS mediante el SecretAgent componente EMR-EC2**: se produce un error cuando se habilita el cifrado de KMS en reposo para los clústeres habilitados para Lake Formation en las versiones 7.8 y 7.9 de EMR. Los trabajos habilitados para la formación de lagos fracasarán con un. *NoSuchMethodError* Hay dos alternativas temporales:
  + Deshabilitar de manera temporal el cifrado en reposo con KMS en los clústeres afectados.
  + Póngase en contacto con AWS Support para solicitar un artefacto Bootstrap Action si se debe mantener el cifrado KMS.
**nota**  
**Actualización de corrección**: en agosto de 2025, se implementó una actualización en todas las regiones para resolver este problema. Ya no es necesario deshabilitar el cifrado en reposo con KMS.
+  **HBase creación de tablas en el catálogo Hive with Glue**: desde EMR-7.3.0 hasta EMR-7.10.0, hay un error debido a la integración de Hive Iceberg, que hace que la HBase creación de tablas en Hive falle cuando se utiliza Glue Data Catalog como metaalmacén. Ponte en contacto con el equipo de soporte si tienes este problema. AWS 
+  **IU de Tez**: de EMR-7.3 a EMR-7.10, hay un error que hace que el acceso a la IU de Tez a través de la interfaz de usuario web de YARN Resource Manager falle cuando se habilita el cifrado en tránsito. Esto ocurre porque el proxy YARN intenta usar el protocolo HTTP, mientras que la interfaz de usuario de Tez requiere HTTPS. Modifique la `tez.tez-ui.history-url.base` configuración en `tez-site` de `http` a `https` para resolver este problema.

**Cambios, mejoras y problemas resueltos**
+  A partir de Spark 3.3.1 (compatible con las versiones 6.10 y posteriores de EMR), todos los ejecutores de un host de desmantelamiento pasan a un nuevo `ExecutorState`, denominado estado de *RETIRADA*. Yarn no puede utilizar los ejecutores que se están retirando para asignar tareas y, por lo tanto, solicitará nuevos ejecutores, si es necesario, para las tareas que se están ejecutando. Por lo tanto, si deshabilita Spark DRA mientras usa EMR Managed Scaling, EMR Auto Scaling o cualquier mecanismo de escalado personalizado en los clústeres de EMR-EC2, Yarn puede solicitar el máximo de ejecutores permitidos para cada trabajo. Para evitar este problema, deje la propiedad `spark.dynamicAllocation.enabled` establecida en `TRUE` (que es la predeterminada) cuando utilice la combinación de características anterior. Además, también puede establecer restricciones de ejecutor mínimas y máximas si configura valores para las propiedades `spark.dynamicAllocation.maxExecutors` y `spark.dynamicAllocation.minExecutors` para sus trabajos de Spark, a fin de restringir el número de ejecutores asignados durante la ejecución del trabajo. 
+     
[\[See the AWS documentation website for more details\]](http://docs.aws.amazon.com/es_es/emr/latest/ReleaseGuide/emr-780-release.html)

## Versiones Java predeterminadas de 7.8.0
<a name="emr-780-jdk"></a>

La versión 7.8 y las versiones posteriores de Amazon EMR incluyen Amazon Corretto 17 (basado en OpenJDK) de forma predeterminada para las aplicaciones compatibles con Corretto 17 (JDK 17), con la excepción de Apache Livy.

En la siguiente tabla se muestran las versiones predeterminadas de Java para las aplicaciones de Amazon EMR 7.8.0. Si desea cambiar la JVM predeterminada del clúster, siga las instrucciones de [Configuración de aplicaciones para utilizar una máquina virtual de Java específica](configuring-java8.md) para cada aplicación que se ejecute en el clúster. Solo se puede usar una versión de tiempo de ejecución de Java en un clúster. Amazon EMR no admite la ejecución de distintos nodos o aplicaciones en distintas versiones de tiempo de ejecución en el mismo clúster.


| Aplicación | Versión de Java o Amazon Corretto (el valor predeterminado está en negrita) | 
| --- | --- | 
| Delta | 17, 11, 8 | 
| Flink | 17, 11, 8 | 
| HBase | 17, 11, 8 | 
| HCatalog | 17, 11, 8 | 
| Hadoop | 17, 11, 8 | 
| Hive | 17, 11, 8 | 
| Hudi | 17, 11, 8 | 
| Iceberg | 17, 11 | 
| Livy | 17, 11, 8 | 
| Oozie | 17, 11, 8 | 
| Phoenix | 17, 11, 8 | 
| PrestoDB | 8 | 
| Spark | 17, 11, 8 | 
| Spark RAPIDS | 17, 11, 8 | 
| Tez | 17, 11, 8 | 
| Trino | 21, 17 | 
| Zeppelin | 17, 11, 8 | 
| Pig | 17, 11, 8 | 
| ZooKeeper | 17, 11, 8 | 

## Versiones de componentes 7.8.0
<a name="emr-780-components"></a>

A continuación, se muestran los componentes que Amazon EMR instala con esta versión. Algunos se instalan como parte de paquetes de aplicación de macrodatos. Otros son exclusivos de Amazon EMR y se instalan para ciertos procesos y características del sistema. Normalmente, estos componentes comienzan con `emr` o `aws`. Normalmente, los paquetes de aplicación de macrodatos de la versión más reciente de Amazon EMR son las versiones más recientes que pueden encontrarse en la comunidad. Intentamos que las versiones de la comunidad estén disponibles en Amazon EMR lo más rápido posible.

Algunos componentes de Amazon EMR son distintos de las versiones que se encuentran en la comunidad. Estos componentes tienen una etiqueta de versión con el formato `CommunityVersion-amzn-EmrVersion`. La `EmrVersion` empieza por 0. Por ejemplo, si un componente de la comunidad de código abierto llamado `myapp-component` con la versión 2.2 se ha modificado tres veces para incluirlo en diferentes versiones de lanzamiento de Amazon EMR, la versión que se mostrará será `2.2-amzn-2`.


| Componente | Versión | Description (Descripción) | 
| --- | --- | --- | 
| adot-java-agent | 1.31.0 | Un agente Java que recopila métricas de los daemons de las aplicaciones. | 
| delta | 3.3.0-amzn-0 | Delta Lake es un formato de tabla abierto para conjuntos de datos analíticos de gran tamaño | 
| emr-amazon-cloudwatch-agent | 1.300032.2-amzn-0 | Se trata de una aplicación que recopila métricas internas de nivel de sistema y métricas de aplicación personalizadas de las instancias de Amazon EC2. | 
| emr-ddb | 5.6.0 | Conector de Amazon DynamoDB para aplicaciones del ecosistema de Hadoop. | 
| emr-goodies | 3.17,0 | Bibliotecas especialmente prácticas para el ecosistema de Hadoop. | 
| emr-kinesis | 3.21.0 | Conector de Amazon Kinesis para aplicaciones del ecosistema de Hadoop. | 
| emr-notebook-env | 1.18.0 | Entorno de Conda para cuaderno de EMR que incluye una puerta de enlace empresarial de Jupyter | 
| emr-s3-dist-cp | 2.38.0 | Aplicación de copia distribuida optimizada para Amazon S3. | 
| emr-s3-select | 2.17.0 | Conector S3Select de EMR | 
| emr-wal-cli | 1.3.3 | CLI utilizada para eliminar o enumerar WAL de ERM. | 
| emrfs | 2.69,0 | Conector de Amazon S3 para aplicaciones del ecosistema de Hadoop. | 
| flink-client | 1.20.0-amzn-2 | Scripts y aplicaciones de cliente de línea de comando de Apache Flink. | 
| flink-jobmanager-config | 1.20.0-amzn-2 | Administración de recursos en nodos EMR para Apache Flink. JobManager | 
| hadoop-client | 3.4.1-amzn-0 | Los clientes de línea de comando de Hadoop como, por ejemplo "hdfs", "hadoop" o "yarn". | 
| hadoop-hdfs-datanode | 3.4.1-amzn-0 | Servicio de nivel de nodos de HDFS para el almacenamiento de bloques. | 
| hadoop-hdfs-library | 3.4.1-amzn-0 | Biblioteca y cliente de línea de comandos HDFS | 
| hadoop-hdfs-namenode | 3.4.1-amzn-0 | Servicio de HDFS para realizar un seguimiento de nombres de archivo y bloquear ubicaciones. | 
| hadoop-hdfs-journalnode | 3.4.1-amzn-0 | Servicio de HDFS para administrar los archivos de Hadoop periódico en clústeres de alta disponibilidad. | 
| hadoop-httpfs-server | 3.4.1-amzn-0 | Punto de enlace HTTP para operaciones HDFS. | 
| hadoop-kms-server | 3.4.1-amzn-0 | Servidor de administración de claves criptográficas basado en la API de Hadoop. KeyProvider  | 
| hadoop-mapred | 3.4.1-amzn-0 | MapReduce bibliotecas de motores de ejecución para ejecutar una aplicación. MapReduce  | 
| hadoop-yarn-nodemanager | 3.4.1-amzn-0 | Servicio de YARN para la administración de contenedores en un nodo individual. | 
| hadoop-yarn-resourcemanager | 3.4.1-amzn-0 | Servicio de YARN para la asignación y administración de recursos de clúster y aplicaciones distribuidas. | 
| hadoop-yarn-timeline-server | 3.4.1-amzn-0 | Servicio para recuperar información actual e histórica para aplicaciones de YARN. | 
| hbase-hmaster | 2.6.1-amzn-2 | Servicio para un HBase clúster responsable de la coordinación de las regiones y la ejecución de los comandos administrativos. | 
| hbase-region-server | 2.6.1-amzn-2 | Servicio para prestar servicio a una o más regiones. HBase  | 
| hbase-client | 2.6.1-amzn-2 | HBase cliente de línea de comandos. | 
| hbase-rest-server | 2.6.1-amzn-2 | Servicio que proporciona un punto final HTTP para. RESTful HBase | 
| hbase-thrift-server | 2.6.1-amzn-2 | Servicio que proporciona un punto final de Thrift para. HBase | 
| hbase-operator-tools | 2.6.1-amzn-2 | Herramienta de reparación de clústeres de Apache. HBase  | 
| hcatalog-client | 3.1.3-amzn-17 | El cliente de línea de comando "hcat" para manipular hcatalog-server. | 
| hcatalog-server | 3.1.3-amzn-17 | Prestación de servicios HCatalog, una capa de administración de tablas y almacenamiento para aplicaciones distribuidas. | 
| hcatalog-webhcat-server | 3.1.3-amzn-17 | Punto final HTTP que proporciona una interfaz REST para. HCatalog | 
| hive-client | 3.1.3-amzn-17 | Cliente de línea de comando de Hive. | 
| hive-hbase | 3.1.3-amzn-17 | Hive-hbase client. | 
| hive-metastore-server | 3.1.3-amzn-17 | Service para acceder al metaalmacén de Hive, un repositorio semántico que almacena metadatos para SQL en operaciones de Hadoop. | 
| hive-server2 | 3.1.3-amzn-17 | Servicio para aceptar consultas de Hive como solicitudes web. | 
| hudi | 0.15.0-amzn-5 | Marco de procesamiento incremental para impulsar la canalización de datos a baja latencia y alta eficiencia. | 
| hudi-presto | 0.15.0-amzn-5 | Biblioteca de paquetes para ejecutar Presto con Hudi. | 
| hudi-trino | 0.15.0-amzn-5 | Biblioteca de paquetes para ejecutar Trino con Hudi. | 
| hudi-spark | 0.15.0-amzn-5 | Biblioteca de paquetes para ejecutar Spark con Hudi. | 
| hue-server | 4.11.0 | Aplicación web para analizar datos con aplicaciones del ecosistema de Hadoop | 
| iceberg | 1.7.1-amzn-1 | Apache Iceberg es un formato de tabla abierto para conjuntos de datos analíticos muy grandes | 
| jupyterhub | 1.5.0 | Servidor multiusuario para blocs de notas Jupyter | 
| livy-server | 0.8.0-incubating | Interfaz de REST para interactuar con Apache Spark | 
| nginx | 1.12.1 | nginx [engine x] es un servidor HTTP y proxy inverso | 
| mariadb-server | 5.5.68\$1 | Servidor de base de datos de MariaDB. | 
| nvidia-cuda | 12.3.0 | Controladores Nvidia y conjunto de herramientas Cuda | 
| oozie-client | 5.2.1 | Cliente de línea de comando de Oozie. | 
| oozie-server | 5.2.1 | Servicio para aceptar solicitudes de flujo de trabajo de Oozie. | 
| opencv | 4.7.0 | Biblioteca de visión artificial de código abierto. | 
| phoenix-library | 5.2.1 | Las bibliotecas de Phoenix para servidor y cliente | 
| phoenix-connectors | 6.0.0 | Conectores de Apache Phoenix para Spark-3 | 
| phoenix-query-server | 6.0.0 | Un servidor ligero que proporciona acceso a JDBC, así como acceso de formato Protocol Buffers y JSON al API de Avatica  | 
| presto-coordinator | 0.287-amzn-2 | Servicio para aceptar las consultas y administrar la ejecución de consultas entre presto-workers. | 
| presto-worker | 0.287-amzn-2 | Service para ejecutar partes de una consulta. | 
| presto-client | 0.287-amzn-2 | Cliente de línea de comandos Presto que se instala en los nodos principales en espera de un clúster de HA donde el servidor Presto no se ha iniciado. | 
| trino-coordinator | 467-amzn-1 | Servicio para aceptar consultas y administrar la ejecución de consultas entre trino-workers. | 
| trino-worker | 467-amzn-1 | Service para ejecutar partes de una consulta. | 
| trino-client | 467-amzn-1 | Cliente de línea de comandos Trino que se instala en los maestros en espera de un clúster de HA donde el servidor Trino no se ha iniciado. | 
| pig-client | 0.17.0 | Cliente de línea de comando de Pig. | 
| r | 4.3.2 | Proyecto R para análisis estadístico | 
| ranger-kms-server | 2.0.0 | Sistema de administración de claves Apache Ranger | 
| spark-client | 3.5.4-amzn-0 | Clientes de línea de comando de Spark. | 
| spark-history-server | 3.5.4-amzn-0 | IU web para la visualización de eventos registrados durante la vida útil de una aplicación Spark completada. | 
| spark-on-yarn | 3.5.4-amzn-0 | Motor de ejecución en memoria para YARN. | 
| spark-yarn-slave | 3.5.4-amzn-0 | Bibliotecas de Apache Spark necesarias para esclavos de YARN. | 
| spark-rapids | 24.12.0-amzn-0 | El complemento Nvidia Spark RAPIDS que acelera Apache Spark con. GPUs | 
| tensorflow | 2.16.1 | TensorFlow biblioteca de software de código abierto para computación numérica de alto rendimiento. | 
| tez-on-yarn | 0.10.2-amzn-15 | La aplicación YARN de tez y bibliotecas. | 
| tez-on-worker | 0.10.2-amzn-15 | La aplicación YARN de tez y bibliotecas para nodos de trabajo. | 
| zeppelin-server | 0.11.1 | Bloc de notas basado en web que permite el análisis de datos interactivo. | 
| zookeeper-server | 3.9.3-amzn-0 | Servicio centralizado para mantener información de configuración, nomenclatura, proporcionar sincronización distribuida y proporcionar servicios de grupo. | 
| zookeeper-client | 3.9.3-amzn-0 | ZooKeeper cliente de línea de comandos. | 

## clasificaciones de configuración de 7.8.0
<a name="emr-780-class"></a>

Las clasificaciones de configuración le permiten personalizar las aplicaciones. Suelen corresponder a un archivo XML de configuración para la aplicación como, por ejemplo, `hive-site.xml`. Para obtener más información, consulte [Configuración de aplicaciones](emr-configure-apps.md).

Las acciones de reconfiguración se producen cuando se especifica una configuración para los grupos de instancias de un clúster en ejecución. Amazon EMR solo inicia acciones de reconfiguración para las clasificaciones que se modifican. Para obtener más información, consulte [Reconfiguración de un grupo de instancias en un clúster en ejecución](emr-configure-apps-running-cluster.md).


**clasificaciones emr-7.8.0**  

| Clasificaciones | Description (Descripción) | Acciones de reconfiguración | 
| --- | --- | --- | 
| capacity-scheduler | Cambiar los valores en el archivo capacity-scheduler.xml de Hadoop. | Restarts the ResourceManager service. | 
| container-executor | Cambie los valores en el archivo container-executor.cfg de Hadoop YARN. | Not available. | 
| container-log4j | Cambiar los valores en el archivo container-log4j.properties de Hadoop YARN. | Not available. | 
| core-site | Cambiar los valores en el archivo core-site.xml de Hadoop. | Restarts the Hadoop HDFS services Namenode, SecondaryNamenode, Datanode, ZKFC, and Journalnode. Restarts the Hadoop YARN services ResourceManager, NodeManager, ProxyServer, and TimelineServer. Additionally restarts Hadoop KMS, Ranger KMS, HiveServer2, Hive MetaStore, Hadoop Httpfs, and MapReduce-HistoryServer. | 
| docker-conf | Cambie la configuración relacionada con el docker. | Not available. | 
| emrfs-site | Cambiar la configuración de EMRFS. | Restarts the Hadoop HDFS services Namenode, SecondaryNamenode, Datanode, ZKFC, and Journalnode. Restarts the Hadoop YARN services ResourceManager, NodeManager, ProxyServer, and TimelineServer. Additionally restarts HBaseRegionserver, HBaseMaster, HBaseThrift, HBaseRest, HiveServer2, Hive MetaStore, Hadoop Httpfs, and MapReduce-HistoryServer. | 
| flink-conf | Cambiar la configuración de flink-conf.yaml. | Restarts Flink history server. | 
| flink-log4j | Cambiar la configuración de log4j.properties de Flink. | Restarts Flink history server. | 
| flink-log4j-session | Cambie la configuración de Flink log4j-session.properties para la sesión. Kubernetes/Yarn  | Restarts Flink history server. | 
| flink-log4j-cli | Cambiar la configuración de log4j-cli.properties de Flink. | Restarts Flink history server. | 
| hadoop-env | Cambiar los valores en el entorno de Hadoop para todos los componentes de Hadoop. | Restarts the Hadoop HDFS services Namenode, SecondaryNamenode, Datanode, ZKFC, and Journalnode. Restarts the Hadoop YARN services ResourceManager, NodeManager, ProxyServer, and TimelineServer. Additionally restarts PhoenixQueryserver, HiveServer2, Hive MetaStore, and MapReduce-HistoryServer. | 
| hadoop-log4j | Cambiar los valores en el archivo log4j.properties de Hadoop. | Restarts the Hadoop HDFS services SecondaryNamenode, Datanode, and Journalnode. Restarts the Hadoop YARN services ResourceManager, NodeManager, ProxyServer, and TimelineServer. Additionally restarts Hadoop KMS, Hadoop Httpfs, and MapReduce-HistoryServer. | 
| hadoop-ssl-server | Cambiar la configuración del servidor ssl de Hadoop | Not available. | 
| hadoop-ssl-client | Cambiar la configuración del cliente ssl de Hadoop | Not available. | 
| hbase | Configuraciones seleccionadas por Amazon EMR para Apache. HBase | Custom EMR specific property. Sets emrfs-site and hbase-site configs. See those for their associated restarts. | 
| hbase-env | Cambie los valores en su entorno HBase. | Restarts the HBase services RegionServer, HBaseMaster, ThriftServer, RestServer. | 
| hbase-log4j | Cambie los valores en el archivo HBase hbase-log4j.properties. | Restarts the HBase services RegionServer, HBaseMaster, ThriftServer, RestServer. | 
| hbase-metrics | Cambie los valores en el archivo hadoop-metrics2-hbase.properties. HBase | Restarts the HBase services RegionServer, HBaseMaster, ThriftServer, RestServer. | 
| hbase-policy | Cambie los valores en HBase el archivo hbase-policy.xml. | Not available. | 
| hbase-site | Cambie los valores en HBase el archivo hbase-site.xml. | Restarts the HBase services RegionServer, HBaseMaster, ThriftServer, RestServer. Additionally restarts Phoenix QueryServer. | 
| hdfs-encryption-zones | Configurar zonas de cifrado de HDFS. | This classification should not be reconfigured. | 
| hdfs-env | Cambiar los valores en el entorno de HDFS. | Restarts Hadoop HDFS services Namenode, Datanode, and ZKFC. | 
| hdfs-site | Cambiar los valores en hdfs-site.xml de HDFS. | Restarts the Hadoop HDFS services Namenode, SecondaryNamenode, Datanode, ZKFC, and Journalnode. Additionally restarts Hadoop Httpfs. | 
| hcatalog-env | Cambie los valores en HCatalog el entorno. | Restarts Hive HCatalog Server. | 
| hcatalog-server-jndi | Cambie los valores en HCatalog jndi.properties. | Restarts Hive HCatalog Server. | 
| hcatalog-server-proto-hive-site | Cambie los valores en .xml HCatalog. proto-hive-site | Restarts Hive HCatalog Server. | 
| hcatalog-webhcat-env | Cambie los valores en el entorno HCat de la HCatalog Web. | Restarts Hive WebHCat server. | 
| hcatalog-webhcat-log4j2 | Cambie los valores en las propiedades HCatalog HCat log4j2.properties de la Web. | Restarts Hive WebHCat server. | 
| hcatalog-webhcat-site | Cambie los valores del archivo webhcat-site.xml de la HCatalog WebHCat. | Restarts Hive WebHCat server. | 
| hive | Configuración de Amazon EMR mantenida para Apache Hive. | Sets configurations to launch Hive LLAP service. | 
| hive-beeline-log4j2 | Cambiar los valores en el archivo beeline-log4j2.properties de Hive. | Not available. | 
| hive-parquet-logging | Cambiar los valores en el archivo parquet-logging.properties de Hive. | Not available. | 
| hive-env | Cambiar los valores en el entorno de Hive. | Restarts HiveServer2, HiveMetastore, and Hive HCatalog-Server. Runs Hive schemaTool CLI commands to verify hive-metastore. | 
| hive-exec-log4j2 | Cambie los valores en el archivo hive-exec-log 4j2.properties de Hive. | Not available. | 
| hive-llap-daemon-log4j2 | Cambie los valores en el archivo 4j2.properties de Hive. llap-daemon-log | Not available. | 
| hive-log4j2 | Cambiar los valores en el archivo hive-log4j2.properties de Hive. | Not available. | 
| hive-site | Cambiar los valores en el archivo hive-site.xml de Hive. | Restarts HiveServer2, HiveMetastore, and Hive HCatalog-Server. Runs Hive schemaTool CLI commands to verify hive-metastore. Also restarts Oozie and Zeppelin. | 
| hiveserver2-site | Cambiar los valores en el archivo hiveserver2-site.xml de Hive Server2. | Not available. | 
| hue-ini | Cambiar los valores en el archivo ini de Hue | Restarts Hue. Also activates Hue config override CLI commands to pick up new configurations. | 
| httpfs-env | Cambiar los valores en el entorno de HTTPFS. | Restarts Hadoop Httpfs service. | 
| httpfs-site | Cambiar los valores en el archivo httpfs-site.xml de Hadoop. | Restarts Hadoop Httpfs service. | 
| hadoop-kms-acls | Cambiar los valores en el archivo kms-acls.xml de Hadoop. | Not available. | 
| hadoop-kms-env | Cambiar los valores en el entorno de Hadoop KMS. | Restarts Hadoop-KMS service. | 
| hadoop-kms-java-home | Cambie la página de inicio de Java de KMS de Hadoop | Not available. | 
| hadoop-kms-log4j | Cambiar los valores en el archivo kms-log4j.properties de Hadoop. | Not available. | 
| hadoop-kms-site | Cambiar los valores en el archivo kms-site.xml de Hadoop. | Restarts Hadoop-KMS and Ranger-KMS service. | 
| hudi-env | Cambiar los valores en el entorno de Hudi. | Not available. | 
| hudi-defaults | Cambie los valores en el archivo hudi-defaults.conf de Hudi. | Not available. | 
| iceberg-defaults | Cambie los valores del archivo iceberg-defaults.conf de Iceberg. | Not available. | 
| delta-defaults | Cambie los valores del archivo delta-defaults.conf de Delta. | Not available. | 
| jupyter-notebook-conf | Cambiar los valores en el archivo jupyter\$1notebook\$1config.py de Jupyter Notebook. | Not available. | 
| jupyter-hub-conf | Cambie los valores en JupyterHubs el archivo jupyterhub\$1config.py. | Not available. | 
| jupyter-s3-conf | Configurar la persistencia en S3 del bloc de notas de Jupyter. | Not available. | 
| jupyter-sparkmagic-conf | Cambiar los valores en el archivo config.json de Sparkmagic. | Not available. | 
| livy-conf | Cambiar los valores en el archivo livy.conf de Livy. | Restarts Livy Server. | 
| livy-env | Cambiar los valores en el entorno de Livy. | Restarts Livy Server. | 
| livy-log4j2 | Cambiar la configuración de log4j2.properties de Livy. | Restarts Livy Server. | 
| mapred-env | Cambie los valores en el entorno de la MapReduce aplicación. | Restarts Hadoop MapReduce-HistoryServer. | 
| mapred-site | Cambie los valores en el archivo mapred-site.xml de la MapReduce aplicación. | Restarts Hadoop MapReduce-HistoryServer. | 
| oozie-env | Cambiar los valores en el entorno de Oozie. | Restarts Oozie. | 
| oozie-log4j | Cambiar los valores en el archivo oozie-log4j.properties de Oozie. | Restarts Oozie. | 
| oozie-site | Cambiar los valores en el archivo oozie-site.xml de Oozie. | Restarts Oozie. | 
| phoenix-hbase-metrics | Cambiar los valores en el archivo hadoop-metrics2-hbase.properties de Phoenix. | Not available. | 
| phoenix-hbase-site | Cambiar los valores en el archivo hbase-site.xml de Phoenix. | Not available. | 
| phoenix-log4j2 | Cambiar los valores en el archivo log4j2.properties de Phoenix. | Restarts Phoenix-QueryServer. | 
| phoenix-metrics | Cambiar los valores en el archivo hadoop-metrics2-phoenix.properties de Phoenix. | Not available. | 
| pig-env | Cambiar los valores en el entorno de Pig. | Not available. | 
| pig-properties | Cambiar los valores en el archivo pig.properties de Pig. | Restarts Oozie. | 
| pig-log4j | Cambiar los valores en el archivo log4j.properties de Pig. | Not available. | 
| presto-log | Cambiar los valores en el archivo log.properties de Presto. | Restarts Presto-Server (for PrestoDB) | 
| presto-config | Cambiar los valores en el archivo config.properties de Presto. | Restarts Presto-Server (for PrestoDB) | 
| presto-password-authenticator | Cambiar los valores en el archivo password-authenticator.properties de Presto. | Not available. | 
| presto-env | Cambiar valores en el archivo presto-env.sh de Presto. | Restarts Presto-Server (for PrestoDB) | 
| presto-node | Cambiar valores en el archivo node.properties de Presto. | Not available. | 
| presto-connector-blackhole | Cambiar los valores en el archivo blackhole.properties de Presto. | Not available. | 
| presto-connector-cassandra | Cambiar los valores en el archivo cassandra.properties de Presto. | Not available. | 
| presto-connector-hive | Cambiar los valores en el archivo hive.properties de Presto. | Restarts Presto-Server (for PrestoDB) | 
| presto-connector-jmx | Cambiar los valores en el archivo jmx.properties de Presto. | Not available. | 
| presto-connector-kafka | Cambiar los valores en el archivo kafka.properties de Presto. | Not available. | 
| presto-connector-lakeformation | Cambiar los valores en el archivo lakeformation.properties de Presto. | Restarts Presto-Server (for PrestoDB) | 
| presto-connector-localfile | Cambiar los valores en el archivo localfile.properties de Presto. | Not available. | 
| presto-connector-memory | Cambiar los valores del archivo memory.properties de Presto. | Not available. | 
| presto-connector-mongodb | Cambiar los valores en el archivo mongodb.properties de Presto. | Not available. | 
| presto-connector-mysql | Cambiar los valores en el archivo mysql.properties de Presto. | Not available. | 
| presto-connector-postgresql | Cambiar los valores en el archivo postgresql.properties de Presto. | Not available. | 
| presto-connector-raptor | Cambiar los valores en el archivo raptor.properties de Presto. | Not available. | 
| presto-connector-redis | Cambiar los valores en el archivo redis.properties de Presto. | Not available. | 
| presto-connector-redshift | Cambiar los valores en el archivo redshift.properties de Presto. | Not available. | 
| presto-connector-tpch | Cambiar los valores en el archivo tpch.properties de Presto. | Not available. | 
| presto-connector-tpcds | Cambiar los valores del archivo tpcds.properties de Presto. | Not available. | 
| trino-log | Cambiar los valores en el archivo log.properties de Trino. | Restarts Trino-Server (for Trino) | 
| trino-config | Cambiar los valores en el archivo config.properties de Trino. | Restarts Trino-Server (for Trino) | 
| trino-password-authenticator | Cambiar los valores en el archivo password-authenticator.properties de Trino. | Restarts Trino-Server (for Trino) | 
| trino-env | Cambie los valores del archivo trino-env.sh de Trino. | Restarts Trino-Server (for Trino) | 
| trino-node | Cambiar los valores en el archivo node.properties de Trino. | Not available. | 
| trino-connector-blackhole | Cambiar los valores en el archivo blackhole.properties de Trino. | Not available. | 
| trino-connector-cassandra | Cambiar los valores en el archivo cassandra.properties de Trino. | Not available. | 
| trino-connector-delta | Cambie los valores del archivo delta.properties de Trino. | Restarts Trino-Server (for Trino) | 
| trino-connector-hive | Cambiar los valores en el archivo hive.properties de Trino. | Restarts Trino-Server (for Trino) | 
| trino-exchange-manager | Cambie los valores del archivo exchange-manager.properties de Trino. | Restarts Trino-Server (for Trino) | 
| trino-connector-iceberg | Cambiar los valores en el archivo iceberg.properties de Trino. | Restarts Trino-Server (for Trino) | 
| trino-connector-hudi | Cambiar los valores en el archivo hudi.properties de Trino. | Restarts Trino-Server (for Trino) | 
| trino-connector-jmx | Cambiar los valores en el archivo jmx.properties de Trino. | Not available. | 
| trino-connector-kafka | Cambiar los valores en el archivo kafka.properties de Trino. | Not available. | 
| trino-connector-localfile | Cambiar los valores en el archivo localfile.properties de Trino. | Not available. | 
| trino-connector-memory | Cambiar los valores en el archivo memory.properties de Trino. | Not available. | 
| trino-connector-mongodb | Cambiar los valores en el archivo mongodb.properties de Trino. | Not available. | 
| trino-connector-mysql | Cambiar los valores en el archivo mysql.properties de Trino. | Not available. | 
| trino-connector-postgresql | Cambiar los valores en el archivo postgresql.properties de Trino. | Not available. | 
| trino-connector-raptor | Cambiar los valores en el archivo raptor.properties de Trino. | Not available. | 
| trino-connector-redis | Cambiar los valores en el archivo redis.properties de Trino. | Not available. | 
| trino-connector-redshift | Cambiar los valores en el archivo redshift.properties de Trino. | Not available. | 
| trino-connector-tpch | Cambiar los valores en el archivo tpch.properties de Trino. | Not available. | 
| trino-connector-tpcds | Cambiar los valores en el archivo tpcds.properties de Trino. | Not available. | 
| ranger-kms-dbks-site | Cambie los valores del archivo dbks-site.xml de Ranger KMS. | Restarts Ranger KMS Server. | 
| ranger-kms-site | Cambie los valores en el ranger-kms-site archivo.xml de Ranger KMS. | Restarts Ranger KMS Server. | 
| ranger-kms-env | Cambie los valores del entorno Ranger KMS. | Restarts Ranger KMS Server. | 
| ranger-kms-logback | Cambie los valores del archivo kms-logback.xml de Ranger KMS. | Not available. | 
| ranger-kms-db-ca | Cambie los valores del archivo CA en S3 para la conexión SSL de MySQL con Ranger KMS. | Not available. | 
| spark | Configuración de Amazon EMR mantenida para Apache Spark. | This property modifies spark-defaults. See actions there. | 
| spark-defaults | Cambiar los valores en el archivo spark-defaults.conf de Spark. | Restarts Spark history server and Spark thrift server. | 
| spark-env | Cambiar los valores en el entorno de Spark. | Restarts Spark history server and Spark thrift server. | 
| spark-hive-site | Cambiar los valores en el archivo hive-site.xml de Spark. | Not available. | 
| spark-log4j2 | Cambiar los valores en el archivo log4j2.properties de Spark. | Restarts Spark history server and Spark thrift server. | 
| spark-metrics | Cambiar los valores en el archivo metrics.properties de Spark. | Restarts Spark history server and Spark thrift server. | 
| tez-site | Cambiar los valores en el archivo tez-site.xml de Tez. | Restart Oozie and HiveServer2. | 
| yarn-env | Cambiar los valores en el entorno de YARN. | Restarts the Hadoop YARN services ResourceManager, NodeManager, ProxyServer, and TimelineServer. Additionally restarts MapReduce-HistoryServer. | 
| yarn-site | Cambiar los valores en el archivo yarn-site.xml de YARN. | Restarts the Hadoop YARN services ResourceManager, NodeManager, ProxyServer, and TimelineServer. Additionally restarts Livy Server and MapReduce-HistoryServer. | 
| zeppelin-env | Cambiar los valores en el entorno de Zeppelin. | Restarts Zeppelin. | 
| zeppelin-site | Cambie los ajustes de configuración de zeppelin-site.xml. | Restarts Zeppelin. | 
| zookeeper-config | Cambie los valores en el ZooKeeper archivo zoo.cfg. | Restarts Zookeeper server. | 
| zookeeper-logback | Cambie los valores en ZooKeeper el archivo logback.xml. | Restarts Zookeeper server. | 
| emr-metrics | Cambie la configuración de la métrica EMR para este nodo. | Restarts the CloudWatchAgent service. | 

## 7.8.0 registro de cambios
<a name="780-changelog"></a>


**Registro de cambios de la versión 7.8.0 y de las notas de la versión**  

| Date | Event | Description (Descripción) | 
| --- | --- | --- | 
| 07-03-2025 | Publicación de documentos | Las notas de la versión 7.8.0 de Amazon EMR se publicaron por primera vez | 
| 06-03-2025 | Implementación completa | [Amazon EMR 7.8.0 se ha implementado completamente en todas las regiones compatibles](https://aws.amazon.com/about-aws/global-infrastructure/regional-product-services/) | 
| 28-02-2021 | Versión limitada inicial | Amazon EMR 7.8.0 se implementó por primera vez en las regiones comerciales iniciales | 

# Amazon EMR versión 7.7.0
<a name="emr-770-release"></a>

## Ciclo de vida compatible con 7.7.0
<a name="emr-770-supported-lifecycle"></a>

En la siguiente tabla se describen las fechas de ciclo de vida admitidas para la versión 7.7.0 de Amazon EMR.


| Fase de soporte | Date | 
| --- | --- | 
| Fecha de lanzamiento inicial | 6 de febrero de 2025 | 
| Soporte estándar hasta | 5 de febrero de 2027 | 
| Fin del soporte | 6 de febrero de 2027 | 
| Fin de vida útil | 6 de febrero de 2028 | 

## Versiones de la aplicación 7.7.0
<a name="emr-770-app-versions"></a>

Esta versión incluye las siguientes aplicaciones: [https://docs.aws.amazon.com/AmazonCloudWatch/latest/monitoring/Install-CloudWatch-Agent.html](https://docs.aws.amazon.com/AmazonCloudWatch/latest/monitoring/Install-CloudWatch-Agent.html), [https://delta.io/](https://delta.io/), [https://flink.apache.org/](https://flink.apache.org/), [http://hbase.apache.org/](http://hbase.apache.org/), [https://cwiki.apache.org/confluence/display/Hive/HCatalog](https://cwiki.apache.org/confluence/display/Hive/HCatalog), [http://hadoop.apache.org/docs/current/](http://hadoop.apache.org/docs/current/), [http://hive.apache.org/](http://hive.apache.org/), [https://hudi.apache.org](https://hudi.apache.org), [http://gethue.com/](http://gethue.com/), [https://iceberg.apache.org/](https://iceberg.apache.org/), [https://jupyter-enterprise-gateway.readthedocs.io/en/latest/](https://jupyter-enterprise-gateway.readthedocs.io/en/latest/), [https://jupyterhub.readthedocs.io/en/latest/#](https://jupyterhub.readthedocs.io/en/latest/#), [https://livy.incubator.apache.org/](https://livy.incubator.apache.org/), [http://oozie.apache.org/](http://oozie.apache.org/), [https://phoenix.apache.org/](https://phoenix.apache.org/), [http://pig.apache.org/](http://pig.apache.org/), [https://prestodb.io/](https://prestodb.io/), [https://spark.apache.org/docs/latest/](https://spark.apache.org/docs/latest/), [https://www.tensorflow.org/](https://www.tensorflow.org/), [https://tez.apache.org/](https://tez.apache.org/), [https://trino.io/](https://trino.io/), [https://zeppelin.incubator.apache.org/](https://zeppelin.incubator.apache.org/) y [https://zookeeper.apache.org](https://zookeeper.apache.org).

En la siguiente tabla se enumeran las versiones de la aplicación disponibles en esta versión de Amazon EMR y las versiones de la aplicación en las tres versiones anteriores de Amazon EMR (cuando corresponda).

Para ver un historial completo de las versiones de la aplicación disponibles para cada versión de Amazon EMR, consulte los temas siguientes:
+ [Versiones de las aplicaciones en las versiones 7.x de Amazon EMR](emr-release-app-versions-7.x.md)
+ [Versiones de la aplicación en las versiones 6.x de Amazon EMR](emr-release-app-versions-6.x.md)
+ [Versiones de la aplicación en las versiones 5.x de Amazon EMR](emr-release-app-versions-5.x.md)
+ [Versiones de la aplicación en las versiones 4.x de Amazon EMR](emr-release-app-versions-4.x.md)


**Información sobre la versión de la aplicación**  

|  | emr-7.7.0 | emr-7.6.0 | emr-7.5.0 | emr-7.4.0 | 
| --- | --- | --- | --- | --- | 
| AWS SDK for Java | 2.29.44, 1.12.780 | 2.29.25, 1.12.779 | 2.28.8, 1.12.772 | 2.28.8, 1.12.772 | 
| Python | 3.9, 3.11 | 3.9, 3.11 | 3.9, 3.11 | 3.9, 3.11 | 
| Scala | 2.12.18 | 2.12.18 | 2.12.18 | 2.12.18 | 
| AmazonCloudWatchAgent | 1.300032.2-amzn-0 | 1.300032.2-amzn-0 | 1.300032.2-amzn-0 | 1.300032.2-amzn-0 | 
| Delta | 3.2.1-amzn-2 | 3.2.1-amzn-1 | 3.2.1-amzn-0 | 3.2.0-amzn-1 | 
| Flink | 1.20.0-amzn-1 | 1.20.0-amzn-0 | 1.19.1-amzn-1 | 1.19.1-amzn-0 | 
| Ganglia |  -  |  -  |  -  |  -  | 
| HBase | 2.6.1-amzn-1 | 2.6.1-amzn-0 | 2.5.10-amzn-0 | 2.5.5-amzn-0 | 
| HCatalog | 3.1.3-amzn-16 | 3.1.3-amzn-15 | 3.1.3-amzn-14 | 3.1.3-amzn-13 | 
| Hadoop | 3.4.0-amzn-3 | 3.4.0-amzn-2 | 3.4.0-amzn-1 | 3.4.0-amzn-0 | 
| Hive | 3.1.3-amzn-16 | 3.1.3-amzn-15 | 3.1.3-amzn-14 | 3.1.3-amzn-13 | 
| Hudi | 0.15.0-amzn-4 | 0.15.0-amzn-3 | 0.15.0-amzn-2 | 0.15.0-amzn-1 | 
| Hue | 4.11.0 | 4.11.0 | 4.11.0 | 4.11.0 | 
| Iceberg | 1.7.1-amzn-0 | 1.6.1-amzn-2 | 1.6.1-amzn-1 | 1.6.1-amzn-0 | 
| JupyterEnterpriseGateway | 2.6.0 | 2.6.0 | 2.6.0 | 2.6.0 | 
| JupyterHub | 1.5.0 | 1.5.0 | 1.5.0 | 1.5.0 | 
| Livy | 0.8.0-incubating | 0.8.0-incubating | 0.8.0-incubating | 0.8.0-incubating | 
| MXNet |  -  |  -  |  -  |  -  | 
| Mahout |  -  |  -  |  -  |  -  | 
| Oozie | 5.2.1 | 5.2.1 | 5.2.1 | 5.2.1 | 
| Phoenix | 5.2.1 | 5.2.0 | 5.2.0 | 5.2.0 | 
| Pig | 0.17.0 | 0.17.0 | 0.17.0 | 0.17.0 | 
| Presto | 0.287-amzn-1 | 0.287-amzn-1 | 0.287-amzn-0 | 0.287-amzn-0 | 
| Spark | 3.5.3-amzn-1 | 3.5.3-amzn-0 | 3.5.2-amzn-1 | 3.5.2-amzn-0 | 
| Sqoop |  -  |  -  |  -  | 1.4.7 | 
| TensorFlow | 2.16.1 | 2.16.1 | 2.16.1 | 2.16.1 | 
| Tez | 0.10.2-amzn-14 | 0.10.2-amzn-13 | 0.10.2-amzn-12 | 0.10.2-amzn-11 | 
| Trino (PrestoSQL) | 467-amzn-0 | 457-amzn-0 | 446-amzn-0 | 446-amzn-0 | 
| Zeppelin | 0.11.1 | 0.11.1 | 0.11.1 | 0.11.1 | 
| ZooKeeper | 3.9.2-amzn-1 | 3.9.2-amzn-0 | 3.9.2-amzn-0 | 3.9.2-amzn-0 | 

# Detalles de los componentes de la versión 7.7.0
<a name="emr-770-release-components-details"></a>

Consulte la siguiente tabla para obtener más información sobre los paquetes *Extras* de Amazon EMR 7.7.0.


| Aplicación | Tipo de aplicación | Package | Tipo de Package | Versión de paquete | 
| --- | --- | --- | --- | --- | 
|  AmazonCloudWatchAgent  |  Core  |  hadoop-hdfs-journalnode  |  Extras  |  3.4.0-amzn-3-1.amzn2023  | 
|  AmazonCloudWatchAgent  |  Core  |  ranger-kms  |  Extras  |  2.0.0-1.amzn2023  | 
|  AmazonCloudWatchAgent  |  Core  |  s3-dist-cp  |  Extras  |  2.37.0-1.amzn2023  | 
|  AmazonCloudWatchAgent  |  Core  |  ZooKeeper  |  Extras  |  3.9.2 amzn.1-1.amzn2023  | 
|  AmazonCloudWatchAgent  |  Core  |  zookeeper-server  |  Extras  |  3.9.2. amzn.1-1.amzn2023  | 
|  Flink  |  Core  |  hadoop-client  |  Extras  |  3.4.0.amzn.3-1.amzn2023  | 
|  Flink  |  Core  |  hadoop-hdfs  |  Extras  |  3.4.0.amzn.3-1.amzn2023  | 
|  Flink  |  Core  |  hadoop-hdfs-datanode  |  Extras  |  3.4.0.amzn.3-1.amzn2023  | 
|  Flink  |  Core  |  hadoop-hdfs-journalnode  |  Extras  |  3.4.0.amzn.3-1.amzn2023  | 
|  Flink  |  Core  |  hadoop-hdfs-namenode  |  Extras  |  3.4.0.amzn.3-1.amzn2023  | 
|  Flink  |  Core  |  hadoop-httpfs  |  Extras  |  3.4.0.amzn.3-1.amzn2023  | 
|  Flink  |  Core  |  hadoop-kms  |  Extras  |  3.4.0.amzn.3-1.amzn2023  | 
|  Flink  |  Core  |  hadoop-mapreduce  |  Extras  |  3.4.0.amzn.3-1.amzn2023  | 
|  Flink  |  Core  |  hadoop-mapreduce-historyserver  |  Extras  |  3.4.0.amzn.3-1.amzn2023  | 
|  Flink  |  Core  |  hadoop-yarn  |  Extras  |  3.4.0.amzn.3-1.amzn2023  | 
|  Flink  |  Core  |  hadoop-yarn-nodemanager  |  Extras  |  3.4.0.amzn.3-1.amzn2023  | 
|  Flink  |  Core  |  hadoop-yarn-proxyserver  |  Extras  |  3.4.0.amzn.3-1.amzn2023  | 
|  Flink  |  Core  |  hadoop-yarn-resourcemanager  |  Extras  |  3.4.0.amzn.3-1.amzn2023  | 
|  Flink  |  Core  |  hadoop-yarn-timelineserver  |  Extras  |  3.4.0.amzn.3-1.amzn2023  | 
|  Flink  |  Core  |  hudi  |  Extras  |  0.15.0.amzn.4-1.amzn2023  | 
|  Flink  |  Core  |  ranger-kms  |  Extras  |  2.0.0-1.amzn2023  | 
|  Flink  |  Core  |  hadoop  |  Extras  |  3.4.0.amzn.3-1.amzn2023  | 
|  HBase  |  Core  |  s3-dist-cp  |  Extras  |  2.37.0-1.amzn2023  | 
|  HCatalog  |  Core  |  hadoop-yarn-proxyserver  |  Extras  |  3.4.0. amzn.3-1.amzn2023  | 
|  HCatalog  |  Core  |  mariadb-connector-java  |  Extras  |    | 
|  Hive  |  Core  |  hadoop-httpfs  |  Extras  |  3.4.0.amzn.3-1.amzn2023  | 
|  Hive  |  Core  |  hadoop-yarn-proxyserver  |  Extras  |  3.4.0.amzn.3-1.amzn2023  | 
|  Hive  |  Core  |  hive-hbase  |  Extras  |  3.1.3. amzn.16-1.amzn2023  | 
|  Hive  |  Core  |  mariadb-connector-java  |  Extras  |  2.7.2-1  | 
|  Hive  |  Core  |  s3-dist-cp  |  Extras  |  2.37.0-1.amzn2023  | 
|  Phoenix  |  Core  |  s3-dist-cp  |  Extras  |  2.37.0-1.amzn2023  | 
|  Spark  |  Core  |  spark-datanucleus  |  Extras  |  3.5.3. amzn.1-1.amzn2023  | 
|  Tez  |  Core  |  hadoop-mapreduce  |  Extras  |  3.4.0.amzn.3-1.amzn2023  | 
|  Tez  |  Core  |  hadoop-mapreduce-historyserver  |  Extras  |  3.4.0.amzn.3-1.amzn2023  | 
|  Tez  |  Core  |  hadoop-yarn-proxyserver  |  Extras  |  3.4.0.amzn.3-1.amzn2023  | 
|  Trino  |  Core  |  bigtop-utils  |  Extras  |  1.2.0-1.amzn2023  | 
|  Trino  |  Core  |  hadoop-client  |  Extras  |  3.4.0.amzn.3-1.amzn2023  | 
|  Trino  |  Core  |  hadoop-hdfs  |  Extras  |  3.4.0.amzn.3-1.amzn2023  | 
|  Trino  |  Core  |  hadoop-hdfs-datanode  |  Extras  |  3.4.0.amzn.3-1.amzn2023  | 
|  Trino  |  Core  |  hadoop-hdfs-journalnode  |  Extras  |  3.4.0.amzn.3-1.amzn2023  | 
|  Trino  |  Core  |  hadoop-hdfs-namenode  |  Extras  |  3.4.0.amzn.3-1.amzn2023  | 
|  Trino  |  Core  |  hadoop-kms  |  Extras  |  3.4.0.amzn.3-1.amzn2023  | 
|  Trino  |  Core  |  hadoop-mapreduce  |  Extras  |  3.4.0.amzn.3-1.amzn2023  | 
|  Trino  |  Core  |  hadoop-mapreduce-historyserver  |  Extras  |  3.4.0.amzn.3-1.amzn2023  | 
|  Trino  |  Core  |  hadoop-yarn  |  Extras  |  3.4.0.amzn.3-1.amzn2023  | 
|  Trino  |  Core  |  hadoop-yarn-nodemanager  |  Extras  |  3.4.0.amzn.3-1.amzn2023  | 
|  Trino  |  Core  |  hadoop-yarn-proxyserver  |  Extras  |  3.4.0.amzn.3-1.amzn2023  | 
|  Trino  |  Core  |  hadoop-yarn-resourcemanager  |  Extras  |  3.4.0.amzn.3-1.amzn2023  | 
|  Trino  |  Core  |  hadoop-yarn-timelineserver  |  Extras  |  3.4.0.amzn.3-1.amzn2023  | 
|  Trino  |  Core  |  hive  |  Extras  |  3.1.3. amzn.16-1.amzn2023  | 
|  Trino  |  Core  |  hive-hcatalog-server  |  Extras  |  3.1.3. amzn.16-1.amzn2023  | 
|  Trino  |  Core  |  mariadb-connector-java  |  Extras  |  2.7.2-1  | 
|  Trino  |  Core  |  ranger-kms  |  Extras  |  2.0.0-1.amzn2023  | 
|  Trino  |  Core  |  ZooKeeper  |  Extras  |  3.9.2. amzn.1-1.amzn2023  | 
|  Trino  |  Core  |  zookeeper-server  |  Extras  |  3.9.2. amzn.1-1.amzn2023  | 
|  Trino  |  Core  |  bigtop-groovy  |  Extras  |  2.5.4-1.amzn2023  | 
|  Trino  |  Core  |  bigtop-jsvc  |  Extras  |  1.2.4-1.amzn2023  | 
|  Trino  |  Core  |  hadoop  |  Extras  |  3.4.0.amzn.3-1.amzn2023  | 
|  Trino  |  Core  |  hadoop-lzo  |  Extras  |  0.4.19-1.amzn2023  | 
|  Trino  |  Core  |  hive-hcatalog  |  Extras  |  3.1.3. amzn.16-1.amzn2023  | 
|  Trino  |  Core  |  hive-jdbc  |  Extras  |  3.1.3. amzn.16-1.amzn2023  | 
|  ZooKeeper  |  Core  |  emrfs  |  Extras  |  3.9.2. amzn.1-1.amzn2023  | 
|  ZooKeeper  |  Core  |  hadoop-client  |  Extras  |  3.9.2. amzn.1-1.amzn2023  | 
|  ZooKeeper  |  Core  |  hadoop-hdfs  |  Extras  |  3.9.2. amzn.1-1.amzn2023  | 
|  ZooKeeper  |  Core  |  hadoop-hdfs-datanode  |  Extras  |  3.9.2. amzn.1-1.amzn2023  | 
|  ZooKeeper  |  Core  |  hadoop-hdfs-journalnode  |  Extras  |  3.9.2. amzn.1-1.amzn2023  | 
|  ZooKeeper  |  Core  |  hadoop-hdfs-namenode  |  Extras  |  3.9.2. amzn.1-1.amzn2023  | 
|  ZooKeeper  |  Core  |  hadoop-httpfs  |  Extras  |  3.9.2. amzn.1-1.amzn2023  | 
|  ZooKeeper  |  Core  |  hadoop-kms  |  Extras  |  3.9.2. amzn.1-1.amzn2023  | 
|  ZooKeeper  |  Core  |  hadoop-mapreduce  |  Extras  |  3.4.0.amzn.3-1.amzn2023  | 
|  ZooKeeper  |  Core  |  hadoop-mapreduce-historyserver  |  Extras  |  3.4.0.amzn.3-1.amzn2023  | 
|  ZooKeeper  |  Core  |  hadoop-yarn  |  Extras  |  3.4.0.amzn.3-1.amzn2023  | 
|  ZooKeeper  |  Core  |  hadoop-yarn-nodemanager  |  Extras  |  3.4.0.amzn.3-1.amzn2023  | 
|  ZooKeeper  |  Core  |  hadoop-yarn-proxyserver  |  Extras  |  3.4.0.amzn.3-1.amzn2023  | 
|  ZooKeeper  |  Core  |  hadoop-yarn-resourcemanager  |  Extras  |  3.4.0.amzn.3-1.amzn2023  | 
|  ZooKeeper  |  Core  |  hadoop-yarn-timelineserver  |  Extras  |  3.4.0.amzn.3-1.amzn2023  | 
|  ZooKeeper  |  Core  |  ranger-kms  |  Extras  |  2.0.0-1.amzn2023  | 

# 7.7.0 vulnerabilidades y exposiciones comunes
<a name="770-common-vulnerabilities-exposures"></a>

La siguiente tabla muestra todo lo CVEs que no afecta a los clústeres de EMR que se ejecutan en las configuraciones recomendadas de Amazon EMR 7.7.0. Amazon EMR depende del código abierto original para la disponibilidad de las correcciones y proporcionará la última versión estable como parte de los componentes del motor principal en un plazo de 90 días a partir de su verificación por parte de Amazon EMR.

Esta tabla se actualizó el 4 de febrero de 2025.


| ID de CVE | Gravedad | URL de detalles del CVE | 
| --- | --- | --- | 
|  CVE-2015-1832  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2015-1832](https://nvd.nist.gov/vuln/detail/CVE-2015-1832)  | 
|  CVE-2016-5018  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2016-5018)-2016-5018  | 
|  CVE-2017-15095  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2017-15095)-2017-15095  | 
|  CVE-2017-17485  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2017-17485](https://nvd.nist.gov/vuln/detail/CVE-2017-17485)  | 
|  CVE-2017-7525  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2017-7525)-2017-7525  | 
|  CVE-2018-11307  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2018-11307](https://nvd.nist.gov/vuln/detail/CVE-2018-11307)  | 
|  CVE-2018-11307  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2018-11307](https://nvd.nist.gov/vuln/detail/CVE-2018-11307)  | 
|  CVE-2018-14718  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-14718)-2018-14718  | 
|  CVE-2018-14718  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-14718)-2018-14718  | 
|  CVE-2018-14719  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-14719)-2018-14719  | 
|  CVE-2018-14719  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-14719)-2018-14719  | 
|  CVE-2018-14720  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-14720)-2018-14720  | 
|  CVE-2018-14720  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-14720)-2018-14720  | 
|  CVE-2018-14721  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-14721)-2018-14721  | 
|  CVE-2018-14721  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-14721)-2018-14721  | 
|  CVE-2018-19360  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2018-19360](https://nvd.nist.gov/vuln/detail/CVE-2018-19360)  | 
|  CVE-2018-19360  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2018-19360](https://nvd.nist.gov/vuln/detail/CVE-2018-19360)  | 
|  CVE-2018-19361  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2018-19361](https://nvd.nist.gov/vuln/detail/CVE-2018-19361)  | 
|  CVE-2018-19361  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2018-19361](https://nvd.nist.gov/vuln/detail/CVE-2018-19361)  | 
|  CVE-2018-19362  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2018-19362](https://nvd.nist.gov/vuln/detail/CVE-2018-19362)  | 
|  CVE-2018-19362  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2018-19362](https://nvd.nist.gov/vuln/detail/CVE-2018-19362)  | 
|  CVE-2018-7489  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2018-7489](https://nvd.nist.gov/vuln/detail/CVE-2018-7489)  | 
|  CVE-2018-7489  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2018-7489](https://nvd.nist.gov/vuln/detail/CVE-2018-7489)  | 
|  CVE-2019-10202  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2019-10202](https://nvd.nist.gov/vuln/detail/CVE-2019-10202)  | 
|  CVE-2019-14379  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2019-14379](https://nvd.nist.gov/vuln/detail/CVE-2019-14379)  | 
|  CVE-2019-14379  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2019-14379](https://nvd.nist.gov/vuln/detail/CVE-2019-14379)  | 
|  CVE-2019-14540  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-14540)-2019-14540  | 
|  CVE-2019-14540  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-14540)-2019-14540  | 
|  CVE-2019-14892  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-14892)-2019-14892  | 
|  CVE-2019-14892  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-14892)-2019-14892  | 
|  CVE-2019-14893  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-14893)-2019-14893  | 
|  CVE-2019-14893  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-14893)-2019-14893  | 
|  CVE-2019-16335  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2019-16335](https://nvd.nist.gov/vuln/detail/CVE-2019-16335)  | 
|  CVE-2019-16335  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2019-16335](https://nvd.nist.gov/vuln/detail/CVE-2019-16335)  | 
|  CVE-2019-16942  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-16942)-2019-16942  | 
|  CVE-2019-16942  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-16942)-2019-16942  | 
|  CVE-2019-16943  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-16943)-2019-16943  | 
|  CVE-2019-16943  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-16943)-2019-16943  | 
|  CVE-2019-17267  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2019-17267](https://nvd.nist.gov/vuln/detail/CVE-2019-17267)  | 
|  CVE-2019-17267  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2019-17267](https://nvd.nist.gov/vuln/detail/CVE-2019-17267)  | 
|  CVE-2019-17531  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-17531)-2019-17531  | 
|  CVE-2019-17531  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-17531)-2019-17531  | 
|  CVE-2019-20330  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2019-20330](https://nvd.nist.gov/vuln/detail/CVE-2019-20330)  | 
|  CVE-2019-20330  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2019-20330](https://nvd.nist.gov/vuln/detail/CVE-2019-20330)  | 
|  CVE-2020-8840  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-8840](https://nvd.nist.gov/vuln/detail/CVE-2020-8840)  | 
|  CVE-2020-8840  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-8840](https://nvd.nist.gov/vuln/detail/CVE-2020-8840)  | 
|  CVE-2020-9546  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-9546](https://nvd.nist.gov/vuln/detail/CVE-2020-9546)  | 
|  CVE-2020-9546  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-9546](https://nvd.nist.gov/vuln/detail/CVE-2020-9546)  | 
|  CVE-2020-9547  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-9547](https://nvd.nist.gov/vuln/detail/CVE-2020-9547)  | 
|  CVE-2020-9547  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-9547](https://nvd.nist.gov/vuln/detail/CVE-2020-9547)  | 
|  CVE-2020-9548  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-9548](https://nvd.nist.gov/vuln/detail/CVE-2020-9548)  | 
|  CVE-2020-9548  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-9548](https://nvd.nist.gov/vuln/detail/CVE-2020-9548)  | 
|  CVE-2022-1471  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2022-1471](https://nvd.nist.gov/vuln/detail/CVE-2022-1471)  | 
|  CVE-2022-1471  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2022-1471](https://nvd.nist.gov/vuln/detail/CVE-2022-1471)  | 
|  CVE-2022-37865  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-202237865](https://nvd.nist.gov/vuln/detail/CVE-2022-37865)  | 
|  CVE-2022-39135  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-202239135](https://nvd.nist.gov/vuln/detail/CVE-2022-39135)  | 
|  CVE-2022-42889  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-202242889](https://nvd.nist.gov/vuln/detail/CVE-2022-42889)  | 
|  CVE-2022-46337  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-202246337](https://nvd.nist.gov/vuln/detail/CVE-2022-46337)  | 
|  CVE-2022-46337  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-202246337](https://nvd.nist.gov/vuln/detail/CVE-2022-46337)  | 
|  CVE-2023-44981  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-44981](https://nvd.nist.gov/vuln/detail/CVE-2023-44981)  | 
|  CVE-2024-47561  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-47561](https://nvd.nist.gov/vuln/detail/CVE-2024-47561)  | 
|  CVE-2024-47561  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-47561](https://nvd.nist.gov/vuln/detail/CVE-2024-47561)  | 
|  CVE-2024-47561  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-47561](https://nvd.nist.gov/vuln/detail/CVE-2024-47561)  | 
|  CVE-2024-47561  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-47561](https://nvd.nist.gov/vuln/detail/CVE-2024-47561)  | 
|  CVE-2024-47561  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-47561](https://nvd.nist.gov/vuln/detail/CVE-2024-47561)  | 
|  CVE-2024-47561  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-47561](https://nvd.nist.gov/vuln/detail/CVE-2024-47561)  | 
|  CVE-2024-52046  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-52046](https://nvd.nist.gov/vuln/detail/CVE-2024-52046)  | 
|  CVE-2024-52046  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-52046](https://nvd.nist.gov/vuln/detail/CVE-2024-52046)  | 
|  CVE-2024-53990  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-53990](https://nvd.nist.gov/vuln/detail/CVE-2024-53990)  | 
|  CVE-2024-53990  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-53990](https://nvd.nist.gov/vuln/detail/CVE-2024-53990)  | 
|  CVE-2012-0881  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2012-0881](https://nvd.nist.gov/vuln/detail/CVE-2012-0881)  | 
|  CVE-2013-4002  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2013-4002)-2013-4002  | 
|  CVE-2015-5237  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2015-5237)-2015-5237  | 
|  CVE-2015-5237  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2015-5237)-2015-5237  | 
|  CVE-2016-6796  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2016-6796)-2016-6796  | 
|  CVE-2018-1000180  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2018-1000180](https://nvd.nist.gov/vuln/detail/CVE-2018-1000180)  | 
|  CVE-2018-12022  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2018-12022](https://nvd.nist.gov/vuln/detail/CVE-2018-12022)  | 
|  CVE-2018-12022  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2018-12022](https://nvd.nist.gov/vuln/detail/CVE-2018-12022)  | 
|  CVE-2018-12023  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2018-12023](https://nvd.nist.gov/vuln/detail/CVE-2018-12023)  | 
|  CVE-2018-12023  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2018-12023](https://nvd.nist.gov/vuln/detail/CVE-2018-12023)  | 
|  CVE-2018-5968  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-5968)-2018-5968  | 
|  CVE-2019-0205  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2019-0205](https://nvd.nist.gov/vuln/detail/CVE-2019-0205)  | 
|  CVE-2019-0205  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2019-0205](https://nvd.nist.gov/vuln/detail/CVE-2019-0205)  | 
|  CVE-2019-10172  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2019-10172](https://nvd.nist.gov/vuln/detail/CVE-2019-10172)  | 
|  CVE-2019-12086  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-12086)-2019-12086  | 
|  CVE-2019-12086  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-12086)-2019-12086  | 
|  CVE-2019-14439  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-14439)-2019-14439  | 
|  CVE-2019-14439  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-14439)-2019-14439  | 
|  CVE-2020-10650  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-10650](https://nvd.nist.gov/vuln/detail/CVE-2020-10650)  | 
|  CVE-2020-10650  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-10650](https://nvd.nist.gov/vuln/detail/CVE-2020-10650)  | 
|  CVE-2020-10672  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-10672](https://nvd.nist.gov/vuln/detail/CVE-2020-10672)  | 
|  CVE-2020-10672  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-10672](https://nvd.nist.gov/vuln/detail/CVE-2020-10672)  | 
|  CVE-2020-10673  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-10673](https://nvd.nist.gov/vuln/detail/CVE-2020-10673)  | 
|  CVE-2020-10673  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-10673](https://nvd.nist.gov/vuln/detail/CVE-2020-10673)  | 
|  CVE-2020-10968  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-10968)-2020-10968  | 
|  CVE-2020-10968  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-10968)-2020-10968  | 
|  CVE-2020-10969  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-10969)-2020-10969  | 
|  CVE-2020-10969  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-10969)-2020-10969  | 
|  CVE-2020-11111  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-11111](https://nvd.nist.gov/vuln/detail/CVE-2020-11111)  | 
|  CVE-2020-11111  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-11111](https://nvd.nist.gov/vuln/detail/CVE-2020-11111)  | 
|  CVE-2020-11112  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-11112](https://nvd.nist.gov/vuln/detail/CVE-2020-11112)  | 
|  CVE-2020-11112  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-11112](https://nvd.nist.gov/vuln/detail/CVE-2020-11112)  | 
|  CVE-2020-11113  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-11113](https://nvd.nist.gov/vuln/detail/CVE-2020-11113)  | 
|  CVE-2020-11113  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-11113](https://nvd.nist.gov/vuln/detail/CVE-2020-11113)  | 
|  CVE-2020-11619  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-11619)-2020-11619  | 
|  CVE-2020-11619  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-11619)-2020-11619  | 
|  CVE-2020-11620  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-11620](https://nvd.nist.gov/vuln/detail/CVE-2020-11620)  | 
|  CVE-2020-11620  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-11620](https://nvd.nist.gov/vuln/detail/CVE-2020-11620)  | 
|  CVE-2020-13936  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-13936)-2020-13936  | 
|  CVE-2020-13949  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-13949)-2020-13949  | 
|  CVE-2020-13949  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-13949)-2020-13949  | 
|  CVE-2020-13949  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-13949)-2020-13949  | 
|  CVE-2020-14060  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-14060)-2020-14060  | 
|  CVE-2020-14060  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-14060)-2020-14060  | 
|  CVE-2020-14061  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-14061)-2020-14061  | 
|  CVE-2020-14061  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-14061)-2020-14061  | 
|  CVE-2020-14062  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-14062)-2020-14062  | 
|  CVE-2020-14062  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-14062)-2020-14062  | 
|  CVE-2020-14195  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-14195](https://nvd.nist.gov/vuln/detail/CVE-2020-14195)  | 
|  CVE-2020-14195  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-14195](https://nvd.nist.gov/vuln/detail/CVE-2020-14195)  | 
|  CVE-2020-24616  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-24616](https://nvd.nist.gov/vuln/detail/CVE-2020-24616)  | 
|  CVE-2020-24616  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-24616](https://nvd.nist.gov/vuln/detail/CVE-2020-24616)  | 
|  CVE-2020-24750  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-24750](https://nvd.nist.gov/vuln/detail/CVE-2020-24750)  | 
|  CVE-2020-24750  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-24750](https://nvd.nist.gov/vuln/detail/CVE-2020-24750)  | 
|  CVE-2020-25649  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-25649](https://nvd.nist.gov/vuln/detail/CVE-2020-25649)  | 
|  CVE-2020-28052  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-28052](https://nvd.nist.gov/vuln/detail/CVE-2020-28052)  | 
|  CVE-2020-35490  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-35490](https://nvd.nist.gov/vuln/detail/CVE-2020-35490)  | 
|  CVE-2020-35490  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-35490](https://nvd.nist.gov/vuln/detail/CVE-2020-35490)  | 
|  CVE-2020-35491  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-35491](https://nvd.nist.gov/vuln/detail/CVE-2020-35491)  | 
|  CVE-2020-35491  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-35491](https://nvd.nist.gov/vuln/detail/CVE-2020-35491)  | 
|  CVE-2020-35728  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-35728](https://nvd.nist.gov/vuln/detail/CVE-2020-35728)  | 
|  CVE-2020-35728  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-35728](https://nvd.nist.gov/vuln/detail/CVE-2020-35728)  | 
|  CVE-2020-36179  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36179](https://nvd.nist.gov/vuln/detail/CVE-2020-36179)  | 
|  CVE-2020-36179  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36179](https://nvd.nist.gov/vuln/detail/CVE-2020-36179)  | 
|  CVE-2020-36180  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36180](https://nvd.nist.gov/vuln/detail/CVE-2020-36180)  | 
|  CVE-2020-36180  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36180](https://nvd.nist.gov/vuln/detail/CVE-2020-36180)  | 
|  CVE-2020-36181  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36181](https://nvd.nist.gov/vuln/detail/CVE-2020-36181)  | 
|  CVE-2020-36181  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36181](https://nvd.nist.gov/vuln/detail/CVE-2020-36181)  | 
|  CVE-2020-36182  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36182](https://nvd.nist.gov/vuln/detail/CVE-2020-36182)  | 
|  CVE-2020-36182  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36182](https://nvd.nist.gov/vuln/detail/CVE-2020-36182)  | 
|  CVE-2020-36183  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36183](https://nvd.nist.gov/vuln/detail/CVE-2020-36183)  | 
|  CVE-2020-36183  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36183](https://nvd.nist.gov/vuln/detail/CVE-2020-36183)  | 
|  CVE-2020-36184  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36184](https://nvd.nist.gov/vuln/detail/CVE-2020-36184)  | 
|  CVE-2020-36184  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36184](https://nvd.nist.gov/vuln/detail/CVE-2020-36184)  | 
|  CVE-2020-36185  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36185](https://nvd.nist.gov/vuln/detail/CVE-2020-36185)  | 
|  CVE-2020-36185  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36185](https://nvd.nist.gov/vuln/detail/CVE-2020-36185)  | 
|  CVE-2020-36186  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36186](https://nvd.nist.gov/vuln/detail/CVE-2020-36186)  | 
|  CVE-2020-36186  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36186](https://nvd.nist.gov/vuln/detail/CVE-2020-36186)  | 
|  CVE-2020-36187  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36187](https://nvd.nist.gov/vuln/detail/CVE-2020-36187)  | 
|  CVE-2020-36187  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36187](https://nvd.nist.gov/vuln/detail/CVE-2020-36187)  | 
|  CVE-2020-36188  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36188](https://nvd.nist.gov/vuln/detail/CVE-2020-36188)  | 
|  CVE-2020-36188  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36188](https://nvd.nist.gov/vuln/detail/CVE-2020-36188)  | 
|  CVE-2020-36189  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36189](https://nvd.nist.gov/vuln/detail/CVE-2020-36189)  | 
|  CVE-2020-36189  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36189](https://nvd.nist.gov/vuln/detail/CVE-2020-36189)  | 
|  CVE-2020-36518  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36518](https://nvd.nist.gov/vuln/detail/CVE-2020-36518)  | 
|  CVE-2020-36518  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36518](https://nvd.nist.gov/vuln/detail/CVE-2020-36518)  | 
|  CVE-2021-20190  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2021-20190](https://nvd.nist.gov/vuln/detail/CVE-2021-20190)  | 
|  CVE-2021-20190  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2021-20190](https://nvd.nist.gov/vuln/detail/CVE-2021-20190)  | 
|  CVE-2021-31684  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2021-31684](https://nvd.nist.gov/vuln/detail/CVE-2021-31684)  | 
|  CVE-2021-31684  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2021-31684](https://nvd.nist.gov/vuln/detail/CVE-2021-31684)  | 
|  CVE-2021-34538  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2021-34538](https://nvd.nist.gov/vuln/detail/CVE-2021-34538)  | 
|  CVE-2021-34538  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2021-34538](https://nvd.nist.gov/vuln/detail/CVE-2021-34538)  | 
|  CVE-2021-34538  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2021-34538](https://nvd.nist.gov/vuln/detail/CVE-2021-34538)  | 
|  CVE-2021-43859  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2021-43859](https://nvd.nist.gov/vuln/detail/CVE-2021-43859)  | 
|  CVE-2022-1415  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2022-1415](https://nvd.nist.gov/vuln/detail/CVE-2022-1415)  | 
|  CVE-2022-1415  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2022-1415](https://nvd.nist.gov/vuln/detail/CVE-2022-1415)  | 
|  CVE-2022-25647  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-202225647](https://nvd.nist.gov/vuln/detail/CVE-2022-25647)  | 
|  CVE-2022-25647  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-202225647](https://nvd.nist.gov/vuln/detail/CVE-2022-25647)  | 
|  CVE-2022-25647  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-202225647](https://nvd.nist.gov/vuln/detail/CVE-2022-25647)  | 
|  CVE-2022-25857  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-202225857](https://nvd.nist.gov/vuln/detail/CVE-2022-25857)  | 
|  CVE-2022-3171  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2022-3171](https://nvd.nist.gov/vuln/detail/CVE-2022-3171)  | 
|  CVE-2022-3171  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2022-3171](https://nvd.nist.gov/vuln/detail/CVE-2022-3171)  | 
|  CVE-2022-3171  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2022-3171](https://nvd.nist.gov/vuln/detail/CVE-2022-3171)  | 
|  CVE-2022-3171  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2022-3171](https://nvd.nist.gov/vuln/detail/CVE-2022-3171)  | 
|  CVE-2022-3509  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2022-3509](https://nvd.nist.gov/vuln/detail/CVE-2022-3509)  | 
|  CVE-2022-3509  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2022-3509](https://nvd.nist.gov/vuln/detail/CVE-2022-3509)  | 
|  CVE-2022-3509  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2022-3509](https://nvd.nist.gov/vuln/detail/CVE-2022-3509)  | 
|  CVE-2022-3509  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2022-3509](https://nvd.nist.gov/vuln/detail/CVE-2022-3509)  | 
|  CVE-2022-3510  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-20223510](https://nvd.nist.gov/vuln/detail/CVE-2022-3510)  | 
|  CVE-2022-3510  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-20223510](https://nvd.nist.gov/vuln/detail/CVE-2022-3510)  | 
|  CVE-2022-3510  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-20223510](https://nvd.nist.gov/vuln/detail/CVE-2022-3510)  | 
|  CVE-2022-3510  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-20223510](https://nvd.nist.gov/vuln/detail/CVE-2022-3510)  | 
|  CVE-2022-36364  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-202236364](https://nvd.nist.gov/vuln/detail/CVE-2022-36364)  | 
|  CVE-2022-37866  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-202237866](https://nvd.nist.gov/vuln/detail/CVE-2022-37866)  | 
|  CVE-2022-40149  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-202240149](https://nvd.nist.gov/vuln/detail/CVE-2022-40149)  | 
|  CVE-2022-40149  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-202240149](https://nvd.nist.gov/vuln/detail/CVE-2022-40149)  | 
|  CVE-2022-40149  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-202240149](https://nvd.nist.gov/vuln/detail/CVE-2022-40149)  | 
|  CVE-2022-40150  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-202240150](https://nvd.nist.gov/vuln/detail/CVE-2022-40150)  | 
|  CVE-2022-40150  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-202240150](https://nvd.nist.gov/vuln/detail/CVE-2022-40150)  | 
|  CVE-2022-40150  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-202240150](https://nvd.nist.gov/vuln/detail/CVE-2022-40150)  | 
|  CVE-202240151  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-202240151](https://nvd.nist.gov/vuln/detail/CVE-2022-40151)  | 
|  CVE-2022-40152  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-202240152](https://nvd.nist.gov/vuln/detail/CVE-2022-40152)  | 
|  CVE-2022-41966  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2022-41966](https://nvd.nist.gov/vuln/detail/CVE-2022-41966)  | 
|  CVE-2022-42003  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2022-42003](https://nvd.nist.gov/vuln/detail/CVE-2022-42003)  | 
|  CVE-2022-42003  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2022-42003](https://nvd.nist.gov/vuln/detail/CVE-2022-42003)  | 
|  CVE-2022-42003  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2022-42003](https://nvd.nist.gov/vuln/detail/CVE-2022-42003)  | 
|  CVE-2022-42003  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2022-42003](https://nvd.nist.gov/vuln/detail/CVE-2022-42003)  | 
|  CVE-2022-42003  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2022-42003](https://nvd.nist.gov/vuln/detail/CVE-2022-42003)  | 
|  CVE-2022-42003  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2022-42003](https://nvd.nist.gov/vuln/detail/CVE-2022-42003)  | 
|  CVE-2022-42004  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2022-42004](https://nvd.nist.gov/vuln/detail/CVE-2022-42004)  | 
|  CVE-2022-42004  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2022-42004](https://nvd.nist.gov/vuln/detail/CVE-2022-42004)  | 
|  CVE-2022-42004  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2022-42004](https://nvd.nist.gov/vuln/detail/CVE-2022-42004)  | 
|  CVE-2022-42004  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2022-42004](https://nvd.nist.gov/vuln/detail/CVE-2022-42004)  | 
|  CVE-2022-42004  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2022-42004](https://nvd.nist.gov/vuln/detail/CVE-2022-42004)  | 
|  CVE-2022-45685  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-202245685](https://nvd.nist.gov/vuln/detail/CVE-2022-45685)  | 
|  CVE-2022-45685  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-202245685](https://nvd.nist.gov/vuln/detail/CVE-2022-45685)  | 
|  CVE-2022-45685  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-202245685](https://nvd.nist.gov/vuln/detail/CVE-2022-45685)  | 
|  CVE-2022-45688  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-45688)-202245688  | 
|  CVE-2022-45693  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-202245693](https://nvd.nist.gov/vuln/detail/CVE-2022-45693)  | 
|  CVE-2022-45693  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-202245693](https://nvd.nist.gov/vuln/detail/CVE-2022-45693)  | 
|  CVE-2022-45693  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-202245693](https://nvd.nist.gov/vuln/detail/CVE-2022-45693)  | 
|  CVE-2022-46751  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-202246751](https://nvd.nist.gov/vuln/detail/CVE-2022-46751)  | 
|  CVE-2022-46751  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-202246751](https://nvd.nist.gov/vuln/detail/CVE-2022-46751)  | 
|  CVE-2023-1370  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-1370](https://nvd.nist.gov/vuln/detail/CVE-2023-1370)  | 
|  CVE-2023-1370  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-1370](https://nvd.nist.gov/vuln/detail/CVE-2023-1370)  | 
|  CVE-2023-1370  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-1370](https://nvd.nist.gov/vuln/detail/CVE-2023-1370)  | 
|  CVE-2023-1436  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-1436](https://nvd.nist.gov/vuln/detail/CVE-2023-1436)  | 
|  CVE-2023-1436  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-1436](https://nvd.nist.gov/vuln/detail/CVE-2023-1436)  | 
|  CVE-2023-1436  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-1436](https://nvd.nist.gov/vuln/detail/CVE-2023-1436)  | 
|  CVE-2023-20883  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-20883](https://nvd.nist.gov/vuln/detail/CVE-2023-20883)  | 
|  CVE-2023-25194  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-25194](https://nvd.nist.gov/vuln/detail/CVE-2023-25194)  | 
|  CVE-2023-25194  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-25194](https://nvd.nist.gov/vuln/detail/CVE-2023-25194)  | 
|  CVE-2023-2976  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-2976](https://nvd.nist.gov/vuln/detail/CVE-2023-2976)  | 
|  CVE-2023-2976  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-2976](https://nvd.nist.gov/vuln/detail/CVE-2023-2976)  | 
|  CVE-2023-2976  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-2976](https://nvd.nist.gov/vuln/detail/CVE-2023-2976)  | 
|  CVE-2023-2976  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-2976](https://nvd.nist.gov/vuln/detail/CVE-2023-2976)  | 
|  CVE-2023-2976  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-2976](https://nvd.nist.gov/vuln/detail/CVE-2023-2976)  | 
|  CVE-2023-2976  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-2976](https://nvd.nist.gov/vuln/detail/CVE-2023-2976)  | 
|  CVE-2023-2976  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-2976](https://nvd.nist.gov/vuln/detail/CVE-2023-2976)  | 
|  CVE-2023-2976  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-2976](https://nvd.nist.gov/vuln/detail/CVE-2023-2976)  | 
|  CVE-2023-2976  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-2976](https://nvd.nist.gov/vuln/detail/CVE-2023-2976)  | 
|  CVE-2023-2976  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-2976](https://nvd.nist.gov/vuln/detail/CVE-2023-2976)  | 
|  CVE-2023-2976  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-2976](https://nvd.nist.gov/vuln/detail/CVE-2023-2976)  | 
|  CVE-2023-2976  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-2976](https://nvd.nist.gov/vuln/detail/CVE-2023-2976)  | 
|  CVE-2023-34453  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-34453](https://nvd.nist.gov/vuln/detail/CVE-2023-34453)  | 
|  CVE-2023-34454  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-34454](https://nvd.nist.gov/vuln/detail/CVE-2023-34454)  | 
|  CVE-2023-34455  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-34455](https://nvd.nist.gov/vuln/detail/CVE-2023-34455)  | 
|  CVE-2023-3635  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-3635](https://nvd.nist.gov/vuln/detail/CVE-2023-3635)  | 
|  CVE-2023-3635  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-3635](https://nvd.nist.gov/vuln/detail/CVE-2023-3635)  | 
|  CVE-2023-36478  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-36478](https://nvd.nist.gov/vuln/detail/CVE-2023-36478)  | 
|  CVE-2023-39410  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-39410](https://nvd.nist.gov/vuln/detail/CVE-2023-39410)  | 
|  CVE-2023-39410  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-39410](https://nvd.nist.gov/vuln/detail/CVE-2023-39410)  | 
|  CVE-2023-39410  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-39410](https://nvd.nist.gov/vuln/detail/CVE-2023-39410)  | 
|  CVE-2023-39410  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-39410](https://nvd.nist.gov/vuln/detail/CVE-2023-39410)  | 
|  CVE-2023-39410  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-39410](https://nvd.nist.gov/vuln/detail/CVE-2023-39410)  | 
|  CVE-2023-43642  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-43642](https://nvd.nist.gov/vuln/detail/CVE-2023-43642)  | 
|  CVE-2023-50387  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-50387](https://nvd.nist.gov/vuln/detail/CVE-2023-50387)  | 
|  CVE-2023-5072  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-5072](https://nvd.nist.gov/vuln/detail/CVE-2023-5072)  | 
|  CVE-2023-5072  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-5072](https://nvd.nist.gov/vuln/detail/CVE-2023-5072)  | 
|  CVE-2023-52428  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-52428](https://nvd.nist.gov/vuln/detail/CVE-2023-52428)  | 
|  CVE-2023-6378  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-6378](https://nvd.nist.gov/vuln/detail/CVE-2023-6378)  | 
|  CVE-2023-6378  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-6378](https://nvd.nist.gov/vuln/detail/CVE-2023-6378)  | 
|  CVE-2023-6481  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-6481](https://nvd.nist.gov/vuln/detail/CVE-2023-6481)  | 
|  CVE-2023-6481  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-6481](https://nvd.nist.gov/vuln/detail/CVE-2023-6481)  | 
|  CVE-2024-21634  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-21634](https://nvd.nist.gov/vuln/detail/CVE-2024-21634)  | 
|  CVE-2024-35178  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-35178](https://nvd.nist.gov/vuln/detail/CVE-2024-35178)  | 
|  CVE-2024-7254  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-7254](https://nvd.nist.gov/vuln/detail/CVE-2024-7254)  | 
|  CVE-2024-7254  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-7254](https://nvd.nist.gov/vuln/detail/CVE-2024-7254)  | 
|  CVE-2024-7254  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-7254](https://nvd.nist.gov/vuln/detail/CVE-2024-7254)  | 
|  CVE-2024-7254  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-7254](https://nvd.nist.gov/vuln/detail/CVE-2024-7254)  | 
|  CVE-2024-7254  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-7254](https://nvd.nist.gov/vuln/detail/CVE-2024-7254)  | 
|  CVE-2024-7254  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-7254](https://nvd.nist.gov/vuln/detail/CVE-2024-7254)  | 
|  CVE-2024-7254  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-7254](https://nvd.nist.gov/vuln/detail/CVE-2024-7254)  | 
|  CVE-2024-7254  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-7254](https://nvd.nist.gov/vuln/detail/CVE-2024-7254)  | 
|  CVE-2024-7254  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-7254](https://nvd.nist.gov/vuln/detail/CVE-2024-7254)  | 
|  CVE-2009-2625  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2009-2625)-2009-2625  | 
|  CVE-2012-5783  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2012-5783](https://nvd.nist.gov/vuln/detail/CVE-2012-5783)  | 
|  CVE-2012-6153  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2012-6153](https://nvd.nist.gov/vuln/detail/CVE-2012-6153)  | 
|  CVE-2017-10355  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2017-10355](https://nvd.nist.gov/vuln/detail/CVE-2017-10355)  | 
|  CVE-2018-10237  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2018-10237](https://nvd.nist.gov/vuln/detail/CVE-2018-10237)  | 
|  CVE-2018-10237  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2018-10237](https://nvd.nist.gov/vuln/detail/CVE-2018-10237)  | 
|  CVE-2018-10237  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2018-10237](https://nvd.nist.gov/vuln/detail/CVE-2018-10237)  | 
|  CVE-2018-10237  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2018-10237](https://nvd.nist.gov/vuln/detail/CVE-2018-10237)  | 
|  CVE-2018-10237  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2018-10237](https://nvd.nist.gov/vuln/detail/CVE-2018-10237)  | 
|  CVE-2018-10237  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2018-10237](https://nvd.nist.gov/vuln/detail/CVE-2018-10237)  | 
|  CVE-2018-11798  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2018-11798](https://nvd.nist.gov/vuln/detail/CVE-2018-11798)  | 
|  CVE-2018-1313  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2018-1313](https://nvd.nist.gov/vuln/detail/CVE-2018-1313)  | 
|  CVE-2018-2799  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-2799)-2018-2799  | 
|  CVE-2019-10219  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2019-10219](https://nvd.nist.gov/vuln/detail/CVE-2019-10219)  | 
|  CVE-2019-12384  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-12384)-2019-12384  | 
|  CVE-2019-12384  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-12384)-2019-12384  | 
|  CVE-2019-12814  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-12814)-2019-12814  | 
|  CVE-2019-12814  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-12814)-2019-12814  | 
|  CVE-2020-10693  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-10693](https://nvd.nist.gov/vuln/detail/CVE-2020-10693)  | 
|  CVE-2020-13955  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-13955)-2020-13955  | 
|  CVE-2020-13956  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-13956)-2020-13956  | 
|  CVE-2020-13956  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-13956)-2020-13956  | 
|  CVE-2020-14338  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-14338](https://nvd.nist.gov/vuln/detail/CVE-2020-14338)  | 
|  CVE-2020-15250  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-15250](https://nvd.nist.gov/vuln/detail/CVE-2020-15250)  | 
|  CVE-2020-15250  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-15250](https://nvd.nist.gov/vuln/detail/CVE-2020-15250)  | 
|  CVE-2020-15522  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-15522)-2020-15522  | 
|  CVE-2020-15522  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-15522)-2020-15522  | 
|  CVE-2020-17521  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-17521)-2020-17521  | 
|  CVE-2020-17521  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-17521)-2020-17521  | 
|  CVE-2020-1945  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-1945](https://nvd.nist.gov/vuln/detail/CVE-2020-1945)  | 
|  CVE-2020-26939  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-26939](https://nvd.nist.gov/vuln/detail/CVE-2020-26939)  | 
|  CVE-2020-26939  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-26939](https://nvd.nist.gov/vuln/detail/CVE-2020-26939)  | 
|  CVE-2020-29582  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-29582](https://nvd.nist.gov/vuln/detail/CVE-2020-29582)  | 
|  CVE-2021-21290  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2021-21290](https://nvd.nist.gov/vuln/detail/CVE-2021-21290)  | 
|  CVE-2021-22569  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2021-22569](https://nvd.nist.gov/vuln/detail/CVE-2021-22569)  | 
|  CVE-2021-22569  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2021-22569](https://nvd.nist.gov/vuln/detail/CVE-2021-22569)  | 
|  CVE-2021-22569  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2021-22569](https://nvd.nist.gov/vuln/detail/CVE-2021-22569)  | 
|  CVE-2021-22569  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2021-22569](https://nvd.nist.gov/vuln/detail/CVE-2021-22569)  | 
|  CVE-2021-22570  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2021-22570](https://nvd.nist.gov/vuln/detail/CVE-2021-22570)  | 
|  CVE-2021-22570  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2021-22570](https://nvd.nist.gov/vuln/detail/CVE-2021-22570)  | 
|  CVE-2021-22570  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2021-22570](https://nvd.nist.gov/vuln/detail/CVE-2021-22570)  | 
|  CVE-2021-27568  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2021-27568](https://nvd.nist.gov/vuln/detail/CVE-2021-27568)  | 
|  CVE-2021-28170  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2021-28170](https://nvd.nist.gov/vuln/detail/CVE-2021-28170)  | 
|  CVE-2021-28170  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2021-28170](https://nvd.nist.gov/vuln/detail/CVE-2021-28170)  | 
|  CVE-2021-28170  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2021-28170](https://nvd.nist.gov/vuln/detail/CVE-2021-28170)  | 
|  CVE-2021-28170  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2021-28170](https://nvd.nist.gov/vuln/detail/CVE-2021-28170)  | 
|  CVE-2021-29425  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2021-29425](https://nvd.nist.gov/vuln/detail/CVE-2021-29425)  | 
|  CVE-2021-29425  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2021-29425](https://nvd.nist.gov/vuln/detail/CVE-2021-29425)  | 
|  CVE-2021-36373  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2021-36373](https://nvd.nist.gov/vuln/detail/CVE-2021-36373)  | 
|  CVE-2021-36374  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2021-36374](https://nvd.nist.gov/vuln/detail/CVE-2021-36374)  | 
|  CVE-2021-37533  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2021-37533](https://nvd.nist.gov/vuln/detail/CVE-2021-37533)  | 
|  CVE-2021-38153  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2021-38153](https://nvd.nist.gov/vuln/detail/CVE-2021-38153)  | 
|  CVE-202223437  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-202223437](https://nvd.nist.gov/vuln/detail/CVE-2022-23437)  | 
|  CVE-202224329  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-202224329](https://nvd.nist.gov/vuln/detail/CVE-2022-24329)  | 
|  CVE-202238749  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-202238749](https://nvd.nist.gov/vuln/detail/CVE-2022-38749)  | 
|  CVE-202238750  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-202238750](https://nvd.nist.gov/vuln/detail/CVE-2022-38750)  | 
|  CVE-202238751  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-202238751](https://nvd.nist.gov/vuln/detail/CVE-2022-38751)  | 
|  CVE-202238752  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-202238752](https://nvd.nist.gov/vuln/detail/CVE-2022-38752)  | 
|  CVE-2022-41854  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-41854)-2022-41854  | 
|  CVE-2023-0833  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-0833](https://nvd.nist.gov/vuln/detail/CVE-2023-0833)  | 
|  CVE-2023-20863  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-20863](https://nvd.nist.gov/vuln/detail/CVE-2023-20863)  | 
|  CVE-2023-26048  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-26048](https://nvd.nist.gov/vuln/detail/CVE-2023-26048)  | 
|  CVE-2023-26049  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-26049](https://nvd.nist.gov/vuln/detail/CVE-2023-26049)  | 
|  CVE-2023-33201  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-33201](https://nvd.nist.gov/vuln/detail/CVE-2023-33201)  | 
|  CVE-2023-33201  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-33201](https://nvd.nist.gov/vuln/detail/CVE-2023-33201)  | 
|  CVE-2023-33201  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-33201](https://nvd.nist.gov/vuln/detail/CVE-2023-33201)  | 
|  CVE-2023-33201  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-33201](https://nvd.nist.gov/vuln/detail/CVE-2023-33201)  | 
|  CVE-2023-33201  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-33201](https://nvd.nist.gov/vuln/detail/CVE-2023-33201)  | 
|  CVE-2023-33202  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-33202](https://nvd.nist.gov/vuln/detail/CVE-2023-33202)  | 
|  CVE-2023-33202  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-33202](https://nvd.nist.gov/vuln/detail/CVE-2023-33202)  | 
|  CVE-2023-33202  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-33202](https://nvd.nist.gov/vuln/detail/CVE-2023-33202)  | 
|  CVE-2023-33202  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-33202](https://nvd.nist.gov/vuln/detail/CVE-2023-33202)  | 
|  CVE-2023-33202  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-33202](https://nvd.nist.gov/vuln/detail/CVE-2023-33202)  | 
|  CVE-2023-39968  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-39968](https://nvd.nist.gov/vuln/detail/CVE-2023-39968)  | 
|  CVE-2023-40167  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-40167](https://nvd.nist.gov/vuln/detail/CVE-2023-40167)  | 
|  CVE-2023-40170  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-40170](https://nvd.nist.gov/vuln/detail/CVE-2023-40170)  | 
|  CVE-2023-42503  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-42503](https://nvd.nist.gov/vuln/detail/CVE-2023-42503)  | 
|  CVE-2023-49080  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-49080](https://nvd.nist.gov/vuln/detail/CVE-2023-49080)  | 
|  CVE-2023-51074  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-51074](https://nvd.nist.gov/vuln/detail/CVE-2023-51074)  | 
|  CVE-2023-51074  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-51074](https://nvd.nist.gov/vuln/detail/CVE-2023-51074)  | 
|  CVE-2024-12798  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-12798](https://nvd.nist.gov/vuln/detail/CVE-2024-12798)  | 
|  CVE-2024-12798  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-12798](https://nvd.nist.gov/vuln/detail/CVE-2024-12798)  | 
|  CVE-2024-12798  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-12798](https://nvd.nist.gov/vuln/detail/CVE-2024-12798)  | 
|  CVE-2024-12798  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-12798](https://nvd.nist.gov/vuln/detail/CVE-2024-12798)  | 
|  CVE-2024-12798  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-12798](https://nvd.nist.gov/vuln/detail/CVE-2024-12798)  | 
|  CVE-2024-12798  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-12798](https://nvd.nist.gov/vuln/detail/CVE-2024-12798)  | 
|  CVE-2024-12798  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-12798](https://nvd.nist.gov/vuln/detail/CVE-2024-12798)  | 
|  CVE-2024-25710  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-25710](https://nvd.nist.gov/vuln/detail/CVE-2024-25710)  | 
|  CVE-2024-25710  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-25710](https://nvd.nist.gov/vuln/detail/CVE-2024-25710)  | 
|  CVE-2024-25710  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-25710](https://nvd.nist.gov/vuln/detail/CVE-2024-25710)  | 
|  CVE-2024-25710  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-25710](https://nvd.nist.gov/vuln/detail/CVE-2024-25710)  | 
|  CVE-2024-26308  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-26308](https://nvd.nist.gov/vuln/detail/CVE-2024-26308)  | 
|  CVE-2024-26308  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-26308](https://nvd.nist.gov/vuln/detail/CVE-2024-26308)  | 
|  CVE-2024-26308  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-26308](https://nvd.nist.gov/vuln/detail/CVE-2024-26308)  | 
|  CVE-2024-26308  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-26308](https://nvd.nist.gov/vuln/detail/CVE-2024-26308)  | 
|  CVE-2024-38820  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-38820](https://nvd.nist.gov/vuln/detail/CVE-2024-38820)  | 
|  CVE-2024-38820  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-38820](https://nvd.nist.gov/vuln/detail/CVE-2024-38820)  | 
|  CVE-2024-43805  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-43805](https://nvd.nist.gov/vuln/detail/CVE-2024-43805)  | 
|  CVE-2024-6763  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-6763](https://nvd.nist.gov/vuln/detail/CVE-2024-6763)  | 
|  CVE-2024-6763  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-6763](https://nvd.nist.gov/vuln/detail/CVE-2024-6763)  | 
|  CVE-2024-6763  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-6763](https://nvd.nist.gov/vuln/detail/CVE-2024-6763)  | 
|  CVE-2024-6763  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-6763](https://nvd.nist.gov/vuln/detail/CVE-2024-6763)  | 
|  CVE-2024-6763  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-6763](https://nvd.nist.gov/vuln/detail/CVE-2024-6763)  | 
|  CVE-2024-6763  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-6763](https://nvd.nist.gov/vuln/detail/CVE-2024-6763)  | 
|  CVE-2024-8184  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-8184](https://nvd.nist.gov/vuln/detail/CVE-2024-8184)  | 
|  CVE-2024-8184  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-8184](https://nvd.nist.gov/vuln/detail/CVE-2024-8184)  | 
|  CVE-2020-8908  |  BAJA  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-8908](https://nvd.nist.gov/vuln/detail/CVE-2020-8908)  | 
|  CVE-2020-8908  |  BAJA  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-8908](https://nvd.nist.gov/vuln/detail/CVE-2020-8908)  | 
|  CVE-2020-8908  |  BAJA  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-8908](https://nvd.nist.gov/vuln/detail/CVE-2020-8908)  | 
|  CVE-2020-8908  |  BAJA  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-8908](https://nvd.nist.gov/vuln/detail/CVE-2020-8908)  | 
|  CVE-2020-8908  |  BAJA  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-8908](https://nvd.nist.gov/vuln/detail/CVE-2020-8908)  | 
|  CVE-2020-8908  |  BAJA  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-8908](https://nvd.nist.gov/vuln/detail/CVE-2020-8908)  | 
|  CVE-2020-8908  |  BAJA  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-8908](https://nvd.nist.gov/vuln/detail/CVE-2020-8908)  | 
|  CVE-2020-8908  |  BAJA  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-8908](https://nvd.nist.gov/vuln/detail/CVE-2020-8908)  | 
|  CVE-2020-8908  |  BAJA  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-8908](https://nvd.nist.gov/vuln/detail/CVE-2020-8908)  | 
|  CVE-2020-8908  |  BAJA  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-8908](https://nvd.nist.gov/vuln/detail/CVE-2020-8908)  | 
|  CVE-2020-8908  |  BAJA  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-8908](https://nvd.nist.gov/vuln/detail/CVE-2020-8908)  | 
|  CVE-2020-8908  |  BAJA  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-8908](https://nvd.nist.gov/vuln/detail/CVE-2020-8908)  | 
|  CVE-20222047  |  BAJA  |  [https://nvd.nist. gov/vuln/detail/CVE-2022-047](https://nvd.nist.gov/vuln/detail/CVE-2022-2047)  | 
|  CVE-2024-12801  |  BAJA  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-12801](https://nvd.nist.gov/vuln/detail/CVE-2024-12801)  | 
|  CVE-2024-12801  |  BAJA  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-12801](https://nvd.nist.gov/vuln/detail/CVE-2024-12801)  | 
|  CVE-2024-12801  |  BAJA  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-12801](https://nvd.nist.gov/vuln/detail/CVE-2024-12801)  | 
|  CVE-2024-12801  |  BAJA  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-12801](https://nvd.nist.gov/vuln/detail/CVE-2024-12801)  | 
|  GHSA-58qw-p7qm-5rvh  |  BAJA  |  [https://nvd.nist. gov/vuln/detail/GHSA](https://nvd.nist.gov/vuln/detail/GHSA-58qw-p7qm-5rvh)-58qw-p7qm-5rvh  | 
|  GHSA-chfm-68vv-pvw5  |  BAJA  |  [https://nvd.nist. gov/vuln/detail/GHSA-chfm-68vv-pvw5](https://nvd.nist.gov/vuln/detail/GHSA-chfm-68vv-pvw5)  | 
|  CVE-2023-50868  |  SIN CLASIFICAR  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-50868](https://nvd.nist.gov/vuln/detail/CVE-2023-50868)  | 
|  CVE-2024-23454  |  SIN CLASIFICAR  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-23454](https://nvd.nist.gov/vuln/detail/CVE-2024-23454)  | 
|  CVE-2024-23454  |  SIN CLASIFICAR  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-23454](https://nvd.nist.gov/vuln/detail/CVE-2024-23454)  | 
|  CVE-2024-23944  |  SIN CLASIFICAR  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-23944](https://nvd.nist.gov/vuln/detail/CVE-2024-23944)  | 
|  CVE-2024-23944  |  SIN CLASIFICAR  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-23944](https://nvd.nist.gov/vuln/detail/CVE-2024-23944)  | 
|  CVE-2024-23944  |  SIN CLASIFICAR  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-23944](https://nvd.nist.gov/vuln/detail/CVE-2024-23944)  | 
|  CVE-2024-23945  |  SIN CLASIFICAR  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-23945](https://nvd.nist.gov/vuln/detail/CVE-2024-23945)  | 
|  CVE-2024-23953  |  SIN CLASIFICAR  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-23953](https://nvd.nist.gov/vuln/detail/CVE-2024-23953)  | 
|  CVE-2024-25638  |  SIN CLASIFICAR  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-25638](https://nvd.nist.gov/vuln/detail/CVE-2024-25638)  | 
|  CVE-2024-27137  |  SIN CLASIFICAR  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-27137](https://nvd.nist.gov/vuln/detail/CVE-2024-27137)  | 
|  CVE-2024-29025  |  SIN CLASIFICAR  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-29025](https://nvd.nist.gov/vuln/detail/CVE-2024-29025)  | 
|  CVE-2024-29131  |  SIN CLASIFICAR  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-29131](https://nvd.nist.gov/vuln/detail/CVE-2024-29131)  | 
|  CVE-2024-29131  |  SIN CLASIFICAR  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-29131](https://nvd.nist.gov/vuln/detail/CVE-2024-29131)  | 
|  CVE-2024-29133  |  SIN CLASIFICAR  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-29133](https://nvd.nist.gov/vuln/detail/CVE-2024-29133)  | 
|  CVE-2024-29133  |  SIN CLASIFICAR  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-29133](https://nvd.nist.gov/vuln/detail/CVE-2024-29133)  | 
|  CVE-2024-29857  |  SIN CLASIFICAR  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-29857](https://nvd.nist.gov/vuln/detail/CVE-2024-29857)  | 
|  CVE-2024-29857  |  SIN CLASIFICAR  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-29857](https://nvd.nist.gov/vuln/detail/CVE-2024-29857)  | 
|  CVE-2024-29857  |  SIN CLASIFICAR  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-29857](https://nvd.nist.gov/vuln/detail/CVE-2024-29857)  | 
|  CVE-2024-29857  |  SIN CLASIFICAR  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-29857](https://nvd.nist.gov/vuln/detail/CVE-2024-29857)  | 
|  CVE-2024-29869  |  SIN CLASIFICAR  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-29869](https://nvd.nist.gov/vuln/detail/CVE-2024-29869)  | 
|  CVE-2024-30171  |  SIN CLASIFICAR  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-30171](https://nvd.nist.gov/vuln/detail/CVE-2024-30171)  | 
|  CVE-2024-30171  |  SIN CLASIFICAR  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-30171](https://nvd.nist.gov/vuln/detail/CVE-2024-30171)  | 
|  CVE-2024-30171  |  SIN CLASIFICAR  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-30171](https://nvd.nist.gov/vuln/detail/CVE-2024-30171)  | 
|  CVE-2024-30171  |  SIN CLASIFICAR  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-30171](https://nvd.nist.gov/vuln/detail/CVE-2024-30171)  | 
|  CVE-2024-30172  |  SIN CLASIFICAR  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-30172](https://nvd.nist.gov/vuln/detail/CVE-2024-30172)  | 
|  CVE-2024-30172  |  SIN CLASIFICAR  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-30172](https://nvd.nist.gov/vuln/detail/CVE-2024-30172)  | 
|  CVE-2024-31141  |  SIN CLASIFICAR  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-31141](https://nvd.nist.gov/vuln/detail/CVE-2024-31141)  | 
|  CVE-2024-31141  |  SIN CLASIFICAR  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-31141](https://nvd.nist.gov/vuln/detail/CVE-2024-31141)  | 
|  CVE-2024-34447  |  SIN CLASIFICAR  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-34447](https://nvd.nist.gov/vuln/detail/CVE-2024-34447)  | 
|  CVE-2024-34447  |  SIN CLASIFICAR  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-34447](https://nvd.nist.gov/vuln/detail/CVE-2024-34447)  | 
|  CVE-2024-36114  |  SIN CLASIFICAR  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-36114](https://nvd.nist.gov/vuln/detail/CVE-2024-36114)  | 
|  CVE-2024-36114  |  SIN CLASIFICAR  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-36114](https://nvd.nist.gov/vuln/detail/CVE-2024-36114)  | 
|  CVE-2024-36114  |  SIN CLASIFICAR  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-36114](https://nvd.nist.gov/vuln/detail/CVE-2024-36114)  | 
|  CVE-2024-36114  |  SIN CLASIFICAR  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-36114](https://nvd.nist.gov/vuln/detail/CVE-2024-36114)  | 
|  CVE-2024-38808  |  SIN CLASIFICAR  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-38808](https://nvd.nist.gov/vuln/detail/CVE-2024-38808)  | 
|  CVE-2024-43382  |  SIN CLASIFICAR  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-43382](https://nvd.nist.gov/vuln/detail/CVE-2024-43382)  | 
|  CVE-2024-47072  |  SIN CLASIFICAR  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-47072](https://nvd.nist.gov/vuln/detail/CVE-2024-47072)  | 
|  CVE-2024-47535  |  SIN CLASIFICAR  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-47535](https://nvd.nist.gov/vuln/detail/CVE-2024-47535)  | 
|  CVE-2024-47535  |  SIN CLASIFICAR  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-47535](https://nvd.nist.gov/vuln/detail/CVE-2024-47535)  | 
|  CVE-2024-47535  |  SIN CLASIFICAR  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-47535](https://nvd.nist.gov/vuln/detail/CVE-2024-47535)  | 
|  CVE-2024-47535  |  SIN CLASIFICAR  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-47535](https://nvd.nist.gov/vuln/detail/CVE-2024-47535)  | 
|  CVE-2024-47554  |  SIN CLASIFICAR  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-47554](https://nvd.nist.gov/vuln/detail/CVE-2024-47554)  | 
|  CVE-2024-47554  |  SIN CLASIFICAR  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-47554](https://nvd.nist.gov/vuln/detail/CVE-2024-47554)  | 
|  CVE-2024-47554  |  SIN CLASIFICAR  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-47554](https://nvd.nist.gov/vuln/detail/CVE-2024-47554)  | 
|  CVE-2024-47554  |  SIN CLASIFICAR  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-47554](https://nvd.nist.gov/vuln/detail/CVE-2024-47554)  | 
|  CVE-2024-47554  |  SIN CLASIFICAR  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-47554](https://nvd.nist.gov/vuln/detail/CVE-2024-47554)  | 
|  CVE-2024-47554  |  SIN CLASIFICAR  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-47554](https://nvd.nist.gov/vuln/detail/CVE-2024-47554)  | 
|  CVE-2024-51504  |  SIN CLASIFICAR  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-51504](https://nvd.nist.gov/vuln/detail/CVE-2024-51504)  | 
|  CVE-2024-51504  |  SIN CLASIFICAR  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-51504](https://nvd.nist.gov/vuln/detail/CVE-2024-51504)  | 
|  CVE-2024-51504  |  SIN CLASIFICAR  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-51504](https://nvd.nist.gov/vuln/detail/CVE-2024-51504)  | 
|  CVE-2024-56128  |  SIN CLASIFICAR  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-56128](https://nvd.nist.gov/vuln/detail/CVE-2024-56128)  | 
|  CVE-2024-56128  |  SIN CLASIFICAR  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-56128](https://nvd.nist.gov/vuln/detail/CVE-2024-56128)  | 
|  CVE-2024-9823  |  SIN CLASIFICAR  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-9823](https://nvd.nist.gov/vuln/detail/CVE-2024-9823)  | 
|  CVE-2025-23015  |  SIN CLASIFICAR  |  [https://nvd.nist. gov/vuln/detail/CVE-2025-23015](https://nvd.nist.gov/vuln/detail/CVE-2025-23015)  | 
|  CVE-2025-24789  |  SIN CLASIFICAR  |  [https://nvd.nist. gov/vuln/detail/CVE-2025-24789](https://nvd.nist.gov/vuln/detail/CVE-2025-24789)  | 
|  CVE-2025-24790  |  SIN CLASIFICAR  |  [https://nvd.nist. gov/vuln/detail/CVE-2025-24790](https://nvd.nist.gov/vuln/detail/CVE-2025-24790)  | 
|  CVE-2025-24860  |  SIN CLASIFICAR  |  [https://nvd.nist. gov/vuln/detail/CVE-2025-24860](https://nvd.nist.gov/vuln/detail/CVE-2025-24860)  | 

## Notas de la versión 7.7.0
<a name="emr-770-relnotes"></a>

Las siguientes notas de la versión incluyen información sobre la versión 7.7.0 de Amazon EMR.

**Nuevas características**
+ **Actualizaciones de la aplicación**: Amazon EMR 7.7.0 application upgrades include Delta 3.2.1-amzn-2, Hudi 0.15.0-amzn-4, Iceberg 1.7.1-amzn-0, and Trino 467.

**Problemas conocidos**
+  **HBase creación de tablas en el catálogo Hive with Glue**: desde EMR-7.3.0 hasta EMR-7.10.0, hay un error debido a la integración de Hive Iceberg, que hace que la HBase creación de tablas en Hive falle cuando se utiliza Glue Data Catalog como metaalmacén. Ponte en contacto con el equipo de soporte si tienes este problema. AWS 
+  **IU de Tez**: de EMR-7.3 a EMR-7.10, hay un error que hace que el acceso a la IU de Tez a través de la interfaz de usuario web de YARN Resource Manager falle cuando se habilita el cifrado en tránsito. Esto ocurre porque el proxy YARN intenta usar el protocolo HTTP, mientras que la interfaz de usuario de Tez requiere HTTPS. Modifique la `tez.tez-ui.history-url.base` configuración en `tez-site` de `http` a `https` para resolver este problema.

**Cambios, mejoras y problemas resueltos**
+  A partir de Spark 3.3.1 (compatible con las versiones 6.10 y posteriores de EMR), todos los ejecutores de un host de desmantelamiento pasan a un nuevo `ExecutorState`, denominado estado de *RETIRADA*. Yarn no puede utilizar los ejecutores que se están retirando para asignar tareas y, por lo tanto, solicitará nuevos ejecutores, si es necesario, para las tareas que se están ejecutando. Por lo tanto, si deshabilita Spark DRA mientras usa EMR Managed Scaling, EMR Auto Scaling o cualquier mecanismo de escalado personalizado en los clústeres de EMR-EC2, Yarn puede solicitar el máximo de ejecutores permitidos para cada trabajo. Para evitar este problema, deje la propiedad `spark.dynamicAllocation.enabled` establecida en `TRUE` (que es la predeterminada) cuando utilice la combinación de características anterior. Además, también puede establecer restricciones de ejecutor mínimas y máximas si configura valores para las propiedades `spark.dynamicAllocation.maxExecutors` y `spark.dynamicAllocation.minExecutors` para sus trabajos de Spark, a fin de restringir el número de ejecutores asignados durante la ejecución del trabajo. 
+ La versión de Iceberg que se utilizaba a partir de EMR 7.7.0 ya no es compatible con Java 8. Además, Iceberg está excluido de las siguientes imágenes de Java 8: `emr-7.7.0-java8-latest` y `emr-7.7.0-spark-rapids-java8-latest`.
+ Lake Formation para FGAC con Amazon EMR en EKS: con la versión 7.7 y versiones posteriores de Amazon EMR, puede aprovechar AWS Lake Formation para aplicar controles de acceso detallados en las tablas del catálogo de datos respaldadas por Amazon S3. Esta capacidad le permite configurar los controles de acceso a nivel de tabla, fila, columna y celda para las consultas de lectura dentro de sus trabajos de Spark de Amazon EMR en EKS. Para obtener más información, consulte [Uso de Amazon EMR en EKS con AWS Lake Formation para obtener un control de acceso detallado](https://docs.aws.amazon.com/emr/latest/EMR-on-EKS-DevelopmentGuide/security_iam_fgac-lf.html).
+     
[\[See the AWS documentation website for more details\]](http://docs.aws.amazon.com/es_es/emr/latest/ReleaseGuide/emr-770-release.html)

## Versiones Java predeterminadas de 7.7.0
<a name="emr-770-jdk"></a>

La versión 7.7 y posteriores de Amazon EMR incluyen Amazon Corretto 17 (basado en OpenJDK) de forma predeterminada para las aplicaciones compatibles con Corretto 17 (JDK 17), con la excepción de Apache Livy.

En la siguiente tabla se muestran las versiones predeterminadas de Java para las aplicaciones de Amazon EMR 7.7.0. Si desea cambiar la JVM predeterminada del clúster, siga las instrucciones de [Configuración de aplicaciones para utilizar una máquina virtual de Java específica](configuring-java8.md) para cada aplicación que se ejecute en el clúster. Solo se puede usar una versión de tiempo de ejecución de Java en un clúster. Amazon EMR no admite la ejecución de distintos nodos o aplicaciones en distintas versiones de tiempo de ejecución en el mismo clúster.


| Aplicación | Versión de Java o Amazon Corretto (el valor predeterminado está en negrita) | 
| --- | --- | 
| Delta | 17, 11, 8 | 
| Flink | 17, 11, 8 | 
| HBase | 17, 11, 8 | 
| HCatalog | 17, 11, 8 | 
| Hadoop | 17, 11, 8 | 
| Hive | 17, 11, 8 | 
| Hudi | 17, 11, 8 | 
| Iceberg | 17, 11 | 
| Livy | 17, 11, 8 | 
| Oozie | 17, 11, 8 | 
| Phoenix | 17, 11, 8 | 
| PrestoDB | 8 | 
| Spark | 17, 11, 8 | 
| Spark RAPIDS | 17, 11, 8 | 
| Tez | 17, 11, 8 | 
| Trino | 21, 17 | 
| Zeppelin | 17, 11, 8 | 
| Pig | 17, 11, 8 | 
| ZooKeeper | 17, 11, 8 | 

## Versiones de componentes 7.7.0
<a name="emr-770-components"></a>

A continuación, se muestran los componentes que Amazon EMR instala con esta versión. Algunos se instalan como parte de paquetes de aplicación de macrodatos. Otros son exclusivos de Amazon EMR y se instalan para ciertos procesos y características del sistema. Normalmente, estos componentes comienzan con `emr` o `aws`. Normalmente, los paquetes de aplicación de macrodatos de la versión más reciente de Amazon EMR son las versiones más recientes que pueden encontrarse en la comunidad. Intentamos que las versiones de la comunidad estén disponibles en Amazon EMR lo más rápido posible.

Algunos componentes de Amazon EMR son distintos de las versiones que se encuentran en la comunidad. Estos componentes tienen una etiqueta de versión con el formato `CommunityVersion-amzn-EmrVersion`. La `EmrVersion` empieza por 0. Por ejemplo, si un componente de la comunidad de código abierto llamado `myapp-component` con la versión 2.2 se ha modificado tres veces para incluirlo en diferentes versiones de lanzamiento de Amazon EMR, la versión que se mostrará será `2.2-amzn-2`.


| Componente | Versión | Description (Descripción) | 
| --- | --- | --- | 
| adot-java-agent | 1.31.0 | Un agente Java que recopila métricas de los daemons de las aplicaciones. | 
| delta | 3.2.1-amzn-2 | Delta Lake es un formato de tabla abierto para conjuntos de datos analíticos de gran tamaño | 
| emr-amazon-cloudwatch-agent | 1.300032.2-amzn-0 | Se trata de una aplicación que recopila métricas internas de nivel de sistema y métricas de aplicación personalizadas de las instancias de Amazon EC2. | 
| emr-ddb | 5.6.0 | Conector de Amazon DynamoDB para aplicaciones del ecosistema de Hadoop. | 
| emr-goodies | 3.16.0 | Bibliotecas especialmente prácticas para el ecosistema de Hadoop. | 
| emr-kinesis | 3.20.0 | Conector de Amazon Kinesis para aplicaciones del ecosistema de Hadoop. | 
| emr-notebook-env | 1.18.0 | Entorno de Conda para cuaderno de EMR que incluye una puerta de enlace empresarial de Jupyter | 
| emr-s3-dist-cp | 2.37.0 | Aplicación de copia distribuida optimizada para Amazon S3. | 
| emr-s3-select | 2.16.0 | Conector S3Select de EMR | 
| emr-wal-cli | 1.3.2 | CLI utilizada para eliminar o enumerar WAL de ERM. | 
| emrfs | 2.68,0 | Conector de Amazon S3 para aplicaciones del ecosistema de Hadoop. | 
| flink-client | 1.20.0-amzn-1 | Scripts y aplicaciones de cliente de línea de comando de Apache Flink. | 
| flink-jobmanager-config | 1.20.0-amzn-1 | Administración de recursos en nodos EMR para Apache Flink. JobManager | 
| hadoop-client | 3.4.0-amzn-3 | Los clientes de línea de comando de Hadoop como, por ejemplo "hdfs", "hadoop" o "yarn". | 
| hadoop-hdfs-datanode | 3.4.0-amzn-3 | Servicio de nivel de nodos de HDFS para el almacenamiento de bloques. | 
| hadoop-hdfs-library | 3.4.0-amzn-3 | Biblioteca y cliente de línea de comandos HDFS | 
| hadoop-hdfs-namenode | 3.4.0-amzn-3 | Servicio de HDFS para realizar un seguimiento de nombres de archivo y bloquear ubicaciones. | 
| hadoop-hdfs-journalnode | 3.4.0-amzn-3 | Servicio de HDFS para administrar los archivos de Hadoop periódico en clústeres de alta disponibilidad. | 
| hadoop-httpfs-server | 3.4.0-amzn-3 | Punto de enlace HTTP para operaciones HDFS. | 
| hadoop-kms-server | 3.4.0-amzn-3 | Servidor de administración de claves criptográficas basado en la API de Hadoop. KeyProvider  | 
| hadoop-mapred | 3.4.0-amzn-3 | MapReduce bibliotecas de motores de ejecución para ejecutar una aplicación. MapReduce  | 
| hadoop-yarn-nodemanager | 3.4.0-amzn-3 | Servicio de YARN para la administración de contenedores en un nodo individual. | 
| hadoop-yarn-resourcemanager | 3.4.0-amzn-3 | Servicio de YARN para la asignación y administración de recursos de clúster y aplicaciones distribuidas. | 
| hadoop-yarn-timeline-server | 3.4.0-amzn-3 | Servicio para recuperar información actual e histórica para aplicaciones de YARN. | 
| hbase-hmaster | 2.6.1-amzn-1 | Servicio para un HBase clúster responsable de la coordinación de las regiones y la ejecución de los comandos administrativos. | 
| hbase-region-server | 2.6.1-amzn-1 | Servicio para prestar servicio a una o más regiones. HBase  | 
| hbase-client | 2.6.1-amzn-1 | HBase cliente de línea de comandos. | 
| hbase-rest-server | 2.6.1-amzn-1 | Servicio que proporciona un punto final HTTP para. RESTful HBase | 
| hbase-thrift-server | 2.6.1-amzn-1 | Servicio que proporciona un punto final de Thrift a. HBase | 
| hbase-operator-tools | 2.6.1-amzn-1 | Herramienta de reparación de clústeres de Apache. HBase  | 
| hcatalog-client | 3.1.3-amzn-16 | El cliente de línea de comando "hcat" para manipular hcatalog-server. | 
| hcatalog-server | 3.1.3-amzn-16 | Prestación de servicios HCatalog, una capa de administración de tablas y almacenamiento para aplicaciones distribuidas. | 
| hcatalog-webhcat-server | 3.1.3-amzn-16 | Punto final HTTP que proporciona una interfaz REST para. HCatalog | 
| hive-client | 3.1.3-amzn-16 | Cliente de línea de comando de Hive. | 
| hive-hbase | 3.1.3-amzn-16 | Hive-hbase client. | 
| hive-metastore-server | 3.1.3-amzn-16 | Service para acceder al metaalmacén de Hive, un repositorio semántico que almacena metadatos para SQL en operaciones de Hadoop. | 
| hive-server2 | 3.1.3-amzn-16 | Servicio para aceptar consultas de Hive como solicitudes web. | 
| hudi | 0.15.0-amzn-4 | Marco de procesamiento incremental para impulsar la canalización de datos a baja latencia y alta eficiencia. | 
| hudi-presto | 0.15.0-amzn-4 | Biblioteca de paquetes para ejecutar Presto con Hudi. | 
| hudi-trino | 0.15.0-amzn-4 | Biblioteca de paquetes para ejecutar Trino con Hudi. | 
| hudi-spark | 0.15.0-amzn-4 | Biblioteca de paquetes para ejecutar Spark con Hudi. | 
| hue-server | 4.11.0 | Aplicación web para analizar datos con aplicaciones del ecosistema de Hadoop | 
| iceberg | 1.7.1-amzn-0 | Apache Iceberg es un formato de tabla abierto para conjuntos de datos analíticos muy grandes | 
| jupyterhub | 1.5.0 | Servidor multiusuario para blocs de notas Jupyter | 
| livy-server | 0.8.0-incubating | Interfaz de REST para interactuar con Apache Spark | 
| nginx | 1.12.1 | nginx [engine x] es un servidor HTTP y proxy inverso | 
| mariadb-server | 5.5.68\$1 | Servidor de base de datos de MariaDB. | 
| nvidia-cuda | 12.3.0 | Controladores Nvidia y conjunto de herramientas Cuda | 
| oozie-client | 5.2.1 | Cliente de línea de comando de Oozie. | 
| oozie-server | 5.2.1 | Servicio para aceptar solicitudes de flujo de trabajo de Oozie. | 
| opencv | 4.7.0 | Biblioteca de visión artificial de código abierto. | 
| phoenix-library | 5.2.1 | Las bibliotecas de Phoenix para servidor y cliente | 
| phoenix-connectors | 6.0.0 | Conectores de Apache Phoenix para Spark-3 | 
| phoenix-query-server | 6.0.0 | Un servidor ligero que proporciona acceso a JDBC, así como acceso de formato Protocol Buffers y JSON al API de Avatica  | 
| presto-coordinator | 0.287-amzn-1 | Servicio para aceptar las consultas y administrar la ejecución de consultas entre presto-workers. | 
| presto-worker | 0.287-amzn-1 | Service para ejecutar partes de una consulta. | 
| presto-client | 0.287-amzn-1 | Cliente de línea de comandos Presto que se instala en los nodos principales en espera de un clúster de HA donde el servidor Presto no se ha iniciado. | 
| trino-coordinator | 467-amzn-0 | Servicio para aceptar consultas y administrar la ejecución de consultas entre trino-workers. | 
| trino-worker | 467-amzn-0 | Service para ejecutar partes de una consulta. | 
| trino-client | 467-amzn-0 | Cliente de línea de comandos Trino que se instala en los maestros en espera de un clúster de HA donde el servidor Trino no se ha iniciado. | 
| pig-client | 0.17.0 | Cliente de línea de comando de Pig. | 
| r | 4.3.2 | Proyecto R para análisis estadístico | 
| ranger-kms-server | 2.0.0 | Sistema de administración de claves Apache Ranger | 
| spark-client | 3.5.3-amzn-1 | Clientes de línea de comando de Spark. | 
| spark-history-server | 3.5.3-amzn-1 | IU web para la visualización de eventos registrados durante la vida útil de una aplicación Spark completada. | 
| spark-on-yarn | 3.5.3-amzn-1 | Motor de ejecución en memoria para YARN. | 
| spark-yarn-slave | 3.5.3-amzn-1 | Bibliotecas de Apache Spark necesarias para esclavos de YARN. | 
| spark-rapids | 24.10.1-amzn-1 | El complemento Nvidia Spark RAPIDS que acelera Apache Spark con. GPUs | 
| tensorflow | 2.16.1 | TensorFlow biblioteca de software de código abierto para computación numérica de alto rendimiento. | 
| tez-on-yarn | 0.10.2-amzn-14 | La aplicación YARN de tez y bibliotecas. | 
| tez-on-worker | 0.10.2-amzn-14 | La aplicación YARN de tez y bibliotecas para nodos de trabajo. | 
| zeppelin-server | 0.11.1 | Bloc de notas basado en web que permite el análisis de datos interactivo. | 
| zookeeper-server | 3.9.2-amzn-1 | Servicio centralizado para mantener información de configuración, nomenclatura, proporcionar sincronización distribuida y proporcionar servicios de grupo. | 
| zookeeper-client | 3.9.2-amzn-1 | ZooKeeper cliente de línea de comandos. | 

## Clasificaciones de configuración de 7.7.0
<a name="emr-770-class"></a>

Las clasificaciones de configuración le permiten personalizar las aplicaciones. Suelen corresponder a un archivo XML de configuración para la aplicación como, por ejemplo, `hive-site.xml`. Para obtener más información, consulte [Configuración de aplicaciones](emr-configure-apps.md).

Las acciones de reconfiguración se producen cuando se especifica una configuración para los grupos de instancias de un clúster en ejecución. Amazon EMR solo inicia acciones de reconfiguración para las clasificaciones que se modifican. Para obtener más información, consulte [Reconfiguración de un grupo de instancias en un clúster en ejecución](emr-configure-apps-running-cluster.md).


**clasificaciones emr-7.7.0**  

| Clasificaciones | Description (Descripción) | Acciones de reconfiguración | 
| --- | --- | --- | 
| capacity-scheduler | Cambiar los valores en el archivo capacity-scheduler.xml de Hadoop. | Restarts the ResourceManager service. | 
| container-executor | Cambie los valores en el archivo container-executor.cfg de Hadoop YARN. | Not available. | 
| container-log4j | Cambiar los valores en el archivo container-log4j.properties de Hadoop YARN. | Not available. | 
| core-site | Cambiar los valores en el archivo core-site.xml de Hadoop. | Restarts the Hadoop HDFS services Namenode, SecondaryNamenode, Datanode, ZKFC, and Journalnode. Restarts the Hadoop YARN services ResourceManager, NodeManager, ProxyServer, and TimelineServer. Additionally restarts Hadoop KMS, Ranger KMS, HiveServer2, Hive MetaStore, Hadoop Httpfs, and MapReduce-HistoryServer. | 
| docker-conf | Cambie la configuración relacionada con el docker. | Not available. | 
| emrfs-site | Cambiar la configuración de EMRFS. | Restarts the Hadoop HDFS services Namenode, SecondaryNamenode, Datanode, ZKFC, and Journalnode. Restarts the Hadoop YARN services ResourceManager, NodeManager, ProxyServer, and TimelineServer. Additionally restarts HBaseRegionserver, HBaseMaster, HBaseThrift, HBaseRest, HiveServer2, Hive MetaStore, Hadoop Httpfs, and MapReduce-HistoryServer. | 
| flink-conf | Cambiar la configuración de flink-conf.yaml. | Restarts Flink history server. | 
| flink-log4j | Cambiar la configuración de log4j.properties de Flink. | Restarts Flink history server. | 
| flink-log4j-session | Cambie la configuración de Flink log4j-session.properties para la sesión. Kubernetes/Yarn  | Restarts Flink history server. | 
| flink-log4j-cli | Cambiar la configuración de log4j-cli.properties de Flink. | Restarts Flink history server. | 
| hadoop-env | Cambiar los valores en el entorno de Hadoop para todos los componentes de Hadoop. | Restarts the Hadoop HDFS services Namenode, SecondaryNamenode, Datanode, ZKFC, and Journalnode. Restarts the Hadoop YARN services ResourceManager, NodeManager, ProxyServer, and TimelineServer. Additionally restarts PhoenixQueryserver, HiveServer2, Hive MetaStore, and MapReduce-HistoryServer. | 
| hadoop-log4j | Cambiar los valores en el archivo log4j.properties de Hadoop. | Restarts the Hadoop HDFS services SecondaryNamenode, Datanode, and Journalnode. Restarts the Hadoop YARN services ResourceManager, NodeManager, ProxyServer, and TimelineServer. Additionally restarts Hadoop KMS, Hadoop Httpfs, and MapReduce-HistoryServer. | 
| hadoop-ssl-server | Cambiar la configuración del servidor ssl de Hadoop | Not available. | 
| hadoop-ssl-client | Cambiar la configuración del cliente ssl de Hadoop | Not available. | 
| hbase | Configuraciones seleccionadas por Amazon EMR para Apache. HBase | Custom EMR specific property. Sets emrfs-site and hbase-site configs. See those for their associated restarts. | 
| hbase-env | Cambie los valores en su entorno HBase. | Restarts the HBase services RegionServer, HBaseMaster, ThriftServer, RestServer. | 
| hbase-log4j | Cambie los valores en el archivo HBase hbase-log4j.properties. | Restarts the HBase services RegionServer, HBaseMaster, ThriftServer, RestServer. | 
| hbase-metrics | Cambie los valores en el archivo hadoop-metrics2-hbase.properties. HBase | Restarts the HBase services RegionServer, HBaseMaster, ThriftServer, RestServer. | 
| hbase-policy | Cambie los valores en HBase el archivo hbase-policy.xml. | Not available. | 
| hbase-site | Cambie los valores en HBase el archivo hbase-site.xml. | Restarts the HBase services RegionServer, HBaseMaster, ThriftServer, RestServer. Additionally restarts Phoenix QueryServer. | 
| hdfs-encryption-zones | Configurar zonas de cifrado de HDFS. | This classification should not be reconfigured. | 
| hdfs-env | Cambiar los valores en el entorno de HDFS. | Restarts Hadoop HDFS services Namenode, Datanode, and ZKFC. | 
| hdfs-site | Cambiar los valores en hdfs-site.xml de HDFS. | Restarts the Hadoop HDFS services Namenode, SecondaryNamenode, Datanode, ZKFC, and Journalnode. Additionally restarts Hadoop Httpfs. | 
| hcatalog-env | Cambie los valores en HCatalog el entorno. | Restarts Hive HCatalog Server. | 
| hcatalog-server-jndi | Cambie los valores en HCatalog jndi.properties. | Restarts Hive HCatalog Server. | 
| hcatalog-server-proto-hive-site | Cambie los valores en .xml HCatalog. proto-hive-site | Restarts Hive HCatalog Server. | 
| hcatalog-webhcat-env | Cambie los valores en el entorno HCat de la HCatalog Web. | Restarts Hive WebHCat server. | 
| hcatalog-webhcat-log4j2 | Cambie los valores en las propiedades HCatalog HCat log4j2.properties de la Web. | Restarts Hive WebHCat server. | 
| hcatalog-webhcat-site | Cambie los valores del archivo webhcat-site.xml de la HCatalog WebHCat. | Restarts Hive WebHCat server. | 
| hive | Configuración de Amazon EMR mantenida para Apache Hive. | Sets configurations to launch Hive LLAP service. | 
| hive-beeline-log4j2 | Cambiar los valores en el archivo beeline-log4j2.properties de Hive. | Not available. | 
| hive-parquet-logging | Cambiar los valores en el archivo parquet-logging.properties de Hive. | Not available. | 
| hive-env | Cambiar los valores en el entorno de Hive. | Restarts HiveServer2, HiveMetastore, and Hive HCatalog-Server. Runs Hive schemaTool CLI commands to verify hive-metastore. | 
| hive-exec-log4j2 | Cambie los valores en el archivo hive-exec-log 4j2.properties de Hive. | Not available. | 
| hive-llap-daemon-log4j2 | Cambie los valores en el archivo 4j2.properties de Hive. llap-daemon-log | Not available. | 
| hive-log4j2 | Cambiar los valores en el archivo hive-log4j2.properties de Hive. | Not available. | 
| hive-site | Cambiar los valores en el archivo hive-site.xml de Hive. | Restarts HiveServer2, HiveMetastore, and Hive HCatalog-Server. Runs Hive schemaTool CLI commands to verify hive-metastore. Also restarts Oozie and Zeppelin. | 
| hiveserver2-site | Cambiar los valores en el archivo hiveserver2-site.xml de Hive Server2. | Not available. | 
| hue-ini | Cambiar los valores en el archivo ini de Hue | Restarts Hue. Also activates Hue config override CLI commands to pick up new configurations. | 
| httpfs-env | Cambiar los valores en el entorno de HTTPFS. | Restarts Hadoop Httpfs service. | 
| httpfs-site | Cambiar los valores en el archivo httpfs-site.xml de Hadoop. | Restarts Hadoop Httpfs service. | 
| hadoop-kms-acls | Cambiar los valores en el archivo kms-acls.xml de Hadoop. | Not available. | 
| hadoop-kms-env | Cambiar los valores en el entorno de Hadoop KMS. | Restarts Hadoop-KMS service. | 
| hadoop-kms-java-home | Cambie la página de inicio de Java de KMS de Hadoop | Not available. | 
| hadoop-kms-log4j | Cambiar los valores en el archivo kms-log4j.properties de Hadoop. | Not available. | 
| hadoop-kms-site | Cambiar los valores en el archivo kms-site.xml de Hadoop. | Restarts Hadoop-KMS and Ranger-KMS service. | 
| hudi-env | Cambiar los valores en el entorno de Hudi. | Not available. | 
| hudi-defaults | Cambie los valores en el archivo hudi-defaults.conf de Hudi. | Not available. | 
| iceberg-defaults | Cambie los valores del archivo iceberg-defaults.conf de Iceberg. | Not available. | 
| delta-defaults | Cambie los valores del archivo delta-defaults.conf de Delta. | Not available. | 
| jupyter-notebook-conf | Cambiar los valores en el archivo jupyter\$1notebook\$1config.py de Jupyter Notebook. | Not available. | 
| jupyter-hub-conf | Cambie los valores en JupyterHubs el archivo jupyterhub\$1config.py. | Not available. | 
| jupyter-s3-conf | Configurar la persistencia en S3 del bloc de notas de Jupyter. | Not available. | 
| jupyter-sparkmagic-conf | Cambiar los valores en el archivo config.json de Sparkmagic. | Not available. | 
| livy-conf | Cambiar los valores en el archivo livy.conf de Livy. | Restarts Livy Server. | 
| livy-env | Cambiar los valores en el entorno de Livy. | Restarts Livy Server. | 
| livy-log4j2 | Cambiar la configuración de log4j2.properties de Livy. | Restarts Livy Server. | 
| mapred-env | Cambie los valores en el entorno de la MapReduce aplicación. | Restarts Hadoop MapReduce-HistoryServer. | 
| mapred-site | Cambie los valores en el archivo mapred-site.xml de la MapReduce aplicación. | Restarts Hadoop MapReduce-HistoryServer. | 
| oozie-env | Cambiar los valores en el entorno de Oozie. | Restarts Oozie. | 
| oozie-log4j | Cambiar los valores en el archivo oozie-log4j.properties de Oozie. | Restarts Oozie. | 
| oozie-site | Cambiar los valores en el archivo oozie-site.xml de Oozie. | Restarts Oozie. | 
| phoenix-hbase-metrics | Cambiar los valores en el archivo hadoop-metrics2-hbase.properties de Phoenix. | Not available. | 
| phoenix-hbase-site | Cambiar los valores en el archivo hbase-site.xml de Phoenix. | Not available. | 
| phoenix-log4j2 | Cambiar los valores en el archivo log4j2.properties de Phoenix. | Restarts Phoenix-QueryServer. | 
| phoenix-metrics | Cambiar los valores en el archivo hadoop-metrics2-phoenix.properties de Phoenix. | Not available. | 
| pig-env | Cambiar los valores en el entorno de Pig. | Not available. | 
| pig-properties | Cambiar los valores en el archivo pig.properties de Pig. | Restarts Oozie. | 
| pig-log4j | Cambiar los valores en el archivo log4j.properties de Pig. | Not available. | 
| presto-log | Cambiar los valores en el archivo log.properties de Presto. | Restarts Presto-Server (for PrestoDB) | 
| presto-config | Cambiar los valores en el archivo config.properties de Presto. | Restarts Presto-Server (for PrestoDB) | 
| presto-password-authenticator | Cambiar los valores en el archivo password-authenticator.properties de Presto. | Not available. | 
| presto-env | Cambiar valores en el archivo presto-env.sh de Presto. | Restarts Presto-Server (for PrestoDB) | 
| presto-node | Cambiar valores en el archivo node.properties de Presto. | Not available. | 
| presto-connector-blackhole | Cambiar los valores en el archivo blackhole.properties de Presto. | Not available. | 
| presto-connector-cassandra | Cambiar los valores en el archivo cassandra.properties de Presto. | Not available. | 
| presto-connector-hive | Cambiar los valores en el archivo hive.properties de Presto. | Restarts Presto-Server (for PrestoDB) | 
| presto-connector-jmx | Cambiar los valores en el archivo jmx.properties de Presto. | Not available. | 
| presto-connector-kafka | Cambiar los valores en el archivo kafka.properties de Presto. | Not available. | 
| presto-connector-lakeformation | Cambiar los valores en el archivo lakeformation.properties de Presto. | Restarts Presto-Server (for PrestoDB) | 
| presto-connector-localfile | Cambiar los valores en el archivo localfile.properties de Presto. | Not available. | 
| presto-connector-memory | Cambiar los valores del archivo memory.properties de Presto. | Not available. | 
| presto-connector-mongodb | Cambiar los valores en el archivo mongodb.properties de Presto. | Not available. | 
| presto-connector-mysql | Cambiar los valores en el archivo mysql.properties de Presto. | Not available. | 
| presto-connector-postgresql | Cambiar los valores en el archivo postgresql.properties de Presto. | Not available. | 
| presto-connector-raptor | Cambiar los valores en el archivo raptor.properties de Presto. | Not available. | 
| presto-connector-redis | Cambiar los valores en el archivo redis.properties de Presto. | Not available. | 
| presto-connector-redshift | Cambiar los valores en el archivo redshift.properties de Presto. | Not available. | 
| presto-connector-tpch | Cambiar los valores en el archivo tpch.properties de Presto. | Not available. | 
| presto-connector-tpcds | Cambiar los valores del archivo tpcds.properties de Presto. | Not available. | 
| trino-log | Cambiar los valores en el archivo log.properties de Trino. | Restarts Trino-Server (for Trino) | 
| trino-config | Cambiar los valores en el archivo config.properties de Trino. | Restarts Trino-Server (for Trino) | 
| trino-password-authenticator | Cambiar los valores en el archivo password-authenticator.properties de Trino. | Restarts Trino-Server (for Trino) | 
| trino-env | Cambie los valores del archivo trino-env.sh de Trino. | Restarts Trino-Server (for Trino) | 
| trino-node | Cambiar los valores en el archivo node.properties de Trino. | Not available. | 
| trino-connector-blackhole | Cambiar los valores en el archivo blackhole.properties de Trino. | Not available. | 
| trino-connector-cassandra | Cambiar los valores en el archivo cassandra.properties de Trino. | Not available. | 
| trino-connector-delta | Cambie los valores del archivo delta.properties de Trino. | Restarts Trino-Server (for Trino) | 
| trino-connector-hive | Cambiar los valores en el archivo hive.properties de Trino. | Restarts Trino-Server (for Trino) | 
| trino-exchange-manager | Cambie los valores del archivo exchange-manager.properties de Trino. | Restarts Trino-Server (for Trino) | 
| trino-connector-iceberg | Cambiar los valores en el archivo iceberg.properties de Trino. | Restarts Trino-Server (for Trino) | 
| trino-connector-hudi | Cambiar los valores en el archivo hudi.properties de Trino. | Restarts Trino-Server (for Trino) | 
| trino-connector-jmx | Cambiar los valores en el archivo jmx.properties de Trino. | Not available. | 
| trino-connector-kafka | Cambiar los valores en el archivo kafka.properties de Trino. | Not available. | 
| trino-connector-localfile | Cambiar los valores en el archivo localfile.properties de Trino. | Not available. | 
| trino-connector-memory | Cambiar los valores en el archivo memory.properties de Trino. | Not available. | 
| trino-connector-mongodb | Cambiar los valores en el archivo mongodb.properties de Trino. | Not available. | 
| trino-connector-mysql | Cambiar los valores en el archivo mysql.properties de Trino. | Not available. | 
| trino-connector-postgresql | Cambiar los valores en el archivo postgresql.properties de Trino. | Not available. | 
| trino-connector-raptor | Cambiar los valores en el archivo raptor.properties de Trino. | Not available. | 
| trino-connector-redis | Cambiar los valores en el archivo redis.properties de Trino. | Not available. | 
| trino-connector-redshift | Cambiar los valores en el archivo redshift.properties de Trino. | Not available. | 
| trino-connector-tpch | Cambiar los valores en el archivo tpch.properties de Trino. | Not available. | 
| trino-connector-tpcds | Cambiar los valores en el archivo tpcds.properties de Trino. | Not available. | 
| ranger-kms-dbks-site | Cambie los valores del archivo dbks-site.xml de Ranger KMS. | Restarts Ranger KMS Server. | 
| ranger-kms-site | Cambie los valores en el ranger-kms-site archivo.xml de Ranger KMS. | Restarts Ranger KMS Server. | 
| ranger-kms-env | Cambie los valores del entorno Ranger KMS. | Restarts Ranger KMS Server. | 
| ranger-kms-logback | Cambie los valores del archivo kms-logback.xml de Ranger KMS. | Not available. | 
| ranger-kms-db-ca | Cambie los valores del archivo CA en S3 para la conexión SSL de MySQL con Ranger KMS. | Not available. | 
| spark | Configuración de Amazon EMR mantenida para Apache Spark. | This property modifies spark-defaults. See actions there. | 
| spark-defaults | Cambiar los valores en el archivo spark-defaults.conf de Spark. | Restarts Spark history server and Spark thrift server. | 
| spark-env | Cambiar los valores en el entorno de Spark. | Restarts Spark history server and Spark thrift server. | 
| spark-hive-site | Cambiar los valores en el archivo hive-site.xml de Spark. | Not available. | 
| spark-log4j2 | Cambiar los valores en el archivo log4j2.properties de Spark. | Restarts Spark history server and Spark thrift server. | 
| spark-metrics | Cambiar los valores en el archivo metrics.properties de Spark. | Restarts Spark history server and Spark thrift server. | 
| tez-site | Cambiar los valores en el archivo tez-site.xml de Tez. | Restart Oozie and HiveServer2. | 
| yarn-env | Cambiar los valores en el entorno de YARN. | Restarts the Hadoop YARN services ResourceManager, NodeManager, ProxyServer, and TimelineServer. Additionally restarts MapReduce-HistoryServer. | 
| yarn-site | Cambiar los valores en el archivo yarn-site.xml de YARN. | Restarts the Hadoop YARN services ResourceManager, NodeManager, ProxyServer, and TimelineServer. Additionally restarts Livy Server and MapReduce-HistoryServer. | 
| zeppelin-env | Cambiar los valores en el entorno de Zeppelin. | Restarts Zeppelin. | 
| zeppelin-site | Cambie los ajustes de configuración de zeppelin-site.xml. | Restarts Zeppelin. | 
| zookeeper-config | Cambie los valores en el ZooKeeper archivo zoo.cfg. | Restarts Zookeeper server. | 
| zookeeper-logback | Cambie los valores en ZooKeeper el archivo logback.xml. | Restarts Zookeeper server. | 
| emr-metrics | Cambie la configuración de la métrica EMR para este nodo. | Restarts the CloudWatchAgent service. | 

## 7.7.0 registro de cambios
<a name="770-changelog"></a>


**Registro de cambios de la versión 7.7.0 y de las notas de la versión**  

| Date | Event | Description (Descripción) | 
| --- | --- | --- | 
| 2025-02-07 | Publicación de documentos | Las notas de la versión 7.7.0 de Amazon EMR se publicaron por primera vez | 
| 2025-02-06 | Implementación completa | [Amazon EMR 7.7.0 se ha implementado completamente en todas las regiones compatibles](https://aws.amazon.com/about-aws/global-infrastructure/regional-product-services/) | 
| 30-01-2020 | Versión limitada inicial | Amazon EMR 7.7.0 se implementó por primera vez en las regiones comerciales iniciales | 

# Amazon EMR versión 7.6.0
<a name="emr-760-release"></a>

## Ciclo de vida compatible con 7.6.0
<a name="emr-760-supported-lifecycle"></a>

En la siguiente tabla se describen las fechas de ciclo de vida admitidas para la versión 7.6.0 de Amazon EMR.


| Fase de soporte | Date | 
| --- | --- | 
| Fecha de lanzamiento inicial | 10 de enero de 2025 | 
| Soporte estándar hasta | 9 de enero de 2027 | 
| Fin del soporte | 10 de enero de 2027 | 
| Fin de vida útil | 10 de enero de 2028 | 

## Versiones de la aplicación 7.6.0
<a name="emr-760-app-versions"></a>

Esta versión incluye las siguientes aplicaciones: [https://docs.aws.amazon.com/AmazonCloudWatch/latest/monitoring/Install-CloudWatch-Agent.html](https://docs.aws.amazon.com/AmazonCloudWatch/latest/monitoring/Install-CloudWatch-Agent.html), [https://delta.io/](https://delta.io/), [https://flink.apache.org/](https://flink.apache.org/), [http://hbase.apache.org/](http://hbase.apache.org/), [https://cwiki.apache.org/confluence/display/Hive/HCatalog](https://cwiki.apache.org/confluence/display/Hive/HCatalog), [http://hadoop.apache.org/docs/current/](http://hadoop.apache.org/docs/current/), [http://hive.apache.org/](http://hive.apache.org/), [https://hudi.apache.org](https://hudi.apache.org), [http://gethue.com/](http://gethue.com/), [https://iceberg.apache.org/](https://iceberg.apache.org/), [https://jupyter-enterprise-gateway.readthedocs.io/en/latest/](https://jupyter-enterprise-gateway.readthedocs.io/en/latest/), [https://jupyterhub.readthedocs.io/en/latest/#](https://jupyterhub.readthedocs.io/en/latest/#), [https://livy.incubator.apache.org/](https://livy.incubator.apache.org/), [http://oozie.apache.org/](http://oozie.apache.org/), [https://phoenix.apache.org/](https://phoenix.apache.org/), [http://pig.apache.org/](http://pig.apache.org/), [https://prestodb.io/](https://prestodb.io/), [https://spark.apache.org/docs/latest/](https://spark.apache.org/docs/latest/), [https://www.tensorflow.org/](https://www.tensorflow.org/), [https://tez.apache.org/](https://tez.apache.org/), [https://trino.io/](https://trino.io/), [https://zeppelin.incubator.apache.org/](https://zeppelin.incubator.apache.org/) y [https://zookeeper.apache.org](https://zookeeper.apache.org).

En la siguiente tabla se enumeran las versiones de la aplicación disponibles en esta versión de Amazon EMR y las versiones de la aplicación en las tres versiones anteriores de Amazon EMR (cuando corresponda).

Para ver un historial completo de las versiones de la aplicación disponibles para cada versión de Amazon EMR, consulte los temas siguientes:
+ [Versiones de las aplicaciones en las versiones 7.x de Amazon EMR](emr-release-app-versions-7.x.md)
+ [Versiones de la aplicación en las versiones 6.x de Amazon EMR](emr-release-app-versions-6.x.md)
+ [Versiones de la aplicación en las versiones 5.x de Amazon EMR](emr-release-app-versions-5.x.md)
+ [Versiones de la aplicación en las versiones 4.x de Amazon EMR](emr-release-app-versions-4.x.md)


**Información sobre la versión de la aplicación**  

|  | emr-7.6.0 | emr-7.5.0 | emr-7.4.0 | emr-7.3.0 | 
| --- | --- | --- | --- | --- | 
| AWS SDK for Java | 2.29.25, 1.12.779 | 2.28.8, 1.12.772 | 2.28.8, 1.12.772 | 2.25.70, 1.12.747 | 
| Python | 3.9, 3.11 | 3.9, 3.11 | 3.9, 3.11 | 3.9, 3.11 | 
| Scala | 2.12.18 | 2.12.18 | 2.12.18 | 2.12.18 | 
| AmazonCloudWatchAgent | 1.300032.2-amzn-0 | 1.300032.2-amzn-0 | 1.300032.2-amzn-0 | 1.300032.2-amzn-0 | 
| Delta | 3.2.1-amzn-1 | 3.2.1-amzn-0 | 3.2.0-amzn-1 | 3.2.0-amzn-0 | 
| Flink | 1.20.0-amzn-0 | 1.19.1-amzn-1 | 1.19.1-amzn-0 | 1.18.1-amzn-2 | 
| Ganglia |  -  |  -  |  -  |  -  | 
| HBase | 2.6.1-amzn-0 | 2.5.10-amzn-0 | 2.5.5-amzn-0 | 2.4.17-amzn-7 | 
| HCatalog | 3.1.3-amzn-15 | 3.1.3-amzn-14 | 3.1.3-amzn-13 | 3.1.3-amzn-12 | 
| Hadoop | 3.4.0-amzn-2 | 3.4.0-amzn-1 | 3.4.0-amzn-0 | 3.3.6-amzn-5 | 
| Hive | 3.1.3-amzn-15 | 3.1.3-amzn-14 | 3.1.3-amzn-13 | 3.1.3-amzn-12 | 
| Hudi | 0.15.0-amzn-3 | 0.15.0-amzn-2 | 0.15.0-amzn-1 | 0.15.0-amzn-0 | 
| Hue | 4.11.0 | 4.11.0 | 4.11.0 | 4.11.0 | 
| Iceberg | 1.6.1-amzn-2 | 1.6.1-amzn-1 | 1.6.1-amzn-0 | 1.5.2-amzn-0 | 
| JupyterEnterpriseGateway | 2.6.0 | 2.6.0 | 2.6.0 | 2.6.0 | 
| JupyterHub | 1.5.0 | 1.5.0 | 1.5.0 | 1.5.0 | 
| Livy | 0.8.0-incubating | 0.8.0-incubating | 0.8.0-incubating | 0.8.0-incubating | 
| MXNet |  -  |  -  |  -  |  -  | 
| Mahout |  -  |  -  |  -  |  -  | 
| Oozie | 5.2.1 | 5.2.1 | 5.2.1 | 5.2.1 | 
| Phoenix | 5.2.0 | 5.2.0 | 5.2.0 | 5.1.3 | 
| Pig | 0.17.0 | 0.17.0 | 0.17.0 | 0.17.0 | 
| Presto | 0.287-amzn-1 | 0.287-amzn-0 | 0.287-amzn-0 | 0.285-amzn-1 | 
| Spark | 3.5.3-amzn-0 | 3.5.2-amzn-1 | 3.5.2-amzn-0 | 3.5.1-amzn-1 | 
| Sqoop |  -  |  -  | 1.4.7 | 1.4.7 | 
| TensorFlow | 2.16.1 | 2.16.1 | 2.16.1 | 2.16.1 | 
| Tez | 0.10.2-amzn-13 | 0.10.2-amzn-12 | 0.10.2-amzn-11 | 0.10.2-amzn-10 | 
| Trino (PrestoSQL) | 457-amzn-0 | 446-amzn-0 | 446-amzn-0 | 442-amzn-0 | 
| Zeppelin | 0.11.1 | 0.11.1 | 0.11.1 | 0.11.1 | 
| ZooKeeper | 3.9.2-amzn-0 | 3.9.2-amzn-0 | 3.9.2-amzn-0 | 3.9.1-amzn-1 | 

# Detalles de los componentes de la versión 7.6.0
<a name="emr-760-release-components-details"></a>

Consulte la siguiente tabla para obtener más información sobre los paquetes *Extras* de Amazon EMR 7.6.0.


| Aplicación | Tipo de aplicación | Package | Tipo de Package | Versión de paquete | 
| --- | --- | --- | --- | --- | 
|  AmazonCloudWatchAgent  |  Core  |  hadoop-hdfs-journalnode  |  Extras  |  3.4.0.amzn.2-1.amzn2023  | 
|  AmazonCloudWatchAgent  |  Core  |  ranger-kms  |  Extras  |  2.0.0-1.amzn2023  | 
|  AmazonCloudWatchAgent  |  Core  |  s3-dist-cp  |  Extras  |  2.36.0-1.amzn2023  | 
|  AmazonCloudWatchAgent  |  Core  |  ZooKeeper  |  Extras  |  3.9.2. amzn.0-1.amzn2023  | 
|  AmazonCloudWatchAgent  |  Core  |  zookeeper-server  |  Extras  |  3.9.2. amzn.0-1.amzn2023  | 
|  Flink  |  Core  |  hadoop-client  |  Extras  |  3.4.0.amzn.2-1.amzn2023  | 
|  Flink  |  Core  |  hadoop-hdfs  |  Extras  |  3.4.0.amzn.2-1.amzn2023  | 
|  Flink  |  Core  |  hadoop-hdfs-datanode  |  Extras  |  3.4.0.amzn.2-1.amzn2023  | 
|  Flink  |  Core  |  hadoop-hdfs-journalnode  |  Extras  |  3.4.0.amzn.2-1.amzn2023  | 
|  Flink  |  Core  |  hadoop-hdfs-namenode  |  Extras  |  3.4.0.amzn.2-1.amzn2023  | 
|  Flink  |  Core  |  hadoop-httpfs  |  Extras  |  3.4.0.amzn.2-1.amzn2023  | 
|  Flink  |  Core  |  hadoop-kms  |  Extras  |  3.4.0.amzn.2-1.amzn2023  | 
|  Flink  |  Core  |  hadoop-mapreduce  |  Extras  |  3.4.0.amzn.2-1.amzn2023  | 
|  Flink  |  Core  |  hadoop-mapreduce-historyserver  |  Extras  |  3.4.0.amzn.2-1.amzn2023  | 
|  Flink  |  Core  |  hadoop-yarn  |  Extras  |  3.4.0.amzn.2-1.amzn2023  | 
|  Flink  |  Core  |  hadoop-yarn-nodemanager  |  Extras  |  3.4.0.amzn.2-1.amzn2023  | 
|  Flink  |  Core  |  hadoop-yarn-proxyserver  |  Extras  |  3.4.0.amzn.2-1.amzn2023  | 
|  Flink  |  Core  |  hadoop-yarn-resourcemanager  |  Extras  |  3.4.0.amzn.2-1.amzn2023  | 
|  Flink  |  Core  |  hadoop-yarn-timelineserver  |  Extras  |  3.4.0.amzn.2-1.amzn2023  | 
|  Flink  |  Core  |  hudi  |  Extras  |  0.15.0.amzn.3-1.amzn2023  | 
|  Flink  |  Core  |  ranger-kms  |  Extras  |  2.0.0-1.amzn2023  | 
|  Flink  |  Core  |  hadoop  |  Extras  |  3.4.0.amzn.2-1.amzn2023  | 
|  HBase  |  Core  |  s3-dist-cp  |  Extras  |  2.36.0-1.amzn2023  | 
|  HCatalog  |  Core  |  hadoop-yarn-proxyserver  |  Extras  |  3.4.0. amzn.2-1.amzn2023  | 
|  HCatalog  |  Core  |  mariadb-connector-java  |  Extras  |    | 
|  Hive  |  Core  |  hadoop-httpfs  |  Extras  |  3.4.0.amzn.2-1.amzn2023  | 
|  Hive  |  Core  |  hadoop-yarn-proxyserver  |  Extras  |  3.4.0.amzn.2-1.amzn2023  | 
|  Hive  |  Core  |  hive-hbase  |  Extras  |  3.1.3. amzn.15-1.amzn2023  | 
|  Hive  |  Core  |  mariadb-connector-java  |  Extras  |  2.7.2-1  | 
|  Hive  |  Core  |  s3-dist-cp  |  Extras  |  2.36.0-1.amzn2023  | 
|  Phoenix  |  Core  |  s3-dist-cp  |  Extras  |  2.36.0-1.amzn2023  | 
|  Spark  |  Core  |  spark-datanucleus  |  Extras  |  3.5.1.amzn.0-1.amzn2023  | 
|  Tez  |  Core  |  hadoop-mapreduce  |  Extras  |  3.4.0. amzn.2-1.amzn2023  | 
|  Tez  |  Core  |  hadoop-mapreduce-historyserver  |  Extras  |  3.4.0.amzn.2-1.amzn2023  | 
|  Tez  |  Core  |  hadoop-yarn-proxyserver  |  Extras  |  3.4.0.amzn.2-1.amzn2023  | 
|  Trino  |  Core  |  bigtop-utils  |  Extras  |  1.2.0-1.amzn2023  | 
|  Trino  |  Core  |  hadoop-client  |  Extras  |  3.4.0.amzn.2-1.amzn2023  | 
|  Trino  |  Core  |  hadoop-hdfs  |  Extras  |  3.4.0.amzn.2-1.amzn2023  | 
|  Trino  |  Core  |  hadoop-hdfs-datanode  |  Extras  |  3.4.0.amzn.2-1.amzn2023  | 
|  Trino  |  Core  |  hadoop-hdfs-journalnode  |  Extras  |  3.4.0.amzn.2-1.amzn2023  | 
|  Trino  |  Core  |  hadoop-hdfs-namenode  |  Extras  |  3.4.0.amzn.2-1.amzn2023  | 
|  Trino  |  Core  |  hadoop-kms  |  Extras  |  3.4.0.amzn.2-1.amzn2023  | 
|  Trino  |  Core  |  hadoop-mapreduce  |  Extras  |  3.4.0.amzn.2-1.amzn2023  | 
|  Trino  |  Core  |  hadoop-mapreduce-historyserver  |  Extras  |  3.4.0.amzn.2-1.amzn2023  | 
|  Trino  |  Core  |  hadoop-yarn  |  Extras  |  3.4.0.amzn.2-1.amzn2023  | 
|  Trino  |  Core  |  hadoop-yarn-nodemanager  |  Extras  |  3.4.0.amzn.2-1.amzn2023  | 
|  Trino  |  Core  |  hadoop-yarn-proxyserver  |  Extras  |  3.4.0.amzn.2-1.amzn2023  | 
|  Trino  |  Core  |  hadoop-yarn-resourcemanager  |  Extras  |  3.4.0.amzn.2-1.amzn2023  | 
|  Trino  |  Core  |  hadoop-yarn-timelineserver  |  Extras  |  3.4.0.amzn.2-1.amzn2023  | 
|  Trino  |  Core  |  hive  |  Extras  |  3.1.3.amzn.12-1.amzn2023  | 
|  Trino  |  Core  |  hive-hcatalog-server  |  Extras  |  3.1.3.amzn.12-1.amzn2023  | 
|  Trino  |  Core  |  mariadb-connector-java  |  Extras  |  2.7.2-1  | 
|  Trino  |  Core  |  ranger-kms  |  Extras  |  2.0.0-1.amzn2023  | 
|  Trino  |  Core  |  ZooKeeper  |  Extras  |  3.9.2. amzn.0-1.amzn2023  | 
|  Trino  |  Core  |  zookeeper-server  |  Extras  |  3.9.2. amzn.0-1.amzn2023  | 
|  Trino  |  Core  |  bigtop-groovy  |  Extras  |  2.5.4-1.amzn2023  | 
|  Trino  |  Core  |  bigtop-jsvc  |  Extras  |  1.2.4-1.amzn2023  | 
|  Trino  |  Core  |  hadoop  |  Extras  |  3.4.0.amzn.2-1.amzn2023  | 
|  Trino  |  Core  |  hadoop-lzo  |  Extras  |  0.4.19-1.amzn2023  | 
|  Trino  |  Core  |  hive-hcatalog  |  Extras  |  3.1.3. amzn.15-1.amzn2023  | 
|  Trino  |  Core  |  hive-jdbc  |  Extras  |  3.1.3.amzn.12-1.amzn2023  | 
|  ZooKeeper  |  Core  |  emrfs  |  Extras  |  3.9.2. amzn.0-1.amzn2023  | 
|  ZooKeeper  |  Core  |  hadoop-client  |  Extras  |  3.9.2. amzn.0-1.amzn2023  | 
|  ZooKeeper  |  Core  |  hadoop-hdfs  |  Extras  |  3.9.2. amzn.0-1.amzn2023  | 
|  ZooKeeper  |  Core  |  hadoop-hdfs-datanode  |  Extras  |  3.9.2. amzn.0-1.amzn2023  | 
|  ZooKeeper  |  Core  |  hadoop-hdfs-journalnode  |  Extras  |  3.9.2. amzn.0-1.amzn2023  | 
|  ZooKeeper  |  Core  |  hadoop-hdfs-namenode  |  Extras  |  3.9.2. amzn.0-1.amzn2023  | 
|  ZooKeeper  |  Core  |  hadoop-httpfs  |  Extras  |  3.9.2. amzn.0-1.amzn2023  | 
|  ZooKeeper  |  Core  |  hadoop-kms  |  Extras  |  3.9.2. amzn.0-1.amzn2023  | 
|  ZooKeeper  |  Core  |  hadoop-mapreduce  |  Extras  |  3.4.0.amzn.2-1.amzn2023  | 
|  ZooKeeper  |  Core  |  hadoop-mapreduce-historyserver  |  Extras  |  3.4.0.amzn.2-1.amzn2023  | 
|  ZooKeeper  |  Core  |  hadoop-yarn  |  Extras  |  3.4.0.amzn.2-1.amzn2023  | 
|  ZooKeeper  |  Core  |  hadoop-yarn-nodemanager  |  Extras  |  3.4.0.amzn.2-1.amzn2023  | 
|  ZooKeeper  |  Core  |  hadoop-yarn-proxyserver  |  Extras  |  3.4.0.amzn.2-1.amzn2023  | 
|  ZooKeeper  |  Core  |  hadoop-yarn-resourcemanager  |  Extras  |  3.4.0.amzn.2-1.amzn2023  | 
|  ZooKeeper  |  Core  |  hadoop-yarn-timelineserver  |  Extras  |  3.4.0.amzn.2-1.amzn2023  | 
|  ZooKeeper  |  Core  |  ranger-kms  |  Extras  |  2.0.0-1.amzn2023  | 

# 7.6.0 vulnerabilidades y exposiciones comunes
<a name="760-common-vulnerabilities-exposures"></a>

La siguiente tabla muestra todo lo CVEs que no afecta a los clústeres de EMR que se ejecutan en las configuraciones recomendadas de Amazon EMR 7.6.0. Amazon EMR depende del código abierto original para la disponibilidad de las correcciones y proporcionará la última versión estable como parte de los componentes del motor principal en un plazo de 90 días a partir de su verificación por parte de Amazon EMR.

Esta tabla se actualizó el 9 de enero de 2025.


| ID de CVE | Gravedad | URL de detalles del CVE | 
| --- | --- | --- | 
|  CVE-2013-7285  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2013-7285)-2013-7285  | 
|  CVE-2015-1832  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2015-1832](https://nvd.nist.gov/vuln/detail/CVE-2015-1832)  | 
|  CVE-2016-5018  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2016-5018)-2016-5018  | 
|  CVE-2017-15095  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2017-15095)-2017-15095  | 
|  CVE-2017-17485  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2017-17485](https://nvd.nist.gov/vuln/detail/CVE-2017-17485)  | 
|  CVE-2017-7525  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2017-7525)-2017-7525  | 
|  CVE-2018-11307  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2018-11307](https://nvd.nist.gov/vuln/detail/CVE-2018-11307)  | 
|  CVE-2018-14718  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-14718)-2018-14718  | 
|  CVE-2018-14719  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-14719)-2018-14719  | 
|  CVE-2018-14720  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-14720)-2018-14720  | 
|  CVE-2018-14721  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-14721)-2018-14721  | 
|  CVE-2018-19360  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2018-19360](https://nvd.nist.gov/vuln/detail/CVE-2018-19360)  | 
|  CVE-2018-19361  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2018-19361](https://nvd.nist.gov/vuln/detail/CVE-2018-19361)  | 
|  CVE-2018-19362  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2018-19362](https://nvd.nist.gov/vuln/detail/CVE-2018-19362)  | 
|  CVE-2018-7489  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2018-7489](https://nvd.nist.gov/vuln/detail/CVE-2018-7489)  | 
|  CVE-2019-10173  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2019-10173](https://nvd.nist.gov/vuln/detail/CVE-2019-10173)  | 
|  CVE-2019-10202  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2019-10202](https://nvd.nist.gov/vuln/detail/CVE-2019-10202)  | 
|  CVE-2019-14379  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2019-14379](https://nvd.nist.gov/vuln/detail/CVE-2019-14379)  | 
|  CVE-2019-14540  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-14540)-2019-14540  | 
|  CVE-2019-14892  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-14892)-2019-14892  | 
|  CVE-2019-14893  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-14893)-2019-14893  | 
|  CVE-2019-16335  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2019-16335](https://nvd.nist.gov/vuln/detail/CVE-2019-16335)  | 
|  CVE-2019-16942  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-16942)-2019-16942  | 
|  CVE-2019-16943  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-16943)-2019-16943  | 
|  CVE-2019-17267  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2019-17267](https://nvd.nist.gov/vuln/detail/CVE-2019-17267)  | 
|  CVE-2019-17531  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-17531)-2019-17531  | 
|  CVE-2019-20330  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2019-20330](https://nvd.nist.gov/vuln/detail/CVE-2019-20330)  | 
|  CVE-2019-20444  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2019-20444](https://nvd.nist.gov/vuln/detail/CVE-2019-20444)  | 
|  CVE-2019-20445  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2019-20445](https://nvd.nist.gov/vuln/detail/CVE-2019-20445)  | 
|  CVE-2020-8840  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-8840](https://nvd.nist.gov/vuln/detail/CVE-2020-8840)  | 
|  CVE-2020-9546  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-9546](https://nvd.nist.gov/vuln/detail/CVE-2020-9546)  | 
|  CVE-2020-9547  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-9547](https://nvd.nist.gov/vuln/detail/CVE-2020-9547)  | 
|  CVE-2020-9548  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-9548](https://nvd.nist.gov/vuln/detail/CVE-2020-9548)  | 
|  CVE-2021-21342  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2021-21342](https://nvd.nist.gov/vuln/detail/CVE-2021-21342)  | 
|  CVE-2021-21344  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2021-21344](https://nvd.nist.gov/vuln/detail/CVE-2021-21344)  | 
|  CVE-2021-21345  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2021-21345](https://nvd.nist.gov/vuln/detail/CVE-2021-21345)  | 
|  CVE-2021-21346  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2021-21346](https://nvd.nist.gov/vuln/detail/CVE-2021-21346)  | 
|  CVE-2021-21347  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2021-21347](https://nvd.nist.gov/vuln/detail/CVE-2021-21347)  | 
|  CVE-2021-21350  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2021-21350](https://nvd.nist.gov/vuln/detail/CVE-2021-21350)  | 
|  CVE-2021-21351  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2021-21351](https://nvd.nist.gov/vuln/detail/CVE-2021-21351)  | 
|  CVE-2021-41411  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2021-41411](https://nvd.nist.gov/vuln/detail/CVE-2021-41411)  | 
|  CVE-2022-1471  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2022-1471](https://nvd.nist.gov/vuln/detail/CVE-2022-1471)  | 
|  CVE-2022-37865  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-202237865](https://nvd.nist.gov/vuln/detail/CVE-2022-37865)  | 
|  CVE-2022-39135  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-202239135](https://nvd.nist.gov/vuln/detail/CVE-2022-39135)  | 
|  CVE-2022-42889  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-202242889](https://nvd.nist.gov/vuln/detail/CVE-2022-42889)  | 
|  CVE-2022-46337  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-202246337](https://nvd.nist.gov/vuln/detail/CVE-2022-46337)  | 
|  CVE-2024-47561  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-47561](https://nvd.nist.gov/vuln/detail/CVE-2024-47561)  | 
|  CVE-2024-52046  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-52046](https://nvd.nist.gov/vuln/detail/CVE-2024-52046)  | 
|  CVE-2024-53990  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-53990](https://nvd.nist.gov/vuln/detail/CVE-2024-53990)  | 
|  CVE-2012-0881  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2012-0881](https://nvd.nist.gov/vuln/detail/CVE-2012-0881)  | 
|  CVE-2013-4002  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2013-4002)-2013-4002  | 
|  CVE-2014-8125  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2014-8125](https://nvd.nist.gov/vuln/detail/CVE-2014-8125)  | 
|  CVE-2015-5237  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2015-5237)-2015-5237  | 
|  CVE-2016-3674  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2016-3674)-2016-3674  | 
|  CVE-2016-6796  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2016-6796)-2016-6796  | 
|  CVE-2017-7957  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2017-7957)-2017-7957  | 
|  CVE-2018-1000180  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2018-1000180](https://nvd.nist.gov/vuln/detail/CVE-2018-1000180)  | 
|  CVE-2018-12022  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2018-12022](https://nvd.nist.gov/vuln/detail/CVE-2018-12022)  | 
|  CVE-2018-12023  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2018-12023](https://nvd.nist.gov/vuln/detail/CVE-2018-12023)  | 
|  CVE-2018-5968  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-5968)-2018-5968  | 
|  CVE-2019-0205  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2019-0205](https://nvd.nist.gov/vuln/detail/CVE-2019-0205)  | 
|  CVE-2019-10172  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2019-10172](https://nvd.nist.gov/vuln/detail/CVE-2019-10172)  | 
|  CVE-2019-12086  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-12086)-2019-12086  | 
|  CVE-2019-14439  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-14439)-2019-14439  | 
|  CVE-2020-10650  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-10650](https://nvd.nist.gov/vuln/detail/CVE-2020-10650)  | 
|  CVE-2020-10672  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-10672](https://nvd.nist.gov/vuln/detail/CVE-2020-10672)  | 
|  CVE-2020-10673  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-10673](https://nvd.nist.gov/vuln/detail/CVE-2020-10673)  | 
|  CVE-2020-10968  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-10968)-2020-10968  | 
|  CVE-2020-10969  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-10969)-2020-10969  | 
|  CVE-2020-11111  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-11111](https://nvd.nist.gov/vuln/detail/CVE-2020-11111)  | 
|  CVE-2020-11112  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-11112](https://nvd.nist.gov/vuln/detail/CVE-2020-11112)  | 
|  CVE-2020-11113  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-11113](https://nvd.nist.gov/vuln/detail/CVE-2020-11113)  | 
|  CVE-2020-11619  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-11619)-2020-11619  | 
|  CVE-2020-11620  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-11620](https://nvd.nist.gov/vuln/detail/CVE-2020-11620)  | 
|  CVE-2020-13936  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-13936)-2020-13936  | 
|  CVE-2020-13949  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-13949)-2020-13949  | 
|  CVE-2020-14060  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-14060)-2020-14060  | 
|  CVE-2020-14061  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-14061)-2020-14061  | 
|  CVE-2020-14062  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-14062)-2020-14062  | 
|  CVE-2020-14195  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-14195](https://nvd.nist.gov/vuln/detail/CVE-2020-14195)  | 
|  CVE-2020-24616  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-24616](https://nvd.nist.gov/vuln/detail/CVE-2020-24616)  | 
|  CVE-2020-24750  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-24750](https://nvd.nist.gov/vuln/detail/CVE-2020-24750)  | 
|  CVE-2020-25649  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-25649](https://nvd.nist.gov/vuln/detail/CVE-2020-25649)  | 
|  CVE-2020-26217  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-26217](https://nvd.nist.gov/vuln/detail/CVE-2020-26217)  | 
|  CVE-2020-26258  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-26258](https://nvd.nist.gov/vuln/detail/CVE-2020-26258)  | 
|  CVE-2020-28052  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-28052](https://nvd.nist.gov/vuln/detail/CVE-2020-28052)  | 
|  CVE-2020-35490  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-35490](https://nvd.nist.gov/vuln/detail/CVE-2020-35490)  | 
|  CVE-2020-35491  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-35491](https://nvd.nist.gov/vuln/detail/CVE-2020-35491)  | 
|  CVE-2020-35728  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-35728](https://nvd.nist.gov/vuln/detail/CVE-2020-35728)  | 
|  CVE-2020-36179  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36179](https://nvd.nist.gov/vuln/detail/CVE-2020-36179)  | 
|  CVE-2020-36180  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36180](https://nvd.nist.gov/vuln/detail/CVE-2020-36180)  | 
|  CVE-2020-36181  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36181](https://nvd.nist.gov/vuln/detail/CVE-2020-36181)  | 
|  CVE-2020-36182  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36182](https://nvd.nist.gov/vuln/detail/CVE-2020-36182)  | 
|  CVE-2020-36183  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36183](https://nvd.nist.gov/vuln/detail/CVE-2020-36183)  | 
|  CVE-2020-36184  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36184](https://nvd.nist.gov/vuln/detail/CVE-2020-36184)  | 
|  CVE-2020-36185  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36185](https://nvd.nist.gov/vuln/detail/CVE-2020-36185)  | 
|  CVE-2020-36186  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36186](https://nvd.nist.gov/vuln/detail/CVE-2020-36186)  | 
|  CVE-2020-36187  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36187](https://nvd.nist.gov/vuln/detail/CVE-2020-36187)  | 
|  CVE-2020-36188  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36188](https://nvd.nist.gov/vuln/detail/CVE-2020-36188)  | 
|  CVE-2020-36189  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36189](https://nvd.nist.gov/vuln/detail/CVE-2020-36189)  | 
|  CVE-2020-36518  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36518](https://nvd.nist.gov/vuln/detail/CVE-2020-36518)  | 
|  CVE-2021-20190  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2021-20190](https://nvd.nist.gov/vuln/detail/CVE-2021-20190)  | 
|  CVE-2021-21341  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2021-21341](https://nvd.nist.gov/vuln/detail/CVE-2021-21341)  | 
|  CVE-2021-21343  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2021-21343](https://nvd.nist.gov/vuln/detail/CVE-2021-21343)  | 
|  CVE-2021-21348  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2021-21348](https://nvd.nist.gov/vuln/detail/CVE-2021-21348)  | 
|  CVE-2021-21349  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2021-21349](https://nvd.nist.gov/vuln/detail/CVE-2021-21349)  | 
|  CVE-2021-29505  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2021-29505](https://nvd.nist.gov/vuln/detail/CVE-2021-29505)  | 
|  CVE-2021-31684  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2021-31684](https://nvd.nist.gov/vuln/detail/CVE-2021-31684)  | 
|  CVE-2021-34538  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2021-34538](https://nvd.nist.gov/vuln/detail/CVE-2021-34538)  | 
|  CVE-2021-37136  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2021-37136](https://nvd.nist.gov/vuln/detail/CVE-2021-37136)  | 
|  CVE-2021-39139  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2021-39139](https://nvd.nist.gov/vuln/detail/CVE-2021-39139)  | 
|  CVE-2021-39141  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2021-39141](https://nvd.nist.gov/vuln/detail/CVE-2021-39141)  | 
|  CVE-2021-39144  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2021-39144](https://nvd.nist.gov/vuln/detail/CVE-2021-39144)  | 
|  CVE-2021-39145  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2021-39145](https://nvd.nist.gov/vuln/detail/CVE-2021-39145)  | 
|  CVE-2021-39146  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2021-39146](https://nvd.nist.gov/vuln/detail/CVE-2021-39146)  | 
|  CVE-2021-39147  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2021-39147](https://nvd.nist.gov/vuln/detail/CVE-2021-39147)  | 
|  CVE-2021-39148  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2021-39148](https://nvd.nist.gov/vuln/detail/CVE-2021-39148)  | 
|  CVE-2021-39149  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2021-39149](https://nvd.nist.gov/vuln/detail/CVE-2021-39149)  | 
|  CVE-2021-39150  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2021-39150](https://nvd.nist.gov/vuln/detail/CVE-2021-39150)  | 
|  CVE-2021-39151  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2021-39151](https://nvd.nist.gov/vuln/detail/CVE-2021-39151)  | 
|  CVE-2021-39152  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2021-39152](https://nvd.nist.gov/vuln/detail/CVE-2021-39152)  | 
|  CVE-2021-39153  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2021-39153](https://nvd.nist.gov/vuln/detail/CVE-2021-39153)  | 
|  CVE-2021-39154  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2021-39154](https://nvd.nist.gov/vuln/detail/CVE-2021-39154)  | 
|  CVE-2021-43859  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2021-43859](https://nvd.nist.gov/vuln/detail/CVE-2021-43859)  | 
|  CVE-2022-1415  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2022-1415](https://nvd.nist.gov/vuln/detail/CVE-2022-1415)  | 
|  CVE-2022-25647  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-202225647](https://nvd.nist.gov/vuln/detail/CVE-2022-25647)  | 
|  CVE-2022-25857  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-202225857](https://nvd.nist.gov/vuln/detail/CVE-2022-25857)  | 
|  CVE-2022-3171  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2022-3171](https://nvd.nist.gov/vuln/detail/CVE-2022-3171)  | 
|  CVE-2022-3509  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2022-3509](https://nvd.nist.gov/vuln/detail/CVE-2022-3509)  | 
|  CVE-2022-3510  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-20223510](https://nvd.nist.gov/vuln/detail/CVE-2022-3510)  | 
|  CVE-2022-36364  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-202236364](https://nvd.nist.gov/vuln/detail/CVE-2022-36364)  | 
|  CVE-2022-37866  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-202237866](https://nvd.nist.gov/vuln/detail/CVE-2022-37866)  | 
|  CVE-2022-40149  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-202240149](https://nvd.nist.gov/vuln/detail/CVE-2022-40149)  | 
|  CVE-2022-40150  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-202240150](https://nvd.nist.gov/vuln/detail/CVE-2022-40150)  | 
|  CVE-202240151  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-202240151](https://nvd.nist.gov/vuln/detail/CVE-2022-40151)  | 
|  CVE-2022-40152  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-202240152](https://nvd.nist.gov/vuln/detail/CVE-2022-40152)  | 
|  CVE-2022-41966  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2022-41966](https://nvd.nist.gov/vuln/detail/CVE-2022-41966)  | 
|  CVE-2022-42003  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2022-42003](https://nvd.nist.gov/vuln/detail/CVE-2022-42003)  | 
|  CVE-2022-42004  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2022-42004](https://nvd.nist.gov/vuln/detail/CVE-2022-42004)  | 
|  CVE-2022-45685  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-202245685](https://nvd.nist.gov/vuln/detail/CVE-2022-45685)  | 
|  CVE-2022-45688  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-45688)-202245688  | 
|  CVE-2022-45693  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-202245693](https://nvd.nist.gov/vuln/detail/CVE-2022-45693)  | 
|  CVE-2022-46751  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-202246751](https://nvd.nist.gov/vuln/detail/CVE-2022-46751)  | 
|  CVE-2023-1370  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-1370](https://nvd.nist.gov/vuln/detail/CVE-2023-1370)  | 
|  CVE-2023-1436  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-1436](https://nvd.nist.gov/vuln/detail/CVE-2023-1436)  | 
|  CVE-2023-20883  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-20883](https://nvd.nist.gov/vuln/detail/CVE-2023-20883)  | 
|  CVE-2023-25194  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-25194](https://nvd.nist.gov/vuln/detail/CVE-2023-25194)  | 
|  CVE-2023-2976  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-2976](https://nvd.nist.gov/vuln/detail/CVE-2023-2976)  | 
|  CVE-2023-34453  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-34453](https://nvd.nist.gov/vuln/detail/CVE-2023-34453)  | 
|  CVE-2023-34454  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-34454](https://nvd.nist.gov/vuln/detail/CVE-2023-34454)  | 
|  CVE-2023-34455  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-34455](https://nvd.nist.gov/vuln/detail/CVE-2023-34455)  | 
|  CVE-2023-3635  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-3635](https://nvd.nist.gov/vuln/detail/CVE-2023-3635)  | 
|  CVE-2023-39410  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-39410](https://nvd.nist.gov/vuln/detail/CVE-2023-39410)  | 
|  CVE-2023-43642  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-43642](https://nvd.nist.gov/vuln/detail/CVE-2023-43642)  | 
|  CVE-2023-44487  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-44487](https://nvd.nist.gov/vuln/detail/CVE-2023-44487)  | 
|  CVE-2023-50387  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-50387](https://nvd.nist.gov/vuln/detail/CVE-2023-50387)  | 
|  CVE-2023-5072  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-5072](https://nvd.nist.gov/vuln/detail/CVE-2023-5072)  | 
|  CVE-2023-52428  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-52428](https://nvd.nist.gov/vuln/detail/CVE-2023-52428)  | 
|  CVE-2023-6378  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-6378](https://nvd.nist.gov/vuln/detail/CVE-2023-6378)  | 
|  CVE-2023-6481  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-6481](https://nvd.nist.gov/vuln/detail/CVE-2023-6481)  | 
|  CVE-2024-21634  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-21634](https://nvd.nist.gov/vuln/detail/CVE-2024-21634)  | 
|  CVE-2024-7254  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-7254](https://nvd.nist.gov/vuln/detail/CVE-2024-7254)  | 
|  CVE-2009-2625  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2009-2625)-2009-2625  | 
|  CVE-2012-5783  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2012-5783](https://nvd.nist.gov/vuln/detail/CVE-2012-5783)  | 
|  CVE-2012-6153  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2012-6153](https://nvd.nist.gov/vuln/detail/CVE-2012-6153)  | 
|  CVE-2017-10355  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2017-10355](https://nvd.nist.gov/vuln/detail/CVE-2017-10355)  | 
|  CVE-2018-10237  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2018-10237](https://nvd.nist.gov/vuln/detail/CVE-2018-10237)  | 
|  CVE-2018-11798  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2018-11798](https://nvd.nist.gov/vuln/detail/CVE-2018-11798)  | 
|  CVE-2018-1313  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2018-1313](https://nvd.nist.gov/vuln/detail/CVE-2018-1313)  | 
|  CVE-2018-2799  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-2799)-2018-2799  | 
|  CVE-2019-10219  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2019-10219](https://nvd.nist.gov/vuln/detail/CVE-2019-10219)  | 
|  CVE-2019-12384  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-12384)-2019-12384  | 
|  CVE-2019-12814  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-12814)-2019-12814  | 
|  CVE-2020-10693  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-10693](https://nvd.nist.gov/vuln/detail/CVE-2020-10693)  | 
|  CVE-2020-13955  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-13955)-2020-13955  | 
|  CVE-2020-13956  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-13956)-2020-13956  | 
|  CVE-2020-14338  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-14338](https://nvd.nist.gov/vuln/detail/CVE-2020-14338)  | 
|  CVE-2020-15250  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-15250](https://nvd.nist.gov/vuln/detail/CVE-2020-15250)  | 
|  CVE-2020-15522  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-15522)-2020-15522  | 
|  CVE-2020-17521  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-17521)-2020-17521  | 
|  CVE-2020-1945  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-1945](https://nvd.nist.gov/vuln/detail/CVE-2020-1945)  | 
|  CVE-2020-26939  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-26939](https://nvd.nist.gov/vuln/detail/CVE-2020-26939)  | 
|  CVE-2020-29582  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-29582](https://nvd.nist.gov/vuln/detail/CVE-2020-29582)  | 
|  CVE-2021-21290  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2021-21290](https://nvd.nist.gov/vuln/detail/CVE-2021-21290)  | 
|  CVE-2021-21295  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2021-21295](https://nvd.nist.gov/vuln/detail/CVE-2021-21295)  | 
|  CVE-2021-22569  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2021-22569](https://nvd.nist.gov/vuln/detail/CVE-2021-22569)  | 
|  CVE-2021-22570  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2021-22570](https://nvd.nist.gov/vuln/detail/CVE-2021-22570)  | 
|  CVE-2021-27568  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2021-27568](https://nvd.nist.gov/vuln/detail/CVE-2021-27568)  | 
|  CVE-2021-28170  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2021-28170](https://nvd.nist.gov/vuln/detail/CVE-2021-28170)  | 
|  CVE-2021-29425  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2021-29425](https://nvd.nist.gov/vuln/detail/CVE-2021-29425)  | 
|  CVE-2021-36373  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2021-36373](https://nvd.nist.gov/vuln/detail/CVE-2021-36373)  | 
|  CVE-2021-36374  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2021-36374](https://nvd.nist.gov/vuln/detail/CVE-2021-36374)  | 
|  CVE-2021-37533  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2021-37533](https://nvd.nist.gov/vuln/detail/CVE-2021-37533)  | 
|  CVE-2021-38153  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2021-38153](https://nvd.nist.gov/vuln/detail/CVE-2021-38153)  | 
|  CVE-202223437  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-202223437](https://nvd.nist.gov/vuln/detail/CVE-2022-23437)  | 
|  CVE-202224329  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-202224329](https://nvd.nist.gov/vuln/detail/CVE-2022-24329)  | 
|  CVE-202238749  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-202238749](https://nvd.nist.gov/vuln/detail/CVE-2022-38749)  | 
|  CVE-202238750  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-202238750](https://nvd.nist.gov/vuln/detail/CVE-2022-38750)  | 
|  CVE-202238751  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-202238751](https://nvd.nist.gov/vuln/detail/CVE-2022-38751)  | 
|  CVE-202238752  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-202238752](https://nvd.nist.gov/vuln/detail/CVE-2022-38752)  | 
|  CVE-2022-41854  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-41854)-2022-41854  | 
|  CVE-2023-0833  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-0833](https://nvd.nist.gov/vuln/detail/CVE-2023-0833)  | 
|  CVE-2023-20863  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-20863](https://nvd.nist.gov/vuln/detail/CVE-2023-20863)  | 
|  CVE-2023-26049  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-26049](https://nvd.nist.gov/vuln/detail/CVE-2023-26049)  | 
|  CVE-2023-33201  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-33201](https://nvd.nist.gov/vuln/detail/CVE-2023-33201)  | 
|  CVE-2023-33202  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-33202](https://nvd.nist.gov/vuln/detail/CVE-2023-33202)  | 
|  CVE-2023-34462  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-34462](https://nvd.nist.gov/vuln/detail/CVE-2023-34462)  | 
|  CVE-2023-42503  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-42503](https://nvd.nist.gov/vuln/detail/CVE-2023-42503)  | 
|  CVE-2023-51074  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-51074](https://nvd.nist.gov/vuln/detail/CVE-2023-51074)  | 
|  CVE-2024-12798  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-12798](https://nvd.nist.gov/vuln/detail/CVE-2024-12798)  | 
|  CVE-2024-25710  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-25710](https://nvd.nist.gov/vuln/detail/CVE-2024-25710)  | 
|  CVE-2024-26308  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-26308](https://nvd.nist.gov/vuln/detail/CVE-2024-26308)  | 
|  CVE-2024-38820  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-38820](https://nvd.nist.gov/vuln/detail/CVE-2024-38820)  | 
|  CVE-2024-6763  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-6763](https://nvd.nist.gov/vuln/detail/CVE-2024-6763)  | 
|  CVE-2024-8184  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-8184](https://nvd.nist.gov/vuln/detail/CVE-2024-8184)  | 
|  CVE-2020-8908  |  BAJA  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-8908](https://nvd.nist.gov/vuln/detail/CVE-2020-8908)  | 
|  CVE-2024-12801  |  BAJA  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-12801](https://nvd.nist.gov/vuln/detail/CVE-2024-12801)  | 
|  CVE-2023-50868  |  SIN CLASIFICAR  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-50868](https://nvd.nist.gov/vuln/detail/CVE-2023-50868)  | 
|  CVE-2024-23454  |  SIN CLASIFICAR  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-23454](https://nvd.nist.gov/vuln/detail/CVE-2024-23454)  | 
|  CVE-2024-23944  |  SIN CLASIFICAR  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-23944](https://nvd.nist.gov/vuln/detail/CVE-2024-23944)  | 
|  CVE-2024-23945  |  SIN CLASIFICAR  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-23945](https://nvd.nist.gov/vuln/detail/CVE-2024-23945)  | 
|  CVE-2024-25638  |  SIN CLASIFICAR  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-25638](https://nvd.nist.gov/vuln/detail/CVE-2024-25638)  | 
|  CVE-2024-29025  |  SIN CLASIFICAR  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-29025](https://nvd.nist.gov/vuln/detail/CVE-2024-29025)  | 
|  CVE-2024-29131  |  SIN CLASIFICAR  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-29131](https://nvd.nist.gov/vuln/detail/CVE-2024-29131)  | 
|  CVE-2024-29133  |  SIN CLASIFICAR  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-29133](https://nvd.nist.gov/vuln/detail/CVE-2024-29133)  | 
|  CVE-2024-29857  |  SIN CLASIFICAR  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-29857](https://nvd.nist.gov/vuln/detail/CVE-2024-29857)  | 
|  CVE-2024-30171  |  SIN CLASIFICAR  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-30171](https://nvd.nist.gov/vuln/detail/CVE-2024-30171)  | 
|  CVE-2024-31141  |  SIN CLASIFICAR  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-31141](https://nvd.nist.gov/vuln/detail/CVE-2024-31141)  | 
|  CVE-2024-36114  |  SIN CLASIFICAR  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-36114](https://nvd.nist.gov/vuln/detail/CVE-2024-36114)  | 
|  CVE-2024-38808  |  SIN CLASIFICAR  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-38808](https://nvd.nist.gov/vuln/detail/CVE-2024-38808)  | 
|  CVE-2024-43382  |  SIN CLASIFICAR  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-43382](https://nvd.nist.gov/vuln/detail/CVE-2024-43382)  | 
|  CVE-2024-47072  |  SIN CLASIFICAR  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-47072](https://nvd.nist.gov/vuln/detail/CVE-2024-47072)  | 
|  CVE-2024-47535  |  SIN CLASIFICAR  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-47535](https://nvd.nist.gov/vuln/detail/CVE-2024-47535)  | 
|  CVE-2024-47554  |  SIN CLASIFICAR  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-47554](https://nvd.nist.gov/vuln/detail/CVE-2024-47554)  | 
|  CVE-2024-51504  |  SIN CLASIFICAR  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-51504](https://nvd.nist.gov/vuln/detail/CVE-2024-51504)  | 
|  CVE-2024-56128  |  SIN CLASIFICAR  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-56128](https://nvd.nist.gov/vuln/detail/CVE-2024-56128)  | 
|  CVE-2024-9823  |  SIN CLASIFICAR  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-9823](https://nvd.nist.gov/vuln/detail/CVE-2024-9823)  | 

## Notas de la versión 7.6.0
<a name="emr-760-relnotes"></a>

Las siguientes notas de la versión incluyen información sobre la versión 7.6.0 de Amazon EMR.

**Nuevas características**
+ **Actualizaciones de la aplicación**: Amazon EMR 7.6.0 application upgrades include HBase 2.6.1, Flink 1.20.0, Spark 3.5.3, and Trino 457.

**Problemas conocidos**
+ **Cuando el escalado gestionado está activado, el YARN ResourceManager (RM) sufre un grave problema de bloqueo que hace que deje de responder al pasar del estado de desmantelamiento al de **desmantelamiento** con operaciones simultáneas.** Esto sucede especialmente en entornos con clústeres de gran tamaño. Cuando esto ocurre, tanto las transiciones entre el estado del nodo como las transiciones entre el estado de la aplicación y el estado de la aplicación no se procesan, lo que paraliza la funcionalidad principal del. ResourceManager Como solución alternativa, reinicie la JVM del RM con el siguiente comando en el nodo principal:

  ```
  sudo systemctl restart hadoop-yarn-resourcemanager
  ```
+ Cuando se inicia un clúster de EMR con programadores YARN distintos del `CapacityScheduler` o `FairScheduler` (por ejemplo, el programador FIFO), la `YARNMemoryAvailablePercentage` métrica no se transfiere a. CloudWatch Este problema afecta la reducción de capacidad en clústeres con escalado administrado habilitado. También puede afectar un escalado administrado personalizado si depende de la métrica `YARNMemoryAvailablePercentage`. Como solución alternativa, utilice `CapacityScheduler` o `FairScheduler`.
+  **HBase creación de tablas en el catálogo Hive with Glue**: desde EMR-7.3.0 hasta EMR-7.10.0, hay un error debido a la integración de Hive Iceberg, que hace que la HBase creación de tablas en Hive falle cuando se utiliza Glue Data Catalog como metaalmacén. Ponte en contacto con el equipo de soporte si tienes este problema. AWS 
+  **IU de Tez**: de EMR-7.3 a EMR-7.10, hay un error que hace que el acceso a la IU de Tez a través de la interfaz de usuario web de YARN Resource Manager falle cuando se habilita el cifrado en tránsito. Esto ocurre porque el proxy YARN intenta usar el protocolo HTTP, mientras que la interfaz de usuario de Tez requiere HTTPS. Modifique la `tez.tez-ui.history-url.base` configuración en `tez-site` de `http` a `https` para resolver este problema.

**Cambios, mejoras y problemas resueltos**
+ A partir de EMR 7.6.0, el proceso de cancelación de pasos garantiza que todas las aplicaciones de Hadoop YARN creadas por un paso se finalicen cuando ese paso se cancela. Esto permite una limpieza más fiable para aplicaciones como los trabajos de Spark que se ejecutan en modo clúster.
+  A partir de Spark 3.3.1 (compatible con las versiones 6.10 y posteriores de EMR), todos los ejecutores de un host de desmantelamiento pasan a un nuevo `ExecutorState`, denominado *estado de RETIRADA*. Yarn no puede utilizar los ejecutores que se están retirando para asignar tareas y, por lo tanto, solicitará nuevos ejecutores, si es necesario, para las tareas que se están ejecutando. Por lo tanto, si deshabilita Spark DRA mientras usa EMR Managed Scaling, EMR Auto Scaling o cualquier mecanismo de escalado personalizado en los clústeres de EMR-EC2, Yarn puede solicitar el máximo de ejecutores permitidos para cada trabajo. Para evitar este problema, deje la propiedad `spark.dynamicAllocation.enabled` establecida en `TRUE` (que es la predeterminada) cuando utilice la combinación de características anterior. Además, también puede establecer restricciones de ejecutor mínimas y máximas si configura valores para las propiedades `spark.dynamicAllocation.maxExecutors` y `spark.dynamicAllocation.minExecutors` para sus trabajos de Spark, a fin de restringir el número de ejecutores asignados durante la ejecución del trabajo. 
+ CloudWatch el agente es compatible con los clústeres de roles en tiempo de ejecución para EMR 7.6 y versiones posteriores. Para obtener más información, consulta el [ CloudWatch agente de Amazon](https://docs.aws.amazon.com/emr/latest/ReleaseGuide/emr-AmazonCloudWatchAgent.html).
+ A partir de la versión 7.6.0 de Amazon Elastic Map Reduce (EMR), el conector del sistema de archivos S3A ahora admite el cifrado del cliente de Amazon S3.
+ A partir de EMR 7.6.0, TLS es compatible con los puntos finales. HMaster RegionServer Para obtener más información, consulte la siguiente tabla sobre el soporte de TLS con:. HBase [HBase](https://docs.aws.amazon.com/emr/latest/ManagementGuide/emr-encryption-support-matrix.html#emr-encryption-support-matrix-hbase)
+     
[\[See the AWS documentation website for more details\]](http://docs.aws.amazon.com/es_es/emr/latest/ReleaseGuide/emr-760-release.html)

## Versiones Java predeterminadas de 7.6.0
<a name="emr-760-jdk"></a>

La versión 7.6 y posteriores de Amazon EMR incluyen Amazon Corretto 17 (basado en OpenJDK) de forma predeterminada para las aplicaciones compatibles con Corretto 17 (JDK 17), con la excepción de Apache Livy.

En la siguiente tabla se muestran las versiones predeterminadas de Java para las aplicaciones de Amazon EMR 7.6.0. Si desea cambiar la JVM predeterminada del clúster, siga las instrucciones de [Configuración de aplicaciones para utilizar una máquina virtual de Java específica](configuring-java8.md) para cada aplicación que se ejecute en el clúster. Solo se puede usar una versión de tiempo de ejecución de Java en un clúster. Amazon EMR no admite la ejecución de distintos nodos o aplicaciones en distintas versiones de tiempo de ejecución en el mismo clúster.


| Aplicación | Versión de Java o Amazon Corretto (el valor predeterminado está en negrita) | 
| --- | --- | 
| Delta | 17, 11, 8 | 
| Flink | 17, 11, 8 | 
| HBase | 17, 11, 8 | 
| HCatalog | 17, 11, 8 | 
| Hadoop | 17, 11, 8 | 
| Hive | 17, 11, 8 | 
| Hudi | 17, 11, 8 | 
| Iceberg | 17, 11, 8 | 
| Livy | 17, 11, 8 | 
| Oozie | 17, 11, 8 | 
| Phoenix | 17, 11, 8 | 
| PrestoDB | 8 | 
| Spark | 17, 11, 8 | 
| Spark RAPIDS | 17, 11, 8 | 
| Tez | 17, 11, 8 | 
| Trino | 21, 17 | 
| Zeppelin | 17, 11, 8 | 
| Pig | 17, 11, 8 | 
| ZooKeeper | 17, 11, 8 | 

## Versiones de los componentes 7.6.0
<a name="emr-760-components"></a>

A continuación, se muestran los componentes que Amazon EMR instala con esta versión. Algunos se instalan como parte de paquetes de aplicación de macrodatos. Otros son exclusivos de Amazon EMR y se instalan para ciertos procesos y características del sistema. Normalmente, estos componentes comienzan con `emr` o `aws`. Normalmente, los paquetes de aplicación de macrodatos de la versión más reciente de Amazon EMR son las versiones más recientes que pueden encontrarse en la comunidad. Intentamos que las versiones de la comunidad estén disponibles en Amazon EMR lo más rápido posible.

Algunos componentes de Amazon EMR son distintos de las versiones que se encuentran en la comunidad. Estos componentes tienen una etiqueta de versión con el formato `CommunityVersion-amzn-EmrVersion`. La `EmrVersion` empieza por 0. Por ejemplo, si un componente de la comunidad de código abierto llamado `myapp-component` con la versión 2.2 se ha modificado tres veces para incluirlo en diferentes versiones de lanzamiento de Amazon EMR, la versión que se mostrará será `2.2-amzn-2`.


| Componente | Versión | Description (Descripción) | 
| --- | --- | --- | 
| adot-java-agent | 1.31.0 | Un agente Java que recopila métricas de los daemons de las aplicaciones. | 
| delta | 3.2.1-amzn-1 | Delta Lake es un formato de tabla abierto para conjuntos de datos analíticos de gran tamaño | 
| emr-amazon-cloudwatch-agent | 1.300032.2-amzn-0 | Se trata de una aplicación que recopila métricas internas de nivel de sistema y métricas de aplicación personalizadas de las instancias de Amazon EC2. | 
| emr-ddb | 5.6.0 | Conector de Amazon DynamoDB para aplicaciones del ecosistema de Hadoop. | 
| emr-goodies | 3.15.0 | Bibliotecas especialmente prácticas para el ecosistema de Hadoop. | 
| emr-kinesis | 3.19,0 | Conector de Amazon Kinesis para aplicaciones del ecosistema de Hadoop. | 
| emr-notebook-env | 1.18.0 | Entorno de Conda para cuaderno de EMR que incluye una puerta de enlace empresarial de Jupyter | 
| emr-s3-dist-cp | 2.36.0 | Aplicación de copia distribuida optimizada para Amazon S3. | 
| emr-s3-select | 2.15.0 | Conector S3Select de EMR | 
| emr-wal-cli | 1.3.1 | CLI utilizada para eliminar o enumerar WAL de ERM. | 
| emrfs | 2.67,0 | Conector de Amazon S3 para aplicaciones del ecosistema de Hadoop. | 
| flink-client | 1.20.0-amzn-0 | Scripts y aplicaciones de cliente de línea de comando de Apache Flink. | 
| flink-jobmanager-config | 1.20.0-amzn-0 | Administración de recursos en nodos EMR para Apache Flink. JobManager | 
| hadoop-client | 3.4.0-amzn-2 | Los clientes de línea de comando de Hadoop como, por ejemplo "hdfs", "hadoop" o "yarn". | 
| hadoop-hdfs-datanode | 3.4.0-amzn-2 | Servicio de nivel de nodos de HDFS para el almacenamiento de bloques. | 
| hadoop-hdfs-library | 3.4.0-amzn-2 | Biblioteca y cliente de línea de comandos HDFS | 
| hadoop-hdfs-namenode | 3.4.0-amzn-2 | Servicio de HDFS para realizar un seguimiento de nombres de archivo y bloquear ubicaciones. | 
| hadoop-hdfs-journalnode | 3.4.0-amzn-2 | Servicio de HDFS para administrar los archivos de Hadoop periódico en clústeres de alta disponibilidad. | 
| hadoop-httpfs-server | 3.4.0-amzn-2 | Punto de enlace HTTP para operaciones HDFS. | 
| hadoop-kms-server | 3.4.0-amzn-2 | Servidor de administración de claves criptográficas basado en la API de Hadoop. KeyProvider  | 
| hadoop-mapred | 3.4.0-amzn-2 | MapReduce bibliotecas de motores de ejecución para ejecutar una aplicación. MapReduce  | 
| hadoop-yarn-nodemanager | 3.4.0-amzn-2 | Servicio de YARN para la administración de contenedores en un nodo individual. | 
| hadoop-yarn-resourcemanager | 3.4.0-amzn-2 | Servicio de YARN para la asignación y administración de recursos de clúster y aplicaciones distribuidas. | 
| hadoop-yarn-timeline-server | 3.4.0-amzn-2 | Servicio para recuperar información actual e histórica para aplicaciones de YARN. | 
| hbase-hmaster | 2.6.1-amzn-0 | Servicio para un HBase clúster responsable de la coordinación de las regiones y la ejecución de los comandos administrativos. | 
| hbase-region-server | 2.6.1-amzn-0 | Servicio para prestar servicio a una o más regiones. HBase  | 
| hbase-client | 2.6.1-amzn-0 | HBase cliente de línea de comandos. | 
| hbase-rest-server | 2.6.1-amzn-0 | Servicio que proporciona un punto final HTTP para. RESTful HBase | 
| hbase-thrift-server | 2.6.1-amzn-0 | Servicio que proporciona un punto final de Thrift para. HBase | 
| hbase-operator-tools | 2.6.1-amzn-0 | Herramienta de reparación de clústeres de Apache. HBase  | 
| hcatalog-client | 3.1.3-amzn-15 | El cliente de línea de comando "hcat" para manipular hcatalog-server. | 
| hcatalog-server | 3.1.3-amzn-15 | Prestación de servicios HCatalog, una capa de administración de tablas y almacenamiento para aplicaciones distribuidas. | 
| hcatalog-webhcat-server | 3.1.3-amzn-15 | Punto final HTTP que proporciona una interfaz REST para. HCatalog | 
| hive-client | 3.1.3-amzn-15 | Cliente de línea de comando de Hive. | 
| hive-hbase | 3.1.3-amzn-15 | Hive-hbase client. | 
| hive-metastore-server | 3.1.3-amzn-15 | Service para acceder al metaalmacén de Hive, un repositorio semántico que almacena metadatos para SQL en operaciones de Hadoop. | 
| hive-server2 | 3.1.3-amzn-15 | Servicio para aceptar consultas de Hive como solicitudes web. | 
| hudi | 0.15.0-amzn-3 | Marco de procesamiento incremental para impulsar la canalización de datos a baja latencia y alta eficiencia. | 
| hudi-presto | 0.15.0-amzn-3 | Biblioteca de paquetes para ejecutar Presto con Hudi. | 
| hudi-trino | 0.15.0-amzn-3 | Biblioteca de paquetes para ejecutar Trino con Hudi. | 
| hudi-spark | 0.15.0-amzn-3 | Biblioteca de paquetes para ejecutar Spark con Hudi. | 
| hue-server | 4.11.0 | Aplicación web para analizar datos con aplicaciones del ecosistema de Hadoop | 
| iceberg | 1.6.1-amzn-2 | Apache Iceberg es un formato de tabla abierto para conjuntos de datos analíticos muy grandes | 
| jupyterhub | 1.5.0 | Servidor multiusuario para blocs de notas Jupyter | 
| livy-server | 0.8.0-incubating | Interfaz de REST para interactuar con Apache Spark | 
| nginx | 1.12.1 | nginx [engine x] es un servidor HTTP y proxy inverso | 
| mariadb-server | 5.5.68\$1 | Servidor de base de datos de MariaDB. | 
| nvidia-cuda | 12.3.0 | Controladores Nvidia y conjunto de herramientas Cuda | 
| oozie-client | 5.2.1 | Cliente de línea de comando de Oozie. | 
| oozie-server | 5.2.1 | Servicio para aceptar solicitudes de flujo de trabajo de Oozie. | 
| opencv | 4.7.0 | Biblioteca de visión artificial de código abierto. | 
| phoenix-library | 5.2.0 | Las bibliotecas de Phoenix para servidor y cliente | 
| phoenix-connectors | 6.0.0 | Conectores de Apache Phoenix para Spark-3 | 
| phoenix-query-server | 6.0.0 | Un servidor ligero que proporciona acceso a JDBC, así como acceso de formato Protocol Buffers y JSON al API de Avatica  | 
| presto-coordinator | 0.287-amzn-1 | Servicio para aceptar las consultas y administrar la ejecución de consultas entre presto-workers. | 
| presto-worker | 0.287-amzn-1 | Service para ejecutar partes de una consulta. | 
| presto-client | 0.287-amzn-1 | Cliente de línea de comandos Presto que se instala en los nodos principales en espera de un clúster de HA donde el servidor Presto no se ha iniciado. | 
| trino-coordinator | 457-amzn-0 | Servicio para aceptar consultas y administrar la ejecución de consultas entre trino-workers. | 
| trino-worker | 457-amzn-0 | Service para ejecutar partes de una consulta. | 
| trino-client | 457-amzn-0 | Cliente de línea de comandos Trino que se instala en los maestros en espera de un clúster de HA donde el servidor Trino no se ha iniciado. | 
| pig-client | 0.17.0 | Cliente de línea de comando de Pig. | 
| r | 4.3.2 | Proyecto R para análisis estadístico | 
| ranger-kms-server | 2.0.0 | Sistema de administración de claves Apache Ranger | 
| spark-client | 3.5.3-amzn-0 | Clientes de línea de comando de Spark. | 
| spark-history-server | 3.5.3-amzn-0 | IU web para la visualización de eventos registrados durante la vida útil de una aplicación Spark completada. | 
| spark-on-yarn | 3.5.3-amzn-0 | Motor de ejecución en memoria para YARN. | 
| spark-yarn-slave | 3.5.3-amzn-0 | Bibliotecas de Apache Spark necesarias para esclavos de YARN. | 
| spark-rapids | 24.10.1-amzn-0 | El complemento Nvidia Spark RAPIDS que acelera Apache Spark con. GPUs | 
| tensorflow | 2.16.1 | TensorFlow biblioteca de software de código abierto para computación numérica de alto rendimiento. | 
| tez-on-yarn | 0.10.2-amzn-13 | La aplicación YARN de tez y bibliotecas. | 
| tez-on-worker | 0.10.2-amzn-13 | La aplicación YARN de tez y bibliotecas para nodos de trabajo. | 
| zeppelin-server | 0.11.1 | Bloc de notas basado en web que permite el análisis de datos interactivo. | 
| zookeeper-server | 3.9.2-amzn-0 | Servicio centralizado para mantener información de configuración, nomenclatura, proporcionar sincronización distribuida y proporcionar servicios de grupo. | 
| zookeeper-client | 3.9.2-amzn-0 | ZooKeeper cliente de línea de comandos. | 

## clasificaciones de configuración de 7.6.0
<a name="emr-760-class"></a>

Las clasificaciones de configuración le permiten personalizar las aplicaciones. Suelen corresponder a un archivo XML de configuración para la aplicación como, por ejemplo, `hive-site.xml`. Para obtener más información, consulte [Configuración de aplicaciones](emr-configure-apps.md).

Las acciones de reconfiguración se producen cuando se especifica una configuración para los grupos de instancias de un clúster en ejecución. Amazon EMR solo inicia acciones de reconfiguración para las clasificaciones que se modifican. Para obtener más información, consulte [Reconfiguración de un grupo de instancias en un clúster en ejecución](emr-configure-apps-running-cluster.md).


**clasificaciones emr-7.6.0**  

| Clasificaciones | Description (Descripción) | Acciones de reconfiguración | 
| --- | --- | --- | 
| capacity-scheduler | Cambiar los valores en el archivo capacity-scheduler.xml de Hadoop. | Restarts the ResourceManager service. | 
| container-executor | Cambie los valores en el archivo container-executor.cfg de Hadoop YARN. | Not available. | 
| container-log4j | Cambiar los valores en el archivo container-log4j.properties de Hadoop YARN. | Not available. | 
| core-site | Cambiar los valores en el archivo core-site.xml de Hadoop. | Restarts the Hadoop HDFS services Namenode, SecondaryNamenode, Datanode, ZKFC, and Journalnode. Restarts the Hadoop YARN services ResourceManager, NodeManager, ProxyServer, and TimelineServer. Additionally restarts Hadoop KMS, Ranger KMS, HiveServer2, Hive MetaStore, Hadoop Httpfs, and MapReduce-HistoryServer. | 
| docker-conf | Cambie la configuración relacionada con el docker. | Not available. | 
| emrfs-site | Cambiar la configuración de EMRFS. | Restarts the Hadoop HDFS services Namenode, SecondaryNamenode, Datanode, ZKFC, and Journalnode. Restarts the Hadoop YARN services ResourceManager, NodeManager, ProxyServer, and TimelineServer. Additionally restarts HBaseRegionserver, HBaseMaster, HBaseThrift, HBaseRest, HiveServer2, Hive MetaStore, Hadoop Httpfs, and MapReduce-HistoryServer. | 
| flink-conf | Cambiar la configuración de flink-conf.yaml. | Restarts Flink history server. | 
| flink-log4j | Cambiar la configuración de log4j.properties de Flink. | Restarts Flink history server. | 
| flink-log4j-session | Cambie la configuración de Flink log4j-session.properties para la sesión. Kubernetes/Yarn  | Restarts Flink history server. | 
| flink-log4j-cli | Cambiar la configuración de log4j-cli.properties de Flink. | Restarts Flink history server. | 
| hadoop-env | Cambiar los valores en el entorno de Hadoop para todos los componentes de Hadoop. | Restarts the Hadoop HDFS services Namenode, SecondaryNamenode, Datanode, ZKFC, and Journalnode. Restarts the Hadoop YARN services ResourceManager, NodeManager, ProxyServer, and TimelineServer. Additionally restarts PhoenixQueryserver, HiveServer2, Hive MetaStore, and MapReduce-HistoryServer. | 
| hadoop-log4j | Cambiar los valores en el archivo log4j.properties de Hadoop. | Restarts the Hadoop HDFS services SecondaryNamenode, Datanode, and Journalnode. Restarts the Hadoop YARN services ResourceManager, NodeManager, ProxyServer, and TimelineServer. Additionally restarts Hadoop KMS, Hadoop Httpfs, and MapReduce-HistoryServer. | 
| hadoop-ssl-server | Cambiar la configuración del servidor ssl de Hadoop | Not available. | 
| hadoop-ssl-client | Cambiar la configuración del cliente ssl de Hadoop | Not available. | 
| hbase | Configuraciones seleccionadas por Amazon EMR para Apache. HBase | Custom EMR specific property. Sets emrfs-site and hbase-site configs. See those for their associated restarts. | 
| hbase-env | Cambie los valores en su entorno HBase. | Restarts the HBase services RegionServer, HBaseMaster, ThriftServer, RestServer. | 
| hbase-log4j | Cambie los valores en el archivo HBase hbase-log4j.properties. | Restarts the HBase services RegionServer, HBaseMaster, ThriftServer, RestServer. | 
| hbase-metrics | Cambie los valores en el archivo hadoop-metrics2-hbase.properties. HBase | Restarts the HBase services RegionServer, HBaseMaster, ThriftServer, RestServer. | 
| hbase-policy | Cambie los valores en HBase el archivo hbase-policy.xml. | Not available. | 
| hbase-site | Cambie los valores en HBase el archivo hbase-site.xml. | Restarts the HBase services RegionServer, HBaseMaster, ThriftServer, RestServer. Additionally restarts Phoenix QueryServer. | 
| hdfs-encryption-zones | Configurar zonas de cifrado de HDFS. | This classification should not be reconfigured. | 
| hdfs-env | Cambiar los valores en el entorno de HDFS. | Restarts Hadoop HDFS services Namenode, Datanode, and ZKFC. | 
| hdfs-site | Cambiar los valores en hdfs-site.xml de HDFS. | Restarts the Hadoop HDFS services Namenode, SecondaryNamenode, Datanode, ZKFC, and Journalnode. Additionally restarts Hadoop Httpfs. | 
| hcatalog-env | Cambie los valores en HCatalog el entorno. | Restarts Hive HCatalog Server. | 
| hcatalog-server-jndi | Cambie los valores en HCatalog jndi.properties. | Restarts Hive HCatalog Server. | 
| hcatalog-server-proto-hive-site | Cambie los valores en .xml HCatalog. proto-hive-site | Restarts Hive HCatalog Server. | 
| hcatalog-webhcat-env | Cambie los valores en el entorno HCat de la HCatalog Web. | Restarts Hive WebHCat server. | 
| hcatalog-webhcat-log4j2 | Cambie los valores en las propiedades HCatalog HCat log4j2.properties de la Web. | Restarts Hive WebHCat server. | 
| hcatalog-webhcat-site | Cambie los valores del archivo webhcat-site.xml de la HCatalog WebHCat. | Restarts Hive WebHCat server. | 
| hive | Configuración de Amazon EMR mantenida para Apache Hive. | Sets configurations to launch Hive LLAP service. | 
| hive-beeline-log4j2 | Cambiar los valores en el archivo beeline-log4j2.properties de Hive. | Not available. | 
| hive-parquet-logging | Cambiar los valores en el archivo parquet-logging.properties de Hive. | Not available. | 
| hive-env | Cambiar los valores en el entorno de Hive. | Restarts HiveServer2, HiveMetastore, and Hive HCatalog-Server. Runs Hive schemaTool CLI commands to verify hive-metastore. | 
| hive-exec-log4j2 | Cambie los valores en el archivo hive-exec-log 4j2.properties de Hive. | Not available. | 
| hive-llap-daemon-log4j2 | Cambie los valores en el archivo 4j2.properties de Hive. llap-daemon-log | Not available. | 
| hive-log4j2 | Cambiar los valores en el archivo hive-log4j2.properties de Hive. | Not available. | 
| hive-site | Cambiar los valores en el archivo hive-site.xml de Hive. | Restarts HiveServer2, HiveMetastore, and Hive HCatalog-Server. Runs Hive schemaTool CLI commands to verify hive-metastore. Also restarts Oozie and Zeppelin. | 
| hiveserver2-site | Cambiar los valores en el archivo hiveserver2-site.xml de Hive Server2. | Not available. | 
| hue-ini | Cambiar los valores en el archivo ini de Hue | Restarts Hue. Also activates Hue config override CLI commands to pick up new configurations. | 
| httpfs-env | Cambiar los valores en el entorno de HTTPFS. | Restarts Hadoop Httpfs service. | 
| httpfs-site | Cambiar los valores en el archivo httpfs-site.xml de Hadoop. | Restarts Hadoop Httpfs service. | 
| hadoop-kms-acls | Cambiar los valores en el archivo kms-acls.xml de Hadoop. | Not available. | 
| hadoop-kms-env | Cambiar los valores en el entorno de Hadoop KMS. | Restarts Hadoop-KMS service. | 
| hadoop-kms-java-home | Cambie la página de inicio de Java de KMS de Hadoop | Not available. | 
| hadoop-kms-log4j | Cambiar los valores en el archivo kms-log4j.properties de Hadoop. | Not available. | 
| hadoop-kms-site | Cambiar los valores en el archivo kms-site.xml de Hadoop. | Restarts Hadoop-KMS and Ranger-KMS service. | 
| hudi-env | Cambiar los valores en el entorno de Hudi. | Not available. | 
| hudi-defaults | Cambie los valores en el archivo hudi-defaults.conf de Hudi. | Not available. | 
| iceberg-defaults | Cambie los valores del archivo iceberg-defaults.conf de Iceberg. | Not available. | 
| delta-defaults | Cambie los valores del archivo delta-defaults.conf de Delta. | Not available. | 
| jupyter-notebook-conf | Cambiar los valores en el archivo jupyter\$1notebook\$1config.py de Jupyter Notebook. | Not available. | 
| jupyter-hub-conf | Cambie los valores en JupyterHubs el archivo jupyterhub\$1config.py. | Not available. | 
| jupyter-s3-conf | Configurar la persistencia en S3 del bloc de notas de Jupyter. | Not available. | 
| jupyter-sparkmagic-conf | Cambiar los valores en el archivo config.json de Sparkmagic. | Not available. | 
| livy-conf | Cambiar los valores en el archivo livy.conf de Livy. | Restarts Livy Server. | 
| livy-env | Cambiar los valores en el entorno de Livy. | Restarts Livy Server. | 
| livy-log4j2 | Cambiar la configuración de log4j2.properties de Livy. | Restarts Livy Server. | 
| mapred-env | Cambie los valores en el entorno de la MapReduce aplicación. | Restarts Hadoop MapReduce-HistoryServer. | 
| mapred-site | Cambie los valores en el archivo mapred-site.xml de la MapReduce aplicación. | Restarts Hadoop MapReduce-HistoryServer. | 
| oozie-env | Cambiar los valores en el entorno de Oozie. | Restarts Oozie. | 
| oozie-log4j | Cambiar los valores en el archivo oozie-log4j.properties de Oozie. | Restarts Oozie. | 
| oozie-site | Cambiar los valores en el archivo oozie-site.xml de Oozie. | Restarts Oozie. | 
| phoenix-hbase-metrics | Cambiar los valores en el archivo hadoop-metrics2-hbase.properties de Phoenix. | Not available. | 
| phoenix-hbase-site | Cambiar los valores en el archivo hbase-site.xml de Phoenix. | Not available. | 
| phoenix-log4j2 | Cambiar los valores en el archivo log4j2.properties de Phoenix. | Restarts Phoenix-QueryServer. | 
| phoenix-metrics | Cambiar los valores en el archivo hadoop-metrics2-phoenix.properties de Phoenix. | Not available. | 
| pig-env | Cambiar los valores en el entorno de Pig. | Not available. | 
| pig-properties | Cambiar los valores en el archivo pig.properties de Pig. | Restarts Oozie. | 
| pig-log4j | Cambiar los valores en el archivo log4j.properties de Pig. | Not available. | 
| presto-log | Cambiar los valores en el archivo log.properties de Presto. | Restarts Presto-Server (for PrestoDB) | 
| presto-config | Cambiar los valores en el archivo config.properties de Presto. | Restarts Presto-Server (for PrestoDB) | 
| presto-password-authenticator | Cambiar los valores en el archivo password-authenticator.properties de Presto. | Not available. | 
| presto-env | Cambiar valores en el archivo presto-env.sh de Presto. | Restarts Presto-Server (for PrestoDB) | 
| presto-node | Cambiar valores en el archivo node.properties de Presto. | Not available. | 
| presto-connector-blackhole | Cambiar los valores en el archivo blackhole.properties de Presto. | Not available. | 
| presto-connector-cassandra | Cambiar los valores en el archivo cassandra.properties de Presto. | Not available. | 
| presto-connector-hive | Cambiar los valores en el archivo hive.properties de Presto. | Restarts Presto-Server (for PrestoDB) | 
| presto-connector-jmx | Cambiar los valores en el archivo jmx.properties de Presto. | Not available. | 
| presto-connector-kafka | Cambiar los valores en el archivo kafka.properties de Presto. | Not available. | 
| presto-connector-lakeformation | Cambiar los valores en el archivo lakeformation.properties de Presto. | Restarts Presto-Server (for PrestoDB) | 
| presto-connector-localfile | Cambiar los valores en el archivo localfile.properties de Presto. | Not available. | 
| presto-connector-memory | Cambiar los valores del archivo memory.properties de Presto. | Not available. | 
| presto-connector-mongodb | Cambiar los valores en el archivo mongodb.properties de Presto. | Not available. | 
| presto-connector-mysql | Cambiar los valores en el archivo mysql.properties de Presto. | Not available. | 
| presto-connector-postgresql | Cambiar los valores en el archivo postgresql.properties de Presto. | Not available. | 
| presto-connector-raptor | Cambiar los valores en el archivo raptor.properties de Presto. | Not available. | 
| presto-connector-redis | Cambiar los valores en el archivo redis.properties de Presto. | Not available. | 
| presto-connector-redshift | Cambiar los valores en el archivo redshift.properties de Presto. | Not available. | 
| presto-connector-tpch | Cambiar los valores en el archivo tpch.properties de Presto. | Not available. | 
| presto-connector-tpcds | Cambiar los valores del archivo tpcds.properties de Presto. | Not available. | 
| trino-log | Cambiar los valores en el archivo log.properties de Trino. | Restarts Trino-Server (for Trino) | 
| trino-config | Cambiar los valores en el archivo config.properties de Trino. | Restarts Trino-Server (for Trino) | 
| trino-password-authenticator | Cambiar los valores en el archivo password-authenticator.properties de Trino. | Restarts Trino-Server (for Trino) | 
| trino-env | Cambie los valores del archivo trino-env.sh de Trino. | Restarts Trino-Server (for Trino) | 
| trino-node | Cambiar los valores en el archivo node.properties de Trino. | Not available. | 
| trino-connector-blackhole | Cambiar los valores en el archivo blackhole.properties de Trino. | Not available. | 
| trino-connector-cassandra | Cambiar los valores en el archivo cassandra.properties de Trino. | Not available. | 
| trino-connector-delta | Cambie los valores del archivo delta.properties de Trino. | Restarts Trino-Server (for Trino) | 
| trino-connector-hive | Cambiar los valores en el archivo hive.properties de Trino. | Restarts Trino-Server (for Trino) | 
| trino-exchange-manager | Cambie los valores del archivo exchange-manager.properties de Trino. | Restarts Trino-Server (for Trino) | 
| trino-connector-iceberg | Cambiar los valores en el archivo iceberg.properties de Trino. | Restarts Trino-Server (for Trino) | 
| trino-connector-hudi | Cambiar los valores en el archivo hudi.properties de Trino. | Restarts Trino-Server (for Trino) | 
| trino-connector-jmx | Cambiar los valores en el archivo jmx.properties de Trino. | Not available. | 
| trino-connector-kafka | Cambiar los valores en el archivo kafka.properties de Trino. | Not available. | 
| trino-connector-localfile | Cambiar los valores en el archivo localfile.properties de Trino. | Not available. | 
| trino-connector-memory | Cambiar los valores en el archivo memory.properties de Trino. | Not available. | 
| trino-connector-mongodb | Cambiar los valores en el archivo mongodb.properties de Trino. | Not available. | 
| trino-connector-mysql | Cambiar los valores en el archivo mysql.properties de Trino. | Not available. | 
| trino-connector-postgresql | Cambiar los valores en el archivo postgresql.properties de Trino. | Not available. | 
| trino-connector-raptor | Cambiar los valores en el archivo raptor.properties de Trino. | Not available. | 
| trino-connector-redis | Cambiar los valores en el archivo redis.properties de Trino. | Not available. | 
| trino-connector-redshift | Cambiar los valores en el archivo redshift.properties de Trino. | Not available. | 
| trino-connector-tpch | Cambiar los valores en el archivo tpch.properties de Trino. | Not available. | 
| trino-connector-tpcds | Cambiar los valores en el archivo tpcds.properties de Trino. | Not available. | 
| ranger-kms-dbks-site | Cambie los valores del archivo dbks-site.xml de Ranger KMS. | Restarts Ranger KMS Server. | 
| ranger-kms-site | Cambie los valores en el ranger-kms-site archivo.xml de Ranger KMS. | Restarts Ranger KMS Server. | 
| ranger-kms-env | Cambie los valores del entorno Ranger KMS. | Restarts Ranger KMS Server. | 
| ranger-kms-logback | Cambie los valores del archivo kms-logback.xml de Ranger KMS. | Not available. | 
| ranger-kms-db-ca | Cambie los valores del archivo CA en S3 para la conexión SSL de MySQL con Ranger KMS. | Not available. | 
| spark | Configuración de Amazon EMR mantenida para Apache Spark. | This property modifies spark-defaults. See actions there. | 
| spark-defaults | Cambiar los valores en el archivo spark-defaults.conf de Spark. | Restarts Spark history server and Spark thrift server. | 
| spark-env | Cambiar los valores en el entorno de Spark. | Restarts Spark history server and Spark thrift server. | 
| spark-hive-site | Cambiar los valores en el archivo hive-site.xml de Spark. | Not available. | 
| spark-log4j2 | Cambiar los valores en el archivo log4j2.properties de Spark. | Restarts Spark history server and Spark thrift server. | 
| spark-metrics | Cambiar los valores en el archivo metrics.properties de Spark. | Restarts Spark history server and Spark thrift server. | 
| tez-site | Cambiar los valores en el archivo tez-site.xml de Tez. | Restart Oozie and HiveServer2. | 
| yarn-env | Cambiar los valores en el entorno de YARN. | Restarts the Hadoop YARN services ResourceManager, NodeManager, ProxyServer, and TimelineServer. Additionally restarts MapReduce-HistoryServer. | 
| yarn-site | Cambiar los valores en el archivo yarn-site.xml de YARN. | Restarts the Hadoop YARN services ResourceManager, NodeManager, ProxyServer, and TimelineServer. Additionally restarts Livy Server and MapReduce-HistoryServer. | 
| zeppelin-env | Cambiar los valores en el entorno de Zeppelin. | Restarts Zeppelin. | 
| zeppelin-site | Cambie los ajustes de configuración de zeppelin-site.xml. | Restarts Zeppelin. | 
| zookeeper-config | Cambie los valores en el ZooKeeper archivo zoo.cfg. | Restarts Zookeeper server. | 
| zookeeper-logback | Cambie los valores en ZooKeeper el archivo logback.xml. | Restarts Zookeeper server. | 
| emr-metrics | Cambie la configuración de la métrica EMR para este nodo. | Restarts the CloudWatchAgent service. | 

## 7.6.0 registro de cambios
<a name="760-changelog"></a>


**Registro de cambios de la versión 7.6.0 y de las notas de la versión**  

| Date | Event | Description (Descripción) | 
| --- | --- | --- | 
| 13-01-2020 | Publicación de documentos | Las notas de la versión 7.6.0 de Amazon EMR se publicaron por primera vez | 
| 10-01-10 | Implementación completa | [Amazon EMR 7.6.0 se ha implementado completamente en todas las regiones compatibles](https://aws.amazon.com/about-aws/global-infrastructure/regional-product-services/) | 
| 26 de diciembre de 2025 | Versión inicial | Amazon EMR 7.6.0 se implementó por primera vez en las regiones comerciales iniciales | 

# Amazon EMR versión 7.5.0
<a name="emr-750-release"></a>

## Ciclo de vida compatible con 7.5.0
<a name="emr-750-supported-lifecycle"></a>

En la siguiente tabla se describen las fechas de ciclo de vida admitidas para la versión 7.5.0 de Amazon EMR.


| Fase de soporte | Date | 
| --- | --- | 
| Fecha de lanzamiento inicial | 21 de noviembre de 2024 | 
| Soporte estándar hasta | 20 de noviembre de 2026 | 
| Fin del soporte | 21 de noviembre de 2026 | 
| Fin de vida útil | 21 de noviembre de 2027 | 

## Versiones de la aplicación 7.5.0
<a name="emr-750-app-versions"></a>

Esta versión incluye las siguientes aplicaciones: [https://docs.aws.amazon.com/AmazonCloudWatch/latest/monitoring/Install-CloudWatch-Agent.html](https://docs.aws.amazon.com/AmazonCloudWatch/latest/monitoring/Install-CloudWatch-Agent.html), [https://delta.io/](https://delta.io/), [https://flink.apache.org/](https://flink.apache.org/), [http://hbase.apache.org/](http://hbase.apache.org/), [https://cwiki.apache.org/confluence/display/Hive/HCatalog](https://cwiki.apache.org/confluence/display/Hive/HCatalog), [http://hadoop.apache.org/docs/current/](http://hadoop.apache.org/docs/current/), [http://hive.apache.org/](http://hive.apache.org/), [https://hudi.apache.org](https://hudi.apache.org), [http://gethue.com/](http://gethue.com/), [https://iceberg.apache.org/](https://iceberg.apache.org/), [https://jupyter-enterprise-gateway.readthedocs.io/en/latest/](https://jupyter-enterprise-gateway.readthedocs.io/en/latest/), [https://jupyterhub.readthedocs.io/en/latest/#](https://jupyterhub.readthedocs.io/en/latest/#), [https://livy.incubator.apache.org/](https://livy.incubator.apache.org/), [http://oozie.apache.org/](http://oozie.apache.org/), [https://phoenix.apache.org/](https://phoenix.apache.org/), [http://pig.apache.org/](http://pig.apache.org/), [https://prestodb.io/](https://prestodb.io/), [https://spark.apache.org/docs/latest/](https://spark.apache.org/docs/latest/), [https://www.tensorflow.org/](https://www.tensorflow.org/), [https://tez.apache.org/](https://tez.apache.org/), [https://trino.io/](https://trino.io/), [https://zeppelin.incubator.apache.org/](https://zeppelin.incubator.apache.org/) y [https://zookeeper.apache.org](https://zookeeper.apache.org).

En la siguiente tabla se enumeran las versiones de la aplicación disponibles en esta versión de Amazon EMR y las versiones de la aplicación en las tres versiones anteriores de Amazon EMR (cuando corresponda).

Para ver un historial completo de las versiones de la aplicación disponibles para cada versión de Amazon EMR, consulte los temas siguientes:
+ [Versiones de las aplicaciones en las versiones 7.x de Amazon EMR](emr-release-app-versions-7.x.md)
+ [Versiones de la aplicación en las versiones 6.x de Amazon EMR](emr-release-app-versions-6.x.md)
+ [Versiones de la aplicación en las versiones 5.x de Amazon EMR](emr-release-app-versions-5.x.md)
+ [Versiones de la aplicación en las versiones 4.x de Amazon EMR](emr-release-app-versions-4.x.md)


**Información sobre la versión de la aplicación**  

|  | emr-7.5.0 | emr-7.4.0 | emr-7.3.0 | emr-7.2.0 | 
| --- | --- | --- | --- | --- | 
| AWS SDK for Java | 2.28.8, 1.12.772 | 2.28.8, 1.12.772 | 2.25.70, 1.12.747 | 2.23.18, 1.12.705 | 
| Python | 3.9, 3.11 | 3.9, 3.11 | 3.9, 3.11 | 3.9, 3.11 | 
| Scala | 2.12.18 | 2.12.18 | 2.12.18 | 2.12.17 | 
| AmazonCloudWatchAgent | 1.300032.2-amzn-0 | 1.300032.2-amzn-0 | 1.300032.2-amzn-0 | 1.300032.2-amzn-0 | 
| Delta | 3.2.1-amzn-0 | 3.2.0-amzn-1 | 3.2.0-amzn-0 | 3.1.0 | 
| Flink | 1.19.1-amzn-1 | 1.19.1-amzn-0 | 1.18.1-amzn-2 | 1.18.1-amzn-1 | 
| Ganglia |  -  |  -  |  -  |  -  | 
| HBase | 2.5.10-amzn-0 | 2.5.5-amzn-0 | 2.4.17-amzn-7 | 2.4.17-amzn-6 | 
| HCatalog | 3.1.3-amzn-14 | 3.1.3-amzn-13 | 3.1.3-amzn-12 | 3.1.3-amzn-11 | 
| Hadoop | 3.4.0-amzn-1 | 3.4.0-amzn-0 | 3.3.6-amzn-5 | 3.3.6-amzn-4 | 
| Hive | 3.1.3-amzn-14 | 3.1.3-amzn-13 | 3.1.3-amzn-12 | 3.1.3-amzn-11 | 
| Hudi | 0.15.0-amzn-2 | 0.15.0-amzn-1 | 0.15.0-amzn-0 | 0.14.1-amzn-1 | 
| Hue | 4.11.0 | 4.11.0 | 4.11.0 | 4.11.0 | 
| Iceberg | 1.6.1-amzn-1 | 1.6.1-amzn-0 | 1.5.2-amzn-0 | 1.5.0-amzn-0 | 
| JupyterEnterpriseGateway | 2.6.0 | 2.6.0 | 2.6.0 | 2.6.0 | 
| JupyterHub | 1.5.0 | 1.5.0 | 1.5.0 | 1.5.0 | 
| Livy | 0.8.0-incubating | 0.8.0-incubating | 0.8.0-incubating | 0.8.0-incubating | 
| MXNet |  -  |  -  |  -  | 1.9.1 | 
| Mahout |  -  |  -  |  -  |  -  | 
| Oozie | 5.2.1 | 5.2.1 | 5.2.1 | 5.2.1 | 
| Phoenix | 5.2.0 | 5.2.0 | 5.1.3 | 5.1.3 | 
| Pig | 0.17.0 | 0.17.0 | 0.17.0 | 0.17.0 | 
| Presto | 0.287-amzn-0 | 0.287-amzn-0 | 0.285-amzn-1 | 0.285-amzn-0 | 
| Spark | 3.5.2-amzn-1 | 3.5.2-amzn-0 | 3.5.1-amzn-1 | 3.5.1-amzn-0 | 
| Sqoop |  -  | 1.4.7 | 1.4.7 | 1.4.7 | 
| TensorFlow | 2.16.1 | 2.16.1 | 2.16.1 | 2.11.0 | 
| Tez | 0.10.2-amzn-12 | 0.10.2-amzn-11 | 0.10.2-amzn-10 | 0.10.2-amzn-9 | 
| Trino (PrestoSQL) | 446-amzn-0 | 446-amzn-0 | 442-amzn-0 | 436-amzn-0 | 
| Zeppelin | 0.11.1 | 0.11.1 | 0.11.1 | 0.10.1 | 
| ZooKeeper | 3.9.2-amzn-0 | 3.9.2-amzn-0 | 3.9.1-amzn-1 | 3.9.1-amzn-1 | 

# Detalles de los componentes de la versión 7.5.0
<a name="emr-750-release-components-details"></a>

Consulte la siguiente tabla para obtener más información sobre los paquetes *Extras* de Amazon EMR 7.5.0.


| Aplicación | Tipo de aplicación | Package | Tipo de Package | Versión de paquete | 
| --- | --- | --- | --- | --- | 
|  AmazonCloudWatchAgent  |  Core  |  hadoop-hdfs-journalnode  |  Extras  |  3.3.6.amzn.5-1.amzn2023  | 
|  AmazonCloudWatchAgent  |  Core  |  ranger-kms  |  Extras  |  2.0.0-1.amzn2023  | 
|  AmazonCloudWatchAgent  |  Core  |  s3-dist-cp  |  Extras  |  2.33.0-1.amzn2023  | 
|  AmazonCloudWatchAgent  |  Core  |  ZooKeeper  |  Extras  |  3.9.1.amzn.1-1.amzn2023  | 
|  AmazonCloudWatchAgent  |  Core  |  zookeeper-server  |  Extras  |  3.9.1.amzn.1-1.amzn2023  | 
|  Flink  |  Core  |  hadoop-client  |  Extras  |  3.3.6.amzn.5-1.amzn2023  | 
|  Flink  |  Core  |  hadoop-hdfs  |  Extras  |  3.3.6.amzn.5-1.amzn2023  | 
|  Flink  |  Core  |  hadoop-hdfs-datanode  |  Extras  |  3.3.6.amzn.5-1.amzn2023  | 
|  Flink  |  Core  |  hadoop-hdfs-journalnode  |  Extras  |  3.3.6.amzn.5-1.amzn2023  | 
|  Flink  |  Core  |  hadoop-hdfs-namenode  |  Extras  |  3.3.6.amzn.5-1.amzn2023  | 
|  Flink  |  Core  |  hadoop-httpfs  |  Extras  |  3.3.6.amzn.5-1.amzn2023  | 
|  Flink  |  Core  |  hadoop-kms  |  Extras  |  3.3.6.amzn.5-1.amzn2023  | 
|  Flink  |  Core  |  hadoop-mapreduce  |  Extras  |  3.3.6.amzn.5-1.amzn2023  | 
|  Flink  |  Core  |  hadoop-mapreduce-historyserver  |  Extras  |  3.3.6.amzn.5-1.amzn2023  | 
|  Flink  |  Core  |  hadoop-yarn  |  Extras  |  3.3.6.amzn.5-1.amzn2023  | 
|  Flink  |  Core  |  hadoop-yarn-nodemanager  |  Extras  |  3.3.6.amzn.5-1.amzn2023  | 
|  Flink  |  Core  |  hadoop-yarn-proxyserver  |  Extras  |  3.3.6.amzn.5-1.amzn2023  | 
|  Flink  |  Core  |  hadoop-yarn-resourcemanager  |  Extras  |  3.3.6.amzn.5-1.amzn2023  | 
|  Flink  |  Core  |  hadoop-yarn-timelineserver  |  Extras  |  3.3.6.amzn.5-1.amzn2023  | 
|  Flink  |  Core  |  hudi  |  Extras  |  0.15.0.amzn.0-1.amzn2023  | 
|  Flink  |  Core  |  ranger-kms  |  Extras  |  2.0.0-1.amzn2023  | 
|  Flink  |  Core  |  hadoop  |  Extras  |  3.3.6.amzn.5-1.amzn2023  | 
|  HBase  |  Core  |  s3-dist-cp  |  Extras  |  2.33.0-1.amzn2023  | 
|  HCatalog  |  Core  |  hadoop-yarn-proxyserver  |  Extras  |  3.3.6.amzn.5-1.amzn2023  | 
|  HCatalog  |  Core  |  mariadb-connector-java  |  Extras  |    | 
|  Hive  |  Core  |  hadoop-httpfs  |  Extras  |  3.3.6.amzn.5-1.amzn2023  | 
|  Hive  |  Core  |  hadoop-yarn-proxyserver  |  Extras  |  3.3.6.amzn.5-1.amzn2023  | 
|  Hive  |  Core  |  hive-hbase  |  Extras  |  3.1.3.amzn.12-1.amzn2023  | 
|  Hive  |  Core  |  mariadb-connector-java  |  Extras  |  2.7.2-1  | 
|  Hive  |  Core  |  s3-dist-cp  |  Extras  |  2.33.0-1.amzn2023  | 
|  Phoenix  |  Core  |  s3-dist-cp  |  Extras  |  2.33.0-1.amzn2023  | 
|  Spark  |  Core  |  spark-datanucleus  |  Extras  |  3.5.1.amzn.0-1.amzn2023  | 
|  Tez  |  Core  |  hadoop-mapreduce  |  Extras  |  3.3.6.amzn.5-1.amzn2023  | 
|  Tez  |  Core  |  hadoop-mapreduce-historyserver  |  Extras  |  3.3.6.amzn.5-1.amzn2023  | 
|  Tez  |  Core  |  hadoop-yarn-proxyserver  |  Extras  |  3.3.6.amzn.5-1.amzn2023  | 
|  Trino  |  Core  |  bigtop-utils  |  Extras  |  1.2.0-1.amzn2023  | 
|  Trino  |  Core  |  hadoop-client  |  Extras  |  3.3.6.amzn.5-1.amzn2023  | 
|  Trino  |  Core  |  hadoop-hdfs  |  Extras  |  3.3.6.amzn.5-1.amzn2023  | 
|  Trino  |  Core  |  hadoop-hdfs-datanode  |  Extras  |  3.3.6.amzn.5-1.amzn2023  | 
|  Trino  |  Core  |  hadoop-hdfs-journalnode  |  Extras  |  3.3.6.amzn.5-1.amzn2023  | 
|  Trino  |  Core  |  hadoop-hdfs-namenode  |  Extras  |  3.3.6.amzn.5-1.amzn2023  | 
|  Trino  |  Core  |  hadoop-kms  |  Extras  |  3.3.6.amzn.5-1.amzn2023  | 
|  Trino  |  Core  |  hadoop-mapreduce  |  Extras  |  3.3.6.amzn.5-1.amzn2023  | 
|  Trino  |  Core  |  hadoop-mapreduce-historyserver  |  Extras  |  3.3.6.amzn.5-1.amzn2023  | 
|  Trino  |  Core  |  hadoop-yarn  |  Extras  |  3.3.6.amzn.5-1.amzn2023  | 
|  Trino  |  Core  |  hadoop-yarn-nodemanager  |  Extras  |  3.3.6.amzn.5-1.amzn2023  | 
|  Trino  |  Core  |  hadoop-yarn-proxyserver  |  Extras  |  3.3.6.amzn.5-1.amzn2023  | 
|  Trino  |  Core  |  hadoop-yarn-resourcemanager  |  Extras  |  3.3.6.amzn.5-1.amzn2023  | 
|  Trino  |  Core  |  hadoop-yarn-timelineserver  |  Extras  |  3.3.6.amzn.5-1.amzn2023  | 
|  Trino  |  Core  |  hive  |  Extras  |  3.1.3.amzn.12-1.amzn2023  | 
|  Trino  |  Core  |  hive-hcatalog-server  |  Extras  |  3.1.3.amzn.12-1.amzn2023  | 
|  Trino  |  Core  |  mariadb-connector-java  |  Extras  |  2.7.2-1  | 
|  Trino  |  Core  |  ranger-kms  |  Extras  |  2.0.0-1.amzn2023  | 
|  Trino  |  Core  |  ZooKeeper  |  Extras  |  3.9.1.amzn.1-1.amzn2023  | 
|  Trino  |  Core  |  zookeeper-server  |  Extras  |  3.9.1.amzn.1-1.amzn2023  | 
|  Trino  |  Core  |  bigtop-groovy  |  Extras  |  2.5.4-1.amzn2023  | 
|  Trino  |  Core  |  bigtop-jsvc  |  Extras  |  1.2.4-1.amzn2023  | 
|  Trino  |  Core  |  hadoop  |  Extras  |  3.3.6.amzn.5-1.amzn2023  | 
|  Trino  |  Core  |  hadoop-lzo  |  Extras  |  0.4.19-1.amzn2023  | 
|  Trino  |  Core  |  hive-hcatalog  |  Extras  |  3.1.3.amzn.12-1.amzn2023  | 
|  Trino  |  Core  |  hive-jdbc  |  Extras  |  3.1.3.amzn.12-1.amzn2023  | 
|  ZooKeeper  |  Core  |  emrfs  |  Extras  |  2.64.0-1.amzn2023  | 
|  ZooKeeper  |  Core  |  hadoop-client  |  Extras  |  3.3.6.amzn.5-1.amzn2023  | 
|  ZooKeeper  |  Core  |  hadoop-hdfs  |  Extras  |  3.3.6.amzn.5-1.amzn2023  | 
|  ZooKeeper  |  Core  |  hadoop-hdfs-datanode  |  Extras  |  3.3.6.amzn.5-1.amzn2023  | 
|  ZooKeeper  |  Core  |  hadoop-hdfs-journalnode  |  Extras  |  3.3.6.amzn.5-1.amzn2023  | 
|  ZooKeeper  |  Core  |  hadoop-hdfs-namenode  |  Extras  |  3.3.6.amzn.5-1.amzn2023  | 
|  ZooKeeper  |  Core  |  hadoop-httpfs  |  Extras  |  3.3.6.amzn.5-1.amzn2023  | 
|  ZooKeeper  |  Core  |  hadoop-kms  |  Extras  |  3.3.6.amzn.5-1.amzn2023  | 
|  ZooKeeper  |  Core  |  hadoop-mapreduce  |  Extras  |  3.3.6.amzn.5-1.amzn2023  | 
|  ZooKeeper  |  Core  |  hadoop-mapreduce-historyserver  |  Extras  |  3.3.6.amzn.5-1.amzn2023  | 
|  ZooKeeper  |  Core  |  hadoop-yarn  |  Extras  |  3.3.6.amzn.5-1.amzn2023  | 
|  ZooKeeper  |  Core  |  hadoop-yarn-nodemanager  |  Extras  |  3.3.6.amzn.5-1.amzn2023  | 
|  ZooKeeper  |  Core  |  hadoop-yarn-proxyserver  |  Extras  |  3.3.6.amzn.5-1.amzn2023  | 
|  ZooKeeper  |  Core  |  hadoop-yarn-resourcemanager  |  Extras  |  3.3.6.amzn.5-1.amzn2023  | 
|  ZooKeeper  |  Core  |  hadoop-yarn-timelineserver  |  Extras  |  3.3.6.amzn.5-1.amzn2023  | 
|  ZooKeeper  |  Core  |  ranger-kms  |  Extras  |  2.0.0-1.amzn2023  | 

# 7.5.0 vulnerabilidades y exposiciones comunes
<a name="750-common-vulnerabilities-exposures"></a>

La siguiente tabla muestra todo lo CVEs que no afecta a los clústeres de EMR que se ejecutan en las configuraciones recomendadas de Amazon EMR 7.5.0. Amazon EMR depende del código abierto original para la disponibilidad de las correcciones y proporcionará la última versión estable como parte de los componentes del motor principal en un plazo de 90 días a partir de su verificación por parte de Amazon EMR.

Esta tabla se actualizó el 23 de noviembre de 2021.


| ID de CVE | Gravedad | URL de detalles del CVE | 
| --- | --- | --- | 
|  CVE-2013-4002  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2013-4002)-2013-4002  | 
|  CVE-2015-1832  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2015-1832](https://nvd.nist.gov/vuln/detail/CVE-2015-1832)  | 
|  CVE-2018-12022  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2018-12022](https://nvd.nist.gov/vuln/detail/CVE-2018-12022)  | 
|  CVE-2018-14718  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-14718)-2018-14718  | 
|  CVE-2019-12384  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-12384)-2019-12384  | 
|  CVE-2019-14379  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2019-14379](https://nvd.nist.gov/vuln/detail/CVE-2019-14379)  | 
|  CVE-2019-14439  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-14439)-2019-14439  | 
|  CVE-2020-10672  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-10672](https://nvd.nist.gov/vuln/detail/CVE-2020-10672)  | 
|  CVE-2020-10673  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-10673](https://nvd.nist.gov/vuln/detail/CVE-2020-10673)  | 
|  CVE-2020-11112  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-11112](https://nvd.nist.gov/vuln/detail/CVE-2020-11112)  | 
|  CVE-2020-13949  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-13949)-2020-13949  | 
|  CVE-2020-14195  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-14195](https://nvd.nist.gov/vuln/detail/CVE-2020-14195)  | 
|  CVE-2020-17521  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-17521)-2020-17521  | 
|  CVE-2020-24616  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-24616](https://nvd.nist.gov/vuln/detail/CVE-2020-24616)  | 
|  CVE-2020-24750  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-24750](https://nvd.nist.gov/vuln/detail/CVE-2020-24750)  | 
|  CVE-2020-25649  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-25649](https://nvd.nist.gov/vuln/detail/CVE-2020-25649)  | 
|  CVE-2020-36183  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36183](https://nvd.nist.gov/vuln/detail/CVE-2020-36183)  | 
|  CVE-2020-36186  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36186](https://nvd.nist.gov/vuln/detail/CVE-2020-36186)  | 
|  CVE-2020-36188  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36188](https://nvd.nist.gov/vuln/detail/CVE-2020-36188)  | 
|  CVE-2020-36189  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36189](https://nvd.nist.gov/vuln/detail/CVE-2020-36189)  | 
|  CVE-2020-8908  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-8908](https://nvd.nist.gov/vuln/detail/CVE-2020-8908)  | 
|  CVE-2021-37137  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2021-37137](https://nvd.nist.gov/vuln/detail/CVE-2021-37137)  | 
|  CVE-2021-38153  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2021-38153](https://nvd.nist.gov/vuln/detail/CVE-2021-38153)  | 
|  CVE-2022-25857  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-202225857](https://nvd.nist.gov/vuln/detail/CVE-2022-25857)  | 
|  CVE-2022-3509  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2022-3509](https://nvd.nist.gov/vuln/detail/CVE-2022-3509)  | 
|  CVE-2022-37866  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-202237866](https://nvd.nist.gov/vuln/detail/CVE-2022-37866)  | 
|  CVE-2022-41966  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2022-41966](https://nvd.nist.gov/vuln/detail/CVE-2022-41966)  | 
|  CVE-2022-45688  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-45688)-202245688  | 
|  CVE-2023-34455  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-34455](https://nvd.nist.gov/vuln/detail/CVE-2023-34455)  | 
|  CVE-2023-3635  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-3635](https://nvd.nist.gov/vuln/detail/CVE-2023-3635)  | 
|  CVE-2023-38647  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-38647](https://nvd.nist.gov/vuln/detail/CVE-2023-38647)  | 
|  CVE-2023-40167  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-40167](https://nvd.nist.gov/vuln/detail/CVE-2023-40167)  | 
|  CVE-2023-43642  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-43642](https://nvd.nist.gov/vuln/detail/CVE-2023-43642)  | 
|  CVE-2023-44981  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-44981](https://nvd.nist.gov/vuln/detail/CVE-2023-44981)  | 
|  CVE-2023-50387  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-50387](https://nvd.nist.gov/vuln/detail/CVE-2023-50387)  | 
|  CVE-2024-23454  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-23454](https://nvd.nist.gov/vuln/detail/CVE-2024-23454)  | 
|  CVE-2024-29025  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-29025](https://nvd.nist.gov/vuln/detail/CVE-2024-29025)  | 
|  CVE-2024-36124  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-36124](https://nvd.nist.gov/vuln/detail/CVE-2024-36124)  | 
|  CVE-2024-8184  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-8184](https://nvd.nist.gov/vuln/detail/CVE-2024-8184)  | 
|  CVE-2012-0881  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2012-0881](https://nvd.nist.gov/vuln/detail/CVE-2012-0881)  | 
|  CVE-2012-5783  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2012-5783](https://nvd.nist.gov/vuln/detail/CVE-2012-5783)  | 
|  CVE-2015-5237  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2015-5237)-2015-5237  | 
|  CVE-2016-5018  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2016-5018)-2016-5018  | 
|  CVE-2016-6796  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2016-6796)-2016-6796  | 
|  CVE-2017-15095  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2017-15095)-2017-15095  | 
|  CVE-2018-1000180  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2018-1000180](https://nvd.nist.gov/vuln/detail/CVE-2018-1000180)  | 
|  CVE-2018-10054  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2018-10054](https://nvd.nist.gov/vuln/detail/CVE-2018-10054)  | 
|  CVE-2018-10237  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2018-10237](https://nvd.nist.gov/vuln/detail/CVE-2018-10237)  | 
|  CVE-2018-11798  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2018-11798](https://nvd.nist.gov/vuln/detail/CVE-2018-11798)  | 
|  CVE-2018-12023  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2018-12023](https://nvd.nist.gov/vuln/detail/CVE-2018-12023)  | 
|  CVE-2018-14721  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-14721)-2018-14721  | 
|  CVE-2018-19361  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2018-19361](https://nvd.nist.gov/vuln/detail/CVE-2018-19361)  | 
|  CVE-2018-5968  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-5968)-2018-5968  | 
|  CVE-2018-7489  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2018-7489](https://nvd.nist.gov/vuln/detail/CVE-2018-7489)  | 
|  CVE-2019-0205  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2019-0205](https://nvd.nist.gov/vuln/detail/CVE-2019-0205)  | 
|  CVE-2019-12086  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-12086)-2019-12086  | 
|  CVE-2019-12814  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-12814)-2019-12814  | 
|  CVE-2019-14540  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-14540)-2019-14540  | 
|  CVE-2019-14892  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-14892)-2019-14892  | 
|  CVE-2019-14893  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-14893)-2019-14893  | 
|  CVE-2019-16869  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-16869)-2019-16869  | 
|  CVE-2019-16942  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-16942)-2019-16942  | 
|  CVE-2019-17267  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2019-17267](https://nvd.nist.gov/vuln/detail/CVE-2019-17267)  | 
|  CVE-2019-17531  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-17531)-2019-17531  | 
|  CVE-2019-20330  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2019-20330](https://nvd.nist.gov/vuln/detail/CVE-2019-20330)  | 
|  CVE-2019-20444  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2019-20444](https://nvd.nist.gov/vuln/detail/CVE-2019-20444)  | 
|  CVE-2019-20445  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2019-20445](https://nvd.nist.gov/vuln/detail/CVE-2019-20445)  | 
|  CVE-2020-10969  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-10969)-2020-10969  | 
|  CVE-2020-11111  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-11111](https://nvd.nist.gov/vuln/detail/CVE-2020-11111)  | 
|  CVE-2020-11619  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-11619)-2020-11619  | 
|  CVE-2020-11620  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-11620](https://nvd.nist.gov/vuln/detail/CVE-2020-11620)  | 
|  CVE-2020-13955  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-13955)-2020-13955  | 
|  CVE-2020-13956  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-13956)-2020-13956  | 
|  CVE-2020-14060  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-14060)-2020-14060  | 
|  CVE-2020-14061  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-14061)-2020-14061  | 
|  CVE-2020-15250  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-15250](https://nvd.nist.gov/vuln/detail/CVE-2020-15250)  | 
|  CVE-2020-26939  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-26939](https://nvd.nist.gov/vuln/detail/CVE-2020-26939)  | 
|  CVE-2020-35491  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-35491](https://nvd.nist.gov/vuln/detail/CVE-2020-35491)  | 
|  CVE-2020-35728  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-35728](https://nvd.nist.gov/vuln/detail/CVE-2020-35728)  | 
|  CVE-2020-36179  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36179](https://nvd.nist.gov/vuln/detail/CVE-2020-36179)  | 
|  CVE-2020-36181  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36181](https://nvd.nist.gov/vuln/detail/CVE-2020-36181)  | 
|  CVE-2020-36182  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36182](https://nvd.nist.gov/vuln/detail/CVE-2020-36182)  | 
|  CVE-2020-36184  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36184](https://nvd.nist.gov/vuln/detail/CVE-2020-36184)  | 
|  CVE-2020-36185  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36185](https://nvd.nist.gov/vuln/detail/CVE-2020-36185)  | 
|  CVE-2020-36187  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36187](https://nvd.nist.gov/vuln/detail/CVE-2020-36187)  | 
|  CVE-2020-36518  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36518](https://nvd.nist.gov/vuln/detail/CVE-2020-36518)  | 
|  CVE-2020-8840  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-8840](https://nvd.nist.gov/vuln/detail/CVE-2020-8840)  | 
|  CVE-2020-9546  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-9546](https://nvd.nist.gov/vuln/detail/CVE-2020-9546)  | 
|  CVE-2020-9547  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-9547](https://nvd.nist.gov/vuln/detail/CVE-2020-9547)  | 
|  CVE-2020-9548  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-9548](https://nvd.nist.gov/vuln/detail/CVE-2020-9548)  | 
|  CVE-2021-20190  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2021-20190](https://nvd.nist.gov/vuln/detail/CVE-2021-20190)  | 
|  CVE-2021-21290  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2021-21290](https://nvd.nist.gov/vuln/detail/CVE-2021-21290)  | 
|  CVE-2021-22569  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2021-22569](https://nvd.nist.gov/vuln/detail/CVE-2021-22569)  | 
|  CVE-2021-28170  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2021-28170](https://nvd.nist.gov/vuln/detail/CVE-2021-28170)  | 
|  CVE-2021-29425  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2021-29425](https://nvd.nist.gov/vuln/detail/CVE-2021-29425)  | 
|  CVE-2021-31684  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2021-31684](https://nvd.nist.gov/vuln/detail/CVE-2021-31684)  | 
|  CVE-2021-34538  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2021-34538](https://nvd.nist.gov/vuln/detail/CVE-2021-34538)  | 
|  CVE-2021-36374  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2021-36374](https://nvd.nist.gov/vuln/detail/CVE-2021-36374)  | 
|  CVE-2021-37533  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2021-37533](https://nvd.nist.gov/vuln/detail/CVE-2021-37533)  | 
|  CVE-2021-43859  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2021-43859](https://nvd.nist.gov/vuln/detail/CVE-2021-43859)  | 
|  CVE-2022-1415  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2022-1415](https://nvd.nist.gov/vuln/detail/CVE-2022-1415)  | 
|  CVE-2022-1471  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2022-1471](https://nvd.nist.gov/vuln/detail/CVE-2022-1471)  | 
|  CVE-2022-3171  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2022-3171](https://nvd.nist.gov/vuln/detail/CVE-2022-3171)  | 
|  CVE-2022-3510  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-20223510](https://nvd.nist.gov/vuln/detail/CVE-2022-3510)  | 
|  CVE-2022-36364  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-202236364](https://nvd.nist.gov/vuln/detail/CVE-2022-36364)  | 
|  CVE-2022-37865  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-202237865](https://nvd.nist.gov/vuln/detail/CVE-2022-37865)  | 
|  CVE-202238749  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-202238749](https://nvd.nist.gov/vuln/detail/CVE-2022-38749)  | 
|  CVE-202238751  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-202238751](https://nvd.nist.gov/vuln/detail/CVE-2022-38751)  | 
|  CVE-2022-40150  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-202240150](https://nvd.nist.gov/vuln/detail/CVE-2022-40150)  | 
|  CVE-202240151  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-202240151](https://nvd.nist.gov/vuln/detail/CVE-2022-40151)  | 
|  CVE-2022-40152  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-202240152](https://nvd.nist.gov/vuln/detail/CVE-2022-40152)  | 
|  CVE-2022-41854  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-41854)-2022-41854  | 
|  CVE-2022-42003  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2022-42003](https://nvd.nist.gov/vuln/detail/CVE-2022-42003)  | 
|  CVE-2022-42889  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-202242889](https://nvd.nist.gov/vuln/detail/CVE-2022-42889)  | 
|  CVE-2022-45685  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-202245685](https://nvd.nist.gov/vuln/detail/CVE-2022-45685)  | 
|  CVE-2022-45693  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-202245693](https://nvd.nist.gov/vuln/detail/CVE-2022-45693)  | 
|  CVE-2022-46337  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-202246337](https://nvd.nist.gov/vuln/detail/CVE-2022-46337)  | 
|  CVE-2023-0833  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-0833](https://nvd.nist.gov/vuln/detail/CVE-2023-0833)  | 
|  CVE-2023-1370  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-1370](https://nvd.nist.gov/vuln/detail/CVE-2023-1370)  | 
|  CVE-2023-1436  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-1436](https://nvd.nist.gov/vuln/detail/CVE-2023-1436)  | 
|  CVE-2023-20863  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-20863](https://nvd.nist.gov/vuln/detail/CVE-2023-20863)  | 
|  CVE-2023-25194  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-25194](https://nvd.nist.gov/vuln/detail/CVE-2023-25194)  | 
|  CVE-2023-33201  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-33201](https://nvd.nist.gov/vuln/detail/CVE-2023-33201)  | 
|  CVE-2023-33202  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-33202](https://nvd.nist.gov/vuln/detail/CVE-2023-33202)  | 
|  CVE-2023-34453  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-34453](https://nvd.nist.gov/vuln/detail/CVE-2023-34453)  | 
|  CVE-2023-34454  |  high  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-34454](https://nvd.nist.gov/vuln/detail/CVE-2023-34454)  | 
|  CVE-2023-39410  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-39410](https://nvd.nist.gov/vuln/detail/CVE-2023-39410)  | 
|  CVE-2023-42503  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-42503](https://nvd.nist.gov/vuln/detail/CVE-2023-42503)  | 
|  CVE-2023-5072  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-5072](https://nvd.nist.gov/vuln/detail/CVE-2023-5072)  | 
|  CVE-2023-50868  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-50868](https://nvd.nist.gov/vuln/detail/CVE-2023-50868)  | 
|  CVE-2023-52428  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-52428](https://nvd.nist.gov/vuln/detail/CVE-2023-52428)  | 
|  CVE-2023-6378  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-6378](https://nvd.nist.gov/vuln/detail/CVE-2023-6378)  | 
|  CVE-2023-6481  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-6481](https://nvd.nist.gov/vuln/detail/CVE-2023-6481)  | 
|  CVE-2024-21634  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-21634](https://nvd.nist.gov/vuln/detail/CVE-2024-21634)  | 
|  CVE-2024-23944  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-23944](https://nvd.nist.gov/vuln/detail/CVE-2024-23944)  | 
|  CVE-2024-29131  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-29131](https://nvd.nist.gov/vuln/detail/CVE-2024-29131)  | 
|  CVE-2024-30171  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-30171](https://nvd.nist.gov/vuln/detail/CVE-2024-30171)  | 
|  CVE-2024-30172  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-30172](https://nvd.nist.gov/vuln/detail/CVE-2024-30172)  | 
|  CVE-2024-34447  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-34447](https://nvd.nist.gov/vuln/detail/CVE-2024-34447)  | 
|  CVE-2024-35255  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-35255](https://nvd.nist.gov/vuln/detail/CVE-2024-35255)  | 
|  CVE-2024-36114  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-36114](https://nvd.nist.gov/vuln/detail/CVE-2024-36114)  | 
|  CVE-2024-38808  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-38808](https://nvd.nist.gov/vuln/detail/CVE-2024-38808)  | 
|  CVE-2024-39676  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-39676](https://nvd.nist.gov/vuln/detail/CVE-2024-39676)  | 
|  CVE-2024-51504  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-51504](https://nvd.nist.gov/vuln/detail/CVE-2024-51504)  | 
|  CVE-2024-7254  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-7254](https://nvd.nist.gov/vuln/detail/CVE-2024-7254)  | 
|  CVE-2017-17485  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2017-17485](https://nvd.nist.gov/vuln/detail/CVE-2017-17485)  | 
|  CVE-2018-14719  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-14719)-2018-14719  | 
|  CVE-2018-14720  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-14720)-2018-14720  | 
|  CVE-2018-19362  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2018-19362](https://nvd.nist.gov/vuln/detail/CVE-2018-19362)  | 
|  CVE-2020-10650  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-10650](https://nvd.nist.gov/vuln/detail/CVE-2020-10650)  | 
|  CVE-2020-10968  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-10968)-2020-10968  | 
|  CVE-2020-13936  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-13936)-2020-13936  | 
|  CVE-2020-14062  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-14062)-2020-14062  | 
|  CVE-2020-15522  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-15522)-2020-15522  | 
|  CVE-2020-1945  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-1945](https://nvd.nist.gov/vuln/detail/CVE-2020-1945)  | 
|  CVE-2020-28052  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-28052](https://nvd.nist.gov/vuln/detail/CVE-2020-28052)  | 
|  CVE-2020-35490  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-35490](https://nvd.nist.gov/vuln/detail/CVE-2020-35490)  | 
|  CVE-2021-36373  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2021-36373](https://nvd.nist.gov/vuln/detail/CVE-2021-36373)  | 
|  CVE-2022-25647  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-202225647](https://nvd.nist.gov/vuln/detail/CVE-2022-25647)  | 
|  CVE-202238750  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-202238750](https://nvd.nist.gov/vuln/detail/CVE-2022-38750)  | 
|  CVE-202238752  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-202238752](https://nvd.nist.gov/vuln/detail/CVE-2022-38752)  | 
|  CVE-2022-42004  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2022-42004](https://nvd.nist.gov/vuln/detail/CVE-2022-42004)  | 
|  CVE-2022-46751  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-202246751](https://nvd.nist.gov/vuln/detail/CVE-2022-46751)  | 
|  CVE-2023-20883  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-20883](https://nvd.nist.gov/vuln/detail/CVE-2023-20883)  | 
|  CVE-2023-26048  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-26048](https://nvd.nist.gov/vuln/detail/CVE-2023-26048)  | 
|  CVE-2023-2976  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-2976](https://nvd.nist.gov/vuln/detail/CVE-2023-2976)  | 
|  CVE-2023-36478  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-36478](https://nvd.nist.gov/vuln/detail/CVE-2023-36478)  | 
|  CVE-2023-51074  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-51074](https://nvd.nist.gov/vuln/detail/CVE-2023-51074)  | 
|  CVE-2024-25638  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-25638](https://nvd.nist.gov/vuln/detail/CVE-2024-25638)  | 
|  CVE-2024-25710  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-25710](https://nvd.nist.gov/vuln/detail/CVE-2024-25710)  | 
|  CVE-2024-26308  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-26308](https://nvd.nist.gov/vuln/detail/CVE-2024-26308)  | 
|  CVE-2024-29133  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-29133](https://nvd.nist.gov/vuln/detail/CVE-2024-29133)  | 
|  CVE-2024-47554  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-47554](https://nvd.nist.gov/vuln/detail/CVE-2024-47554)  | 
|  CVE-2024-47561  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-47561](https://nvd.nist.gov/vuln/detail/CVE-2024-47561)  | 
|  CVE-2024-6763  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-6763](https://nvd.nist.gov/vuln/detail/CVE-2024-6763)  | 
|  CVE-2012-6153  |  BAJA  |  [https://nvd.nist. gov/vuln/detail/CVE-2012-6153](https://nvd.nist.gov/vuln/detail/CVE-2012-6153)  | 
|  CVE-2020-11113  |  BAJA  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-11113](https://nvd.nist.gov/vuln/detail/CVE-2020-11113)  | 
|  CVE-2021-22570  |  BAJA  |  [https://nvd.nist. gov/vuln/detail/CVE-2021-22570](https://nvd.nist.gov/vuln/detail/CVE-2021-22570)  | 
|  CVE-2021-27568  |  BAJA  |  [https://nvd.nist. gov/vuln/detail/CVE-2021-27568](https://nvd.nist.gov/vuln/detail/CVE-2021-27568)  | 
|  CVE-2024-29857  |  BAJA  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-29857](https://nvd.nist.gov/vuln/detail/CVE-2024-29857)  | 
|  CVE-2017-7525  |  SIN CLASIFICAR  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2017-7525)-2017-7525  | 
|  CVE-2018-11307  |  SIN CLASIFICAR  |  [https://nvd.nist. gov/vuln/detail/CVE-2018-11307](https://nvd.nist.gov/vuln/detail/CVE-2018-11307)  | 
|  CVE-2018-1313  |  SIN CLASIFICAR  |  [https://nvd.nist. gov/vuln/detail/CVE-2018-1313](https://nvd.nist.gov/vuln/detail/CVE-2018-1313)  | 
|  CVE-2018-19360  |  SIN CLASIFICAR  |  [https://nvd.nist. gov/vuln/detail/CVE-2018-19360](https://nvd.nist.gov/vuln/detail/CVE-2018-19360)  | 
|  CVE-2019-16335  |  SIN CLASIFICAR  |  [https://nvd.nist. gov/vuln/detail/CVE-2019-16335](https://nvd.nist.gov/vuln/detail/CVE-2019-16335)  | 
|  CVE-2019-16943  |  SIN CLASIFICAR  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-16943)-2019-16943  | 
|  CVE-2020-36180  |  SIN CLASIFICAR  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36180](https://nvd.nist.gov/vuln/detail/CVE-2020-36180)  | 
|  CVE-2021-37136  |  SIN CLASIFICAR  |  [https://nvd.nist. gov/vuln/detail/CVE-2021-37136](https://nvd.nist.gov/vuln/detail/CVE-2021-37136)  | 
|  CVE-202224329  |  SIN CLASIFICAR  |  [https://nvd.nist. gov/vuln/detail/CVE-202224329](https://nvd.nist.gov/vuln/detail/CVE-2022-24329)  | 
|  CVE-2022-39135  |  SIN CLASIFICAR  |  [https://nvd.nist. gov/vuln/detail/CVE-202239135](https://nvd.nist.gov/vuln/detail/CVE-2022-39135)  | 
|  CVE-2022-40149  |  SIN CLASIFICAR  |  [https://nvd.nist. gov/vuln/detail/CVE-202240149](https://nvd.nist.gov/vuln/detail/CVE-2022-40149)  | 
|  CVE-2023-26049  |  SIN CLASIFICAR  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-26049](https://nvd.nist.gov/vuln/detail/CVE-2023-26049)  | 

## Notas de la versión 7.5.0
<a name="emr-750-relnotes"></a>

Las siguientes notas de la versión incluyen información sobre la versión 7.5.0 de Amazon EMR.

**Nuevas características**
+ **Actualizaciones de la aplicación**: Amazon EMR 7.5.0 application upgrades include Delta 3.2.1-amzn-0, HBase 2.5.10, Hudi 0.15.0-amzn-2, and Iceberg 1.6.1-amzn-1.
+ Los registros de escritura anticipada (WAL) de EMR permiten la replicación entre clústeres. Para obtener más información, consulte [EMR WAL cross-cluster replication](https://docs.aws.amazon.com/emr/latest/ReleaseGuide/emr-hbase-wal-cross-cluster.html).

**Problemas conocidos**
+ Apache Sqoop se retiró a partir de la versión 7.5 de Amazon EMR y versiones posteriores.
+ **Cuando el escalado gestionado está activado, el YARN ResourceManager (RM) sufre un grave problema de bloqueo que hace que deje de responder al pasar del estado de desmantelamiento al de **desmantelamiento** con operaciones simultáneas.** Esto sucede especialmente en entornos con clústeres de gran tamaño. Cuando esto ocurre, tanto las transiciones entre el estado del nodo como las transiciones entre el estado de la aplicación y el estado de la aplicación no se procesan, lo que paraliza la funcionalidad principal del. ResourceManager Como solución alternativa, reinicie la JVM del RM con el siguiente comando en el nodo principal:

  ```
  sudo systemctl restart hadoop-yarn-resourcemanager
  ```
+ Cuando se inicia un clúster de EMR con programadores YARN distintos del `CapacityScheduler` o `FairScheduler` (por ejemplo, el programador FIFO), la `YARNMemoryAvailablePercentage` métrica no se transfiere a. CloudWatch Este problema afecta la reducción de capacidad en clústeres con escalado administrado habilitado. También puede afectar un escalado administrado personalizado si depende de la métrica `YARNMemoryAvailablePercentage`. Como solución alternativa, utilice `CapacityScheduler` o `FairScheduler`.
+  **HBase creación de tablas en el catálogo Hive with Glue**: desde EMR-7.3.0 hasta EMR-7.10.0, hay un error debido a la integración de Hive Iceberg, que hace que la HBase creación de tablas en Hive falle cuando se utiliza Glue Data Catalog como metaalmacén. Ponte en contacto con el equipo de soporte si tienes este problema. AWS 
+  **IU de Tez**: de EMR-7.3 a EMR-7.10, hay un error que hace que el acceso a la IU de Tez a través de la interfaz de usuario web de YARN Resource Manager falle cuando se habilita el cifrado en tránsito. Esto ocurre porque el proxy YARN intenta usar el protocolo HTTP, mientras que la interfaz de usuario de Tez requiere HTTPS. Modifique la `tez.tez-ui.history-url.base` configuración en `tez-site` de `http` a `https` para resolver este problema.

**Cambios, mejoras y problemas resueltos**
+  A partir de Spark 3.3.1 (compatible con las versiones 6.10 y posteriores de EMR), todos los ejecutores de un host de desmantelamiento pasan a un nuevo `ExecutorState`, denominado estado de *RETIRADA*. Yarn no puede utilizar los ejecutores que se están retirando para asignar tareas y, por lo tanto, solicitará nuevos ejecutores, si es necesario, para las tareas que se están ejecutando. Por lo tanto, si deshabilita Spark DRA mientras usa EMR Managed Scaling, EMR Auto Scaling o cualquier mecanismo de escalado personalizado en los clústeres de EMR-EC2, Yarn puede solicitar el máximo de ejecutores permitidos para cada trabajo. Para evitar este problema, deje la propiedad `spark.dynamicAllocation.enabled` establecida en `TRUE` (que es la predeterminada) cuando utilice la combinación de características anterior. Además, también puede establecer restricciones de ejecutor mínimas y máximas si configura valores para las propiedades `spark.dynamicAllocation.maxExecutors` y `spark.dynamicAllocation.minExecutors` para sus trabajos de Spark, a fin de restringir el número de ejecutores asignados durante la ejecución del trabajo. 
+ Amazon EMR utiliza diferentes compilaciones de la TensorFlow biblioteca, en función de los tipos de instancias que elija para el clúster. Amazon EMR también admite clústeres con tipos TensorFlow de instancias **aarch64** (instancias Graviton) de EMR-7.5.0 y versiones posteriores.

  En la siguiente tabla, se muestran las compilaciones por tipo de instancia para EMR-7.5.0.    
[\[See the AWS documentation website for more details\]](http://docs.aws.amazon.com/es_es/emr/latest/ReleaseGuide/emr-750-release.html)
+ Un clúster Amazon EMR habilitado para AWS Lake Formation con FGAC (Fine-Grained Access Control) ahora puede admitir hasta 256 pasos simultáneos con la siguiente configuración de hdfs-site.xml:

  ```
  [
    {
      "Classification": "hdfs-site",
      "Properties": {
        "dfs.datanode.handler.count": "40",
        "dfs.datanode.max.transfer.threads": "16384",
        "dfs.namenode.handler.count": "64",
        "dfs.replication": "1"
      }
    },
    {
      "Classification": "hdfs-env",
      "Configurations": [
        {
          "Classification": "export",
          "Properties": {
            "HADOOP_DATANODE_HEAPSIZE": "5120"
          }
        }
      ],
      "Properties": {}
    }
  ]
  ```
+     
[\[See the AWS documentation website for more details\]](http://docs.aws.amazon.com/es_es/emr/latest/ReleaseGuide/emr-750-release.html)

## Versiones Java predeterminadas de 7.5.0
<a name="emr-750-jdk"></a>

La versión 7.5 y posteriores de Amazon EMR incluyen Amazon Corretto 17 (basado en OpenJDK) de forma predeterminada para las aplicaciones compatibles con Corretto 17 (JDK 17), con la excepción de Apache Livy.

En la siguiente tabla se muestran las versiones predeterminadas de Java para las aplicaciones de Amazon EMR 7.5.0. Si desea cambiar la JVM predeterminada del clúster, siga las instrucciones de [Configuración de aplicaciones para utilizar una máquina virtual de Java específica](configuring-java8.md) para cada aplicación que se ejecute en el clúster. Solo se puede usar una versión de tiempo de ejecución de Java en un clúster. Amazon EMR no admite la ejecución de distintos nodos o aplicaciones en distintas versiones de tiempo de ejecución en el mismo clúster.


| Aplicación | Versión de Java o Amazon Corretto (el valor predeterminado está en negrita) | 
| --- | --- | 
| Delta | 17, 11, 8 | 
| Flink | 17, 11, 8 | 
| HBase | 17, 11, 8 | 
| HCatalog | 17, 11, 8 | 
| Hadoop | 17, 11, 8 | 
| Hive | 17, 11, 8 | 
| Hudi | 17, 11, 8 | 
| Iceberg | 17, 11, 8 | 
| Livy | 17, 11, 8 | 
| Oozie | 17, 11, 8 | 
| Phoenix | 17, 11, 8 | 
| PrestoDB | 8 | 
| Spark | 17, 11, 8 | 
| Spark RAPIDS | 17, 11, 8 | 
| Tez | 17, 11, 8 | 
| Trino | 21, 17 | 
| Zeppelin | 17, 11, 8 | 
| Pig | 8 | 
| ZooKeeper | 17, 11, 8 | 

## Versiones de componentes 7.5.0
<a name="emr-750-components"></a>

A continuación, se muestran los componentes que Amazon EMR instala con esta versión. Algunos se instalan como parte de paquetes de aplicación de macrodatos. Otros son exclusivos de Amazon EMR y se instalan para ciertos procesos y características del sistema. Normalmente, estos componentes comienzan con `emr` o `aws`. Normalmente, los paquetes de aplicación de macrodatos de la versión más reciente de Amazon EMR son las versiones más recientes que pueden encontrarse en la comunidad. Intentamos que las versiones de la comunidad estén disponibles en Amazon EMR lo más rápido posible.

Algunos componentes de Amazon EMR son distintos de las versiones que se encuentran en la comunidad. Estos componentes tienen una etiqueta de versión con el formato `CommunityVersion-amzn-EmrVersion`. La `EmrVersion` empieza por 0. Por ejemplo, si un componente de la comunidad de código abierto llamado `myapp-component` con la versión 2.2 se ha modificado tres veces para incluirlo en diferentes versiones de lanzamiento de Amazon EMR, la versión que se mostrará será `2.2-amzn-2`.


| Componente | Versión | Description (Descripción) | 
| --- | --- | --- | 
| adot-java-agent | 1.31.0 | Un agente Java que recopila métricas de los daemons de las aplicaciones. | 
| delta | 3.2.1-amzn-0 | Delta Lake es un formato de tabla abierto para conjuntos de datos analíticos de gran tamaño | 
| emr-amazon-cloudwatch-agent | 1.300032.2-amzn-0 | Se trata de una aplicación que recopila métricas internas de nivel de sistema y métricas de aplicación personalizadas de las instancias de Amazon EC2. | 
| emr-ddb | 5.6.0 | Conector de Amazon DynamoDB para aplicaciones del ecosistema de Hadoop. | 
| emr-goodies | 3.14.0 | Bibliotecas especialmente prácticas para el ecosistema de Hadoop. | 
| emr-kinesis | 3.18.0 | Conector de Amazon Kinesis para aplicaciones del ecosistema de Hadoop. | 
| emr-notebook-env | 1.16.0 | Entorno de Conda para cuaderno de EMR que incluye una puerta de enlace empresarial de Jupyter | 
| emr-s3-dist-cp | 2.35.0 | Aplicación de copia distribuida optimizada para Amazon S3. | 
| emr-s3-select | 2.14.0 | Conector S3Select de EMR | 
| emr-wal-cli | 1.3.1 | CLI utilizada para eliminar o enumerar WAL de ERM. | 
| emrfs | 2.66,0 | Conector de Amazon S3 para aplicaciones del ecosistema de Hadoop. | 
| flink-client | 1.19.1-amzn-1 | Scripts y aplicaciones de cliente de línea de comando de Apache Flink. | 
| flink-jobmanager-config | 1.19.1-amzn-1 | Administración de recursos en nodos EMR para Apache Flink. JobManager | 
| hadoop-client | 3.4.0-amzn-1 | Los clientes de línea de comando de Hadoop como, por ejemplo "hdfs", "hadoop" o "yarn". | 
| hadoop-hdfs-datanode | 3.4.0-amzn-1 | Servicio de nivel de nodos de HDFS para el almacenamiento de bloques. | 
| hadoop-hdfs-library | 3.4.0-amzn-1 | Biblioteca y cliente de línea de comandos HDFS | 
| hadoop-hdfs-namenode | 3.4.0-amzn-1 | Servicio de HDFS para realizar un seguimiento de nombres de archivo y bloquear ubicaciones. | 
| hadoop-hdfs-journalnode | 3.4.0-amzn-1 | Servicio de HDFS para administrar los archivos de Hadoop periódico en clústeres de alta disponibilidad. | 
| hadoop-httpfs-server | 3.4.0-amzn-1 | Punto de enlace HTTP para operaciones HDFS. | 
| hadoop-kms-server | 3.4.0-amzn-1 | Servidor de administración de claves criptográficas basado en la API de Hadoop. KeyProvider  | 
| hadoop-mapred | 3.4.0-amzn-1 | MapReduce bibliotecas de motores de ejecución para ejecutar una aplicación. MapReduce  | 
| hadoop-yarn-nodemanager | 3.4.0-amzn-1 | Servicio de YARN para la administración de contenedores en un nodo individual. | 
| hadoop-yarn-resourcemanager | 3.4.0-amzn-1 | Servicio de YARN para la asignación y administración de recursos de clúster y aplicaciones distribuidas. | 
| hadoop-yarn-timeline-server | 3.4.0-amzn-1 | Servicio para recuperar información actual e histórica para aplicaciones de YARN. | 
| hbase-hmaster | 2.5.10-amzn-0 | Servicio para un HBase clúster responsable de la coordinación de las regiones y la ejecución de los comandos administrativos. | 
| hbase-region-server | 2.5.10-amzn-0 | Servicio para prestar servicio a una o más regiones. HBase  | 
| hbase-client | 2.5.10-amzn-0 | HBase cliente de línea de comandos. | 
| hbase-rest-server | 2.5.10-amzn-0 | Servicio que proporciona un punto final HTTP para. RESTful HBase | 
| hbase-thrift-server | 2.5.10-amzn-0 | Servicio que proporciona un punto final de Thrift para. HBase | 
| hbase-operator-tools | 2.5.10-amzn-0 | Herramienta de reparación de clústeres de Apache. HBase  | 
| hcatalog-client | 3.1.3-amzn-14 | El cliente de línea de comando "hcat" para manipular hcatalog-server. | 
| hcatalog-server | 3.1.3-amzn-14 | Prestación de servicios HCatalog, una capa de administración de tablas y almacenamiento para aplicaciones distribuidas. | 
| hcatalog-webhcat-server | 3.1.3-amzn-14 | Punto final HTTP que proporciona una interfaz REST para. HCatalog | 
| hive-client | 3.1.3-amzn-14 | Cliente de línea de comando de Hive. | 
| hive-hbase | 3.1.3-amzn-14 | Hive-hbase client. | 
| hive-metastore-server | 3.1.3-amzn-14 | Service para acceder al metaalmacén de Hive, un repositorio semántico que almacena metadatos para SQL en operaciones de Hadoop. | 
| hive-server2 | 3.1.3-amzn-14 | Servicio para aceptar consultas de Hive como solicitudes web. | 
| hudi | 0.15.0-amzn-2 | Marco de procesamiento incremental para impulsar la canalización de datos a baja latencia y alta eficiencia. | 
| hudi-presto | 0.15.0-amzn-2 | Biblioteca de paquetes para ejecutar Presto con Hudi. | 
| hudi-trino | 0.15.0-amzn-2 | Biblioteca de paquetes para ejecutar Trino con Hudi. | 
| hudi-spark | 0.15.0-amzn-2 | Biblioteca de paquetes para ejecutar Spark con Hudi. | 
| hue-server | 4.11.0 | Aplicación web para analizar datos con aplicaciones del ecosistema de Hadoop | 
| iceberg | 1.6.1-amzn-1 | Apache Iceberg es un formato de tabla abierto para conjuntos de datos analíticos muy grandes | 
| jupyterhub | 1.5.0 | Servidor multiusuario para blocs de notas Jupyter | 
| livy-server | 0.8.0-incubating | Interfaz de REST para interactuar con Apache Spark | 
| nginx | 1.12.1 | nginx [engine x] es un servidor HTTP y proxy inverso | 
| mariadb-server | 5.5.68\$1 | Servidor de base de datos de MariaDB. | 
| nvidia-cuda | 12.3.0 | Controladores Nvidia y conjunto de herramientas Cuda | 
| oozie-client | 5.2.1 | Cliente de línea de comando de Oozie. | 
| oozie-server | 5.2.1 | Servicio para aceptar solicitudes de flujo de trabajo de Oozie. | 
| opencv | 4.7.0 | Biblioteca de visión artificial de código abierto. | 
| phoenix-library | 5.2.0 | Las bibliotecas de Phoenix para servidor y cliente | 
| phoenix-connectors | 6.0.0 | Conectores de Apache Phoenix para Spark-3 | 
| phoenix-query-server | 6.0.0 | Un servidor ligero que proporciona acceso a JDBC, así como acceso de formato Protocol Buffers y JSON al API de Avatica  | 
| presto-coordinator | 0.287-amzn-0 | Servicio para aceptar las consultas y administrar la ejecución de consultas entre presto-workers. | 
| presto-worker | 0.287-amzn-0 | Service para ejecutar partes de una consulta. | 
| presto-client | 0.287-amzn-0 | Cliente de línea de comandos Presto que se instala en los nodos principales en espera de un clúster de HA donde el servidor Presto no se ha iniciado. | 
| trino-coordinator | 446-amzn-0 | Servicio para aceptar consultas y administrar la ejecución de consultas entre trino-workers. | 
| trino-worker | 446-amzn-0 | Service para ejecutar partes de una consulta. | 
| trino-client | 446-amzn-0 | Cliente de línea de comandos Trino que se instala en los maestros en espera de un clúster de HA donde el servidor Trino no se ha iniciado. | 
| pig-client | 0.17.0 | Cliente de línea de comando de Pig. | 
| r | 4.3.2 | Proyecto R para análisis estadístico | 
| ranger-kms-server | 2.0.0 | Sistema de administración de claves Apache Ranger | 
| spark-client | 3.5.2-amzn-1 | Clientes de línea de comando de Spark. | 
| spark-history-server | 3.5.2-amzn-1 | IU web para la visualización de eventos registrados durante la vida útil de una aplicación Spark completada. | 
| spark-on-yarn | 3.5.2-amzn-1 | Motor de ejecución en memoria para YARN. | 
| spark-yarn-slave | 3.5.2-amzn-1 | Bibliotecas de Apache Spark necesarias para esclavos de YARN. | 
| spark-rapids | 24.08.1-amzn-1 | El complemento Nvidia Spark RAPIDS que acelera Apache Spark con. GPUs | 
| tensorflow | 2.16.1 | TensorFlow biblioteca de software de código abierto para computación numérica de alto rendimiento. | 
| tez-on-yarn | 0.10.2-amzn-12 | La aplicación YARN de tez y bibliotecas. | 
| tez-on-worker | 0.10.2-amzn-12 | La aplicación YARN de tez y bibliotecas para nodos de trabajo. | 
| zeppelin-server | 0.11.1 | Bloc de notas basado en web que permite el análisis de datos interactivo. | 
| zookeeper-server | 3.9.2-amzn-0 | Servicio centralizado para mantener información de configuración, nomenclatura, proporcionar sincronización distribuida y proporcionar servicios de grupo. | 
| zookeeper-client | 3.9.2-amzn-0 | ZooKeeper cliente de línea de comandos. | 

## clasificaciones de configuración de 7.5.0
<a name="emr-750-class"></a>

Las clasificaciones de configuración le permiten personalizar las aplicaciones. Suelen corresponder a un archivo XML de configuración para la aplicación como, por ejemplo, `hive-site.xml`. Para obtener más información, consulte [Configuración de aplicaciones](emr-configure-apps.md).

Las acciones de reconfiguración se producen cuando se especifica una configuración para los grupos de instancias de un clúster en ejecución. Amazon EMR solo inicia acciones de reconfiguración para las clasificaciones que se modifican. Para obtener más información, consulte [Reconfiguración de un grupo de instancias en un clúster en ejecución](emr-configure-apps-running-cluster.md).


**clasificaciones emr-7.5.0**  

| Clasificaciones | Description (Descripción) | Acciones de reconfiguración | 
| --- | --- | --- | 
| capacity-scheduler | Cambiar los valores en el archivo capacity-scheduler.xml de Hadoop. | Restarts the ResourceManager service. | 
| container-executor | Cambie los valores en el archivo container-executor.cfg de Hadoop YARN. | Not available. | 
| container-log4j | Cambiar los valores en el archivo container-log4j.properties de Hadoop YARN. | Not available. | 
| core-site | Cambiar los valores en el archivo core-site.xml de Hadoop. | Restarts the Hadoop HDFS services Namenode, SecondaryNamenode, Datanode, ZKFC, and Journalnode. Restarts the Hadoop YARN services ResourceManager, NodeManager, ProxyServer, and TimelineServer. Additionally restarts Hadoop KMS, Ranger KMS, HiveServer2, Hive MetaStore, Hadoop Httpfs, and MapReduce-HistoryServer. | 
| docker-conf | Cambie la configuración relacionada con el docker. | Not available. | 
| emrfs-site | Cambiar la configuración de EMRFS. | Restarts the Hadoop HDFS services Namenode, SecondaryNamenode, Datanode, ZKFC, and Journalnode. Restarts the Hadoop YARN services ResourceManager, NodeManager, ProxyServer, and TimelineServer. Additionally restarts HBaseRegionserver, HBaseMaster, HBaseThrift, HBaseRest, HiveServer2, Hive MetaStore, Hadoop Httpfs, and MapReduce-HistoryServer. | 
| flink-conf | Cambiar la configuración de flink-conf.yaml. | Restarts Flink history server. | 
| flink-log4j | Cambiar la configuración de log4j.properties de Flink. | Restarts Flink history server. | 
| flink-log4j-session | Cambie la configuración de Flink log4j-session.properties para la sesión. Kubernetes/Yarn  | Restarts Flink history server. | 
| flink-log4j-cli | Cambiar la configuración de log4j-cli.properties de Flink. | Restarts Flink history server. | 
| hadoop-env | Cambiar los valores en el entorno de Hadoop para todos los componentes de Hadoop. | Restarts the Hadoop HDFS services Namenode, SecondaryNamenode, Datanode, ZKFC, and Journalnode. Restarts the Hadoop YARN services ResourceManager, NodeManager, ProxyServer, and TimelineServer. Additionally restarts PhoenixQueryserver, HiveServer2, Hive MetaStore, and MapReduce-HistoryServer. | 
| hadoop-log4j | Cambiar los valores en el archivo log4j.properties de Hadoop. | Restarts the Hadoop HDFS services SecondaryNamenode, Datanode, and Journalnode. Restarts the Hadoop YARN services ResourceManager, NodeManager, ProxyServer, and TimelineServer. Additionally restarts Hadoop KMS, Hadoop Httpfs, and MapReduce-HistoryServer. | 
| hadoop-ssl-server | Cambiar la configuración del servidor ssl de Hadoop | Not available. | 
| hadoop-ssl-client | Cambiar la configuración del cliente ssl de Hadoop | Not available. | 
| hbase | Configuraciones seleccionadas por Amazon EMR para Apache. HBase | Custom EMR specific property. Sets emrfs-site and hbase-site configs. See those for their associated restarts. | 
| hbase-env | Cambie los valores en su entorno HBase. | Restarts the HBase services RegionServer, HBaseMaster, ThriftServer, RestServer. | 
| hbase-log4j | Cambie los valores en el archivo HBase hbase-log4j.properties. | Restarts the HBase services RegionServer, HBaseMaster, ThriftServer, RestServer. | 
| hbase-metrics | Cambie los valores en el archivo hadoop-metrics2-hbase.properties. HBase | Restarts the HBase services RegionServer, HBaseMaster, ThriftServer, RestServer. | 
| hbase-policy | Cambie los valores en HBase el archivo hbase-policy.xml. | Not available. | 
| hbase-site | Cambie los valores en HBase el archivo hbase-site.xml. | Restarts the HBase services RegionServer, HBaseMaster, ThriftServer, RestServer. Additionally restarts Phoenix QueryServer. | 
| hdfs-encryption-zones | Configurar zonas de cifrado de HDFS. | This classification should not be reconfigured. | 
| hdfs-env | Cambiar los valores en el entorno de HDFS. | Restarts Hadoop HDFS services Namenode, Datanode, and ZKFC. | 
| hdfs-site | Cambiar los valores en hdfs-site.xml de HDFS. | Restarts the Hadoop HDFS services Namenode, SecondaryNamenode, Datanode, ZKFC, and Journalnode. Additionally restarts Hadoop Httpfs. | 
| hcatalog-env | Cambie los valores en HCatalog el entorno. | Restarts Hive HCatalog Server. | 
| hcatalog-server-jndi | Cambie los valores en HCatalog jndi.properties. | Restarts Hive HCatalog Server. | 
| hcatalog-server-proto-hive-site | Cambie los valores en .xml HCatalog. proto-hive-site | Restarts Hive HCatalog Server. | 
| hcatalog-webhcat-env | Cambie los valores en el entorno HCat de la HCatalog Web. | Restarts Hive WebHCat server. | 
| hcatalog-webhcat-log4j2 | Cambie los valores en las propiedades HCatalog HCat log4j2.properties de la Web. | Restarts Hive WebHCat server. | 
| hcatalog-webhcat-site | Cambie los valores del archivo webhcat-site.xml de la HCatalog WebHCat. | Restarts Hive WebHCat server. | 
| hive | Configuración de Amazon EMR mantenida para Apache Hive. | Sets configurations to launch Hive LLAP service. | 
| hive-beeline-log4j2 | Cambiar los valores en el archivo beeline-log4j2.properties de Hive. | Not available. | 
| hive-parquet-logging | Cambiar los valores en el archivo parquet-logging.properties de Hive. | Not available. | 
| hive-env | Cambiar los valores en el entorno de Hive. | Restarts HiveServer2, HiveMetastore, and Hive HCatalog-Server. Runs Hive schemaTool CLI commands to verify hive-metastore. | 
| hive-exec-log4j2 | Cambie los valores en el archivo hive-exec-log 4j2.properties de Hive. | Not available. | 
| hive-llap-daemon-log4j2 | Cambie los valores en el archivo 4j2.properties de Hive. llap-daemon-log | Not available. | 
| hive-log4j2 | Cambiar los valores en el archivo hive-log4j2.properties de Hive. | Not available. | 
| hive-site | Cambiar los valores en el archivo hive-site.xml de Hive. | Restarts HiveServer2, HiveMetastore, and Hive HCatalog-Server. Runs Hive schemaTool CLI commands to verify hive-metastore. Also restarts Oozie and Zeppelin. | 
| hiveserver2-site | Cambiar los valores en el archivo hiveserver2-site.xml de Hive Server2. | Not available. | 
| hue-ini | Cambiar los valores en el archivo ini de Hue | Restarts Hue. Also activates Hue config override CLI commands to pick up new configurations. | 
| httpfs-env | Cambiar los valores en el entorno de HTTPFS. | Restarts Hadoop Httpfs service. | 
| httpfs-site | Cambiar los valores en el archivo httpfs-site.xml de Hadoop. | Restarts Hadoop Httpfs service. | 
| hadoop-kms-acls | Cambiar los valores en el archivo kms-acls.xml de Hadoop. | Not available. | 
| hadoop-kms-env | Cambiar los valores en el entorno de Hadoop KMS. | Restarts Hadoop-KMS service. | 
| hadoop-kms-java-home | Cambie la página de inicio de Java de KMS de Hadoop | Not available. | 
| hadoop-kms-log4j | Cambiar los valores en el archivo kms-log4j.properties de Hadoop. | Not available. | 
| hadoop-kms-site | Cambiar los valores en el archivo kms-site.xml de Hadoop. | Restarts Hadoop-KMS and Ranger-KMS service. | 
| hudi-env | Cambiar los valores en el entorno de Hudi. | Not available. | 
| hudi-defaults | Cambie los valores en el archivo hudi-defaults.conf de Hudi. | Not available. | 
| iceberg-defaults | Cambie los valores del archivo iceberg-defaults.conf de Iceberg. | Not available. | 
| delta-defaults | Cambie los valores del archivo delta-defaults.conf de Delta. | Not available. | 
| jupyter-notebook-conf | Cambiar los valores en el archivo jupyter\$1notebook\$1config.py de Jupyter Notebook. | Not available. | 
| jupyter-hub-conf | Cambie los valores en JupyterHubs el archivo jupyterhub\$1config.py. | Not available. | 
| jupyter-s3-conf | Configurar la persistencia en S3 del bloc de notas de Jupyter. | Not available. | 
| jupyter-sparkmagic-conf | Cambiar los valores en el archivo config.json de Sparkmagic. | Not available. | 
| livy-conf | Cambiar los valores en el archivo livy.conf de Livy. | Restarts Livy Server. | 
| livy-env | Cambiar los valores en el entorno de Livy. | Restarts Livy Server. | 
| livy-log4j2 | Cambiar la configuración de log4j2.properties de Livy. | Restarts Livy Server. | 
| mapred-env | Cambie los valores en el entorno de la MapReduce aplicación. | Restarts Hadoop MapReduce-HistoryServer. | 
| mapred-site | Cambie los valores en el archivo mapred-site.xml de la MapReduce aplicación. | Restarts Hadoop MapReduce-HistoryServer. | 
| oozie-env | Cambiar los valores en el entorno de Oozie. | Restarts Oozie. | 
| oozie-log4j | Cambiar los valores en el archivo oozie-log4j.properties de Oozie. | Restarts Oozie. | 
| oozie-site | Cambiar los valores en el archivo oozie-site.xml de Oozie. | Restarts Oozie. | 
| phoenix-hbase-metrics | Cambiar los valores en el archivo hadoop-metrics2-hbase.properties de Phoenix. | Not available. | 
| phoenix-hbase-site | Cambiar los valores en el archivo hbase-site.xml de Phoenix. | Not available. | 
| phoenix-log4j2 | Cambiar los valores en el archivo log4j2.properties de Phoenix. | Restarts Phoenix-QueryServer. | 
| phoenix-metrics | Cambiar los valores en el archivo hadoop-metrics2-phoenix.properties de Phoenix. | Not available. | 
| pig-env | Cambiar los valores en el entorno de Pig. | Not available. | 
| pig-properties | Cambiar los valores en el archivo pig.properties de Pig. | Restarts Oozie. | 
| pig-log4j | Cambiar los valores en el archivo log4j.properties de Pig. | Not available. | 
| presto-log | Cambiar los valores en el archivo log.properties de Presto. | Restarts Presto-Server (for PrestoDB) | 
| presto-config | Cambiar los valores en el archivo config.properties de Presto. | Restarts Presto-Server (for PrestoDB) | 
| presto-password-authenticator | Cambiar los valores en el archivo password-authenticator.properties de Presto. | Not available. | 
| presto-env | Cambiar valores en el archivo presto-env.sh de Presto. | Restarts Presto-Server (for PrestoDB) | 
| presto-node | Cambiar valores en el archivo node.properties de Presto. | Not available. | 
| presto-connector-blackhole | Cambiar los valores en el archivo blackhole.properties de Presto. | Not available. | 
| presto-connector-cassandra | Cambiar los valores en el archivo cassandra.properties de Presto. | Not available. | 
| presto-connector-hive | Cambiar los valores en el archivo hive.properties de Presto. | Restarts Presto-Server (for PrestoDB) | 
| presto-connector-jmx | Cambiar los valores en el archivo jmx.properties de Presto. | Not available. | 
| presto-connector-kafka | Cambiar los valores en el archivo kafka.properties de Presto. | Not available. | 
| presto-connector-lakeformation | Cambiar los valores en el archivo lakeformation.properties de Presto. | Restarts Presto-Server (for PrestoDB) | 
| presto-connector-localfile | Cambiar los valores en el archivo localfile.properties de Presto. | Not available. | 
| presto-connector-memory | Cambiar los valores del archivo memory.properties de Presto. | Not available. | 
| presto-connector-mongodb | Cambiar los valores en el archivo mongodb.properties de Presto. | Not available. | 
| presto-connector-mysql | Cambiar los valores en el archivo mysql.properties de Presto. | Not available. | 
| presto-connector-postgresql | Cambiar los valores en el archivo postgresql.properties de Presto. | Not available. | 
| presto-connector-raptor | Cambiar los valores en el archivo raptor.properties de Presto. | Not available. | 
| presto-connector-redis | Cambiar los valores en el archivo redis.properties de Presto. | Not available. | 
| presto-connector-redshift | Cambiar los valores en el archivo redshift.properties de Presto. | Not available. | 
| presto-connector-tpch | Cambiar los valores en el archivo tpch.properties de Presto. | Not available. | 
| presto-connector-tpcds | Cambiar los valores del archivo tpcds.properties de Presto. | Not available. | 
| trino-log | Cambiar los valores en el archivo log.properties de Trino. | Restarts Trino-Server (for Trino) | 
| trino-config | Cambiar los valores en el archivo config.properties de Trino. | Restarts Trino-Server (for Trino) | 
| trino-password-authenticator | Cambiar los valores en el archivo password-authenticator.properties de Trino. | Restarts Trino-Server (for Trino) | 
| trino-env | Cambie los valores del archivo trino-env.sh de Trino. | Restarts Trino-Server (for Trino) | 
| trino-node | Cambiar los valores en el archivo node.properties de Trino. | Not available. | 
| trino-connector-blackhole | Cambiar los valores en el archivo blackhole.properties de Trino. | Not available. | 
| trino-connector-cassandra | Cambiar los valores en el archivo cassandra.properties de Trino. | Not available. | 
| trino-connector-delta | Cambie los valores del archivo delta.properties de Trino. | Restarts Trino-Server (for Trino) | 
| trino-connector-hive | Cambiar los valores en el archivo hive.properties de Trino. | Restarts Trino-Server (for Trino) | 
| trino-exchange-manager | Cambie los valores del archivo exchange-manager.properties de Trino. | Restarts Trino-Server (for Trino) | 
| trino-connector-iceberg | Cambiar los valores en el archivo iceberg.properties de Trino. | Restarts Trino-Server (for Trino) | 
| trino-connector-hudi | Cambiar los valores en el archivo hudi.properties de Trino. | Restarts Trino-Server (for Trino) | 
| trino-connector-jmx | Cambiar los valores en el archivo jmx.properties de Trino. | Not available. | 
| trino-connector-kafka | Cambiar los valores en el archivo kafka.properties de Trino. | Not available. | 
| trino-connector-localfile | Cambiar los valores en el archivo localfile.properties de Trino. | Not available. | 
| trino-connector-memory | Cambiar los valores en el archivo memory.properties de Trino. | Not available. | 
| trino-connector-mongodb | Cambiar los valores en el archivo mongodb.properties de Trino. | Not available. | 
| trino-connector-mysql | Cambiar los valores en el archivo mysql.properties de Trino. | Not available. | 
| trino-connector-postgresql | Cambiar los valores en el archivo postgresql.properties de Trino. | Not available. | 
| trino-connector-raptor | Cambiar los valores en el archivo raptor.properties de Trino. | Not available. | 
| trino-connector-redis | Cambiar los valores en el archivo redis.properties de Trino. | Not available. | 
| trino-connector-redshift | Cambiar los valores en el archivo redshift.properties de Trino. | Not available. | 
| trino-connector-tpch | Cambiar los valores en el archivo tpch.properties de Trino. | Not available. | 
| trino-connector-tpcds | Cambiar los valores en el archivo tpcds.properties de Trino. | Not available. | 
| ranger-kms-dbks-site | Cambie los valores del archivo dbks-site.xml de Ranger KMS. | Restarts Ranger KMS Server. | 
| ranger-kms-site | Cambie los valores en el ranger-kms-site archivo.xml de Ranger KMS. | Restarts Ranger KMS Server. | 
| ranger-kms-env | Cambie los valores del entorno Ranger KMS. | Restarts Ranger KMS Server. | 
| ranger-kms-logback | Cambie los valores del archivo kms-logback.xml de Ranger KMS. | Not available. | 
| ranger-kms-db-ca | Cambie los valores del archivo CA en S3 para la conexión SSL de MySQL con Ranger KMS. | Not available. | 
| spark | Configuración de Amazon EMR mantenida para Apache Spark. | This property modifies spark-defaults. See actions there. | 
| spark-defaults | Cambiar los valores en el archivo spark-defaults.conf de Spark. | Restarts Spark history server and Spark thrift server. | 
| spark-env | Cambiar los valores en el entorno de Spark. | Restarts Spark history server and Spark thrift server. | 
| spark-hive-site | Cambiar los valores en el archivo hive-site.xml de Spark. | Not available. | 
| spark-log4j2 | Cambiar los valores en el archivo log4j2.properties de Spark. | Restarts Spark history server and Spark thrift server. | 
| spark-metrics | Cambiar los valores en el archivo metrics.properties de Spark. | Restarts Spark history server and Spark thrift server. | 
| tez-site | Cambiar los valores en el archivo tez-site.xml de Tez. | Restart Oozie and HiveServer2. | 
| yarn-env | Cambiar los valores en el entorno de YARN. | Restarts the Hadoop YARN services ResourceManager, NodeManager, ProxyServer, and TimelineServer. Additionally restarts MapReduce-HistoryServer. | 
| yarn-site | Cambiar los valores en el archivo yarn-site.xml de YARN. | Restarts the Hadoop YARN services ResourceManager, NodeManager, ProxyServer, and TimelineServer. Additionally restarts Livy Server and MapReduce-HistoryServer. | 
| zeppelin-env | Cambiar los valores en el entorno de Zeppelin. | Restarts Zeppelin. | 
| zeppelin-site | Cambie los ajustes de configuración de zeppelin-site.xml. | Restarts Zeppelin. | 
| zookeeper-config | Cambie los valores en el ZooKeeper archivo zoo.cfg. | Restarts Zookeeper server. | 
| zookeeper-logback | Cambie los valores en ZooKeeper el archivo logback.xml. | Restarts Zookeeper server. | 
| emr-metrics | Cambie la configuración de la métrica EMR para este nodo. | Restarts the CloudWatchAgent service. | 

## 7.5.0 registro de cambios
<a name="750-changelog"></a>


**Registro de cambios de la versión 7.5.0 y de las notas de la versión**  

| Date | Event | Description (Descripción) | 
| --- | --- | --- | 
| 21-11-2020 | Publicación de documentos | Las notas de la versión de Amazon EMR 7.5.0 se publicaron por primera vez | 
| 21-11-2021 | Implementación completa | [Amazon EMR 7.5.0 se ha implementado completamente en todas las regiones compatibles](https://aws.amazon.com/about-aws/global-infrastructure/regional-product-services/) | 
| 13 de noviembre de 2022 | Versión inicial | Amazon EMR 7.5.0 se implementó por primera vez en las regiones comerciales iniciales | 

# Amazon EMR versión 7.4.0
<a name="emr-740-release"></a>

## Ciclo de vida compatible con 7.4.0
<a name="emr-740-supported-lifecycle"></a>

En la siguiente tabla se describen las fechas de ciclo de vida admitidas para la versión 7.4.0 de Amazon EMR.


| Fase de soporte | Date | 
| --- | --- | 
| Fecha de lanzamiento inicial | 13 de noviembre de 2024 | 
| Soporte estándar hasta | 12 de noviembre de 2026 | 
| Fin del soporte | 13 de noviembre de 2026 | 
| Fin de vida útil | 13 de noviembre de 2027 | 

## Versiones de la aplicación 7.4.0
<a name="emr-740-app-versions"></a>

Esta versión incluye las siguientes aplicaciones: [https://docs.aws.amazon.com/AmazonCloudWatch/latest/monitoring/Install-CloudWatch-Agent.html](https://docs.aws.amazon.com/AmazonCloudWatch/latest/monitoring/Install-CloudWatch-Agent.html), [https://delta.io/](https://delta.io/), [https://flink.apache.org/](https://flink.apache.org/), [http://hbase.apache.org/](http://hbase.apache.org/), [https://cwiki.apache.org/confluence/display/Hive/HCatalog](https://cwiki.apache.org/confluence/display/Hive/HCatalog), [http://hadoop.apache.org/docs/current/](http://hadoop.apache.org/docs/current/), [http://hive.apache.org/](http://hive.apache.org/), [https://hudi.apache.org](https://hudi.apache.org), [http://gethue.com/](http://gethue.com/), [https://iceberg.apache.org/](https://iceberg.apache.org/), [https://jupyter-enterprise-gateway.readthedocs.io/en/latest/](https://jupyter-enterprise-gateway.readthedocs.io/en/latest/), [https://jupyterhub.readthedocs.io/en/latest/#](https://jupyterhub.readthedocs.io/en/latest/#), [https://livy.incubator.apache.org/](https://livy.incubator.apache.org/), [http://oozie.apache.org/](http://oozie.apache.org/), [https://phoenix.apache.org/](https://phoenix.apache.org/), [http://pig.apache.org/](http://pig.apache.org/), [https://prestodb.io/](https://prestodb.io/), [https://spark.apache.org/docs/latest/](https://spark.apache.org/docs/latest/), [http://sqoop.apache.org/](http://sqoop.apache.org/), [https://www.tensorflow.org/](https://www.tensorflow.org/), [https://tez.apache.org/](https://tez.apache.org/), [https://trino.io/](https://trino.io/), [https://zeppelin.incubator.apache.org/](https://zeppelin.incubator.apache.org/) y [https://zookeeper.apache.org](https://zookeeper.apache.org).

En la siguiente tabla se enumeran las versiones de la aplicación disponibles en esta versión de Amazon EMR y las versiones de la aplicación en las tres versiones anteriores de Amazon EMR (cuando corresponda).

Para ver un historial completo de las versiones de la aplicación disponibles para cada versión de Amazon EMR, consulte los temas siguientes:
+ [Versiones de las aplicaciones en las versiones 7.x de Amazon EMR](emr-release-app-versions-7.x.md)
+ [Versiones de la aplicación en las versiones 6.x de Amazon EMR](emr-release-app-versions-6.x.md)
+ [Versiones de la aplicación en las versiones 5.x de Amazon EMR](emr-release-app-versions-5.x.md)
+ [Versiones de la aplicación en las versiones 4.x de Amazon EMR](emr-release-app-versions-4.x.md)


**Información sobre la versión de la aplicación**  

|  | emr-7.4.0 | emr-7.3.0 | emr-7.2.0 | emr-7.1.0 | 
| --- | --- | --- | --- | --- | 
| AWS SDK for Java | 2.28.8, 1.12.772 | 2.25.70, 1.12.747 | 2.23.18, 1.12.705 | 2.23.18, 1.12.656 | 
| Python | 3.9, 3.11 | 3.9, 3.11 | 3.9, 3.11 | 3.9, 3.11 | 
| Scala | 2.12.18 | 2.12.18 | 2.12.17 | 2.12.17 | 
| AmazonCloudWatchAgent | 1.300032.2-amzn-0 | 1.300032.2-amzn-0 | 1.300032.2-amzn-0 | 1.300032.2-amzn-0 | 
| Delta | 3.2.0-amzn-1 | 3.2.0-amzn-0 | 3.1.0 | 3.0.0 | 
| Flink | 1.19.1-amzn-0 | 1.18.1-amzn-2 | 1.18.1-amzn-1 | 1.18.1-amzn-0 | 
| Ganglia |  -  |  -  |  -  |  -  | 
| HBase | 2.5.5-amzn-0 | 2.4.17-amzn-7 | 2.4.17-amzn-6 | 2.4.17-amzn-5 | 
| HCatalog | 3.1.3-amzn-13 | 3.1.3-amzn-12 | 3.1.3-amzn-11 | 3.1.3-amzn-10 | 
| Hadoop | 3.4.0-amzn-0 | 3.3.6-amzn-5 | 3.3.6-amzn-4 | 3.3.6-amzn-3 | 
| Hive | 3.1.3-amzn-13 | 3.1.3-amzn-12 | 3.1.3-amzn-11 | 3.1.3-amzn-10 | 
| Hudi | 0.15.0-amzn-1 | 0.15.0-amzn-0 | 0.14.1-amzn-1 | 0.14.1-amzn-0 | 
| Hue | 4.11.0 | 4.11.0 | 4.11.0 | 4.11.0 | 
| Iceberg | 1.6.1-amzn-0 | 1.5.2-amzn-0 | 1.5.0-amzn-0 | 1.4.3-amzn-0 | 
| JupyterEnterpriseGateway | 2.6.0 | 2.6.0 | 2.6.0 | 2.6.0 | 
| JupyterHub | 1.5.0 | 1.5.0 | 1.5.0 | 1.5.0 | 
| Livy | 0.8.0-incubating | 0.8.0-incubating | 0.8.0-incubating | 0.8.0-incubating | 
| MXNet |  -  |  -  | 1.9.1 | 1.9.1 | 
| Mahout |  -  |  -  |  -  |  -  | 
| Oozie | 5.2.1 | 5.2.1 | 5.2.1 | 5.2.1 | 
| Phoenix | 5.2.0 | 5.1.3 | 5.1.3 | 5.1.3 | 
| Pig | 0.17.0 | 0.17.0 | 0.17.0 | 0.17.0 | 
| Presto | 0.287-amzn-0 | 0.285-amzn-1 | 0.285-amzn-0 | 0.284-amzn-0 | 
| Spark | 3.5.2-amzn-0 | 3.5.1-amzn-1 | 3.5.1-amzn-0 | 3.5.0-amzn-1 | 
| Sqoop | 1.4.7 | 1.4.7 | 1.4.7 | 1.4.7 | 
| TensorFlow | 2.16.1 | 2.16.1 | 2.11.0 | 2.11.0 | 
| Tez | 0.10.2-amzn-11 | 0.10.2-amzn-10 | 0.10.2-amzn-9 | 0.10.2-amzn-8 | 
| Trino (PrestoSQL) | 446-amzn-0 | 442-amzn-0 | 436-amzn-0 | 435-amzn-0 | 
| Zeppelin | 0.11.1 | 0.11.1 | 0.10.1 | 0.10.1 | 
| ZooKeeper | 3.9.2-amzn-0 | 3.9.1-amzn-1 | 3.9.1-amzn-1 | 3.9.1-amzn-0 | 

# Detalles de los componentes de la versión 7.4.0
<a name="emr-740-release-components-details"></a>

Consulte la siguiente tabla para obtener más información sobre los paquetes *Extras* de Amazon EMR 7.4.0.


| Aplicación | Tipo de aplicación | Package | Tipo de Package | Versión de paquete | 
| --- | --- | --- | --- | --- | 
|  AmazonCloudWatchAgent  |  Core  |  hadoop-hdfs-journalnode  |  Extras  |  3.3.6.amzn.5-1.amzn2023  | 
|  AmazonCloudWatchAgent  |  Core  |  ranger-kms  |  Extras  |  2.0.0-1.amzn2023  | 
|  AmazonCloudWatchAgent  |  Core  |  s3-dist-cp  |  Extras  |  2.33.0-1.amzn2023  | 
|  AmazonCloudWatchAgent  |  Core  |  ZooKeeper  |  Extras  |  3.9.1.amzn.1-1.amzn2023  | 
|  AmazonCloudWatchAgent  |  Core  |  zookeeper-server  |  Extras  |  3.9.1.amzn.1-1.amzn2023  | 
|  Flink  |  Core  |  hadoop-client  |  Extras  |  3.3.6.amzn.5-1.amzn2023  | 
|  Flink  |  Core  |  hadoop-hdfs  |  Extras  |  3.3.6.amzn.5-1.amzn2023  | 
|  Flink  |  Core  |  hadoop-hdfs-datanode  |  Extras  |  3.3.6.amzn.5-1.amzn2023  | 
|  Flink  |  Core  |  hadoop-hdfs-journalnode  |  Extras  |  3.3.6.amzn.5-1.amzn2023  | 
|  Flink  |  Core  |  hadoop-hdfs-namenode  |  Extras  |  3.3.6.amzn.5-1.amzn2023  | 
|  Flink  |  Core  |  hadoop-httpfs  |  Extras  |  3.3.6.amzn.5-1.amzn2023  | 
|  Flink  |  Core  |  hadoop-kms  |  Extras  |  3.3.6.amzn.5-1.amzn2023  | 
|  Flink  |  Core  |  hadoop-mapreduce  |  Extras  |  3.3.6.amzn.5-1.amzn2023  | 
|  Flink  |  Core  |  hadoop-mapreduce-historyserver  |  Extras  |  3.3.6.amzn.5-1.amzn2023  | 
|  Flink  |  Core  |  hadoop-yarn  |  Extras  |  3.3.6.amzn.5-1.amzn2023  | 
|  Flink  |  Core  |  hadoop-yarn-nodemanager  |  Extras  |  3.3.6.amzn.5-1.amzn2023  | 
|  Flink  |  Core  |  hadoop-yarn-proxyserver  |  Extras  |  3.3.6.amzn.5-1.amzn2023  | 
|  Flink  |  Core  |  hadoop-yarn-resourcemanager  |  Extras  |  3.3.6.amzn.5-1.amzn2023  | 
|  Flink  |  Core  |  hadoop-yarn-timelineserver  |  Extras  |  3.3.6.amzn.5-1.amzn2023  | 
|  Flink  |  Core  |  hudi  |  Extras  |  0.15.0.amzn.0-1.amzn2023  | 
|  Flink  |  Core  |  ranger-kms  |  Extras  |  2.0.0-1.amzn2023  | 
|  Flink  |  Core  |  hadoop  |  Extras  |  3.3.6.amzn.5-1.amzn2023  | 
|  HBase  |  Core  |  s3-dist-cp  |  Extras  |  2.33.0-1.amzn2023  | 
|  HCatalog  |  Core  |  hadoop-yarn-proxyserver  |  Extras  |  3.3.6.amzn.5-1.amzn2023  | 
|  HCatalog  |  Core  |  mariadb-connector-java  |  Extras  |    | 
|  Hive  |  Core  |  hadoop-httpfs  |  Extras  |  3.3.6.amzn.5-1.amzn2023  | 
|  Hive  |  Core  |  hadoop-yarn-proxyserver  |  Extras  |  3.3.6.amzn.5-1.amzn2023  | 
|  Hive  |  Core  |  hive-hbase  |  Extras  |  3.1.3.amzn.12-1.amzn2023  | 
|  Hive  |  Core  |  mariadb-connector-java  |  Extras  |  2.7.2-1  | 
|  Hive  |  Core  |  s3-dist-cp  |  Extras  |  2.33.0-1.amzn2023  | 
|  Phoenix  |  Core  |  s3-dist-cp  |  Extras  |  2.33.0-1.amzn2023  | 
|  Spark  |  Core  |  spark-datanucleus  |  Extras  |  3.5.1.amzn.0-1.amzn2023  | 
|  Tez  |  Core  |  hadoop-mapreduce  |  Extras  |  3.3.6.amzn.5-1.amzn2023  | 
|  Tez  |  Core  |  hadoop-mapreduce-historyserver  |  Extras  |  3.3.6.amzn.5-1.amzn2023  | 
|  Tez  |  Core  |  hadoop-yarn-proxyserver  |  Extras  |  3.3.6.amzn.5-1.amzn2023  | 
|  Trino  |  Core  |  bigtop-utils  |  Extras  |  1.2.0-1.amzn2023  | 
|  Trino  |  Core  |  hadoop-client  |  Extras  |  3.3.6.amzn.5-1.amzn2023  | 
|  Trino  |  Core  |  hadoop-hdfs  |  Extras  |  3.3.6.amzn.5-1.amzn2023  | 
|  Trino  |  Core  |  hadoop-hdfs-datanode  |  Extras  |  3.3.6.amzn.5-1.amzn2023  | 
|  Trino  |  Core  |  hadoop-hdfs-journalnode  |  Extras  |  3.3.6.amzn.5-1.amzn2023  | 
|  Trino  |  Core  |  hadoop-hdfs-namenode  |  Extras  |  3.3.6.amzn.5-1.amzn2023  | 
|  Trino  |  Core  |  hadoop-kms  |  Extras  |  3.3.6.amzn.5-1.amzn2023  | 
|  Trino  |  Core  |  hadoop-mapreduce  |  Extras  |  3.3.6.amzn.5-1.amzn2023  | 
|  Trino  |  Core  |  hadoop-mapreduce-historyserver  |  Extras  |  3.3.6.amzn.5-1.amzn2023  | 
|  Trino  |  Core  |  hadoop-yarn  |  Extras  |  3.3.6.amzn.5-1.amzn2023  | 
|  Trino  |  Core  |  hadoop-yarn-nodemanager  |  Extras  |  3.3.6.amzn.5-1.amzn2023  | 
|  Trino  |  Core  |  hadoop-yarn-proxyserver  |  Extras  |  3.3.6.amzn.5-1.amzn2023  | 
|  Trino  |  Core  |  hadoop-yarn-resourcemanager  |  Extras  |  3.3.6.amzn.5-1.amzn2023  | 
|  Trino  |  Core  |  hadoop-yarn-timelineserver  |  Extras  |  3.3.6.amzn.5-1.amzn2023  | 
|  Trino  |  Core  |  hive  |  Extras  |  3.1.3.amzn.12-1.amzn2023  | 
|  Trino  |  Core  |  hive-hcatalog-server  |  Extras  |  3.1.3.amzn.12-1.amzn2023  | 
|  Trino  |  Core  |  mariadb-connector-java  |  Extras  |  2.7.2-1  | 
|  Trino  |  Core  |  ranger-kms  |  Extras  |  2.0.0-1.amzn2023  | 
|  Trino  |  Core  |  ZooKeeper  |  Extras  |  3.9.1.amzn.1-1.amzn2023  | 
|  Trino  |  Core  |  zookeeper-server  |  Extras  |  3.9.1.amzn.1-1.amzn2023  | 
|  Trino  |  Core  |  bigtop-groovy  |  Extras  |  2.5.4-1.amzn2023  | 
|  Trino  |  Core  |  bigtop-jsvc  |  Extras  |  1.2.4-1.amzn2023  | 
|  Trino  |  Core  |  hadoop  |  Extras  |  3.3.6.amzn.5-1.amzn2023  | 
|  Trino  |  Core  |  hadoop-lzo  |  Extras  |  0.4.19-1.amzn2023  | 
|  Trino  |  Core  |  hive-hcatalog  |  Extras  |  3.1.3.amzn.12-1.amzn2023  | 
|  Trino  |  Core  |  hive-jdbc  |  Extras  |  3.1.3.amzn.12-1.amzn2023  | 
|  ZooKeeper  |  Core  |  emrfs  |  Extras  |  2.64.0-1.amzn2023  | 
|  ZooKeeper  |  Core  |  hadoop-client  |  Extras  |  3.3.6.amzn.5-1.amzn2023  | 
|  ZooKeeper  |  Core  |  hadoop-hdfs  |  Extras  |  3.3.6.amzn.5-1.amzn2023  | 
|  ZooKeeper  |  Core  |  hadoop-hdfs-datanode  |  Extras  |  3.3.6.amzn.5-1.amzn2023  | 
|  ZooKeeper  |  Core  |  hadoop-hdfs-journalnode  |  Extras  |  3.3.6.amzn.5-1.amzn2023  | 
|  ZooKeeper  |  Core  |  hadoop-hdfs-namenode  |  Extras  |  3.3.6.amzn.5-1.amzn2023  | 
|  ZooKeeper  |  Core  |  hadoop-httpfs  |  Extras  |  3.3.6.amzn.5-1.amzn2023  | 
|  ZooKeeper  |  Core  |  hadoop-kms  |  Extras  |  3.3.6.amzn.5-1.amzn2023  | 
|  ZooKeeper  |  Core  |  hadoop-mapreduce  |  Extras  |  3.3.6.amzn.5-1.amzn2023  | 
|  ZooKeeper  |  Core  |  hadoop-mapreduce-historyserver  |  Extras  |  3.3.6.amzn.5-1.amzn2023  | 
|  ZooKeeper  |  Core  |  hadoop-yarn  |  Extras  |  3.3.6.amzn.5-1.amzn2023  | 
|  ZooKeeper  |  Core  |  hadoop-yarn-nodemanager  |  Extras  |  3.3.6.amzn.5-1.amzn2023  | 
|  ZooKeeper  |  Core  |  hadoop-yarn-proxyserver  |  Extras  |  3.3.6.amzn.5-1.amzn2023  | 
|  ZooKeeper  |  Core  |  hadoop-yarn-resourcemanager  |  Extras  |  3.3.6.amzn.5-1.amzn2023  | 
|  ZooKeeper  |  Core  |  hadoop-yarn-timelineserver  |  Extras  |  3.3.6.amzn.5-1.amzn2023  | 
|  ZooKeeper  |  Core  |  ranger-kms  |  Extras  |  2.0.0-1.amzn2023  | 

# 7.4.0 vulnerabilidades y exposiciones comunes
<a name="740-common-vulnerabilities-exposures"></a>

La siguiente tabla muestra todo lo CVEs que no afecta a los clústeres de EMR que se ejecutan en las configuraciones recomendadas de Amazon EMR 7.4.0. Amazon EMR depende del código abierto original para la disponibilidad de las correcciones y proporcionará la última versión estable como parte de los componentes del motor principal en un plazo de 90 días a partir de su verificación por parte de Amazon EMR.

Esta tabla se actualizó el 14 de noviembre de 2024.


| ID de CVE | Gravedad | URL de detalles del CVE | 
| --- | --- | --- | 
|  CVE-2013-4002  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2013-4002)-2013-4002  | 
|  CVE-2015-1832  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2015-1832](https://nvd.nist.gov/vuln/detail/CVE-2015-1832)  | 
|  CVE-2017-7525  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2017-7525)-2017-7525  | 
|  CVE-2018-11307  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2018-11307](https://nvd.nist.gov/vuln/detail/CVE-2018-11307)  | 
|  CVE-2018-12022  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2018-12022](https://nvd.nist.gov/vuln/detail/CVE-2018-12022)  | 
|  CVE-2018-14718  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-14718)-2018-14718  | 
|  CVE-2018-19360  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2018-19360](https://nvd.nist.gov/vuln/detail/CVE-2018-19360)  | 
|  CVE-2019-12384  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-12384)-2019-12384  | 
|  CVE-2019-14379  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2019-14379](https://nvd.nist.gov/vuln/detail/CVE-2019-14379)  | 
|  CVE-2019-14439  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-14439)-2019-14439  | 
|  CVE-2019-16335  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2019-16335](https://nvd.nist.gov/vuln/detail/CVE-2019-16335)  | 
|  CVE-2019-16943  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-16943)-2019-16943  | 
|  CVE-2020-10672  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-10672](https://nvd.nist.gov/vuln/detail/CVE-2020-10672)  | 
|  CVE-2020-10673  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-10673](https://nvd.nist.gov/vuln/detail/CVE-2020-10673)  | 
|  CVE-2020-11112  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-11112](https://nvd.nist.gov/vuln/detail/CVE-2020-11112)  | 
|  CVE-2020-13949  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-13949)-2020-13949  | 
|  CVE-2020-14195  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-14195](https://nvd.nist.gov/vuln/detail/CVE-2020-14195)  | 
|  CVE-2020-17521  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-17521)-2020-17521  | 
|  CVE-2020-24616  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-24616](https://nvd.nist.gov/vuln/detail/CVE-2020-24616)  | 
|  CVE-2020-24750  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-24750](https://nvd.nist.gov/vuln/detail/CVE-2020-24750)  | 
|  CVE-2020-25649  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-25649](https://nvd.nist.gov/vuln/detail/CVE-2020-25649)  | 
|  CVE-2020-36183  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36183](https://nvd.nist.gov/vuln/detail/CVE-2020-36183)  | 
|  CVE-2020-36186  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36186](https://nvd.nist.gov/vuln/detail/CVE-2020-36186)  | 
|  CVE-2020-36188  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36188](https://nvd.nist.gov/vuln/detail/CVE-2020-36188)  | 
|  CVE-2020-36189  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36189](https://nvd.nist.gov/vuln/detail/CVE-2020-36189)  | 
|  CVE-2020-8908  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-8908](https://nvd.nist.gov/vuln/detail/CVE-2020-8908)  | 
|  CVE-2021-37137  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2021-37137](https://nvd.nist.gov/vuln/detail/CVE-2021-37137)  | 
|  CVE-2021-38153  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2021-38153](https://nvd.nist.gov/vuln/detail/CVE-2021-38153)  | 
|  CVE-2022-25857  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-202225857](https://nvd.nist.gov/vuln/detail/CVE-2022-25857)  | 
|  CVE-2022-3509  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2022-3509](https://nvd.nist.gov/vuln/detail/CVE-2022-3509)  | 
|  CVE-2022-37866  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-202237866](https://nvd.nist.gov/vuln/detail/CVE-2022-37866)  | 
|  CVE-2022-39135  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-202239135](https://nvd.nist.gov/vuln/detail/CVE-2022-39135)  | 
|  CVE-2022-41966  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2022-41966](https://nvd.nist.gov/vuln/detail/CVE-2022-41966)  | 
|  CVE-2022-45688  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-45688)-202245688  | 
|  CVE-2023-34455  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-34455](https://nvd.nist.gov/vuln/detail/CVE-2023-34455)  | 
|  CVE-2023-3635  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-3635](https://nvd.nist.gov/vuln/detail/CVE-2023-3635)  | 
|  CVE-2023-38647  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-38647](https://nvd.nist.gov/vuln/detail/CVE-2023-38647)  | 
|  CVE-2023-40167  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-40167](https://nvd.nist.gov/vuln/detail/CVE-2023-40167)  | 
|  CVE-2023-43642  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-43642](https://nvd.nist.gov/vuln/detail/CVE-2023-43642)  | 
|  CVE-2023-44981  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-44981](https://nvd.nist.gov/vuln/detail/CVE-2023-44981)  | 
|  CVE-2023-50387  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-50387](https://nvd.nist.gov/vuln/detail/CVE-2023-50387)  | 
|  CVE-2024-23454  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-23454](https://nvd.nist.gov/vuln/detail/CVE-2024-23454)  | 
|  CVE-2024-29025  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-29025](https://nvd.nist.gov/vuln/detail/CVE-2024-29025)  | 
|  CVE-2024-36124  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-36124](https://nvd.nist.gov/vuln/detail/CVE-2024-36124)  | 
|  CVE-2024-8184  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-8184](https://nvd.nist.gov/vuln/detail/CVE-2024-8184)  | 
|  CVE-2012-0881  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2012-0881](https://nvd.nist.gov/vuln/detail/CVE-2012-0881)  | 
|  CVE-2012-5783  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2012-5783](https://nvd.nist.gov/vuln/detail/CVE-2012-5783)  | 
|  CVE-2015-5237  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2015-5237)-2015-5237  | 
|  CVE-2016-5018  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2016-5018)-2016-5018  | 
|  CVE-2016-6796  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2016-6796)-2016-6796  | 
|  CVE-2017-15095  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2017-15095)-2017-15095  | 
|  CVE-2018-1000180  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2018-1000180](https://nvd.nist.gov/vuln/detail/CVE-2018-1000180)  | 
|  CVE-2018-10054  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2018-10054](https://nvd.nist.gov/vuln/detail/CVE-2018-10054)  | 
|  CVE-2018-10237  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2018-10237](https://nvd.nist.gov/vuln/detail/CVE-2018-10237)  | 
|  CVE-2018-11798  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2018-11798](https://nvd.nist.gov/vuln/detail/CVE-2018-11798)  | 
|  CVE-2018-12023  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2018-12023](https://nvd.nist.gov/vuln/detail/CVE-2018-12023)  | 
|  CVE-2018-14721  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-14721)-2018-14721  | 
|  CVE-2018-19361  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2018-19361](https://nvd.nist.gov/vuln/detail/CVE-2018-19361)  | 
|  CVE-2018-5968  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-5968)-2018-5968  | 
|  CVE-2018-7489  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2018-7489](https://nvd.nist.gov/vuln/detail/CVE-2018-7489)  | 
|  CVE-2019-0205  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2019-0205](https://nvd.nist.gov/vuln/detail/CVE-2019-0205)  | 
|  CVE-2019-12086  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-12086)-2019-12086  | 
|  CVE-2019-12814  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-12814)-2019-12814  | 
|  CVE-2019-14540  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-14540)-2019-14540  | 
|  CVE-2019-14892  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-14892)-2019-14892  | 
|  CVE-2019-14893  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-14893)-2019-14893  | 
|  CVE-2019-16869  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-16869)-2019-16869  | 
|  CVE-2019-16942  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-16942)-2019-16942  | 
|  CVE-2019-17267  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2019-17267](https://nvd.nist.gov/vuln/detail/CVE-2019-17267)  | 
|  CVE-2019-17531  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-17531)-2019-17531  | 
|  CVE-2019-20330  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2019-20330](https://nvd.nist.gov/vuln/detail/CVE-2019-20330)  | 
|  CVE-2019-20444  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2019-20444](https://nvd.nist.gov/vuln/detail/CVE-2019-20444)  | 
|  CVE-2019-20445  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2019-20445](https://nvd.nist.gov/vuln/detail/CVE-2019-20445)  | 
|  CVE-2020-10969  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-10969)-2020-10969  | 
|  CVE-2020-11111  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-11111](https://nvd.nist.gov/vuln/detail/CVE-2020-11111)  | 
|  CVE-2020-11619  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-11619)-2020-11619  | 
|  CVE-2020-11620  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-11620](https://nvd.nist.gov/vuln/detail/CVE-2020-11620)  | 
|  CVE-2020-13955  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-13955)-2020-13955  | 
|  CVE-2020-13956  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-13956)-2020-13956  | 
|  CVE-2020-14060  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-14060)-2020-14060  | 
|  CVE-2020-14061  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-14061)-2020-14061  | 
|  CVE-2020-15250  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-15250](https://nvd.nist.gov/vuln/detail/CVE-2020-15250)  | 
|  CVE-2020-26939  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-26939](https://nvd.nist.gov/vuln/detail/CVE-2020-26939)  | 
|  CVE-2020-35491  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-35491](https://nvd.nist.gov/vuln/detail/CVE-2020-35491)  | 
|  CVE-2020-35728  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-35728](https://nvd.nist.gov/vuln/detail/CVE-2020-35728)  | 
|  CVE-2020-36179  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36179](https://nvd.nist.gov/vuln/detail/CVE-2020-36179)  | 
|  CVE-2020-36181  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36181](https://nvd.nist.gov/vuln/detail/CVE-2020-36181)  | 
|  CVE-2020-36182  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36182](https://nvd.nist.gov/vuln/detail/CVE-2020-36182)  | 
|  CVE-2020-36184  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36184](https://nvd.nist.gov/vuln/detail/CVE-2020-36184)  | 
|  CVE-2020-36185  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36185](https://nvd.nist.gov/vuln/detail/CVE-2020-36185)  | 
|  CVE-2020-36187  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36187](https://nvd.nist.gov/vuln/detail/CVE-2020-36187)  | 
|  CVE-2020-36518  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36518](https://nvd.nist.gov/vuln/detail/CVE-2020-36518)  | 
|  CVE-2020-8840  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-8840](https://nvd.nist.gov/vuln/detail/CVE-2020-8840)  | 
|  CVE-2020-9546  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-9546](https://nvd.nist.gov/vuln/detail/CVE-2020-9546)  | 
|  CVE-2020-9547  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-9547](https://nvd.nist.gov/vuln/detail/CVE-2020-9547)  | 
|  CVE-2020-9548  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-9548](https://nvd.nist.gov/vuln/detail/CVE-2020-9548)  | 
|  CVE-2021-20190  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2021-20190](https://nvd.nist.gov/vuln/detail/CVE-2021-20190)  | 
|  CVE-2021-21290  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2021-21290](https://nvd.nist.gov/vuln/detail/CVE-2021-21290)  | 
|  CVE-2021-22569  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2021-22569](https://nvd.nist.gov/vuln/detail/CVE-2021-22569)  | 
|  CVE-2021-28170  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2021-28170](https://nvd.nist.gov/vuln/detail/CVE-2021-28170)  | 
|  CVE-2021-29425  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2021-29425](https://nvd.nist.gov/vuln/detail/CVE-2021-29425)  | 
|  CVE-2021-31684  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2021-31684](https://nvd.nist.gov/vuln/detail/CVE-2021-31684)  | 
|  CVE-2021-34538  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2021-34538](https://nvd.nist.gov/vuln/detail/CVE-2021-34538)  | 
|  CVE-2021-36374  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2021-36374](https://nvd.nist.gov/vuln/detail/CVE-2021-36374)  | 
|  CVE-2021-37533  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2021-37533](https://nvd.nist.gov/vuln/detail/CVE-2021-37533)  | 
|  CVE-2021-43859  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2021-43859](https://nvd.nist.gov/vuln/detail/CVE-2021-43859)  | 
|  CVE-2022-1415  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2022-1415](https://nvd.nist.gov/vuln/detail/CVE-2022-1415)  | 
|  CVE-2022-1471  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2022-1471](https://nvd.nist.gov/vuln/detail/CVE-2022-1471)  | 
|  CVE-2022-3171  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2022-3171](https://nvd.nist.gov/vuln/detail/CVE-2022-3171)  | 
|  CVE-2022-3510  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-20223510](https://nvd.nist.gov/vuln/detail/CVE-2022-3510)  | 
|  CVE-2022-36364  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-202236364](https://nvd.nist.gov/vuln/detail/CVE-2022-36364)  | 
|  CVE-2022-37865  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-202237865](https://nvd.nist.gov/vuln/detail/CVE-2022-37865)  | 
|  CVE-202238749  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-202238749](https://nvd.nist.gov/vuln/detail/CVE-2022-38749)  | 
|  CVE-202238751  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-202238751](https://nvd.nist.gov/vuln/detail/CVE-2022-38751)  | 
|  CVE-2022-40150  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-202240150](https://nvd.nist.gov/vuln/detail/CVE-2022-40150)  | 
|  CVE-202240151  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-202240151](https://nvd.nist.gov/vuln/detail/CVE-2022-40151)  | 
|  CVE-2022-40152  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-202240152](https://nvd.nist.gov/vuln/detail/CVE-2022-40152)  | 
|  CVE-2022-41854  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-41854)-2022-41854  | 
|  CVE-2022-42003  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2022-42003](https://nvd.nist.gov/vuln/detail/CVE-2022-42003)  | 
|  CVE-2022-42889  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-202242889](https://nvd.nist.gov/vuln/detail/CVE-2022-42889)  | 
|  CVE-2022-45685  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-202245685](https://nvd.nist.gov/vuln/detail/CVE-2022-45685)  | 
|  CVE-2022-45693  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-202245693](https://nvd.nist.gov/vuln/detail/CVE-2022-45693)  | 
|  CVE-2022-46337  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-202246337](https://nvd.nist.gov/vuln/detail/CVE-2022-46337)  | 
|  CVE-2023-0833  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-0833](https://nvd.nist.gov/vuln/detail/CVE-2023-0833)  | 
|  CVE-2023-1370  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-1370](https://nvd.nist.gov/vuln/detail/CVE-2023-1370)  | 
|  CVE-2023-1436  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-1436](https://nvd.nist.gov/vuln/detail/CVE-2023-1436)  | 
|  CVE-2023-20863  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-20863](https://nvd.nist.gov/vuln/detail/CVE-2023-20863)  | 
|  CVE-2023-25194  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-25194](https://nvd.nist.gov/vuln/detail/CVE-2023-25194)  | 
|  CVE-2023-33201  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-33201](https://nvd.nist.gov/vuln/detail/CVE-2023-33201)  | 
|  CVE-2023-33202  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-33202](https://nvd.nist.gov/vuln/detail/CVE-2023-33202)  | 
|  CVE-2023-34453  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-34453](https://nvd.nist.gov/vuln/detail/CVE-2023-34453)  | 
|  CVE-2023-34454  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-34454](https://nvd.nist.gov/vuln/detail/CVE-2023-34454)  | 
|  CVE-2023-39410  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-39410](https://nvd.nist.gov/vuln/detail/CVE-2023-39410)  | 
|  CVE-2023-42503  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-42503](https://nvd.nist.gov/vuln/detail/CVE-2023-42503)  | 
|  CVE-2023-5072  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-5072](https://nvd.nist.gov/vuln/detail/CVE-2023-5072)  | 
|  CVE-2023-50868  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-50868](https://nvd.nist.gov/vuln/detail/CVE-2023-50868)  | 
|  CVE-2023-52428  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-52428](https://nvd.nist.gov/vuln/detail/CVE-2023-52428)  | 
|  CVE-2023-6378  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-6378](https://nvd.nist.gov/vuln/detail/CVE-2023-6378)  | 
|  CVE-2023-6481  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-6481](https://nvd.nist.gov/vuln/detail/CVE-2023-6481)  | 
|  CVE-2024-21634  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-21634](https://nvd.nist.gov/vuln/detail/CVE-2024-21634)  | 
|  CVE-2024-23944  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-23944](https://nvd.nist.gov/vuln/detail/CVE-2024-23944)  | 
|  CVE-2024-29131  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-29131](https://nvd.nist.gov/vuln/detail/CVE-2024-29131)  | 
|  CVE-2024-30171  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-30171](https://nvd.nist.gov/vuln/detail/CVE-2024-30171)  | 
|  CVE-2024-30172  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-30172](https://nvd.nist.gov/vuln/detail/CVE-2024-30172)  | 
|  CVE-2024-34447  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-34447](https://nvd.nist.gov/vuln/detail/CVE-2024-34447)  | 
|  CVE-2024-35255  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-35255](https://nvd.nist.gov/vuln/detail/CVE-2024-35255)  | 
|  CVE-2024-36114  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-36114](https://nvd.nist.gov/vuln/detail/CVE-2024-36114)  | 
|  CVE-2024-38808  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-38808](https://nvd.nist.gov/vuln/detail/CVE-2024-38808)  | 
|  CVE-2024-39676  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-39676](https://nvd.nist.gov/vuln/detail/CVE-2024-39676)  | 
|  CVE-2024-51504  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-51504](https://nvd.nist.gov/vuln/detail/CVE-2024-51504)  | 
|  CVE-2024-7254  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-7254](https://nvd.nist.gov/vuln/detail/CVE-2024-7254)  | 
|  CVE-2017-17485  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2017-17485](https://nvd.nist.gov/vuln/detail/CVE-2017-17485)  | 
|  CVE-2018-14719  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-14719)-2018-14719  | 
|  CVE-2018-14720  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-14720)-2018-14720  | 
|  CVE-2018-19362  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2018-19362](https://nvd.nist.gov/vuln/detail/CVE-2018-19362)  | 
|  CVE-2020-10650  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-10650](https://nvd.nist.gov/vuln/detail/CVE-2020-10650)  | 
|  CVE-2020-10968  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-10968)-2020-10968  | 
|  CVE-2020-13936  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-13936)-2020-13936  | 
|  CVE-2020-14062  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-14062)-2020-14062  | 
|  CVE-2020-15522  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-15522)-2020-15522  | 
|  CVE-2020-1945  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-1945](https://nvd.nist.gov/vuln/detail/CVE-2020-1945)  | 
|  CVE-2020-28052  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-28052](https://nvd.nist.gov/vuln/detail/CVE-2020-28052)  | 
|  CVE-2020-35490  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-35490](https://nvd.nist.gov/vuln/detail/CVE-2020-35490)  | 
|  CVE-2021-36373  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2021-36373](https://nvd.nist.gov/vuln/detail/CVE-2021-36373)  | 
|  CVE-2022-25647  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-202225647](https://nvd.nist.gov/vuln/detail/CVE-2022-25647)  | 
|  CVE-202238750  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-202238750](https://nvd.nist.gov/vuln/detail/CVE-2022-38750)  | 
|  CVE-202238752  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-202238752](https://nvd.nist.gov/vuln/detail/CVE-2022-38752)  | 
|  CVE-2022-42004  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2022-42004](https://nvd.nist.gov/vuln/detail/CVE-2022-42004)  | 
|  CVE-2022-46751  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-202246751](https://nvd.nist.gov/vuln/detail/CVE-2022-46751)  | 
|  CVE-2023-20883  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-20883](https://nvd.nist.gov/vuln/detail/CVE-2023-20883)  | 
|  CVE-2023-26048  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-26048](https://nvd.nist.gov/vuln/detail/CVE-2023-26048)  | 
|  CVE-2023-2976  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-2976](https://nvd.nist.gov/vuln/detail/CVE-2023-2976)  | 
|  CVE-2023-36478  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-36478](https://nvd.nist.gov/vuln/detail/CVE-2023-36478)  | 
|  CVE-2023-51074  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-51074](https://nvd.nist.gov/vuln/detail/CVE-2023-51074)  | 
|  CVE-2024-25638  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-25638](https://nvd.nist.gov/vuln/detail/CVE-2024-25638)  | 
|  CVE-2024-25710  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-25710](https://nvd.nist.gov/vuln/detail/CVE-2024-25710)  | 
|  CVE-2024-26308  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-26308](https://nvd.nist.gov/vuln/detail/CVE-2024-26308)  | 
|  CVE-2024-29133  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-29133](https://nvd.nist.gov/vuln/detail/CVE-2024-29133)  | 
|  CVE-2024-47554  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-47554](https://nvd.nist.gov/vuln/detail/CVE-2024-47554)  | 
|  CVE-2024-47561  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-47561](https://nvd.nist.gov/vuln/detail/CVE-2024-47561)  | 
|  CVE-2024-6763  |  MEDIO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-6763](https://nvd.nist.gov/vuln/detail/CVE-2024-6763)  | 
|  CVE-2012-6153  |  BAJA  |  [https://nvd.nist. gov/vuln/detail/CVE-2012-6153](https://nvd.nist.gov/vuln/detail/CVE-2012-6153)  | 
|  CVE-2020-11113  |  BAJA  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-11113](https://nvd.nist.gov/vuln/detail/CVE-2020-11113)  | 
|  CVE-2021-22570  |  BAJA  |  [https://nvd.nist. gov/vuln/detail/CVE-2021-22570](https://nvd.nist.gov/vuln/detail/CVE-2021-22570)  | 
|  CVE-2021-27568  |  BAJA  |  [https://nvd.nist. gov/vuln/detail/CVE-2021-27568](https://nvd.nist.gov/vuln/detail/CVE-2021-27568)  | 
|  CVE-2024-29857  |  BAJA  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-29857](https://nvd.nist.gov/vuln/detail/CVE-2024-29857)  | 
|  CVE-2018-1313  |  SIN CLASIFICAR  |  [https://nvd.nist. gov/vuln/detail/CVE-2018-1313](https://nvd.nist.gov/vuln/detail/CVE-2018-1313)  | 
|  CVE-2020-36180  |  SIN CLASIFICAR  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36180](https://nvd.nist.gov/vuln/detail/CVE-2020-36180)  | 
|  CVE-2021-37136  |  SIN CLASIFICAR  |  [https://nvd.nist. gov/vuln/detail/CVE-2021-37136](https://nvd.nist.gov/vuln/detail/CVE-2021-37136)  | 
|  CVE-202224329  |  SIN CLASIFICAR  |  [https://nvd.nist. gov/vuln/detail/CVE-202224329](https://nvd.nist.gov/vuln/detail/CVE-2022-24329)  | 
|  CVE-2022-40149  |  SIN CLASIFICAR  |  [https://nvd.nist. gov/vuln/detail/CVE-202240149](https://nvd.nist.gov/vuln/detail/CVE-2022-40149)  | 
|  CVE-2023-26049  |  SIN CLASIFICAR  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-26049](https://nvd.nist.gov/vuln/detail/CVE-2023-26049)  | 

## Notas de la versión 7.4.0
<a name="emr-740-relnotes"></a>

Las siguientes notas de la versión incluyen información sobre la versión 7.4.0 de Amazon EMR.

**Nuevas características**
+ **Actualizaciones de la aplicación**: Amazon EMR 7.4.0 application upgrades include AWS SDK for Java 2.28.8, Delta 3.2.0-amzn-1, Flink 1.19.1, Hadoop 3.4.0, HBase 2.5.5, Hudi 0.15.0-amzn-1, Iceberg 1.6.1-amzn-0, Phoenix 5.2.0, Presto 0.287, Spark 3.5.2, Trino 446, and Zookeeper 3.9.2.
+ Esta versión agrega 7 puntos de enlace de código abierto que admiten el cifrado en tránsito a través de la red. Esta mejora incluye marcos de código abierto como Hue, Livy, Zookeeper y Ranger JupyterEnterpriseGateway KMS. Si ha activado el cifrado en tránsito y desea conectarse a estos puntos de conexión, es posible que tenga que modificar el código para que sea compatible con la comunicación TLS. Puede deshabilitar el TLS para cualquiera de estos puntos de conexión según sea necesario. Para obtener una lista completa de los puntos de conexión compatibles, consulte [Descripción del cifrado en tránsito](https://docs.aws.amazon.com/emr/latest/ManagementGuide/emr-encryption-support-matrix.html).

**Problemas conocidos**
+ La `yarn.resourcemanager.decommissioning-nodes-watcher.wait-for-shuffle-data` propiedad de Yarn ResourceManager, que anteriormente era compatible con los controladores de reproducción aleatoria de Hive desde la versión emr-6.11.0, ahora también permite retirar sin problemas los archivos servidos por el servicio de reproducción aleatoria externo de Spark cuando se ejecuta Spark en Yarn en emr-7.4.0.

  Tenga en cuenta que el comportamiento predeterminado del servicio aleatorio externo de Spark, cuando se ejecuta Spark en Yarn, es que Yarn elimine los archivos de reproducción aleatoria de las aplicaciones al finalizar la aplicación. NodeManager Esto puede afectar la velocidad de retirada de nodos y la utilización de cómputo. En el caso de las aplicaciones de ejecución prolongada, considere la posibilidad de configurar `spark.shuffle.service.removeShuffle` en `true` para eliminar los archivos aleatorios que ya no se utilizan, lo que permite una retirada más rápida de los nodos sin datos aleatorios de activos. 
+  Disponibilidad de Amazon S3 Select: Amazon S3 Select no admite consultas entre regiones para Presto y Trino. Para obtener más información sobre las características específicas disponibles para las versiones de Presto y Trino, consulte [Presto y Trino](https://docs.aws.amazon.com/emr/latest/ReleaseGuide/emr-presto.html).
+ Apache Ranger no es compatible con la versión 7.4 de Amazon EMR.
+ Apache Sqoop no es compatible con Apache Hadoop 3.4 por un problema conocido (SQOOP-3485). La versión 7.4 de Amazon EMR incluye Apache Sqoop, pero no lo admite. Apache Sqoop se eliminará de la versión 7.5 y versiones posteriores de Amazon EMR.
+ **Cuando el escalado gestionado está activado, el YARN ResourceManager (RM) sufre un grave problema de bloqueo que provoca que deje de responder al pasar del estado de desmantelamiento al estado de **desmantelamiento** con operaciones simultáneas.** Esto sucede especialmente en entornos con clústeres de gran tamaño. Cuando esto ocurre, tanto las transiciones entre el estado del nodo como las transiciones entre el estado de la aplicación y el estado de la aplicación no se procesan, lo que paraliza la funcionalidad principal del. ResourceManager Como solución alternativa, reinicie la JVM del RM con el siguiente comando en el nodo principal:

  ```
  sudo systemctl restart hadoop-yarn-resourcemanager
  ```
+ Cuando se inicia un clúster de EMR con programadores YARN distintos del `CapacityScheduler` o `FairScheduler` (por ejemplo, el programador FIFO), la `YARNMemoryAvailablePercentage` métrica no se transfiere a. CloudWatch Este problema afecta la reducción de capacidad en clústeres con escalado administrado habilitado. También puede afectar un escalado administrado personalizado si depende de la métrica `YARNMemoryAvailablePercentage`. Como solución alternativa, utilice `CapacityScheduler` o `FairScheduler`.
+  **HBase creación de tablas en el catálogo Hive with Glue**: desde EMR-7.3.0 hasta EMR-7.10.0, hay un error debido a la integración de Hive Iceberg, que hace que la HBase creación de tablas en Hive falle cuando se utiliza Glue Data Catalog como metaalmacén. Ponte en contacto con el equipo de soporte si tienes este problema. AWS 
+  **IU de Tez**: de EMR-7.3 a EMR-7.10, hay un error que hace que el acceso a la IU de Tez a través de la interfaz de usuario web de YARN Resource Manager falle cuando se habilita el cifrado en tránsito. Esto ocurre porque el proxy YARN intenta usar el protocolo HTTP, mientras que la interfaz de usuario de Tez requiere HTTPS. Modifique la `tez.tez-ui.history-url.base` configuración en `tez-site` de `http` a `https` para resolver este problema.

**Cambios, mejoras y problemas resueltos**
+  A partir de Spark 3.3.1 (compatible con las versiones 6.10 y posteriores de EMR), todos los ejecutores de un host de desmantelamiento pasan a un nuevo `ExecutorState`, denominado estado de *RETIRADA*. Yarn no puede utilizar los ejecutores que se están retirando para asignar tareas y, por lo tanto, solicitará nuevos ejecutores, si es necesario, para las tareas que se están ejecutando. Por lo tanto, si deshabilita Spark DRA mientras usa EMR Managed Scaling, EMR Auto Scaling o cualquier mecanismo de escalado personalizado en los clústeres de EMR-EC2, Yarn puede solicitar el máximo de ejecutores permitidos para cada trabajo. Para evitar este problema, deje la propiedad `spark.dynamicAllocation.enabled` establecida en `TRUE` (que es la predeterminada) cuando utilice la combinación de características anterior. Además, también puede establecer restricciones de ejecutor mínimas y máximas si configura valores para las propiedades `spark.dynamicAllocation.maxExecutors` y `spark.dynamicAllocation.minExecutors` para sus trabajos de Spark, a fin de restringir el número de ejecutores asignados durante la ejecución del trabajo. 
+ Amazon EMR utiliza diferentes compilaciones de la TensorFlow biblioteca en función de los tipos de instancias que elija para el clúster. Amazon EMR también admite clústeres con tipos TensorFlow de instancias aarch64 (instancias Graviton) de EMR-7.5.0 y versiones posteriores.
+ **Optimización del escalado de solicitudes S3 para cargas de trabajo Iceber**: para los clientes que utilizan Iceberg con las versiones EMR 34 v7.4, S3 ha actualizado el esquema predeterminado de entropía a un hash base-2 de 20 caracteres (p. ej., 35 01010110100110110010). Este nuevo esquema de entropía de base 2 reduce el rango de caracteres y permite que S3 escale automáticamente la capacidad de solicitudes más rápido para satisfacer la demanda de la carga de trabajo de Iceberg. También reduce el tiempo durante el cual la carga de trabajo recibe respuestas 503 por limitación.
+     
[\[See the AWS documentation website for more details\]](http://docs.aws.amazon.com/es_es/emr/latest/ReleaseGuide/emr-740-release.html)

## Versiones Java predeterminadas 7.4.0
<a name="emr-740-jdk"></a>

La versión 7.4 y superior de Amazon EMR incluye Amazon Corretto 17 (basado en OpenJDK) de forma predeterminada para las aplicaciones compatibles con Corretto 17 (JDK 17), con la excepción de Apache Livy.

En la siguiente tabla se muestran las versiones predeterminadas de Java para las aplicaciones de Amazon EMR 7.4.0. Si desea cambiar la JVM predeterminada del clúster, siga las instrucciones de [Configuración de aplicaciones para utilizar una máquina virtual de Java específica](configuring-java8.md) para cada aplicación que se ejecute en el clúster. Solo se puede usar una versión de tiempo de ejecución de Java en un clúster. Amazon EMR no admite la ejecución de distintos nodos o aplicaciones en distintas versiones de tiempo de ejecución en el mismo clúster.


| Aplicación | Versión de Java o Amazon Corretto (el valor predeterminado está en negrita) | 
| --- | --- | 
| Delta | 17, 11, 8 | 
| Flink | 17, 11, 8 | 
| HBase | 17, 11, 8 | 
| HCatalog | 17, 11, 8 | 
| Hadoop | 17, 11, 8 | 
| Hive | 17, 11, 8 | 
| Hudi | 17, 11, 8 | 
| Iceberg | 17, 11, 8 | 
| Livy | 17, 11, 8 | 
| Oozie | 17, 11, 8 | 
| Phoenix | 17, 11, 8 | 
| PrestoDB | 8 | 
| Spark | 17, 11, 8 | 
| Spark RAPIDS | 17, 11, 8 | 
| Sqoop | 8 | 
| Tez | 17, 11, 8 | 
| Trino | 21, 17 | 
| Zeppelin | 17, 11, 8 | 
| Pig | 8 | 
| ZooKeeper | 8 | 

## Versiones de los componentes 7.4.0
<a name="emr-740-components"></a>

A continuación, se muestran los componentes que Amazon EMR instala con esta versión. Algunos se instalan como parte de paquetes de aplicación de macrodatos. Otros son exclusivos de Amazon EMR y se instalan para ciertos procesos y características del sistema. Normalmente, estos componentes comienzan con `emr` o `aws`. Normalmente, los paquetes de aplicación de macrodatos de la versión más reciente de Amazon EMR son las versiones más recientes que pueden encontrarse en la comunidad. Intentamos que las versiones de la comunidad estén disponibles en Amazon EMR lo más rápido posible.

Algunos componentes de Amazon EMR son distintos de las versiones que se encuentran en la comunidad. Estos componentes tienen una etiqueta de versión con el formato `CommunityVersion-amzn-EmrVersion`. La `EmrVersion` empieza por 0. Por ejemplo, si un componente de la comunidad de código abierto llamado `myapp-component` con la versión 2.2 se ha modificado tres veces para incluirlo en diferentes versiones de lanzamiento de Amazon EMR, la versión que se mostrará será `2.2-amzn-2`.


| Componente | Versión | Description (Descripción) | 
| --- | --- | --- | 
| adot-java-agent | 1.31.0 | Un agente Java que recopila métricas de los daemons de las aplicaciones. | 
| delta | 3.2.0-amzn-1 | Delta Lake es un formato de tabla abierto para conjuntos de datos analíticos de gran tamaño | 
| emr-amazon-cloudwatch-agent | 1.300032.2-amzn-0 | Se trata de una aplicación que recopila métricas internas de nivel de sistema y métricas de aplicación personalizadas de las instancias de Amazon EC2. | 
| emr-ddb | 5.6.0 | Conector de Amazon DynamoDB para aplicaciones del ecosistema de Hadoop. | 
| emr-goodies | 3.13.0 | Bibliotecas especialmente prácticas para el ecosistema de Hadoop. | 
| emr-kinesis | 3.17.0 | Conector de Amazon Kinesis para aplicaciones del ecosistema de Hadoop. | 
| emr-notebook-env | 1.17.0 | Entorno de Conda para cuaderno de EMR que incluye una puerta de enlace empresarial de Jupyter | 
| emr-s3-dist-cp | 2.34.0 | Aplicación de copia distribuida optimizada para Amazon S3. | 
| emr-s3-select | 2.13.0 | Conector S3Select de EMR | 
| emr-wal-cli | 1.3.1 | CLI utilizada para eliminar o enumerar WAL de ERM. | 
| emrfs | 2.65,0 | Conector de Amazon S3 para aplicaciones del ecosistema de Hadoop. | 
| flink-client | 1.19.1-amzn-0 | Scripts y aplicaciones de cliente de línea de comando de Apache Flink. | 
| flink-jobmanager-config | 1.19.1-amzn-0 | Administración de recursos en nodos EMR para Apache Flink. JobManager | 
| hadoop-client | 3.4.0-amzn-0 | Los clientes de línea de comando de Hadoop como, por ejemplo "hdfs", "hadoop" o "yarn". | 
| hadoop-hdfs-datanode | 3.4.0-amzn-0 | Servicio de nivel de nodos de HDFS para el almacenamiento de bloques. | 
| hadoop-hdfs-library | 3.4.0-amzn-0 | Biblioteca y cliente de línea de comandos HDFS | 
| hadoop-hdfs-namenode | 3.4.0-amzn-0 | Servicio de HDFS para realizar un seguimiento de nombres de archivo y bloquear ubicaciones. | 
| hadoop-hdfs-journalnode | 3.4.0-amzn-0 | Servicio de HDFS para administrar los archivos de Hadoop periódico en clústeres de alta disponibilidad. | 
| hadoop-httpfs-server | 3.4.0-amzn-0 | Punto de enlace HTTP para operaciones HDFS. | 
| hadoop-kms-server | 3.4.0-amzn-0 | Servidor de administración de claves criptográficas basado en la API de Hadoop. KeyProvider  | 
| hadoop-mapred | 3.4.0-amzn-0 | MapReduce bibliotecas de motores de ejecución para ejecutar una aplicación. MapReduce  | 
| hadoop-yarn-nodemanager | 3.4.0-amzn-0 | Servicio de YARN para la administración de contenedores en un nodo individual. | 
| hadoop-yarn-resourcemanager | 3.4.0-amzn-0 | Servicio de YARN para la asignación y administración de recursos de clúster y aplicaciones distribuidas. | 
| hadoop-yarn-timeline-server | 3.4.0-amzn-0 | Servicio para recuperar información actual e histórica para aplicaciones de YARN. | 
| hbase-hmaster | 2.5.5-amzn-0 | Servicio para un HBase clúster responsable de la coordinación de las regiones y la ejecución de los comandos administrativos. | 
| hbase-region-server | 2.5.5-amzn-0 | Servicio para prestar servicio a una o más regiones. HBase  | 
| hbase-client | 2.5.5-amzn-0 | HBase cliente de línea de comandos. | 
| hbase-rest-server | 2.5.5-amzn-0 | Servicio que proporciona un punto final HTTP para. RESTful HBase | 
| hbase-thrift-server | 2.5.5-amzn-0 | Servicio que proporciona un punto final de Thrift para. HBase | 
| hbase-operator-tools | 2.5.5-amzn-0 | Herramienta de reparación de clústeres de Apache. HBase  | 
| hcatalog-client | 3.1.3-amzn-13 | El cliente de línea de comando "hcat" para manipular hcatalog-server. | 
| hcatalog-server | 3.1.3-amzn-13 | Prestación de servicios HCatalog, una capa de administración de tablas y almacenamiento para aplicaciones distribuidas. | 
| hcatalog-webhcat-server | 3.1.3-amzn-13 | Punto final HTTP que proporciona una interfaz REST para. HCatalog | 
| hive-client | 3.1.3-amzn-13 | Cliente de línea de comando de Hive. | 
| hive-hbase | 3.1.3-amzn-13 | Hive-hbase client. | 
| hive-metastore-server | 3.1.3-amzn-13 | Service para acceder al metaalmacén de Hive, un repositorio semántico que almacena metadatos para SQL en operaciones de Hadoop. | 
| hive-server2 | 3.1.3-amzn-13 | Servicio para aceptar consultas de Hive como solicitudes web. | 
| hudi | 0.15.0-amzn-1 | Marco de procesamiento incremental para impulsar la canalización de datos a baja latencia y alta eficiencia. | 
| hudi-presto | 0.15.0-amzn-1 | Biblioteca de paquetes para ejecutar Presto con Hudi. | 
| hudi-trino | 0.15.0-amzn-1 | Biblioteca de paquetes para ejecutar Trino con Hudi. | 
| hudi-spark | 0.15.0-amzn-1 | Biblioteca de paquetes para ejecutar Spark con Hudi. | 
| hue-server | 4.11.0 | Aplicación web para analizar datos con aplicaciones del ecosistema de Hadoop | 
| iceberg | 1.6.1-amzn-0 | Apache Iceberg es un formato de tabla abierto para conjuntos de datos analíticos muy grandes | 
| jupyterhub | 1.5.0 | Servidor multiusuario para blocs de notas Jupyter | 
| livy-server | 0.8.0-incubating | Interfaz de REST para interactuar con Apache Spark | 
| nginx | 1.12.1 | nginx [engine x] es un servidor HTTP y proxy inverso | 
| mariadb-server | 5.5.68\$1 | Servidor de base de datos de MariaDB. | 
| nvidia-cuda | 12.3.0 | Controladores Nvidia y conjunto de herramientas Cuda | 
| oozie-client | 5.2.1 | Cliente de línea de comando de Oozie. | 
| oozie-server | 5.2.1 | Servicio para aceptar solicitudes de flujo de trabajo de Oozie. | 
| opencv | 4.7.0 | Biblioteca de visión artificial de código abierto. | 
| phoenix-library | 5.2.0 | Las bibliotecas de Phoenix para servidor y cliente | 
| phoenix-connectors | 6.0.0 | Conectores de Apache Phoenix para Spark-3 | 
| phoenix-query-server | 6.0.0 | Un servidor ligero que proporciona acceso a JDBC, así como acceso de formato Protocol Buffers y JSON al API de Avatica  | 
| presto-coordinator | 0.287-amzn-0 | Servicio para aceptar las consultas y administrar la ejecución de consultas entre presto-workers. | 
| presto-worker | 0.287-amzn-0 | Service para ejecutar partes de una consulta. | 
| presto-client | 0.287-amzn-0 | Cliente de línea de comandos Presto que se instala en los nodos principales en espera de un clúster de HA donde el servidor Presto no se ha iniciado. | 
| trino-coordinator | 446-amzn-0 | Servicio para aceptar consultas y administrar la ejecución de consultas entre trino-workers. | 
| trino-worker | 446-amzn-0 | Service para ejecutar partes de una consulta. | 
| trino-client | 446-amzn-0 | Cliente de línea de comandos Trino que se instala en los maestros en espera de un clúster de HA donde el servidor Trino no se ha iniciado. | 
| pig-client | 0.17.0 | Cliente de línea de comando de Pig. | 
| r | 4.3.2 | Proyecto R para análisis estadístico | 
| ranger-kms-server | 2.0.0 | Sistema de administración de claves Apache Ranger | 
| spark-client | 3.5.2-amzn-0 | Clientes de línea de comando de Spark. | 
| spark-history-server | 3.5.2-amzn-0 | IU web para la visualización de eventos registrados durante la vida útil de una aplicación Spark completada. | 
| spark-on-yarn | 3.5.2-amzn-0 | Motor de ejecución en memoria para YARN. | 
| spark-yarn-slave | 3.5.2-amzn-0 | Bibliotecas de Apache Spark necesarias para esclavos de YARN. | 
| spark-rapids | 24.08.1-amzn-0 | El complemento Nvidia Spark RAPIDS que acelera Apache Spark con. GPUs | 
| sqoop-client | 1.4.7 | Cliente de línea de comando de Apache Sqoop. | 
| tensorflow | 2.16.1 | TensorFlow biblioteca de software de código abierto para computación numérica de alto rendimiento. | 
| tez-on-yarn | 0.10.2-amzn-11 | La aplicación YARN de tez y bibliotecas. | 
| tez-on-worker | 0.10.2-amzn-11 | La aplicación YARN de tez y bibliotecas para nodos de trabajo. | 
| zeppelin-server | 0.11.1 | Bloc de notas basado en web que permite el análisis de datos interactivo. | 
| zookeeper-server | 3.9.2-amzn-0 | Servicio centralizado para mantener información de configuración, nomenclatura, proporcionar sincronización distribuida y proporcionar servicios de grupo. | 
| zookeeper-client | 3.9.2-amzn-0 | ZooKeeper cliente de línea de comandos. | 

## clasificaciones de configuración 7.4.0
<a name="emr-740-class"></a>

Las clasificaciones de configuración le permiten personalizar las aplicaciones. Suelen corresponder a un archivo XML de configuración para la aplicación como, por ejemplo, `hive-site.xml`. Para obtener más información, consulte [Configuración de aplicaciones](emr-configure-apps.md).

Las acciones de reconfiguración se producen cuando se especifica una configuración para los grupos de instancias de un clúster en ejecución. Amazon EMR solo inicia acciones de reconfiguración para las clasificaciones que se modifican. Para obtener más información, consulte [Reconfiguración de un grupo de instancias en un clúster en ejecución](emr-configure-apps-running-cluster.md).


**clasificaciones emr-7.4.0**  

| Clasificaciones | Description (Descripción) | Acciones de reconfiguración | 
| --- | --- | --- | 
| capacity-scheduler | Cambiar los valores en el archivo capacity-scheduler.xml de Hadoop. | Restarts the ResourceManager service. | 
| container-executor | Cambie los valores en el archivo container-executor.cfg de Hadoop YARN. | Not available. | 
| container-log4j | Cambiar los valores en el archivo container-log4j.properties de Hadoop YARN. | Not available. | 
| core-site | Cambiar los valores en el archivo core-site.xml de Hadoop. | Restarts the Hadoop HDFS services Namenode, SecondaryNamenode, Datanode, ZKFC, and Journalnode. Restarts the Hadoop YARN services ResourceManager, NodeManager, ProxyServer, and TimelineServer. Additionally restarts Hadoop KMS, Ranger KMS, HiveServer2, Hive MetaStore, Hadoop Httpfs, and MapReduce-HistoryServer. | 
| docker-conf | Cambie la configuración relacionada con el docker. | Not available. | 
| emrfs-site | Cambiar la configuración de EMRFS. | Restarts the Hadoop HDFS services Namenode, SecondaryNamenode, Datanode, ZKFC, and Journalnode. Restarts the Hadoop YARN services ResourceManager, NodeManager, ProxyServer, and TimelineServer. Additionally restarts HBaseRegionserver, HBaseMaster, HBaseThrift, HBaseRest, HiveServer2, Hive MetaStore, Hadoop Httpfs, and MapReduce-HistoryServer. | 
| flink-conf | Cambiar la configuración de flink-conf.yaml. | Restarts Flink history server. | 
| flink-log4j | Cambiar la configuración de log4j.properties de Flink. | Restarts Flink history server. | 
| flink-log4j-session | Cambie la configuración de Flink log4j-session.properties para la sesión. Kubernetes/Yarn  | Restarts Flink history server. | 
| flink-log4j-cli | Cambiar la configuración de log4j-cli.properties de Flink. | Restarts Flink history server. | 
| hadoop-env | Cambiar los valores en el entorno de Hadoop para todos los componentes de Hadoop. | Restarts the Hadoop HDFS services Namenode, SecondaryNamenode, Datanode, ZKFC, and Journalnode. Restarts the Hadoop YARN services ResourceManager, NodeManager, ProxyServer, and TimelineServer. Additionally restarts PhoenixQueryserver, HiveServer2, Hive MetaStore, and MapReduce-HistoryServer. | 
| hadoop-log4j | Cambiar los valores en el archivo log4j.properties de Hadoop. | Restarts the Hadoop HDFS services SecondaryNamenode, Datanode, and Journalnode. Restarts the Hadoop YARN services ResourceManager, NodeManager, ProxyServer, and TimelineServer. Additionally restarts Hadoop KMS, Hadoop Httpfs, and MapReduce-HistoryServer. | 
| hadoop-ssl-server | Cambiar la configuración del servidor ssl de Hadoop | Not available. | 
| hadoop-ssl-client | Cambiar la configuración del cliente ssl de Hadoop | Not available. | 
| hbase | Configuraciones seleccionadas por Amazon EMR para Apache. HBase | Custom EMR specific property. Sets emrfs-site and hbase-site configs. See those for their associated restarts. | 
| hbase-env | Cambie los valores en su entorno HBase. | Restarts the HBase services RegionServer, HBaseMaster, ThriftServer, RestServer. | 
| hbase-log4j | Cambie los valores en el archivo HBase hbase-log4j.properties. | Restarts the HBase services RegionServer, HBaseMaster, ThriftServer, RestServer. | 
| hbase-metrics | Cambie los valores en el archivo hadoop-metrics2-hbase.properties. HBase | Restarts the HBase services RegionServer, HBaseMaster, ThriftServer, RestServer. | 
| hbase-policy | Cambie los valores en HBase el archivo hbase-policy.xml. | Not available. | 
| hbase-site | Cambie los valores en HBase el archivo hbase-site.xml. | Restarts the HBase services RegionServer, HBaseMaster, ThriftServer, RestServer. Additionally restarts Phoenix QueryServer. | 
| hdfs-encryption-zones | Configurar zonas de cifrado de HDFS. | This classification should not be reconfigured. | 
| hdfs-env | Cambiar los valores en el entorno de HDFS. | Restarts Hadoop HDFS services Namenode, Datanode, and ZKFC. | 
| hdfs-site | Cambiar los valores en hdfs-site.xml de HDFS. | Restarts the Hadoop HDFS services Namenode, SecondaryNamenode, Datanode, ZKFC, and Journalnode. Additionally restarts Hadoop Httpfs. | 
| hcatalog-env | Cambie los valores en HCatalog el entorno. | Restarts Hive HCatalog Server. | 
| hcatalog-server-jndi | Cambie los valores en HCatalog jndi.properties. | Restarts Hive HCatalog Server. | 
| hcatalog-server-proto-hive-site | Cambie los valores en .xml HCatalog. proto-hive-site | Restarts Hive HCatalog Server. | 
| hcatalog-webhcat-env | Cambie los valores en el entorno HCat de la HCatalog Web. | Restarts Hive WebHCat server. | 
| hcatalog-webhcat-log4j2 | Cambie los valores en las propiedades HCatalog HCat log4j2.properties de la Web. | Restarts Hive WebHCat server. | 
| hcatalog-webhcat-site | Cambie los valores del archivo webhcat-site.xml de la HCatalog WebHCat. | Restarts Hive WebHCat server. | 
| hive | Configuración de Amazon EMR mantenida para Apache Hive. | Sets configurations to launch Hive LLAP service. | 
| hive-beeline-log4j2 | Cambiar los valores en el archivo beeline-log4j2.properties de Hive. | Not available. | 
| hive-parquet-logging | Cambiar los valores en el archivo parquet-logging.properties de Hive. | Not available. | 
| hive-env | Cambiar los valores en el entorno de Hive. | Restarts HiveServer2, HiveMetastore, and Hive HCatalog-Server. Runs Hive schemaTool CLI commands to verify hive-metastore. | 
| hive-exec-log4j2 | Cambie los valores en el archivo hive-exec-log 4j2.properties de Hive. | Not available. | 
| hive-llap-daemon-log4j2 | Cambie los valores en el archivo 4j2.properties de Hive. llap-daemon-log | Not available. | 
| hive-log4j2 | Cambiar los valores en el archivo hive-log4j2.properties de Hive. | Not available. | 
| hive-site | Cambiar los valores en el archivo hive-site.xml de Hive. | Restarts HiveServer2, HiveMetastore, and Hive HCatalog-Server. Runs Hive schemaTool CLI commands to verify hive-metastore. Also restarts Oozie and Zeppelin. | 
| hiveserver2-site | Cambiar los valores en el archivo hiveserver2-site.xml de Hive Server2. | Not available. | 
| hue-ini | Cambiar los valores en el archivo ini de Hue | Restarts Hue. Also activates Hue config override CLI commands to pick up new configurations. | 
| httpfs-env | Cambiar los valores en el entorno de HTTPFS. | Restarts Hadoop Httpfs service. | 
| httpfs-site | Cambiar los valores en el archivo httpfs-site.xml de Hadoop. | Restarts Hadoop Httpfs service. | 
| hadoop-kms-acls | Cambiar los valores en el archivo kms-acls.xml de Hadoop. | Not available. | 
| hadoop-kms-env | Cambiar los valores en el entorno de Hadoop KMS. | Restarts Hadoop-KMS service. | 
| hadoop-kms-java-home | Cambie la página de inicio de Java de KMS de Hadoop | Not available. | 
| hadoop-kms-log4j | Cambiar los valores en el archivo kms-log4j.properties de Hadoop. | Not available. | 
| hadoop-kms-site | Cambiar los valores en el archivo kms-site.xml de Hadoop. | Restarts Hadoop-KMS and Ranger-KMS service. | 
| hudi-env | Cambiar los valores en el entorno de Hudi. | Not available. | 
| hudi-defaults | Cambie los valores en el archivo hudi-defaults.conf de Hudi. | Not available. | 
| iceberg-defaults | Cambie los valores del archivo iceberg-defaults.conf de Iceberg. | Not available. | 
| delta-defaults | Cambie los valores del archivo delta-defaults.conf de Delta. | Not available. | 
| jupyter-notebook-conf | Cambiar los valores en el archivo jupyter\$1notebook\$1config.py de Jupyter Notebook. | Not available. | 
| jupyter-hub-conf | Cambie los valores en JupyterHubs el archivo jupyterhub\$1config.py. | Not available. | 
| jupyter-s3-conf | Configurar la persistencia en S3 del bloc de notas de Jupyter. | Not available. | 
| jupyter-sparkmagic-conf | Cambiar los valores en el archivo config.json de Sparkmagic. | Not available. | 
| livy-conf | Cambiar los valores en el archivo livy.conf de Livy. | Restarts Livy Server. | 
| livy-env | Cambiar los valores en el entorno de Livy. | Restarts Livy Server. | 
| livy-log4j2 | Cambiar la configuración de log4j2.properties de Livy. | Restarts Livy Server. | 
| mapred-env | Cambie los valores en el entorno de la MapReduce aplicación. | Restarts Hadoop MapReduce-HistoryServer. | 
| mapred-site | Cambie los valores en el archivo mapred-site.xml de la MapReduce aplicación. | Restarts Hadoop MapReduce-HistoryServer. | 
| oozie-env | Cambiar los valores en el entorno de Oozie. | Restarts Oozie. | 
| oozie-log4j | Cambiar los valores en el archivo oozie-log4j.properties de Oozie. | Restarts Oozie. | 
| oozie-site | Cambiar los valores en el archivo oozie-site.xml de Oozie. | Restarts Oozie. | 
| phoenix-hbase-metrics | Cambiar los valores en el archivo hadoop-metrics2-hbase.properties de Phoenix. | Not available. | 
| phoenix-hbase-site | Cambiar los valores en el archivo hbase-site.xml de Phoenix. | Not available. | 
| phoenix-log4j2 | Cambiar los valores en el archivo log4j2.properties de Phoenix. | Restarts Phoenix-QueryServer. | 
| phoenix-metrics | Cambiar los valores en el archivo hadoop-metrics2-phoenix.properties de Phoenix. | Not available. | 
| pig-env | Cambiar los valores en el entorno de Pig. | Not available. | 
| pig-properties | Cambiar los valores en el archivo pig.properties de Pig. | Restarts Oozie. | 
| pig-log4j | Cambiar los valores en el archivo log4j.properties de Pig. | Not available. | 
| presto-log | Cambiar los valores en el archivo log.properties de Presto. | Restarts Presto-Server (for PrestoDB) | 
| presto-config | Cambiar los valores en el archivo config.properties de Presto. | Restarts Presto-Server (for PrestoDB) | 
| presto-password-authenticator | Cambiar los valores en el archivo password-authenticator.properties de Presto. | Not available. | 
| presto-env | Cambiar valores en el archivo presto-env.sh de Presto. | Restarts Presto-Server (for PrestoDB) | 
| presto-node | Cambiar valores en el archivo node.properties de Presto. | Not available. | 
| presto-connector-blackhole | Cambiar los valores en el archivo blackhole.properties de Presto. | Not available. | 
| presto-connector-cassandra | Cambiar los valores en el archivo cassandra.properties de Presto. | Not available. | 
| presto-connector-hive | Cambiar los valores en el archivo hive.properties de Presto. | Restarts Presto-Server (for PrestoDB) | 
| presto-connector-jmx | Cambiar los valores en el archivo jmx.properties de Presto. | Not available. | 
| presto-connector-kafka | Cambiar los valores en el archivo kafka.properties de Presto. | Not available. | 
| presto-connector-lakeformation | Cambiar los valores en el archivo lakeformation.properties de Presto. | Restarts Presto-Server (for PrestoDB) | 
| presto-connector-localfile | Cambiar los valores en el archivo localfile.properties de Presto. | Not available. | 
| presto-connector-memory | Cambiar los valores del archivo memory.properties de Presto. | Not available. | 
| presto-connector-mongodb | Cambiar los valores en el archivo mongodb.properties de Presto. | Not available. | 
| presto-connector-mysql | Cambiar los valores en el archivo mysql.properties de Presto. | Not available. | 
| presto-connector-postgresql | Cambiar los valores en el archivo postgresql.properties de Presto. | Not available. | 
| presto-connector-raptor | Cambiar los valores en el archivo raptor.properties de Presto. | Not available. | 
| presto-connector-redis | Cambiar los valores en el archivo redis.properties de Presto. | Not available. | 
| presto-connector-redshift | Cambiar los valores en el archivo redshift.properties de Presto. | Not available. | 
| presto-connector-tpch | Cambiar los valores en el archivo tpch.properties de Presto. | Not available. | 
| presto-connector-tpcds | Cambiar los valores del archivo tpcds.properties de Presto. | Not available. | 
| trino-log | Cambiar los valores en el archivo log.properties de Trino. | Restarts Trino-Server (for Trino) | 
| trino-config | Cambiar los valores en el archivo config.properties de Trino. | Restarts Trino-Server (for Trino) | 
| trino-password-authenticator | Cambiar los valores en el archivo password-authenticator.properties de Trino. | Restarts Trino-Server (for Trino) | 
| trino-env | Cambie los valores del archivo trino-env.sh de Trino. | Restarts Trino-Server (for Trino) | 
| trino-node | Cambiar los valores en el archivo node.properties de Trino. | Not available. | 
| trino-connector-blackhole | Cambiar los valores en el archivo blackhole.properties de Trino. | Not available. | 
| trino-connector-cassandra | Cambiar los valores en el archivo cassandra.properties de Trino. | Not available. | 
| trino-connector-delta | Cambie los valores del archivo delta.properties de Trino. | Restarts Trino-Server (for Trino) | 
| trino-connector-hive | Cambiar los valores en el archivo hive.properties de Trino. | Restarts Trino-Server (for Trino) | 
| trino-exchange-manager | Cambie los valores del archivo exchange-manager.properties de Trino. | Restarts Trino-Server (for Trino) | 
| trino-connector-iceberg | Cambiar los valores en el archivo iceberg.properties de Trino. | Restarts Trino-Server (for Trino) | 
| trino-connector-hudi | Cambiar los valores en el archivo hudi.properties de Trino. | Restarts Trino-Server (for Trino) | 
| trino-connector-jmx | Cambiar los valores en el archivo jmx.properties de Trino. | Not available. | 
| trino-connector-kafka | Cambiar los valores en el archivo kafka.properties de Trino. | Not available. | 
| trino-connector-localfile | Cambiar los valores en el archivo localfile.properties de Trino. | Not available. | 
| trino-connector-memory | Cambiar los valores en el archivo memory.properties de Trino. | Not available. | 
| trino-connector-mongodb | Cambiar los valores en el archivo mongodb.properties de Trino. | Not available. | 
| trino-connector-mysql | Cambiar los valores en el archivo mysql.properties de Trino. | Not available. | 
| trino-connector-postgresql | Cambiar los valores en el archivo postgresql.properties de Trino. | Not available. | 
| trino-connector-raptor | Cambiar los valores en el archivo raptor.properties de Trino. | Not available. | 
| trino-connector-redis | Cambiar los valores en el archivo redis.properties de Trino. | Not available. | 
| trino-connector-redshift | Cambiar los valores en el archivo redshift.properties de Trino. | Not available. | 
| trino-connector-tpch | Cambiar los valores en el archivo tpch.properties de Trino. | Not available. | 
| trino-connector-tpcds | Cambiar los valores en el archivo tpcds.properties de Trino. | Not available. | 
| ranger-kms-dbks-site | Cambie los valores del archivo dbks-site.xml de Ranger KMS. | Restarts Ranger KMS Server. | 
| ranger-kms-site | Cambie los valores en el ranger-kms-site archivo.xml de Ranger KMS. | Restarts Ranger KMS Server. | 
| ranger-kms-env | Cambie los valores del entorno Ranger KMS. | Restarts Ranger KMS Server. | 
| ranger-kms-logback | Cambie los valores del archivo kms-logback.xml de Ranger KMS. | Not available. | 
| ranger-kms-db-ca | Cambie los valores del archivo CA en S3 para la conexión SSL de MySQL con Ranger KMS. | Not available. | 
| spark | Configuración de Amazon EMR mantenida para Apache Spark. | This property modifies spark-defaults. See actions there. | 
| spark-defaults | Cambiar los valores en el archivo spark-defaults.conf de Spark. | Restarts Spark history server and Spark thrift server. | 
| spark-env | Cambiar los valores en el entorno de Spark. | Restarts Spark history server and Spark thrift server. | 
| spark-hive-site | Cambiar los valores en el archivo hive-site.xml de Spark. | Not available. | 
| spark-log4j2 | Cambiar los valores en el archivo log4j2.properties de Spark. | Restarts Spark history server and Spark thrift server. | 
| spark-metrics | Cambiar los valores en el archivo metrics.properties de Spark. | Restarts Spark history server and Spark thrift server. | 
| sqoop-env | Cambiar los valores en el entorno de Sqoop. | Not available. | 
| sqoop-oraoop-site | Cambie los valores en el archivo oraoop-site.xml de Sqoop. OraOop | Not available. | 
| sqoop-site | Cambiar los valores en el archivo sqoop-site.xml de Sqoop. | Not available. | 
| tez-site | Cambiar los valores en el archivo tez-site.xml de Tez. | Restart Oozie and HiveServer2. | 
| yarn-env | Cambiar los valores en el entorno de YARN. | Restarts the Hadoop YARN services ResourceManager, NodeManager, ProxyServer, and TimelineServer. Additionally restarts MapReduce-HistoryServer. | 
| yarn-site | Cambiar los valores en el archivo yarn-site.xml de YARN. | Restarts the Hadoop YARN services ResourceManager, NodeManager, ProxyServer, and TimelineServer. Additionally restarts Livy Server and MapReduce-HistoryServer. | 
| zeppelin-env | Cambiar los valores en el entorno de Zeppelin. | Restarts Zeppelin. | 
| zeppelin-site | Cambie los ajustes de configuración de zeppelin-site.xml. | Restarts Zeppelin. | 
| zookeeper-config | Cambie los valores en el ZooKeeper archivo zoo.cfg. | Restarts Zookeeper server. | 
| zookeeper-logback | Cambie los valores en ZooKeeper el archivo logback.xml. | Restarts Zookeeper server. | 
| emr-metrics | Cambie la configuración de la métrica EMR para este nodo. | Restarts the CloudWatchAgent service. | 

## 7.4.0 registro de cambios
<a name="740-changelog"></a>


**Registro de cambios de la versión 7.4.0 y de las notas de la versión**  

| Date | Event | Description (Descripción) | 
| --- | --- | --- | 
| 18-11-2022 | Publicación de documentos | Las notas de la versión 7.4.0 de Amazon EMR se publicaron por primera vez | 
| 13-11-2020 | Implementación completa | [Amazon EMR 7.4.0 se ha implementado completamente en todas las regiones compatibles](https://aws.amazon.com/about-aws/global-infrastructure/regional-product-services/) | 
| 31 de octubre de 2022 | Inicio de la implementación | Amazon EMR 7.4.0 se implementó por primera vez en las regiones comerciales iniciales | 

# Amazon EMR, versión 7.3.0
<a name="emr-730-release"></a>

## Ciclo de vida compatible con 7.3.0
<a name="emr-730-supported-lifecycle"></a>

En la siguiente tabla se describen las fechas de ciclo de vida admitidas para la versión 7.3.0 de Amazon EMR.


| Fase de soporte | Date | 
| --- | --- | 
| Fecha de lanzamiento inicial | 16 de octubre de 2024 | 
| Soporte estándar hasta | 15 de octubre de 2026 | 
| Fin del soporte | 16 de octubre de 2026 | 
| Fin de vida útil | 16 de octubre de 2027 | 

## Versiones de las aplicaciones de la versión 7.3.0
<a name="emr-730-app-versions"></a>

Esta versión incluye las siguientes aplicaciones: [https://docs.aws.amazon.com/AmazonCloudWatch/latest/monitoring/Install-CloudWatch-Agent.html](https://docs.aws.amazon.com/AmazonCloudWatch/latest/monitoring/Install-CloudWatch-Agent.html), [https://delta.io/](https://delta.io/), [https://flink.apache.org/](https://flink.apache.org/), [http://hbase.apache.org/](http://hbase.apache.org/), [https://cwiki.apache.org/confluence/display/Hive/HCatalog](https://cwiki.apache.org/confluence/display/Hive/HCatalog), [http://hadoop.apache.org/docs/current/](http://hadoop.apache.org/docs/current/), [http://hive.apache.org/](http://hive.apache.org/), [https://hudi.apache.org](https://hudi.apache.org), [http://gethue.com/](http://gethue.com/), [https://iceberg.apache.org/](https://iceberg.apache.org/), [https://jupyter-enterprise-gateway.readthedocs.io/en/latest/](https://jupyter-enterprise-gateway.readthedocs.io/en/latest/), [https://jupyterhub.readthedocs.io/en/latest/#](https://jupyterhub.readthedocs.io/en/latest/#), [https://livy.incubator.apache.org/](https://livy.incubator.apache.org/), [http://oozie.apache.org/](http://oozie.apache.org/), [https://phoenix.apache.org/](https://phoenix.apache.org/), [http://pig.apache.org/](http://pig.apache.org/), [https://prestodb.io/](https://prestodb.io/), [https://spark.apache.org/docs/latest/](https://spark.apache.org/docs/latest/), [http://sqoop.apache.org/](http://sqoop.apache.org/), [https://www.tensorflow.org/](https://www.tensorflow.org/), [https://tez.apache.org/](https://tez.apache.org/), [https://trino.io/](https://trino.io/), [https://zeppelin.incubator.apache.org/](https://zeppelin.incubator.apache.org/) y [https://zookeeper.apache.org](https://zookeeper.apache.org).

En la siguiente tabla se enumeran las versiones de la aplicación disponibles en esta versión de Amazon EMR y las versiones de la aplicación en las tres versiones anteriores de Amazon EMR (cuando corresponda).

Para ver un historial completo de las versiones de la aplicación disponibles para cada versión de Amazon EMR, consulte los temas siguientes:
+ [Versiones de las aplicaciones en las versiones 7.x de Amazon EMR](emr-release-app-versions-7.x.md)
+ [Versiones de la aplicación en las versiones 6.x de Amazon EMR](emr-release-app-versions-6.x.md)
+ [Versiones de la aplicación en las versiones 5.x de Amazon EMR](emr-release-app-versions-5.x.md)
+ [Versiones de la aplicación en las versiones 4.x de Amazon EMR](emr-release-app-versions-4.x.md)


**Información sobre la versión de la aplicación**  

|  | emr-7.3.0 | emr-7.2.0 | emr-7.1.0 | emr-7.0.0 | 
| --- | --- | --- | --- | --- | 
| AWS SDK for Java | 2.25.70, 1.12.747 | 2.23.18, 1.12.705 | 2.23.18, 1.12.656 | 2.20.160-amzn-0, 1.12.569 | 
| Python | 3.9, 3.11 | 3.9, 3.11 | 3.9, 3.11 | 3.9 | 
| Scala | 2.12.18 | 2.12.17 | 2.12.17 | 2.12.17 | 
| AmazonCloudWatchAgent | 1.300032.2-amzn-0 | 1.300032.2-amzn-0 | 1.300032.2-amzn-0 | 1.300031.1-amzn-0 | 
| Delta | 3.2.0-amzn-0 | 3.1.0 | 3.0.0 | 3.0.0 | 
| Flink | 1.18.1-amzn-2 | 1.18.1-amzn-1 | 1.18.1-amzn-0 | 1.18.0-amzn-0 | 
| Ganglia |  -  |  -  |  -  |  -  | 
| HBase | 2.4.17-amzn-7 | 2.4.17-amzn-6 | 2.4.17-amzn-5 | 2.4.17-amzn-4 | 
| HCatalog | 3.1.3-amzn-12 | 3.1.3-amzn-11 | 3.1.3-amzn-10 | 3.1.3-amzn-9 | 
| Hadoop | 3.3.6-amzn-5 | 3.3.6-amzn-4 | 3.3.6-amzn-3 | 3.3.6-amzn-2 | 
| Hive | 3.1.3-amzn-12 | 3.1.3-amzn-11 | 3.1.3-amzn-10 | 3.1.3-amzn-9 | 
| Hudi | 0.15.0-amzn-0 | 0.14.1-amzn-1 | 0.14.1-amzn-0 | 0.14.0-amzn-1 | 
| Hue | 4.11.0 | 4.11.0 | 4.11.0 | 4.11.0 | 
| Iceberg | 1.5.2-amzn-0 | 1.5.0-amzn-0 | 1.4.3-amzn-0 | 1.4.2-amzn-0 | 
| JupyterEnterpriseGateway | 2.6.0 | 2.6.0 | 2.6.0 | 2.6.0 | 
| JupyterHub | 1.5.0 | 1.5.0 | 1.5.0 | 1.5.0 | 
| Livy | 0.8.0-incubating | 0.8.0-incubating | 0.8.0-incubating | 0.7.1-incubating | 
| MXNet |  -  | 1.9.1 | 1.9.1 | 1.9.1 | 
| Mahout |  -  |  -  |  -  |  -  | 
| Oozie | 5.2.1 | 5.2.1 | 5.2.1 | 5.2.1 | 
| Phoenix | 5.1.3 | 5.1.3 | 5.1.3 | 5.1.3 | 
| Pig | 0.17.0 | 0.17.0 | 0.17.0 | 0.17.0 | 
| Presto | 0.285-amzn-1 | 0.285-amzn-0 | 0.284-amzn-0 | 0.283-amzn-1 | 
| Spark | 3.5.1-amzn-1 | 3.5.1-amzn-0 | 3.5.0-amzn-1 | 3.5.0-amzn-0 | 
| Sqoop | 1.4.7 | 1.4.7 | 1.4.7 | 1.4.7 | 
| TensorFlow | 2.16.1 | 2.11.0 | 2.11.0 | 2.11.0 | 
| Tez | 0.10.2-amzn-10 | 0.10.2-amzn-9 | 0.10.2-amzn-8 | 0.10.2-amzn-7 | 
| Trino (PrestoSQL) | 442-amzn-0 | 436-amzn-0 | 435-amzn-0 | 426-amzn-1 | 
| Zeppelin | 0.11.1 | 0.10.1 | 0.10.1 | 0.10.1 | 
| ZooKeeper | 3.9.1-amzn-1 | 3.9.1-amzn-1 | 3.9.1-amzn-0 | 3.5.10 | 

# Detalles de los componentes de la versión 7.3.0
<a name="emr-730-release-components-details"></a>

Consulte la siguiente tabla para obtener más información sobre los paquetes *Extras* de Amazon EMR 7.3.0.


| Aplicación | Tipo de aplicación | Package | Tipo de Package | Versión de paquete | 
| --- | --- | --- | --- | --- | 
|  AmazonCloudWatchAgent  |  Core  |  hadoop-hdfs-journalnode  |  Extras  |  3.3.6.amzn.5-1.amzn2023  | 
|  AmazonCloudWatchAgent  |  Core  |  ranger-kms  |  Extras  |  2.0.0-1.amzn2023  | 
|  AmazonCloudWatchAgent  |  Core  |  s3-dist-cp  |  Extras  |  2.33.0-1.amzn2023  | 
|  AmazonCloudWatchAgent  |  Core  |  ZooKeeper  |  Extras  |  3.9.1.amzn.1-1.amzn2023  | 
|  AmazonCloudWatchAgent  |  Core  |  zookeeper-server  |  Extras  |  3.9.1.amzn.1-1.amzn2023  | 
|  Flink  |  Core  |  hadoop-client  |  Extras  |  3.3.6.amzn.5-1.amzn2023  | 
|  Flink  |  Core  |  hadoop-hdfs  |  Extras  |  3.3.6.amzn.5-1.amzn2023  | 
|  Flink  |  Core  |  hadoop-hdfs-datanode  |  Extras  |  3.3.6.amzn.5-1.amzn2023  | 
|  Flink  |  Core  |  hadoop-hdfs-journalnode  |  Extras  |  3.3.6.amzn.5-1.amzn2023  | 
|  Flink  |  Core  |  hadoop-hdfs-namenode  |  Extras  |  3.3.6.amzn.5-1.amzn2023  | 
|  Flink  |  Core  |  hadoop-httpfs  |  Extras  |  3.3.6.amzn.5-1.amzn2023  | 
|  Flink  |  Core  |  hadoop-kms  |  Extras  |  3.3.6.amzn.5-1.amzn2023  | 
|  Flink  |  Core  |  hadoop-mapreduce  |  Extras  |  3.3.6.amzn.5-1.amzn2023  | 
|  Flink  |  Core  |  hadoop-mapreduce-historyserver  |  Extras  |  3.3.6.amzn.5-1.amzn2023  | 
|  Flink  |  Core  |  hadoop-yarn  |  Extras  |  3.3.6.amzn.5-1.amzn2023  | 
|  Flink  |  Core  |  hadoop-yarn-nodemanager  |  Extras  |  3.3.6.amzn.5-1.amzn2023  | 
|  Flink  |  Core  |  hadoop-yarn-proxyserver  |  Extras  |  3.3.6.amzn.5-1.amzn2023  | 
|  Flink  |  Core  |  hadoop-yarn-resourcemanager  |  Extras  |  3.3.6.amzn.5-1.amzn2023  | 
|  Flink  |  Core  |  hadoop-yarn-timelineserver  |  Extras  |  3.3.6.amzn.5-1.amzn2023  | 
|  Flink  |  Core  |  hudi  |  Extras  |  0.15.0.amzn.0-1.amzn2023  | 
|  Flink  |  Core  |  ranger-kms  |  Extras  |  2.0.0-1.amzn2023  | 
|  Flink  |  Core  |  hadoop  |  Extras  |  3.3.6.amzn.5-1.amzn2023  | 
|  HBase  |  Core  |  s3-dist-cp  |  Extras  |  2.33.0-1.amzn2023  | 
|  HCatalog  |  Core  |  hadoop-yarn-proxyserver  |  Extras  |  3.3.6.amzn.5-1.amzn2023  | 
|  HCatalog  |  Core  |  mariadb-connector-java  |  Extras  |    | 
|  Hive  |  Core  |  hadoop-httpfs  |  Extras  |  3.3.6.amzn.5-1.amzn2023  | 
|  Hive  |  Core  |  hadoop-yarn-proxyserver  |  Extras  |  3.3.6.amzn.5-1.amzn2023  | 
|  Hive  |  Core  |  hive-hbase  |  Extras  |  3.1.3.amzn.12-1.amzn2023  | 
|  Hive  |  Core  |  mariadb-connector-java  |  Extras  |  2.7.2-1  | 
|  Hive  |  Core  |  s3-dist-cp  |  Extras  |  2.33.0-1.amzn2023  | 
|  Phoenix  |  Core  |  s3-dist-cp  |  Extras  |  2.33.0-1.amzn2023  | 
|  Spark  |  Core  |  spark-datanucleus  |  Extras  |  3.5.1.amzn.0-1.amzn2023  | 
|  Tez  |  Core  |  hadoop-mapreduce  |  Extras  |  3.3.6.amzn.5-1.amzn2023  | 
|  Tez  |  Core  |  hadoop-mapreduce-historyserver  |  Extras  |  3.3.6.amzn.5-1.amzn2023  | 
|  Tez  |  Core  |  hadoop-yarn-proxyserver  |  Extras  |  3.3.6.amzn.5-1.amzn2023  | 
|  Trino  |  Core  |  bigtop-utils  |  Extras  |  1.2.0-1.amzn2023  | 
|  Trino  |  Core  |  hadoop-client  |  Extras  |  3.3.6.amzn.5-1.amzn2023  | 
|  Trino  |  Core  |  hadoop-hdfs  |  Extras  |  3.3.6.amzn.5-1.amzn2023  | 
|  Trino  |  Core  |  hadoop-hdfs-datanode  |  Extras  |  3.3.6.amzn.5-1.amzn2023  | 
|  Trino  |  Core  |  hadoop-hdfs-journalnode  |  Extras  |  3.3.6.amzn.5-1.amzn2023  | 
|  Trino  |  Core  |  hadoop-hdfs-namenode  |  Extras  |  3.3.6.amzn.5-1.amzn2023  | 
|  Trino  |  Core  |  hadoop-kms  |  Extras  |  3.3.6.amzn.5-1.amzn2023  | 
|  Trino  |  Core  |  hadoop-mapreduce  |  Extras  |  3.3.6.amzn.5-1.amzn2023  | 
|  Trino  |  Core  |  hadoop-mapreduce-historyserver  |  Extras  |  3.3.6.amzn.5-1.amzn2023  | 
|  Trino  |  Core  |  hadoop-yarn  |  Extras  |  3.3.6.amzn.5-1.amzn2023  | 
|  Trino  |  Core  |  hadoop-yarn-nodemanager  |  Extras  |  3.3.6.amzn.5-1.amzn2023  | 
|  Trino  |  Core  |  hadoop-yarn-proxyserver  |  Extras  |  3.3.6.amzn.5-1.amzn2023  | 
|  Trino  |  Core  |  hadoop-yarn-resourcemanager  |  Extras  |  3.3.6.amzn.5-1.amzn2023  | 
|  Trino  |  Core  |  hadoop-yarn-timelineserver  |  Extras  |  3.3.6.amzn.5-1.amzn2023  | 
|  Trino  |  Core  |  hive  |  Extras  |  3.1.3.amzn.12-1.amzn2023  | 
|  Trino  |  Core  |  hive-hcatalog-server  |  Extras  |  3.1.3.amzn.12-1.amzn2023  | 
|  Trino  |  Core  |  mariadb-connector-java  |  Extras  |  2.7.2-1  | 
|  Trino  |  Core  |  ranger-kms  |  Extras  |  2.0.0-1.amzn2023  | 
|  Trino  |  Core  |  ZooKeeper  |  Extras  |  3.9.1.amzn.1-1.amzn2023  | 
|  Trino  |  Core  |  zookeeper-server  |  Extras  |  3.9.1.amzn.1-1.amzn2023  | 
|  Trino  |  Core  |  bigtop-groovy  |  Extras  |  2.5.4-1.amzn2023  | 
|  Trino  |  Core  |  bigtop-jsvc  |  Extras  |  1.2.4-1.amzn2023  | 
|  Trino  |  Core  |  hadoop  |  Extras  |  3.3.6.amzn.5-1.amzn2023  | 
|  Trino  |  Core  |  hadoop-lzo  |  Extras  |  0.4.19-1.amzn2023  | 
|  Trino  |  Core  |  hive-hcatalog  |  Extras  |  3.1.3.amzn.12-1.amzn2023  | 
|  Trino  |  Core  |  hive-jdbc  |  Extras  |  3.1.3.amzn.12-1.amzn2023  | 
|  ZooKeeper  |  Core  |  emrfs  |  Extras  |  2.64.0-1.amzn2023  | 
|  ZooKeeper  |  Core  |  hadoop-client  |  Extras  |  3.3.6.amzn.5-1.amzn2023  | 
|  ZooKeeper  |  Core  |  hadoop-hdfs  |  Extras  |  3.3.6.amzn.5-1.amzn2023  | 
|  ZooKeeper  |  Core  |  hadoop-hdfs-datanode  |  Extras  |  3.3.6.amzn.5-1.amzn2023  | 
|  ZooKeeper  |  Core  |  hadoop-hdfs-journalnode  |  Extras  |  3.3.6.amzn.5-1.amzn2023  | 
|  ZooKeeper  |  Core  |  hadoop-hdfs-namenode  |  Extras  |  3.3.6.amzn.5-1.amzn2023  | 
|  ZooKeeper  |  Core  |  hadoop-httpfs  |  Extras  |  3.3.6.amzn.5-1.amzn2023  | 
|  ZooKeeper  |  Core  |  hadoop-kms  |  Extras  |  3.3.6.amzn.5-1.amzn2023  | 
|  ZooKeeper  |  Core  |  hadoop-mapreduce  |  Extras  |  3.3.6.amzn.5-1.amzn2023  | 
|  ZooKeeper  |  Core  |  hadoop-mapreduce-historyserver  |  Extras  |  3.3.6.amzn.5-1.amzn2023  | 
|  ZooKeeper  |  Core  |  hadoop-yarn  |  Extras  |  3.3.6.amzn.5-1.amzn2023  | 
|  ZooKeeper  |  Core  |  hadoop-yarn-nodemanager  |  Extras  |  3.3.6.amzn.5-1.amzn2023  | 
|  ZooKeeper  |  Core  |  hadoop-yarn-proxyserver  |  Extras  |  3.3.6.amzn.5-1.amzn2023  | 
|  ZooKeeper  |  Core  |  hadoop-yarn-resourcemanager  |  Extras  |  3.3.6.amzn.5-1.amzn2023  | 
|  ZooKeeper  |  Core  |  hadoop-yarn-timelineserver  |  Extras  |  3.3.6.amzn.5-1.amzn2023  | 
|  ZooKeeper  |  Core  |  ranger-kms  |  Extras  |  2.0.0-1.amzn2023  | 

# 7.3.0 common vulnerabilities and exposures
<a name="730-common-vulnerabilities-exposures"></a>

La siguiente tabla muestra todo lo CVEs que no afecta a los clústeres de EMR que se ejecutan en las configuraciones recomendadas de Amazon EMR 7.3.0. Amazon EMR depende del código abierto original para la disponibilidad de las correcciones y proporcionará la última versión estable como parte de los componentes del motor principal en un plazo de 90 días a partir de su verificación por parte de Amazon EMR.

Esta tabla se actualizó el 3 de octubre de 2024.


| ID de CVE | Gravedad | URL de detalles del CVE | 
| --- | --- | --- | 
|  CVE-2015-1832  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2015-1832](https://nvd.nist.gov/vuln/detail/CVE-2015-1832)  | 
|  CVE-2016-5018  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2016-5018)-2016-5018  | 
|  CVE-2018-11307  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2018-11307](https://nvd.nist.gov/vuln/detail/CVE-2018-11307)  | 
|  CVE-2018-14718  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-14718)-2018-14718  | 
|  CVE-2018-14719  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-14719)-2018-14719  | 
|  CVE-2018-14720  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-14720)-2018-14720  | 
|  CVE-2018-14721  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-14721)-2018-14721  | 
|  CVE-2018-19360  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2018-19360](https://nvd.nist.gov/vuln/detail/CVE-2018-19360)  | 
|  CVE-2018-19361  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2018-19361](https://nvd.nist.gov/vuln/detail/CVE-2018-19361)  | 
|  CVE-2018-19362  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2018-19362](https://nvd.nist.gov/vuln/detail/CVE-2018-19362)  | 
|  CVE-2018-7489  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2018-7489](https://nvd.nist.gov/vuln/detail/CVE-2018-7489)  | 
|  CVE-2019-14379  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2019-14379](https://nvd.nist.gov/vuln/detail/CVE-2019-14379)  | 
|  CVE-2019-14540  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-14540)-2019-14540  | 
|  CVE-2019-14892  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-14892)-2019-14892  | 
|  CVE-2019-14893  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-14893)-2019-14893  | 
|  CVE-2019-16335  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2019-16335](https://nvd.nist.gov/vuln/detail/CVE-2019-16335)  | 
|  CVE-2019-16942  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-16942)-2019-16942  | 
|  CVE-2019-16943  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-16943)-2019-16943  | 
|  CVE-2019-17267  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2019-17267](https://nvd.nist.gov/vuln/detail/CVE-2019-17267)  | 
|  CVE-2019-17531  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-17531)-2019-17531  | 
|  CVE-2019-20330  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2019-20330](https://nvd.nist.gov/vuln/detail/CVE-2019-20330)  | 
|  CVE-2019-20444  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2019-20444](https://nvd.nist.gov/vuln/detail/CVE-2019-20444)  | 
|  CVE-2019-20445  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2019-20445](https://nvd.nist.gov/vuln/detail/CVE-2019-20445)  | 
|  CVE-2020-8840  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-8840](https://nvd.nist.gov/vuln/detail/CVE-2020-8840)  | 
|  CVE-2020-9546  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-9546](https://nvd.nist.gov/vuln/detail/CVE-2020-9546)  | 
|  CVE-2020-9547  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-9547](https://nvd.nist.gov/vuln/detail/CVE-2020-9547)  | 
|  CVE-2020-9548  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-9548](https://nvd.nist.gov/vuln/detail/CVE-2020-9548)  | 
|  CVE-2022-1471  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2022-1471](https://nvd.nist.gov/vuln/detail/CVE-2022-1471)  | 
|  CVE-2022-1471  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2022-1471](https://nvd.nist.gov/vuln/detail/CVE-2022-1471)  | 
|  CVE-2022-1471  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2022-1471](https://nvd.nist.gov/vuln/detail/CVE-2022-1471)  | 
|  CVE-2022-37865  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-202237865](https://nvd.nist.gov/vuln/detail/CVE-2022-37865)  | 
|  CVE-2022-39135  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-202239135](https://nvd.nist.gov/vuln/detail/CVE-2022-39135)  | 
|  CVE-2022-46337  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-202246337](https://nvd.nist.gov/vuln/detail/CVE-2022-46337)  | 
|  CVE-2022-46337  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-202246337](https://nvd.nist.gov/vuln/detail/CVE-2022-46337)  | 
|  CVE-2023-44981  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-44981](https://nvd.nist.gov/vuln/detail/CVE-2023-44981)  | 
|  CVE-2023-44981  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-44981](https://nvd.nist.gov/vuln/detail/CVE-2023-44981)  | 
|  CVE-2023-44981  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-44981](https://nvd.nist.gov/vuln/detail/CVE-2023-44981)  | 
|  CVE-2012-0881  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2012-0881](https://nvd.nist.gov/vuln/detail/CVE-2012-0881)  | 
|  CVE-2013-4002  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2013-4002)-2013-4002  | 
|  CVE-2015-2156  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2015-2156)-2015-2156  | 
|  CVE-2015-5237  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2015-5237)-2015-5237  | 
|  CVE-2016-6796  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2016-6796)-2016-6796  | 
|  CVE-2017-18640  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2017-18640)-2017-18640  | 
|  CVE-2017-18640  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2017-18640)-2017-18640  | 
|  CVE-2018-1000180  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2018-1000180](https://nvd.nist.gov/vuln/detail/CVE-2018-1000180)  | 
|  CVE-2018-12022  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2018-12022](https://nvd.nist.gov/vuln/detail/CVE-2018-12022)  | 
|  CVE-2018-12023  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2018-12023](https://nvd.nist.gov/vuln/detail/CVE-2018-12023)  | 
|  CVE-2019-0205  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2019-0205](https://nvd.nist.gov/vuln/detail/CVE-2019-0205)  | 
|  CVE-2019-0205  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2019-0205](https://nvd.nist.gov/vuln/detail/CVE-2019-0205)  | 
|  CVE-2019-12086  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-12086)-2019-12086  | 
|  CVE-2019-14439  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-14439)-2019-14439  | 
|  CVE-2019-16869  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-16869)-2019-16869  | 
|  CVE-2020-10650  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-10650](https://nvd.nist.gov/vuln/detail/CVE-2020-10650)  | 
|  CVE-2020-10672  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-10672](https://nvd.nist.gov/vuln/detail/CVE-2020-10672)  | 
|  CVE-2020-10673  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-10673](https://nvd.nist.gov/vuln/detail/CVE-2020-10673)  | 
|  CVE-2020-10968  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-10968)-2020-10968  | 
|  CVE-2020-10969  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-10969)-2020-10969  | 
|  CVE-2020-11111  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-11111](https://nvd.nist.gov/vuln/detail/CVE-2020-11111)  | 
|  CVE-2020-11112  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-11112](https://nvd.nist.gov/vuln/detail/CVE-2020-11112)  | 
|  CVE-2020-11113  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-11113](https://nvd.nist.gov/vuln/detail/CVE-2020-11113)  | 
|  CVE-2020-11619  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-11619)-2020-11619  | 
|  CVE-2020-11620  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-11620](https://nvd.nist.gov/vuln/detail/CVE-2020-11620)  | 
|  CVE-2020-13936  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-13936)-2020-13936  | 
|  CVE-2020-13949  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-13949)-2020-13949  | 
|  CVE-2020-13949  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-13949)-2020-13949  | 
|  CVE-2020-13949  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-13949)-2020-13949  | 
|  CVE-2020-14060  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-14060)-2020-14060  | 
|  CVE-2020-14061  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-14061)-2020-14061  | 
|  CVE-2020-14062  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-14062)-2020-14062  | 
|  CVE-2020-14195  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-14195](https://nvd.nist.gov/vuln/detail/CVE-2020-14195)  | 
|  CVE-2020-24616  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-24616](https://nvd.nist.gov/vuln/detail/CVE-2020-24616)  | 
|  CVE-2020-24750  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-24750](https://nvd.nist.gov/vuln/detail/CVE-2020-24750)  | 
|  CVE-2020-25649  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-25649](https://nvd.nist.gov/vuln/detail/CVE-2020-25649)  | 
|  CVE-2020-28052  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-28052](https://nvd.nist.gov/vuln/detail/CVE-2020-28052)  | 
|  CVE-2020-35490  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-35490](https://nvd.nist.gov/vuln/detail/CVE-2020-35490)  | 
|  CVE-2020-35491  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-35491](https://nvd.nist.gov/vuln/detail/CVE-2020-35491)  | 
|  CVE-2020-35728  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-35728](https://nvd.nist.gov/vuln/detail/CVE-2020-35728)  | 
|  CVE-2020-36179  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36179](https://nvd.nist.gov/vuln/detail/CVE-2020-36179)  | 
|  CVE-2020-36180  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36180](https://nvd.nist.gov/vuln/detail/CVE-2020-36180)  | 
|  CVE-2020-36181  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36181](https://nvd.nist.gov/vuln/detail/CVE-2020-36181)  | 
|  CVE-2020-36182  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36182](https://nvd.nist.gov/vuln/detail/CVE-2020-36182)  | 
|  CVE-2020-36183  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36183](https://nvd.nist.gov/vuln/detail/CVE-2020-36183)  | 
|  CVE-2020-36184  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36184](https://nvd.nist.gov/vuln/detail/CVE-2020-36184)  | 
|  CVE-2020-36185  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36185](https://nvd.nist.gov/vuln/detail/CVE-2020-36185)  | 
|  CVE-2020-36186  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36186](https://nvd.nist.gov/vuln/detail/CVE-2020-36186)  | 
|  CVE-2020-36187  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36187](https://nvd.nist.gov/vuln/detail/CVE-2020-36187)  | 
|  CVE-2020-36188  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36188](https://nvd.nist.gov/vuln/detail/CVE-2020-36188)  | 
|  CVE-2020-36189  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36189](https://nvd.nist.gov/vuln/detail/CVE-2020-36189)  | 
|  CVE-2020-36518  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36518](https://nvd.nist.gov/vuln/detail/CVE-2020-36518)  | 
|  CVE-2021-20190  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2021-20190](https://nvd.nist.gov/vuln/detail/CVE-2021-20190)  | 
|  CVE-2021-31684  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2021-31684](https://nvd.nist.gov/vuln/detail/CVE-2021-31684)  | 
|  CVE-2021-31684  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2021-31684](https://nvd.nist.gov/vuln/detail/CVE-2021-31684)  | 
|  CVE-2021-34538  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2021-34538](https://nvd.nist.gov/vuln/detail/CVE-2021-34538)  | 
|  CVE-2021-34538  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2021-34538](https://nvd.nist.gov/vuln/detail/CVE-2021-34538)  | 
|  CVE-2021-34538  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2021-34538](https://nvd.nist.gov/vuln/detail/CVE-2021-34538)  | 
|  CVE-2021-35515  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2021-35515](https://nvd.nist.gov/vuln/detail/CVE-2021-35515)  | 
|  CVE-2021-35516  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2021-35516](https://nvd.nist.gov/vuln/detail/CVE-2021-35516)  | 
|  CVE-2021-35517  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2021-35517](https://nvd.nist.gov/vuln/detail/CVE-2021-35517)  | 
|  CVE-2021-36090  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2021-36090](https://nvd.nist.gov/vuln/detail/CVE-2021-36090)  | 
|  CVE-2021-37136  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2021-37136](https://nvd.nist.gov/vuln/detail/CVE-2021-37136)  | 
|  CVE-2021-37137  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2021-37137](https://nvd.nist.gov/vuln/detail/CVE-2021-37137)  | 
|  CVE-2022-25647  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-202225647](https://nvd.nist.gov/vuln/detail/CVE-2022-25647)  | 
|  CVE-2022-25857  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-202225857](https://nvd.nist.gov/vuln/detail/CVE-2022-25857)  | 
|  CVE-2022-25857  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-202225857](https://nvd.nist.gov/vuln/detail/CVE-2022-25857)  | 
|  CVE-2022-25857  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-202225857](https://nvd.nist.gov/vuln/detail/CVE-2022-25857)  | 
|  CVE-2022-3171  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2022-3171](https://nvd.nist.gov/vuln/detail/CVE-2022-3171)  | 
|  CVE-2022-3171  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2022-3171](https://nvd.nist.gov/vuln/detail/CVE-2022-3171)  | 
|  CVE-2022-3171  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2022-3171](https://nvd.nist.gov/vuln/detail/CVE-2022-3171)  | 
|  CVE-2022-3509  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2022-3509](https://nvd.nist.gov/vuln/detail/CVE-2022-3509)  | 
|  CVE-2022-3509  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2022-3509](https://nvd.nist.gov/vuln/detail/CVE-2022-3509)  | 
|  CVE-2022-3509  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2022-3509](https://nvd.nist.gov/vuln/detail/CVE-2022-3509)  | 
|  CVE-2022-3510  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-20223510](https://nvd.nist.gov/vuln/detail/CVE-2022-3510)  | 
|  CVE-2022-3510  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-20223510](https://nvd.nist.gov/vuln/detail/CVE-2022-3510)  | 
|  CVE-2022-3510  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-20223510](https://nvd.nist.gov/vuln/detail/CVE-2022-3510)  | 
|  CVE-2022-36364  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-202236364](https://nvd.nist.gov/vuln/detail/CVE-2022-36364)  | 
|  CVE-2022-37866  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-202237866](https://nvd.nist.gov/vuln/detail/CVE-2022-37866)  | 
|  CVE-2022-40149  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-202240149](https://nvd.nist.gov/vuln/detail/CVE-2022-40149)  | 
|  CVE-2022-40149  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-202240149](https://nvd.nist.gov/vuln/detail/CVE-2022-40149)  | 
|  CVE-2022-40149  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-202240149](https://nvd.nist.gov/vuln/detail/CVE-2022-40149)  | 
|  CVE-2022-40150  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-202240150](https://nvd.nist.gov/vuln/detail/CVE-2022-40150)  | 
|  CVE-2022-40150  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-202240150](https://nvd.nist.gov/vuln/detail/CVE-2022-40150)  | 
|  CVE-2022-40150  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-202240150](https://nvd.nist.gov/vuln/detail/CVE-2022-40150)  | 
|  CVE-2022-40152  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-202240152](https://nvd.nist.gov/vuln/detail/CVE-2022-40152)  | 
|  CVE-2022-42003  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2022-42003](https://nvd.nist.gov/vuln/detail/CVE-2022-42003)  | 
|  CVE-2022-42003  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2022-42003](https://nvd.nist.gov/vuln/detail/CVE-2022-42003)  | 
|  CVE-2022-42003  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2022-42003](https://nvd.nist.gov/vuln/detail/CVE-2022-42003)  | 
|  CVE-2022-42003  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2022-42003](https://nvd.nist.gov/vuln/detail/CVE-2022-42003)  | 
|  CVE-2022-42004  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2022-42004](https://nvd.nist.gov/vuln/detail/CVE-2022-42004)  | 
|  CVE-2022-42004  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2022-42004](https://nvd.nist.gov/vuln/detail/CVE-2022-42004)  | 
|  CVE-2022-42004  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2022-42004](https://nvd.nist.gov/vuln/detail/CVE-2022-42004)  | 
|  CVE-2022-45685  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-202245685](https://nvd.nist.gov/vuln/detail/CVE-2022-45685)  | 
|  CVE-2022-45685  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-202245685](https://nvd.nist.gov/vuln/detail/CVE-2022-45685)  | 
|  CVE-2022-45685  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-202245685](https://nvd.nist.gov/vuln/detail/CVE-2022-45685)  | 
|  CVE-2022-45688  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-45688)-202245688  | 
|  CVE-2022-45693  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-202245693](https://nvd.nist.gov/vuln/detail/CVE-2022-45693)  | 
|  CVE-2022-45693  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-202245693](https://nvd.nist.gov/vuln/detail/CVE-2022-45693)  | 
|  CVE-2022-45693  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-202245693](https://nvd.nist.gov/vuln/detail/CVE-2022-45693)  | 
|  CVE-2022-46751  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-202246751](https://nvd.nist.gov/vuln/detail/CVE-2022-46751)  | 
|  CVE-2023-1370  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-1370](https://nvd.nist.gov/vuln/detail/CVE-2023-1370)  | 
|  CVE-2023-1370  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-1370](https://nvd.nist.gov/vuln/detail/CVE-2023-1370)  | 
|  CVE-2023-1436  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-1436](https://nvd.nist.gov/vuln/detail/CVE-2023-1436)  | 
|  CVE-2023-1436  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-1436](https://nvd.nist.gov/vuln/detail/CVE-2023-1436)  | 
|  CVE-2023-1436  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-1436](https://nvd.nist.gov/vuln/detail/CVE-2023-1436)  | 
|  CVE-2023-2976  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-2976](https://nvd.nist.gov/vuln/detail/CVE-2023-2976)  | 
|  CVE-2023-2976  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-2976](https://nvd.nist.gov/vuln/detail/CVE-2023-2976)  | 
|  CVE-2023-2976  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-2976](https://nvd.nist.gov/vuln/detail/CVE-2023-2976)  | 
|  CVE-2023-2976  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-2976](https://nvd.nist.gov/vuln/detail/CVE-2023-2976)  | 
|  CVE-2023-2976  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-2976](https://nvd.nist.gov/vuln/detail/CVE-2023-2976)  | 
|  CVE-2023-2976  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-2976](https://nvd.nist.gov/vuln/detail/CVE-2023-2976)  | 
|  CVE-2023-2976  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-2976](https://nvd.nist.gov/vuln/detail/CVE-2023-2976)  | 
|  CVE-2023-2976  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-2976](https://nvd.nist.gov/vuln/detail/CVE-2023-2976)  | 
|  CVE-2023-2976  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-2976](https://nvd.nist.gov/vuln/detail/CVE-2023-2976)  | 
|  CVE-2023-2976  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-2976](https://nvd.nist.gov/vuln/detail/CVE-2023-2976)  | 
|  CVE-2023-34453  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-34453](https://nvd.nist.gov/vuln/detail/CVE-2023-34453)  | 
|  CVE-2023-34454  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-34454](https://nvd.nist.gov/vuln/detail/CVE-2023-34454)  | 
|  CVE-2023-34455  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-34455](https://nvd.nist.gov/vuln/detail/CVE-2023-34455)  | 
|  CVE-2023-3635  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-3635](https://nvd.nist.gov/vuln/detail/CVE-2023-3635)  | 
|  CVE-2023-36478  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-36478](https://nvd.nist.gov/vuln/detail/CVE-2023-36478)  | 
|  CVE-2023-36478  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-36478](https://nvd.nist.gov/vuln/detail/CVE-2023-36478)  | 
|  CVE-2023-39410  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-39410](https://nvd.nist.gov/vuln/detail/CVE-2023-39410)  | 
|  CVE-2023-39410  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-39410](https://nvd.nist.gov/vuln/detail/CVE-2023-39410)  | 
|  CVE-2023-43642  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-43642](https://nvd.nist.gov/vuln/detail/CVE-2023-43642)  | 
|  CVE-2023-43642  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-43642](https://nvd.nist.gov/vuln/detail/CVE-2023-43642)  | 
|  CVE-2023-50387  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-50387](https://nvd.nist.gov/vuln/detail/CVE-2023-50387)  | 
|  CVE-2023-5072  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-5072](https://nvd.nist.gov/vuln/detail/CVE-2023-5072)  | 
|  CVE-2023-6378  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-6378](https://nvd.nist.gov/vuln/detail/CVE-2023-6378)  | 
|  CVE-2023-6378  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-6378](https://nvd.nist.gov/vuln/detail/CVE-2023-6378)  | 
|  CVE-2023-6481  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-6481](https://nvd.nist.gov/vuln/detail/CVE-2023-6481)  | 
|  CVE-2023-6481  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-6481](https://nvd.nist.gov/vuln/detail/CVE-2023-6481)  | 
|  CVE-2024-21634  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-21634](https://nvd.nist.gov/vuln/detail/CVE-2024-21634)  | 

## Notas de la versión 7.3.0
<a name="emr-730-relnotes"></a>

Las siguientes notas de la versión incluyen información sobre la versión 7.3.0 de Amazon EMR. Los cambios son respecto a la versión 7.3.0.

**Nuevas características**
+ **Actualizaciones de la aplicación**: Amazon EMR 7.3.0 application upgrades include Delta 3.2.0-amzn-0, Hudi 0.15.0-amzn-0, TensorFlow 2.16.1, Trino 442, and Zeppelin 0.11.1.
+ Esta versión agrega 22 puntos de conexión de código abierto que admiten el cifrado en tránsito a través de la red. Esta mejora incluye marcos de código abierto como Hadoop, Hive, Tez HBase, Phoenix y Flink. Si ha activado el cifrado en tránsito y desea conectarse a estos puntos de conexión, es posible que tenga que modificar el código para que sea compatible con la comunicación TLS. Puede deshabilitar el TLS para cualquiera de estos puntos de conexión según sea necesario. Para obtener una lista completa de los puntos de conexión compatibles, consulte [Descripción del cifrado en tránsito](https://docs.aws.amazon.com/emr/latest/ManagementGuide/emr-encryption-support-matrix.html).
+ Con Amazon EMR 7.3.0, Apache Hive with Iceberg ahora es compatible con el catálogo de datos de AWS Glue como metaalmacén, lo que le brinda ventajas como un repositorio centralizado para almacenar metadatos, rastrear automáticamente las fuentes de datos y extraer metadatos, y la integración con otros servicios para lograr flujos de trabajo sin problemas.

**Problemas conocidos**
+ Python 3.11 no es compatible con EMR Studio.
+ Si utiliza el cifrado en tránsito y la autenticación de Kerberos, no podrá utilizar las aplicaciones de Spark que dependan del metaalmacén de Hive. Este problema se solucionó en [HIVE-16340](https://issues.apache.org/jira/browse/HIVE-16340) y se resolverá por completo en [SPARK-44114](https://issues.apache.org/jira/browse/SPARK-44114) cuando Spark de código abierto pueda actualizarse a Hive 3. Mientras tanto, puede tratar de resolver este problema temporalmente si establece `hive.metastore.use.SSL` en `false`. Para obtener más información, consulte [Configuración de aplicaciones](https://docs.aws.amazon.com/emr/latest/ReleaseGuide/emr-configure-apps.html).
  + Si no usa la autenticación de Kerberos, debe configurar Spark para que use SSL. Para ello, establezca las siguientes configuraciones cuando aprovisione el clúster.

    ```
    [{
        "Classification": "spark-defaults",
        "Properties": {
            "spark.hadoop.hive.metastore.truststore.path": "/usr/share/aws/emr/security/conf/keystore-thrift.jks",
            "spark.hadoop.hive.metastore.use.SSL": "true"
        }
    }]
    ```
+ Si utilizas dominios personalizados, es posible que algunos enlaces de la interfaz de usuario de Spark History Server de la consola no funcionen. AWS Cargue el siguiente script en un bucket de S3 y, a continuación, [añada un paso](https://docs.aws.amazon.com/emr/latest/ManagementGuide/emr-add-steps-console.html) para usar el script del intérprete de comandos.

  ```
  #!/bin/bash
  
  if grep -q ":8042" /etc/nginx/nginx.conf; then
      sudo sed -i '=s#\^(\\/nm\\/(?<nodeAddress>.*:8042)\\/(?<url>.*)\$)#^(\\/nm\\/(?<nodeAddress>(\\.|-|[a-zA-Z0-9])*:8042)\\/(?<url>(node|conf|logs|stacks|jmx).*)\$)#g' /etc/nginx/nginx.conf
  else
      sudo sed -i 's#\^(\\/nm\\/(?<nodeAddress>.*:8044)\\/(?<url>.*)\$)#^(\\/nm\\/(?<nodeAddress>(\\.|-|[a-zA-Z0-9])*:8044)\\/(?<url>(node|conf|logs|stacks|jmx).*)\$)#g' /etc/nginx/nginx.conf
  fi
  
  sudo systemctl restart nginx
  ```
+  **HBase creación de tablas en el catálogo Hive with Glue**: desde EMR-7.3.0 hasta EMR-7.10.0, hay un error debido a la integración de Hive Iceberg, que hace que la HBase creación de tablas en Hive falle cuando se utiliza Glue Data Catalog como metaalmacén. Ponte en contacto con el equipo de soporte si tienes este problema. AWS 
+  **IU de Tez**: de EMR-7.3 a EMR-7.10, hay un error que hace que el acceso a la IU de Tez a través de la interfaz de usuario web de YARN Resource Manager falle cuando se habilita el cifrado en tránsito. Esto ocurre porque el proxy YARN intenta usar el protocolo HTTP, mientras que la interfaz de usuario de Tez requiere HTTPS. Modifique la `tez.tez-ui.history-url.base` configuración en `tez-site` de `http` a `https` para resolver este problema.

**Cambios, mejoras y problemas resueltos**
+  A partir de Spark 3.3.1 (compatible con las versiones 6.10 y posteriores de EMR), todos los ejecutores de un host de desmantelamiento pasan a un nuevo `ExecutorState`, denominado estado de *RETIRADA*. Yarn no puede utilizar los ejecutores que se están retirando para asignar tareas y, por lo tanto, solicitará nuevos ejecutores, si es necesario, para las tareas que se están ejecutando. Por lo tanto, si deshabilita Spark DRA mientras usa EMR Managed Scaling, EMR Auto Scaling o cualquier mecanismo de escalado personalizado en los clústeres de EMR-EC2, Yarn puede solicitar el máximo de ejecutores permitidos para cada trabajo. Para evitar este problema, deje la propiedad `spark.dynamicAllocation.enabled` establecida en `TRUE` (que es la predeterminada) cuando utilice la combinación de características anterior. Además, también puede establecer restricciones de ejecutor mínimas y máximas si configura valores para las propiedades `spark.dynamicAllocation.maxExecutors` y `spark.dynamicAllocation.minExecutors` para sus trabajos de Spark, a fin de restringir el número de ejecutores asignados durante la ejecución del trabajo. 
+ Para permitir la verificación del nombre de host TLS para YARN, esta versión cambia la configuración de `yarn.resourcemanager.hostname` de la dirección IP de la instancia principal al nombre DNS privado de la instancia principal.
+ [MXNet El proyecto](https://github.com/apache/mxnet) ha llegado al final de su vida útil y ahora está archivado. [Amazon EMR, versión 7.2.0](emr-720-release.md)es la última versión que incluye MXNet.
+ Al lanzar un clúster con *la versión de parche más reciente* de Amazon EMR 5.36, 6.6 o 7.0 o sus respectivas versiones posteriores, Amazon EMR utiliza la versión más reciente de Amazon Linux 2023 o Amazon Linux 2 para la AMI de Amazon EMR predeterminada. Para más información, consulte [Uso de la AMI de Amazon Linux predeterminada para Amazon EMR](https://docs.aws.amazon.com/emr/latest/ManagementGuide/emr-default-ami.html).    
[\[See the AWS documentation website for more details\]](http://docs.aws.amazon.com/es_es/emr/latest/ReleaseGuide/emr-730-release.html)

## Versiones predeterminadas de Java para la versión 7.3.0
<a name="emr-730-jdk"></a>

Las versiones 7.3 y posteriores de Amazon EMR vienen con Amazon Corretto 17 (basado en OpenJDK) de forma predeterminada para las aplicaciones compatibles con Corretto 17 (JDK 17), con la excepción de Apache Livy.

En la siguiente tabla, se muestran las versiones predeterminadas de Java para las aplicaciones en Amazon EMR 7.3.0. Si desea cambiar la JVM predeterminada del clúster, siga las instrucciones de [Configuración de aplicaciones para utilizar una máquina virtual de Java específica](configuring-java8.md) para cada aplicación que se ejecute en el clúster. Solo se puede usar una versión de tiempo de ejecución de Java en un clúster. Amazon EMR no admite la ejecución de distintos nodos o aplicaciones en distintas versiones de tiempo de ejecución en el mismo clúster.


| Aplicación | Versión de Java o Amazon Corretto (el valor predeterminado está en negrita) | 
| --- | --- | 
| Delta | 17, 11, 8 | 
| Flink | 17, 11, 8 | 
| HBase | 17, 11, 8 | 
| HCatalog | 17, 11, 8 | 
| Hadoop | 17, 11, 8 | 
| Hive | 17, 11, 8 | 
| Hudi | 17, 11, 8 | 
| Iceberg | 17, 11, 8 | 
| Livy | 17, 11, 8 | 
| Oozie | 17, 11, 8 | 
| Phoenix | 17, 11, 8 | 
| PrestoDB | 8 | 
| Spark | 17, 11, 8 | 
| Spark RAPIDS | 17, 11, 8 | 
| Sqoop | 8 | 
| Tez | 17, 11, 8 | 
| Trino | 21, 17 | 
| Zeppelin | 8 | 
| Pig | 8 | 
| ZooKeeper | 17, 11, 8 | 

## Versiones de los componentes de la versión 7.3.0
<a name="emr-730-components"></a>

A continuación, se muestran los componentes que Amazon EMR instala con esta versión. Algunos se instalan como parte de paquetes de aplicación de macrodatos. Otros son exclusivos de Amazon EMR y se instalan para ciertos procesos y características del sistema. Normalmente, estos componentes comienzan con `emr` o `aws`. Normalmente, los paquetes de aplicación de macrodatos de la versión más reciente de Amazon EMR son las versiones más recientes que pueden encontrarse en la comunidad. Intentamos que las versiones de la comunidad estén disponibles en Amazon EMR lo más rápido posible.

Algunos componentes de Amazon EMR son distintos de las versiones que se encuentran en la comunidad. Estos componentes tienen una etiqueta de versión con el formato `CommunityVersion-amzn-EmrVersion`. La `EmrVersion` empieza por 0. Por ejemplo, si un componente de la comunidad de código abierto llamado `myapp-component` con la versión 2.2 se ha modificado tres veces para incluirlo en diferentes versiones de lanzamiento de Amazon EMR, la versión que se mostrará será `2.2-amzn-2`.


| Componente | Versión | Description (Descripción) | 
| --- | --- | --- | 
| adot-java-agent | 1,31,0 | Un agente Java que recopila métricas de los daemons de las aplicaciones. | 
| delta | 3.2.0-amzn-0 | Delta Lake es un formato de tabla abierto para conjuntos de datos analíticos de gran tamaño | 
| emr-amazon-cloudwatch-agent | 1.300032.2-amzn-0 | Se trata de una aplicación que recopila métricas internas de nivel de sistema y métricas de aplicación personalizadas de las instancias de Amazon EC2. | 
| emr-ddb | 5.5.0 | Conector de Amazon DynamoDB para aplicaciones del ecosistema de Hadoop. | 
| emr-goodies | 3.12.0 | Bibliotecas especialmente prácticas para el ecosistema de Hadoop. | 
| emr-kinesis | 3.16.0 | Conector de Amazon Kinesis para aplicaciones del ecosistema de Hadoop. | 
| emr-notebook-env | 1.16.0 | Entorno de Conda para cuaderno de EMR que incluye una puerta de enlace empresarial de Jupyter | 
| emr-s3-dist-cp | 2.33.0 | Aplicación de copia distribuida optimizada para Amazon S3. | 
| emr-s3-select | 2.12.0 | Conector S3Select de EMR | 
| emr-wal-cli | 1.3.0 | CLI utilizada para eliminar o enumerar WAL de ERM. | 
| emrfs | 2.64,0 | Conector de Amazon S3 para aplicaciones del ecosistema de Hadoop. | 
| flink-client | 1.18.1-amzn-2 | Scripts y aplicaciones de cliente de línea de comando de Apache Flink. | 
| flink-jobmanager-config | 1.18.1-amzn-2 | Administración de recursos en nodos EMR para Apache Flink. JobManager | 
| hadoop-client | 3.3.6-amzn-5 | Los clientes de línea de comando de Hadoop como, por ejemplo "hdfs", "hadoop" o "yarn". | 
| hadoop-hdfs-datanode | 3.3.6-amzn-5 | Servicio de nivel de nodos de HDFS para el almacenamiento de bloques. | 
| hadoop-hdfs-library | 3.3.6-amzn-5 | Biblioteca y cliente de línea de comandos HDFS | 
| hadoop-hdfs-namenode | 3.3.6-amzn-5 | Servicio de HDFS para realizar un seguimiento de nombres de archivo y bloquear ubicaciones. | 
| hadoop-hdfs-journalnode | 3.3.6-amzn-5 | Servicio de HDFS para administrar los archivos de Hadoop periódico en clústeres de alta disponibilidad. | 
| hadoop-httpfs-server | 3.3.6-amzn-5 | Punto de enlace HTTP para operaciones HDFS. | 
| hadoop-kms-server | 3.3.6-amzn-5 | Servidor de administración de claves criptográficas basado en la API de Hadoop. KeyProvider  | 
| hadoop-mapred | 3.3.6-amzn-5 | MapReduce bibliotecas de motores de ejecución para ejecutar una aplicación. MapReduce  | 
| hadoop-yarn-nodemanager | 3.3.6-amzn-5 | Servicio de YARN para la administración de contenedores en un nodo individual. | 
| hadoop-yarn-resourcemanager | 3.3.6-amzn-5 | Servicio de YARN para la asignación y administración de recursos de clúster y aplicaciones distribuidas. | 
| hadoop-yarn-timeline-server | 3.3.6-amzn-5 | Servicio para recuperar información actual e histórica para aplicaciones de YARN. | 
| hbase-hmaster | 2.4.17-amzn-7 | Servicio para un HBase clúster responsable de la coordinación de las regiones y la ejecución de los comandos administrativos. | 
| hbase-region-server | 2.4.17-amzn-7 | Servicio para prestar servicio a una o más HBase regiones. | 
| hbase-client | 2.4.17-amzn-7 | HBase cliente de línea de comandos. | 
| hbase-rest-server | 2.4.17-amzn-7 | Servicio que proporciona un punto final RESTful HTTP para. HBase | 
| hbase-thrift-server | 2.4.17-amzn-7 | Servicio que proporciona un punto final de Thrift para HBase. | 
| hbase-operator-tools | 2.4.17-amzn-7 | Herramienta de reparación para HBase clústeres de Apache. | 
| hcatalog-client | 3.1.3-amzn-12 | El cliente de línea de comando "hcat" para manipular hcatalog-server. | 
| hcatalog-server | 3.1.3-amzn-12 | Prestación de servicios HCatalog, una capa de administración de tablas y almacenamiento para aplicaciones distribuidas. | 
| hcatalog-webhcat-server | 3.1.3-amzn-12 | Punto final HTTP que proporciona una interfaz REST para HCatalog. | 
| hive-client | 3.1.3-amzn-12 | Cliente de línea de comando de Hive. | 
| hive-hbase | 3.1.3-amzn-12 | Hive-hbase client. | 
| hive-metastore-server | 3.1.3-amzn-12 | Service para acceder al metaalmacén de Hive, un repositorio semántico que almacena metadatos para SQL en operaciones de Hadoop. | 
| hive-server2 | 3.1.3-amzn-12 | Servicio para aceptar consultas de Hive como solicitudes web. | 
| hudi | 0.15.0-amzn-0 | Marco de procesamiento incremental para impulsar la canalización de datos a baja latencia y alta eficiencia. | 
| hudi-presto | 0.15.0-amzn-0 | Biblioteca de paquetes para ejecutar Presto con Hudi. | 
| hudi-trino | 0.15.0-amzn-0 | Biblioteca de paquetes para ejecutar Trino con Hudi. | 
| hudi-spark | 0.15.0-amzn-0 | Biblioteca de paquetes para ejecutar Spark con Hudi. | 
| hue-server | 4.11.0 | Aplicación web para analizar datos con aplicaciones del ecosistema de Hadoop | 
| iceberg | 1.5.2-amzn-0 | Apache Iceberg es un formato de tabla abierto para conjuntos de datos analíticos muy grandes | 
| jupyterhub | 1.5.0 | Servidor multiusuario para blocs de notas Jupyter | 
| livy-server | 0.8.0-incubating | Interfaz de REST para interactuar con Apache Spark | 
| nginx | 1.12.1 | nginx [engine x] es un servidor HTTP y proxy inverso | 
| mariadb-server | 5.5.68\$1 | Servidor de base de datos de MariaDB. | 
| nvidia-cuda | 12.3.0 | Controladores Nvidia y conjunto de herramientas Cuda | 
| oozie-client | 5.2.1 | Cliente de línea de comando de Oozie. | 
| oozie-server | 5.2.1 | Servicio para aceptar solicitudes de flujo de trabajo de Oozie. | 
| opencv | 4.7.0 | Biblioteca de visión artificial de código abierto. | 
| phoenix-library | 5.1.3 | Las bibliotecas de Phoenix para servidor y cliente | 
| phoenix-connectors | 6.0.0 | Conectores de Apache Phoenix para Spark-3 | 
| phoenix-query-server | 6.0.0 | Un servidor ligero que proporciona acceso a JDBC, así como acceso de formato Protocol Buffers y JSON al API de Avatica  | 
| presto-coordinator | 0.285-amzn-1 | Servicio para aceptar las consultas y administrar la ejecución de consultas entre presto-workers. | 
| presto-worker | 0.285-amzn-1 | Service para ejecutar partes de una consulta. | 
| presto-client | 0.285-amzn-1 | Cliente de línea de comandos Presto que se instala en los nodos principales en espera de un clúster de HA donde el servidor Presto no se ha iniciado. | 
| trino-coordinator | 442-amzn-0 | Servicio para aceptar consultas y administrar la ejecución de consultas entre trino-workers. | 
| trino-worker | 442-amzn-0 | Service para ejecutar partes de una consulta. | 
| trino-client | 442-amzn-0 | Cliente de línea de comandos Trino que se instala en los maestros en espera de un clúster de HA donde el servidor Trino no se ha iniciado. | 
| pig-client | 0.17.0 | Cliente de línea de comando de Pig. | 
| r | 4.3.2 | Proyecto R para análisis estadístico | 
| ranger-kms-server | 2.0.0 | Sistema de administración de claves Apache Ranger | 
| spark-client | 3.5.1-amzn-1 | Clientes de línea de comando de Spark. | 
| spark-history-server | 3.5.1-amzn-1 | IU web para la visualización de eventos registrados durante la vida útil de una aplicación Spark completada. | 
| spark-on-yarn | 3.5.1-amzn-1 | Motor de ejecución en memoria para YARN. | 
| spark-yarn-slave | 3.5.1-amzn-1 | Bibliotecas de Apache Spark necesarias para esclavos de YARN. | 
| spark-rapids | 24.06.1-amzn-0 | El complemento Nvidia Spark RAPIDS que acelera Apache Spark con... GPUs | 
| sqoop-client | 1.4.7 | Cliente de línea de comando de Apache Sqoop. | 
| tensorflow | 2.16.1 | TensorFlow biblioteca de software de código abierto para computación numérica de alto rendimiento. | 
| tez-on-yarn | 0.10.2-amzn-10 | La aplicación YARN de tez y bibliotecas. | 
| tez-on-worker | 0.10.2-amzn-10 | La aplicación YARN de tez y bibliotecas para nodos de trabajo. | 
| zeppelin-server | 0.11.1 | Bloc de notas basado en web que permite el análisis de datos interactivo. | 
| zookeeper-server | 3.9.1-amzn-1 | Servicio centralizado para mantener información de configuración, nomenclatura, proporcionar sincronización distribuida y proporcionar servicios de grupo. | 
| zookeeper-client | 3.9.1-amzn-1 | ZooKeeper cliente de línea de comandos. | 

## Clasificaciones de configuración de la versión 7.3.0
<a name="emr-730-class"></a>

Las clasificaciones de configuración le permiten personalizar las aplicaciones. Suelen corresponder a un archivo XML de configuración para la aplicación como, por ejemplo, `hive-site.xml`. Para obtener más información, consulte [Configuración de aplicaciones](emr-configure-apps.md).

Las acciones de reconfiguración se producen cuando se especifica una configuración para los grupos de instancias de un clúster en ejecución. Amazon EMR solo inicia acciones de reconfiguración para las clasificaciones que se modifican. Para obtener más información, consulte [Reconfiguración de un grupo de instancias en un clúster en ejecución](emr-configure-apps-running-cluster.md).


**Clasificaciones de emr-7.3.0**  

| Clasificaciones | Description (Descripción) | Acciones de reconfiguración | 
| --- | --- | --- | 
| capacity-scheduler | Cambiar los valores en el archivo capacity-scheduler.xml de Hadoop. | Restarts the ResourceManager service. | 
| container-executor | Cambie los valores en el archivo container-executor.cfg de Hadoop YARN. | Not available. | 
| container-log4j | Cambiar los valores en el archivo container-log4j.properties de Hadoop YARN. | Not available. | 
| core-site | Cambiar los valores en el archivo core-site.xml de Hadoop. | Restarts the Hadoop HDFS services Namenode, SecondaryNamenode, Datanode, ZKFC, and Journalnode. Restarts the Hadoop YARN services ResourceManager, NodeManager, ProxyServer, and TimelineServer. Additionally restarts Hadoop KMS, Ranger KMS, HiveServer2, Hive MetaStore, Hadoop Httpfs, and MapReduce-HistoryServer. | 
| docker-conf | Cambie la configuración relacionada con el docker. | Not available. | 
| emrfs-site | Cambiar la configuración de EMRFS. | Restarts the Hadoop HDFS services Namenode, SecondaryNamenode, Datanode, ZKFC, and Journalnode. Restarts the Hadoop YARN services ResourceManager, NodeManager, ProxyServer, and TimelineServer. Additionally restarts HBaseRegionserver, HBaseMaster, HBaseThrift, HBaseRest, HiveServer2, Hive MetaStore, Hadoop Httpfs, and MapReduce-HistoryServer. | 
| flink-conf | Cambiar la configuración de flink-conf.yaml. | Restarts Flink history server. | 
| flink-log4j | Cambiar la configuración de log4j.properties de Flink. | Restarts Flink history server. | 
| flink-log4j-session | Cambie la configuración de Flink log4j-session.properties para la sesión. Kubernetes/Yarn  | Restarts Flink history server. | 
| flink-log4j-cli | Cambiar la configuración de log4j-cli.properties de Flink. | Restarts Flink history server. | 
| hadoop-env | Cambiar los valores en el entorno de Hadoop para todos los componentes de Hadoop. | Restarts the Hadoop HDFS services Namenode, SecondaryNamenode, Datanode, ZKFC, and Journalnode. Restarts the Hadoop YARN services ResourceManager, NodeManager, ProxyServer, and TimelineServer. Additionally restarts PhoenixQueryserver, HiveServer2, Hive MetaStore, and MapReduce-HistoryServer. | 
| hadoop-log4j | Cambiar los valores en el archivo log4j.properties de Hadoop. | Restarts the Hadoop HDFS services SecondaryNamenode, Datanode, and Journalnode. Restarts the Hadoop YARN services ResourceManager, NodeManager, ProxyServer, and TimelineServer. Additionally restarts Hadoop KMS, Hadoop Httpfs, and MapReduce-HistoryServer. | 
| hadoop-ssl-server | Cambiar la configuración del servidor ssl de Hadoop | Not available. | 
| hadoop-ssl-client | Cambiar la configuración del cliente ssl de Hadoop | Not available. | 
| hbase | Configuraciones seleccionadas por Amazon EMR para Apache. HBase | Custom EMR specific property. Sets emrfs-site and hbase-site configs. See those for their associated restarts. | 
| hbase-env | Cambie los valores en su entorno HBase. | Restarts the HBase services RegionServer, HBaseMaster, ThriftServer, RestServer. | 
| hbase-log4j | Cambie los valores en el archivo HBase hbase-log4j.properties. | Restarts the HBase services RegionServer, HBaseMaster, ThriftServer, RestServer. | 
| hbase-metrics | Cambie los valores en el archivo hadoop-metrics2-hbase.properties. HBase | Restarts the HBase services RegionServer, HBaseMaster, ThriftServer, RestServer. | 
| hbase-policy | Cambie los valores en HBase el archivo hbase-policy.xml. | Not available. | 
| hbase-site | Cambie los valores en HBase el archivo hbase-site.xml. | Restarts the HBase services RegionServer, HBaseMaster, ThriftServer, RestServer. Additionally restarts Phoenix QueryServer. | 
| hdfs-encryption-zones | Configurar zonas de cifrado de HDFS. | This classification should not be reconfigured. | 
| hdfs-env | Cambiar los valores en el entorno de HDFS. | Restarts Hadoop HDFS services Namenode, Datanode, and ZKFC. | 
| hdfs-site | Cambiar los valores en hdfs-site.xml de HDFS. | Restarts the Hadoop HDFS services Namenode, SecondaryNamenode, Datanode, ZKFC, and Journalnode. Additionally restarts Hadoop Httpfs. | 
| hcatalog-env | Cambie los valores en HCatalog el entorno. | Restarts Hive HCatalog Server. | 
| hcatalog-server-jndi | Cambie los valores en HCatalog jndi.properties. | Restarts Hive HCatalog Server. | 
| hcatalog-server-proto-hive-site | Cambie los valores en .xml HCatalog. proto-hive-site | Restarts Hive HCatalog Server. | 
| hcatalog-webhcat-env | Cambie los valores en el entorno HCat de la HCatalog Web. | Restarts Hive WebHCat server. | 
| hcatalog-webhcat-log4j2 | Cambie los valores en las propiedades HCatalog HCat log4j2.properties de la Web. | Restarts Hive WebHCat server. | 
| hcatalog-webhcat-site | Cambie los valores del archivo webhcat-site.xml de la HCatalog WebHCat. | Restarts Hive WebHCat server. | 
| hive | Configuración de Amazon EMR mantenida para Apache Hive. | Sets configurations to launch Hive LLAP service. | 
| hive-beeline-log4j2 | Cambiar los valores en el archivo beeline-log4j2.properties de Hive. | Not available. | 
| hive-parquet-logging | Cambiar los valores en el archivo parquet-logging.properties de Hive. | Not available. | 
| hive-env | Cambiar los valores en el entorno de Hive. | Restarts HiveServer2, HiveMetastore, and Hive HCatalog-Server. Runs Hive schemaTool CLI commands to verify hive-metastore. | 
| hive-exec-log4j2 | Cambie los valores en el archivo hive-exec-log 4j2.properties de Hive. | Not available. | 
| hive-llap-daemon-log4j2 | Cambie los valores en el archivo 4j2.properties de Hive. llap-daemon-log | Not available. | 
| hive-log4j2 | Cambiar los valores en el archivo hive-log4j2.properties de Hive. | Not available. | 
| hive-site | Cambiar los valores en el archivo hive-site.xml de Hive. | Restarts HiveServer2, HiveMetastore, and Hive HCatalog-Server. Runs Hive schemaTool CLI commands to verify hive-metastore. Also restarts Oozie and Zeppelin. | 
| hiveserver2-site | Cambiar los valores en el archivo hiveserver2-site.xml de Hive Server2. | Not available. | 
| hue-ini | Cambiar los valores en el archivo ini de Hue | Restarts Hue. Also activates Hue config override CLI commands to pick up new configurations. | 
| httpfs-env | Cambiar los valores en el entorno de HTTPFS. | Restarts Hadoop Httpfs service. | 
| httpfs-site | Cambiar los valores en el archivo httpfs-site.xml de Hadoop. | Restarts Hadoop Httpfs service. | 
| hadoop-kms-acls | Cambiar los valores en el archivo kms-acls.xml de Hadoop. | Not available. | 
| hadoop-kms-env | Cambiar los valores en el entorno de Hadoop KMS. | Restarts Hadoop-KMS service. | 
| hadoop-kms-java-home | Cambie la página de inicio de Java de KMS de Hadoop | Not available. | 
| hadoop-kms-log4j | Cambiar los valores en el archivo kms-log4j.properties de Hadoop. | Not available. | 
| hadoop-kms-site | Cambiar los valores en el archivo kms-site.xml de Hadoop. | Restarts Hadoop-KMS and Ranger-KMS service. | 
| hudi-env | Cambiar los valores en el entorno de Hudi. | Not available. | 
| hudi-defaults | Cambie los valores en el archivo hudi-defaults.conf de Hudi. | Not available. | 
| iceberg-defaults | Cambie los valores del archivo iceberg-defaults.conf de Iceberg. | Not available. | 
| delta-defaults | Cambie los valores del archivo delta-defaults.conf de Delta. | Not available. | 
| jupyter-notebook-conf | Cambiar los valores en el archivo jupyter\$1notebook\$1config.py de Jupyter Notebook. | Not available. | 
| jupyter-hub-conf | Cambie los valores en JupyterHubs el archivo jupyterhub\$1config.py. | Not available. | 
| jupyter-s3-conf | Configurar la persistencia en S3 del bloc de notas de Jupyter. | Not available. | 
| jupyter-sparkmagic-conf | Cambiar los valores en el archivo config.json de Sparkmagic. | Not available. | 
| livy-conf | Cambiar los valores en el archivo livy.conf de Livy. | Restarts Livy Server. | 
| livy-env | Cambiar los valores en el entorno de Livy. | Restarts Livy Server. | 
| livy-log4j2 | Cambiar la configuración de log4j2.properties de Livy. | Restarts Livy Server. | 
| mapred-env | Cambie los valores en el entorno de la MapReduce aplicación. | Restarts Hadoop MapReduce-HistoryServer. | 
| mapred-site | Cambie los valores en el archivo mapred-site.xml de la MapReduce aplicación. | Restarts Hadoop MapReduce-HistoryServer. | 
| oozie-env | Cambiar los valores en el entorno de Oozie. | Restarts Oozie. | 
| oozie-log4j | Cambiar los valores en el archivo oozie-log4j.properties de Oozie. | Restarts Oozie. | 
| oozie-site | Cambiar los valores en el archivo oozie-site.xml de Oozie. | Restarts Oozie. | 
| phoenix-hbase-metrics | Cambiar los valores en el archivo hadoop-metrics2-hbase.properties de Phoenix. | Not available. | 
| phoenix-hbase-site | Cambiar los valores en el archivo hbase-site.xml de Phoenix. | Not available. | 
| phoenix-log4j | Cambiar los valores en el archivo log4j.properties de Phoenix. | Restarts Phoenix-QueryServer. | 
| phoenix-metrics | Cambiar los valores en el archivo hadoop-metrics2-phoenix.properties de Phoenix. | Not available. | 
| pig-env | Cambiar los valores en el entorno de Pig. | Not available. | 
| pig-properties | Cambiar los valores en el archivo pig.properties de Pig. | Restarts Oozie. | 
| pig-log4j | Cambiar los valores en el archivo log4j.properties de Pig. | Not available. | 
| presto-log | Cambiar los valores en el archivo log.properties de Presto. | Restarts Presto-Server (for PrestoDB) | 
| presto-config | Cambiar los valores en el archivo config.properties de Presto. | Restarts Presto-Server (for PrestoDB) | 
| presto-password-authenticator | Cambiar los valores en el archivo password-authenticator.properties de Presto. | Not available. | 
| presto-env | Cambiar valores en el archivo presto-env.sh de Presto. | Restarts Presto-Server (for PrestoDB) | 
| presto-node | Cambiar valores en el archivo node.properties de Presto. | Not available. | 
| presto-connector-blackhole | Cambiar los valores en el archivo blackhole.properties de Presto. | Not available. | 
| presto-connector-cassandra | Cambiar los valores en el archivo cassandra.properties de Presto. | Not available. | 
| presto-connector-hive | Cambiar los valores en el archivo hive.properties de Presto. | Restarts Presto-Server (for PrestoDB) | 
| presto-connector-jmx | Cambiar los valores en el archivo jmx.properties de Presto. | Not available. | 
| presto-connector-kafka | Cambiar los valores en el archivo kafka.properties de Presto. | Not available. | 
| presto-connector-lakeformation | Cambiar los valores en el archivo lakeformation.properties de Presto. | Restarts Presto-Server (for PrestoDB) | 
| presto-connector-localfile | Cambiar los valores en el archivo localfile.properties de Presto. | Not available. | 
| presto-connector-memory | Cambiar los valores del archivo memory.properties de Presto. | Not available. | 
| presto-connector-mongodb | Cambiar los valores en el archivo mongodb.properties de Presto. | Not available. | 
| presto-connector-mysql | Cambiar los valores en el archivo mysql.properties de Presto. | Not available. | 
| presto-connector-postgresql | Cambiar los valores en el archivo postgresql.properties de Presto. | Not available. | 
| presto-connector-raptor | Cambiar los valores en el archivo raptor.properties de Presto. | Not available. | 
| presto-connector-redis | Cambiar los valores en el archivo redis.properties de Presto. | Not available. | 
| presto-connector-redshift | Cambiar los valores en el archivo redshift.properties de Presto. | Not available. | 
| presto-connector-tpch | Cambiar los valores en el archivo tpch.properties de Presto. | Not available. | 
| presto-connector-tpcds | Cambiar los valores del archivo tpcds.properties de Presto. | Not available. | 
| trino-log | Cambiar los valores en el archivo log.properties de Trino. | Restarts Trino-Server (for Trino) | 
| trino-config | Cambiar los valores en el archivo config.properties de Trino. | Restarts Trino-Server (for Trino) | 
| trino-password-authenticator | Cambiar los valores en el archivo password-authenticator.properties de Trino. | Restarts Trino-Server (for Trino) | 
| trino-env | Cambie los valores del archivo trino-env.sh de Trino. | Restarts Trino-Server (for Trino) | 
| trino-node | Cambiar los valores en el archivo node.properties de Trino. | Not available. | 
| trino-connector-blackhole | Cambiar los valores en el archivo blackhole.properties de Trino. | Not available. | 
| trino-connector-cassandra | Cambiar los valores en el archivo cassandra.properties de Trino. | Not available. | 
| trino-connector-delta | Cambie los valores del archivo delta.properties de Trino. | Restarts Trino-Server (for Trino) | 
| trino-connector-hive | Cambiar los valores en el archivo hive.properties de Trino. | Restarts Trino-Server (for Trino) | 
| trino-exchange-manager | Cambie los valores del archivo exchange-manager.properties de Trino. | Restarts Trino-Server (for Trino) | 
| trino-connector-iceberg | Cambiar los valores en el archivo iceberg.properties de Trino. | Restarts Trino-Server (for Trino) | 
| trino-connector-hudi | Cambiar los valores en el archivo hudi.properties de Trino. | Restarts Trino-Server (for Trino) | 
| trino-connector-jmx | Cambiar los valores en el archivo jmx.properties de Trino. | Not available. | 
| trino-connector-kafka | Cambiar los valores en el archivo kafka.properties de Trino. | Not available. | 
| trino-connector-localfile | Cambiar los valores en el archivo localfile.properties de Trino. | Not available. | 
| trino-connector-memory | Cambiar los valores en el archivo memory.properties de Trino. | Not available. | 
| trino-connector-mongodb | Cambiar los valores en el archivo mongodb.properties de Trino. | Not available. | 
| trino-connector-mysql | Cambiar los valores en el archivo mysql.properties de Trino. | Not available. | 
| trino-connector-postgresql | Cambiar los valores en el archivo postgresql.properties de Trino. | Not available. | 
| trino-connector-raptor | Cambiar los valores en el archivo raptor.properties de Trino. | Not available. | 
| trino-connector-redis | Cambiar los valores en el archivo redis.properties de Trino. | Not available. | 
| trino-connector-redshift | Cambiar los valores en el archivo redshift.properties de Trino. | Not available. | 
| trino-connector-tpch | Cambiar los valores en el archivo tpch.properties de Trino. | Not available. | 
| trino-connector-tpcds | Cambiar los valores en el archivo tpcds.properties de Trino. | Not available. | 
| ranger-kms-dbks-site | Cambie los valores del archivo dbks-site.xml de Ranger KMS. | Restarts Ranger KMS Server. | 
| ranger-kms-site | Cambie los valores en el ranger-kms-site archivo.xml de Ranger KMS. | Restarts Ranger KMS Server. | 
| ranger-kms-env | Cambie los valores del entorno Ranger KMS. | Restarts Ranger KMS Server. | 
| ranger-kms-logback | Cambie los valores del archivo kms-logback.xml de Ranger KMS. | Not available. | 
| ranger-kms-db-ca | Cambie los valores del archivo CA en S3 para la conexión SSL de MySQL con Ranger KMS. | Not available. | 
| spark | Configuración de Amazon EMR mantenida para Apache Spark. | This property modifies spark-defaults. See actions there. | 
| spark-defaults | Cambiar los valores en el archivo spark-defaults.conf de Spark. | Restarts Spark history server and Spark thrift server. | 
| spark-env | Cambiar los valores en el entorno de Spark. | Restarts Spark history server and Spark thrift server. | 
| spark-hive-site | Cambiar los valores en el archivo hive-site.xml de Spark. | Not available. | 
| spark-log4j2 | Cambiar los valores en el archivo log4j2.properties de Spark. | Restarts Spark history server and Spark thrift server. | 
| spark-metrics | Cambiar los valores en el archivo metrics.properties de Spark. | Restarts Spark history server and Spark thrift server. | 
| sqoop-env | Cambiar los valores en el entorno de Sqoop. | Not available. | 
| sqoop-oraoop-site | Cambie los valores en el archivo oraoop-site.xml de Sqoop. OraOop | Not available. | 
| sqoop-site | Cambiar los valores en el archivo sqoop-site.xml de Sqoop. | Not available. | 
| tez-site | Cambiar los valores en el archivo tez-site.xml de Tez. | Restart Oozie and HiveServer2. | 
| yarn-env | Cambiar los valores en el entorno de YARN. | Restarts the Hadoop YARN services ResourceManager, NodeManager, ProxyServer, and TimelineServer. Additionally restarts MapReduce-HistoryServer. | 
| yarn-site | Cambiar los valores en el archivo yarn-site.xml de YARN. | Restarts the Hadoop YARN services ResourceManager, NodeManager, ProxyServer, and TimelineServer. Additionally restarts Livy Server and MapReduce-HistoryServer. | 
| zeppelin-env | Cambiar los valores en el entorno de Zeppelin. | Restarts Zeppelin. | 
| zeppelin-site | Cambie los ajustes de configuración de zeppelin-site.xml. | Restarts Zeppelin. | 
| zookeeper-config | Cambie los valores en el ZooKeeper archivo zoo.cfg. | Restarts Zookeeper server. | 
| zookeeper-logback | Cambie los valores en ZooKeeper el archivo logback.xml. | Restarts Zookeeper server. | 
| emr-metrics | Cambie la configuración de la métrica EMR para este nodo. | Restarts the CloudWatchAgent service. | 

## Registro de cambios de la versión 7.3.0
<a name="730-changelog"></a>


**Registro de cambios de la versión 7.3.0 y notas de la versión**  

| Date | Event | Description (Descripción) | 
| --- | --- | --- | 
| 17-10-24 | Publicación de documentos | Primera publicación de las notas de la versión 7.3.0 de Amazon EMR | 
| 2024-10-16 | Implementación completa | Amazon EMR 7.3.0 se ha implementado completamente en todas las [regiones compatibles](https://aws.amazon.com/about-aws/global-infrastructure/regional-product-services/) | 
| 2024-10-14 | Versión inicial | Implementación inicial de Amazon EMR 7.3.0 en regiones comerciales limitadas | 

# Amazon EMR, versión 7.2.0
<a name="emr-720-release"></a>

## Ciclo de vida compatible con 7.2.0
<a name="emr-720-supported-lifecycle"></a>

En la siguiente tabla se describen las fechas de ciclo de vida admitidas para la versión 7.2.0 de Amazon EMR.


| Fase de soporte | Date | 
| --- | --- | 
| Fecha de lanzamiento inicial | 25 de julio de 2024 | 
| Soporte estándar hasta | 24 de julio de 2026 | 
| Fin del soporte | 25 de julio de 2026 | 
| Fin de vida útil | 25 de julio de 2027 | 

## Versiones de las aplicaciones de la versión 7.2.0
<a name="emr-720-app-versions"></a>

Esta versión incluye las siguientes aplicaciones: [https://docs.aws.amazon.com/AmazonCloudWatch/latest/monitoring/Install-CloudWatch-Agent.html](https://docs.aws.amazon.com/AmazonCloudWatch/latest/monitoring/Install-CloudWatch-Agent.html), [https://delta.io/](https://delta.io/), [https://flink.apache.org/](https://flink.apache.org/), [http://hbase.apache.org/](http://hbase.apache.org/), [https://cwiki.apache.org/confluence/display/Hive/HCatalog](https://cwiki.apache.org/confluence/display/Hive/HCatalog), [http://hadoop.apache.org/docs/current/](http://hadoop.apache.org/docs/current/), [http://hive.apache.org/](http://hive.apache.org/), [https://hudi.apache.org](https://hudi.apache.org), [http://gethue.com/](http://gethue.com/), [https://iceberg.apache.org/](https://iceberg.apache.org/), [https://jupyter-enterprise-gateway.readthedocs.io/en/latest/](https://jupyter-enterprise-gateway.readthedocs.io/en/latest/), [https://jupyterhub.readthedocs.io/en/latest/#](https://jupyterhub.readthedocs.io/en/latest/#), [https://livy.incubator.apache.org/](https://livy.incubator.apache.org/), [https://mxnet.incubator.apache.org/](https://mxnet.incubator.apache.org/), [http://oozie.apache.org/](http://oozie.apache.org/), [https://phoenix.apache.org/](https://phoenix.apache.org/), [http://pig.apache.org/](http://pig.apache.org/), [https://prestodb.io/](https://prestodb.io/), [https://spark.apache.org/docs/latest/](https://spark.apache.org/docs/latest/), [http://sqoop.apache.org/](http://sqoop.apache.org/), [https://www.tensorflow.org/](https://www.tensorflow.org/), [https://tez.apache.org/](https://tez.apache.org/), [https://trino.io/](https://trino.io/), [https://zeppelin.incubator.apache.org/](https://zeppelin.incubator.apache.org/) y [https://zookeeper.apache.org](https://zookeeper.apache.org).

En la siguiente tabla se enumeran las versiones de la aplicación disponibles en esta versión de Amazon EMR y las versiones de la aplicación en las tres versiones anteriores de Amazon EMR (cuando corresponda).

Para ver un historial completo de las versiones de la aplicación disponibles para cada versión de Amazon EMR, consulte los temas siguientes:
+ [Versiones de las aplicaciones en las versiones 7.x de Amazon EMR](emr-release-app-versions-7.x.md)
+ [Versiones de la aplicación en las versiones 6.x de Amazon EMR](emr-release-app-versions-6.x.md)
+ [Versiones de la aplicación en las versiones 5.x de Amazon EMR](emr-release-app-versions-5.x.md)
+ [Versiones de la aplicación en las versiones 4.x de Amazon EMR](emr-release-app-versions-4.x.md)


**Información sobre la versión de la aplicación**  

|  | emr-7.3.0 | emr-7.2.0 | emr-7.1.0 | emr-7.0.0 | 
| --- | --- | --- | --- | --- | 
| AWS SDK for Java | 2.25.70, 1.12.747 | 2.23.18, 1.12.705 | 2.23.18, 1.12.656 | 2.20.160-amzn-0, 1.12.569 | 
| Python | 3.9, 3.11 | 3.9, 3.11 | 3.9, 3.11 | 3.9 | 
| Scala | 2.12.18 | 2.12.17 | 2.12.17 | 2.12.17 | 
| AmazonCloudWatchAgent | 1.300032.2-amzn-0 | 1.300032.2-amzn-0 | 1.300032.2-amzn-0 | 1.300031.1-amzn-0 | 
| Delta | 3.2.0-amzn-0 | 3.1.0 | 3.0.0 | 3.0.0 | 
| Flink | 1.18.1-amzn-2 | 1.18.1-amzn-1 | 1.18.1-amzn-0 | 1.18.0-amzn-0 | 
| Ganglia |  -  |  -  |  -  |  -  | 
| HBase | 2.4.17-amzn-7 | 2.4.17-amzn-6 | 2.4.17-amzn-5 | 2.4.17-amzn-4 | 
| HCatalog | 3.1.3-amzn-12 | 3.1.3-amzn-11 | 3.1.3-amzn-10 | 3.1.3-amzn-9 | 
| Hadoop | 3.3.6-amzn-5 | 3.3.6-amzn-4 | 3.3.6-amzn-3 | 3.3.6-amzn-2 | 
| Hive | 3.1.3-amzn-12 | 3.1.3-amzn-11 | 3.1.3-amzn-10 | 3.1.3-amzn-9 | 
| Hudi | 0.15.0-amzn-0 | 0.14.1-amzn-1 | 0.14.1-amzn-0 | 0.14.0-amzn-1 | 
| Hue | 4.11.0 | 4.11.0 | 4.11.0 | 4.11.0 | 
| Iceberg | 1.5.2-amzn-0 | 1.5.0-amzn-0 | 1.4.3-amzn-0 | 1.4.2-amzn-0 | 
| JupyterEnterpriseGateway | 2.6.0 | 2.6.0 | 2.6.0 | 2.6.0 | 
| JupyterHub | 1.5.0 | 1.5.0 | 1.5.0 | 1.5.0 | 
| Livy | 0.8.0-incubating | 0.8.0-incubating | 0.8.0-incubating | 0.7.1-incubating | 
| MXNet |  -  | 1.9.1 | 1.9.1 | 1.9.1 | 
| Mahout |  -  |  -  |  -  |  -  | 
| Oozie | 5.2.1 | 5.2.1 | 5.2.1 | 5.2.1 | 
| Phoenix | 5.1.3 | 5.1.3 | 5.1.3 | 5.1.3 | 
| Pig | 0.17.0 | 0.17.0 | 0.17.0 | 0.17.0 | 
| Presto | 0.285-amzn-1 | 0.285-amzn-0 | 0.284-amzn-0 | 0.283-amzn-1 | 
| Spark | 3.5.1-amzn-1 | 3.5.1-amzn-0 | 3.5.0-amzn-1 | 3.5.0-amzn-0 | 
| Sqoop | 1.4.7 | 1.4.7 | 1.4.7 | 1.4.7 | 
| TensorFlow | 2.16.1 | 2.11.0 | 2.11.0 | 2.11.0 | 
| Tez | 0.10.2-amzn-10 | 0.10.2-amzn-9 | 0.10.2-amzn-8 | 0.10.2-amzn-7 | 
| Trino (PrestoSQL) | 442-amzn-0 | 436-amzn-0 | 435-amzn-0 | 426-amzn-1 | 
| Zeppelin | 0.11.1 | 0.10.1 | 0.10.1 | 0.10.1 | 
| ZooKeeper | 3.9.1-amzn-1 | 3.9.1-amzn-1 | 3.9.1-amzn-0 | 3.5.10 | 

# Detalles de los componentes de la versión 7.2.0
<a name="emr-720-release-components-details"></a>

Consulte la siguiente tabla para obtener más información sobre los paquetes *Extras* de Amazon EMR 7.2.0.


| Aplicación | Tipo de aplicación | Package | Tipo de Package | Versión de paquete | 
| --- | --- | --- | --- | --- | 
|  AmazonCloudWatchAgent  |  Core  |  hadoop-hdfs-journalnode  |  Extras  |  3.3.6.amzn.4-1.amzn2023  | 
|  AmazonCloudWatchAgent  |  Core  |  ranger-kms  |  Extras  |  2.0.0-1.amzn2023  | 
|  AmazonCloudWatchAgent  |  Core  |  s3-dist-cp  |  Extras  |  2.32.0-1.amzn2023  | 
|  AmazonCloudWatchAgent  |  Core  |  ZooKeeper  |  Extras  |  3.9.1.amzn.1-1.amzn2023  | 
|  AmazonCloudWatchAgent  |  Core  |  zookeeper-server  |  Extras  |  3.9.1.amzn.1-1.amzn2023  | 
|  Flink  |  Core  |  hadoop-client  |  Extras  |  3.3.6.amzn.4-1.amzn2023  | 
|  Flink  |  Core  |  hadoop-hdfs  |  Extras  |  3.3.6.amzn.4-1.amzn2023  | 
|  Flink  |  Core  |  hadoop-hdfs-datanode  |  Extras  |  3.3.6.amzn.4-1.amzn2023  | 
|  Flink  |  Core  |  hadoop-hdfs-journalnode  |  Extras  |  3.3.6.amzn.4-1.amzn2023  | 
|  Flink  |  Core  |  hadoop-hdfs-namenode  |  Extras  |  3.3.6.amzn.4-1.amzn2023  | 
|  Flink  |  Core  |  hadoop-httpfs  |  Extras  |  3.3.6.amzn.4-1.amzn2023  | 
|  Flink  |  Core  |  hadoop-kms  |  Extras  |  3.3.6.amzn.4-1.amzn2023  | 
|  Flink  |  Core  |  hadoop-mapreduce  |  Extras  |  3.3.6.amzn.4-1.amzn2023  | 
|  Flink  |  Core  |  hadoop-mapreduce-historyserver  |  Extras  |  3.3.6.amzn.4-1.amzn2023  | 
|  Flink  |  Core  |  hadoop-yarn  |  Extras  |  3.3.6.amzn.4-1.amzn2023  | 
|  Flink  |  Core  |  hadoop-yarn-nodemanager  |  Extras  |  3.3.6.amzn.4-1.amzn2023  | 
|  Flink  |  Core  |  hadoop-yarn-proxyserver  |  Extras  |  3.3.6.amzn.4-1.amzn2023  | 
|  Flink  |  Core  |  hadoop-yarn-resourcemanager  |  Extras  |  3.3.6.amzn.4-1.amzn2023  | 
|  Flink  |  Core  |  hadoop-yarn-timelineserver  |  Extras  |  3.3.6.amzn.4-1.amzn2023  | 
|  Flink  |  Core  |  hudi  |  Extras  |  0.14.1.amzn.1-1.amzn2023  | 
|  Flink  |  Core  |  ranger-kms  |  Extras  |  2.0.0-1.amzn2023  | 
|  Flink  |  Core  |  hadoop  |  Extras  |  3.3.6.amzn.4-1.amzn2023  | 
|  HBase  |  Core  |  s3-dist-cp  |  Extras  |  2.32.0-1.amzn2023  | 
|  HCatalog  |  Core  |  hadoop-yarn-proxyserver  |  Extras  |  3.3.6.amzn.4-1.amzn2023  | 
|  HCatalog  |  Core  |  mariadb-connector-java  |  Extras  |  2.7.2-1  | 
|  Hive  |  Core  |  hadoop-httpfs  |  Extras  |  3.3.6.amzn.4-1.amzn2023  | 
|  Hive  |  Core  |  hadoop-yarn-proxyserver  |  Extras  |  3.3.6.amzn.4-1.amzn2023  | 
|  Hive  |  Core  |  hive-hbase  |  Extras  |  3.1.3.amzn.11-1.amzn2023  | 
|  Hive  |  Core  |  mariadb-connector-java  |  Extras  |  2.7.2-1  | 
|  Hive  |  Core  |  s3-dist-cp  |  Extras  |  2.32.0-1.amzn2023  | 
|  Phoenix  |  Core  |  s3-dist-cp  |  Extras  |  2.32.0-1.amzn2023  | 
|  Spark  |  Core  |  spark-datanucleus  |  Extras  |  3.5.1.amzn.0-1.amzn2023  | 
|  Tez  |  Core  |  hadoop-mapreduce  |  Extras  |  3.3.6.amzn.4-1.amzn2023  | 
|  Tez  |  Core  |  hadoop-mapreduce-historyserver  |  Extras  |  3.3.6.amzn.4-1.amzn2023  | 
|  Tez  |  Core  |  hadoop-yarn-proxyserver  |  Extras  |  3.3.6.amzn.4-1.amzn2023  | 
|  Trino  |  Core  |  bigtop-utils  |  Extras  |  1.2.0-1.amzn2023  | 
|  Trino  |  Core  |  hadoop-client  |  Extras  |  3.3.6.amzn.4-1.amzn2023  | 
|  Trino  |  Core  |  hadoop-hdfs  |  Extras  |  3.3.6.amzn.4-1.amzn2023  | 
|  Trino  |  Core  |  hadoop-hdfs-datanode  |  Extras  |  3.3.6.amzn.4-1.amzn2023  | 
|  Trino  |  Core  |  hadoop-hdfs-journalnode  |  Extras  |  3.3.6.amzn.4-1.amzn2023  | 
|  Trino  |  Core  |  hadoop-hdfs-namenode  |  Extras  |  3.3.6.amzn.4-1.amzn2023  | 
|  Trino  |  Core  |  hadoop-kms  |  Extras  |  3.3.6.amzn.4-1.amzn2023  | 
|  Trino  |  Core  |  hadoop-mapreduce  |  Extras  |  3.3.6.amzn.4-1.amzn2023  | 
|  Trino  |  Core  |  hadoop-mapreduce-historyserver  |  Extras  |  3.3.6.amzn.4-1.amzn2023  | 
|  Trino  |  Core  |  hadoop-yarn  |  Extras  |  3.3.6.amzn.4-1.amzn2023  | 
|  Trino  |  Core  |  hadoop-yarn-nodemanager  |  Extras  |  3.3.6.amzn.4-1.amzn2023  | 
|  Trino  |  Core  |  hadoop-yarn-proxyserver  |  Extras  |  3.3.6.amzn.4-1.amzn2023  | 
|  Trino  |  Core  |  hadoop-yarn-resourcemanager  |  Extras  |  3.3.6.amzn.4-1.amzn2023  | 
|  Trino  |  Core  |  hadoop-yarn-timelineserver  |  Extras  |  3.3.6.amzn.4-1.amzn2023  | 
|  Trino  |  Core  |  hive  |  Extras  |  3.1.3.amzn.11-1.amzn2023  | 
|  Trino  |  Core  |  hive-hcatalog-server  |  Extras  |  3.1.3.amzn.11-1.amzn2023  | 
|  Trino  |  Core  |  mariadb-connector-java  |  Extras  |  2.7.2-1  | 
|  Trino  |  Core  |  ranger-kms  |  Extras  |  2.0.0-1.amzn2023  | 
|  Trino  |  Core  |  ZooKeeper  |  Extras  |  3.9.1.amzn.1-1.amzn2023  | 
|  Trino  |  Core  |  zookeeper-server  |  Extras  |  3.9.1.amzn.1-1.amzn2023  | 
|  Trino  |  Core  |  bigtop-groovy  |  Extras  |  2.5.4-1.amzn2023  | 
|  Trino  |  Core  |  bigtop-jsvc  |  Extras  |  1.2.4-1.amzn2023  | 
|  Trino  |  Core  |  hadoop  |  Extras  |  3.3.6.amzn.4-1.amzn2023  | 
|  Trino  |  Core  |  hadoop-lzo  |  Extras  |  0.4.19-1.amzn2023  | 
|  Trino  |  Core  |  hive-hcatalog  |  Extras  |  3.1.3.amzn.11-1.amzn2023  | 
|  Trino  |  Core  |  hive-jdbc  |  Extras  |  3.1.3.amzn.11-1.amzn2023  | 
|  ZooKeeper  |  Core  |  emrfs  |  Extras  |  2.63.0-1.amzn2023  | 
|  ZooKeeper  |  Core  |  hadoop-client  |  Extras  |  3.3.6.amzn.4-1.amzn2023  | 
|  ZooKeeper  |  Core  |  hadoop-hdfs  |  Extras  |  3.3.6.amzn.4-1.amzn2023  | 
|  ZooKeeper  |  Core  |  hadoop-hdfs-datanode  |  Extras  |  3.3.6.amzn.4-1.amzn2023  | 
|  ZooKeeper  |  Core  |  hadoop-hdfs-journalnode  |  Extras  |  3.3.6.amzn.4-1.amzn2023  | 
|  ZooKeeper  |  Core  |  hadoop-hdfs-namenode  |  Extras  |  3.3.6.amzn.4-1.amzn2023  | 
|  ZooKeeper  |  Core  |  hadoop-httpfs  |  Extras  |  3.3.6.amzn.4-1.amzn2023  | 
|  ZooKeeper  |  Core  |  hadoop-kms  |  Extras  |  3.3.6.amzn.4-1.amzn2023  | 
|  ZooKeeper  |  Core  |  hadoop-mapreduce  |  Extras  |  3.3.6.amzn.4-1.amzn2023  | 
|  ZooKeeper  |  Core  |  hadoop-mapreduce-historyserver  |  Extras  |  3.3.6.amzn.4-1.amzn2023  | 
|  ZooKeeper  |  Core  |  hadoop-yarn  |  Extras  |  3.3.6.amzn.4-1.amzn2023  | 
|  ZooKeeper  |  Core  |  hadoop-yarn-nodemanager  |  Extras  |  3.3.6.amzn.4-1.amzn2023  | 
|  ZooKeeper  |  Core  |  hadoop-yarn-proxyserver  |  Extras  |  3.3.6.amzn.4-1.amzn2023  | 
|  ZooKeeper  |  Core  |  hadoop-yarn-resourcemanager  |  Extras  |  3.3.6.amzn.4-1.amzn2023  | 
|  ZooKeeper  |  Core  |  hadoop-yarn-timelineserver  |  Extras  |  3.3.6.amzn.4-1.amzn2023  | 
|  ZooKeeper  |  Core  |  ranger-kms  |  Extras  |  2.0.0-1.amzn2023  | 

# Vulnerabilidades y exposiciones comunes de la versión 7.2.0
<a name="720-common-vulnerabilities-exposures"></a>

La siguiente tabla muestra todo lo CVEs que no afecta a los clústeres de EMR que se ejecutan en las configuraciones recomendadas de Amazon EMR 7.2.0. Amazon EMR depende del código abierto original para la disponibilidad de las correcciones y proporcionará la última versión estable como parte de los componentes del motor principal en un plazo de 90 días a partir de su verificación por parte de Amazon EMR.

Esta tabla se actualizó el 15 de septiembre de 2024.


| ID de CVE | Gravedad | URL de detalles del CVE | 
| --- | --- | --- | 
|  CVE-2015-1832  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2015-1832](https://nvd.nist.gov/vuln/detail/CVE-2015-1832)  | 
|  CVE-2015-4852  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2015-4852)-2015-4852  | 
|  CVE-2015-7501  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2015-7501)-2015-7501  | 
|  CVE-2016-5018  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2016-5018)-2016-5018  | 
|  CVE-2017-1000487  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2017-1000487)-2017-1000487  | 
|  CVE-2017-12629  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2017-12629)-2017-12629  | 
|  CVE-2017-15095  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2017-15095)-2017-15095  | 
|  CVE-2017-15095  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2017-15095)-2017-15095  | 
|  CVE-2017-17485  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2017-17485](https://nvd.nist.gov/vuln/detail/CVE-2017-17485)  | 
|  CVE-2017-17485  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2017-17485](https://nvd.nist.gov/vuln/detail/CVE-2017-17485)  | 
|  CVE-2017-7525  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2017-7525)-2017-7525  | 
|  CVE-2017-7657  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2017-7657](https://nvd.nist.gov/vuln/detail/CVE-2017-7657)  | 
|  CVE-2017-7658  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2017-7658](https://nvd.nist.gov/vuln/detail/CVE-2017-7658)  | 
|  CVE-2018-11307  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2018-11307](https://nvd.nist.gov/vuln/detail/CVE-2018-11307)  | 
|  CVE-2018-11307  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2018-11307](https://nvd.nist.gov/vuln/detail/CVE-2018-11307)  | 
|  CVE-2018-11307  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2018-11307](https://nvd.nist.gov/vuln/detail/CVE-2018-11307)  | 
|  CVE-2018-14718  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-14718)-2018-14718  | 
|  CVE-2018-14718  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-14718)-2018-14718  | 
|  CVE-2018-14718  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-14718)-2018-14718  | 
|  CVE-2018-14719  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-14719)-2018-14719  | 
|  CVE-2018-14719  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-14719)-2018-14719  | 
|  CVE-2018-14719  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-14719)-2018-14719  | 
|  CVE-2018-14720  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-14720)-2018-14720  | 
|  CVE-2018-14720  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-14720)-2018-14720  | 
|  CVE-2018-14720  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-14720)-2018-14720  | 
|  CVE-2018-14721  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-14721)-2018-14721  | 
|  CVE-2018-14721  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-14721)-2018-14721  | 
|  CVE-2018-14721  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-14721)-2018-14721  | 
|  CVE-2018-17190  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2018-17190](https://nvd.nist.gov/vuln/detail/CVE-2018-17190)  | 
|  CVE-2018-19360  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2018-19360](https://nvd.nist.gov/vuln/detail/CVE-2018-19360)  | 
|  CVE-2018-19360  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2018-19360](https://nvd.nist.gov/vuln/detail/CVE-2018-19360)  | 
|  CVE-2018-19360  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2018-19360](https://nvd.nist.gov/vuln/detail/CVE-2018-19360)  | 
|  CVE-2018-19361  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2018-19361](https://nvd.nist.gov/vuln/detail/CVE-2018-19361)  | 
|  CVE-2018-19361  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2018-19361](https://nvd.nist.gov/vuln/detail/CVE-2018-19361)  | 
|  CVE-2018-19361  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2018-19361](https://nvd.nist.gov/vuln/detail/CVE-2018-19361)  | 
|  CVE-2018-19362  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2018-19362](https://nvd.nist.gov/vuln/detail/CVE-2018-19362)  | 
|  CVE-2018-19362  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2018-19362](https://nvd.nist.gov/vuln/detail/CVE-2018-19362)  | 
|  CVE-2018-19362  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2018-19362](https://nvd.nist.gov/vuln/detail/CVE-2018-19362)  | 
|  CVE-2018-7489  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2018-7489](https://nvd.nist.gov/vuln/detail/CVE-2018-7489)  | 
|  CVE-2018-7489  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2018-7489](https://nvd.nist.gov/vuln/detail/CVE-2018-7489)  | 
|  CVE-2018-7489  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2018-7489](https://nvd.nist.gov/vuln/detail/CVE-2018-7489)  | 
|  CVE-2019-10202  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2019-10202](https://nvd.nist.gov/vuln/detail/CVE-2019-10202)  | 
|  CVE-2019-14379  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2019-14379](https://nvd.nist.gov/vuln/detail/CVE-2019-14379)  | 
|  CVE-2019-14379  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2019-14379](https://nvd.nist.gov/vuln/detail/CVE-2019-14379)  | 
|  CVE-2019-14379  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2019-14379](https://nvd.nist.gov/vuln/detail/CVE-2019-14379)  | 
|  CVE-2019-14379  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2019-14379](https://nvd.nist.gov/vuln/detail/CVE-2019-14379)  | 
|  CVE-2019-14540  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-14540)-2019-14540  | 
|  CVE-2019-14540  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-14540)-2019-14540  | 
|  CVE-2019-14540  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-14540)-2019-14540  | 
|  CVE-2019-14540  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-14540)-2019-14540  | 
|  CVE-2019-14892  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-14892)-2019-14892  | 
|  CVE-2019-14892  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-14892)-2019-14892  | 
|  CVE-2019-14892  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-14892)-2019-14892  | 
|  CVE-2019-14892  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-14892)-2019-14892  | 
|  CVE-2019-14893  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-14893)-2019-14893  | 
|  CVE-2019-14893  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-14893)-2019-14893  | 
|  CVE-2019-14893  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-14893)-2019-14893  | 
|  CVE-2019-16335  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2019-16335](https://nvd.nist.gov/vuln/detail/CVE-2019-16335)  | 
|  CVE-2019-16335  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2019-16335](https://nvd.nist.gov/vuln/detail/CVE-2019-16335)  | 
|  CVE-2019-16335  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2019-16335](https://nvd.nist.gov/vuln/detail/CVE-2019-16335)  | 
|  CVE-2019-16335  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2019-16335](https://nvd.nist.gov/vuln/detail/CVE-2019-16335)  | 
|  CVE-2019-16942  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-16942)-2019-16942  | 
|  CVE-2019-16942  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-16942)-2019-16942  | 
|  CVE-2019-16942  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-16942)-2019-16942  | 
|  CVE-2019-16942  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-16942)-2019-16942  | 
|  CVE-2019-16943  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-16943)-2019-16943  | 
|  CVE-2019-16943  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-16943)-2019-16943  | 
|  CVE-2019-16943  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-16943)-2019-16943  | 
|  CVE-2019-16943  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-16943)-2019-16943  | 
|  CVE-2019-17195  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2019-17195](https://nvd.nist.gov/vuln/detail/CVE-2019-17195)  | 
|  CVE-2019-17195  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2019-17195](https://nvd.nist.gov/vuln/detail/CVE-2019-17195)  | 
|  CVE-2019-17267  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2019-17267](https://nvd.nist.gov/vuln/detail/CVE-2019-17267)  | 
|  CVE-2019-17267  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2019-17267](https://nvd.nist.gov/vuln/detail/CVE-2019-17267)  | 
|  CVE-2019-17267  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2019-17267](https://nvd.nist.gov/vuln/detail/CVE-2019-17267)  | 
|  CVE-2019-17267  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2019-17267](https://nvd.nist.gov/vuln/detail/CVE-2019-17267)  | 
|  CVE-2019-17531  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-17531)-2019-17531  | 
|  CVE-2019-17531  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-17531)-2019-17531  | 
|  CVE-2019-17531  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-17531)-2019-17531  | 
|  CVE-2019-17531  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-17531)-2019-17531  | 
|  CVE-2019-20330  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2019-20330](https://nvd.nist.gov/vuln/detail/CVE-2019-20330)  | 
|  CVE-2019-20330  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2019-20330](https://nvd.nist.gov/vuln/detail/CVE-2019-20330)  | 
|  CVE-2019-20330  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2019-20330](https://nvd.nist.gov/vuln/detail/CVE-2019-20330)  | 
|  CVE-2019-20330  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2019-20330](https://nvd.nist.gov/vuln/detail/CVE-2019-20330)  | 
|  CVE-2019-20444  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2019-20444](https://nvd.nist.gov/vuln/detail/CVE-2019-20444)  | 
|  CVE-2019-20444  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2019-20444](https://nvd.nist.gov/vuln/detail/CVE-2019-20444)  | 
|  CVE-2019-20445  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2019-20445](https://nvd.nist.gov/vuln/detail/CVE-2019-20445)  | 
|  CVE-2019-20445  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2019-20445](https://nvd.nist.gov/vuln/detail/CVE-2019-20445)  | 
|  CVE-2020-7692  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-7692](https://nvd.nist.gov/vuln/detail/CVE-2020-7692)  | 
|  CVE-2020-7692  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-7692](https://nvd.nist.gov/vuln/detail/CVE-2020-7692)  | 
|  CVE-2020-8840  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-8840](https://nvd.nist.gov/vuln/detail/CVE-2020-8840)  | 
|  CVE-2020-8840  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-8840](https://nvd.nist.gov/vuln/detail/CVE-2020-8840)  | 
|  CVE-2020-8840  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-8840](https://nvd.nist.gov/vuln/detail/CVE-2020-8840)  | 
|  CVE-2020-8840  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-8840](https://nvd.nist.gov/vuln/detail/CVE-2020-8840)  | 
|  CVE-2020-9480  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-9480](https://nvd.nist.gov/vuln/detail/CVE-2020-9480)  | 
|  CVE-2020-9546  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-9546](https://nvd.nist.gov/vuln/detail/CVE-2020-9546)  | 
|  CVE-2020-9546  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-9546](https://nvd.nist.gov/vuln/detail/CVE-2020-9546)  | 
|  CVE-2020-9546  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-9546](https://nvd.nist.gov/vuln/detail/CVE-2020-9546)  | 
|  CVE-2020-9546  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-9546](https://nvd.nist.gov/vuln/detail/CVE-2020-9546)  | 
|  CVE-2020-9547  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-9547](https://nvd.nist.gov/vuln/detail/CVE-2020-9547)  | 
|  CVE-2020-9547  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-9547](https://nvd.nist.gov/vuln/detail/CVE-2020-9547)  | 
|  CVE-2020-9547  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-9547](https://nvd.nist.gov/vuln/detail/CVE-2020-9547)  | 
|  CVE-2020-9547  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-9547](https://nvd.nist.gov/vuln/detail/CVE-2020-9547)  | 
|  CVE-2020-9548  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-9548](https://nvd.nist.gov/vuln/detail/CVE-2020-9548)  | 
|  CVE-2020-9548  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-9548](https://nvd.nist.gov/vuln/detail/CVE-2020-9548)  | 
|  CVE-2020-9548  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-9548](https://nvd.nist.gov/vuln/detail/CVE-2020-9548)  | 
|  CVE-2020-9548  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-9548](https://nvd.nist.gov/vuln/detail/CVE-2020-9548)  | 
|  CVE-2021-26291  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2021-26291](https://nvd.nist.gov/vuln/detail/CVE-2021-26291)  | 
|  CVE-2021-26291  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2021-26291](https://nvd.nist.gov/vuln/detail/CVE-2021-26291)  | 
|  CVE-2021-32797  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2021-32797](https://nvd.nist.gov/vuln/detail/CVE-2021-32797)  | 
|  CVE-2021-32798  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2021-32798](https://nvd.nist.gov/vuln/detail/CVE-2021-32798)  | 
|  CVE-2021-35958  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2021-35958](https://nvd.nist.gov/vuln/detail/CVE-2021-35958)  | 
|  CVE-2021-37404  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2021-37404](https://nvd.nist.gov/vuln/detail/CVE-2021-37404)  | 
|  CVE-2022-1471  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2022-1471](https://nvd.nist.gov/vuln/detail/CVE-2022-1471)  | 
|  CVE-2022-1471  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2022-1471](https://nvd.nist.gov/vuln/detail/CVE-2022-1471)  | 
|  CVE-2022-1471  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2022-1471](https://nvd.nist.gov/vuln/detail/CVE-2022-1471)  | 
|  CVE-2022-1471  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2022-1471](https://nvd.nist.gov/vuln/detail/CVE-2022-1471)  | 
|  CVE-2022-25168  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2022-5168](https://nvd.nist.gov/vuln/detail/CVE-2022-25168)  | 
|  CVE-2022-26612  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-26612)-2022-26612  | 
|  CVE-2022-32532  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-32532)-2022-32532  | 
|  CVE-2022-33980  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-202233980](https://nvd.nist.gov/vuln/detail/CVE-2022-33980)  | 
|  CVE-2022-37865  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-202237865](https://nvd.nist.gov/vuln/detail/CVE-2022-37865)  | 
|  CVE-2022-39135  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-202239135](https://nvd.nist.gov/vuln/detail/CVE-2022-39135)  | 
|  CVE-2022-40664  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-202240664](https://nvd.nist.gov/vuln/detail/CVE-2022-40664)  | 
|  CVE-2022-42889  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-202242889](https://nvd.nist.gov/vuln/detail/CVE-2022-42889)  | 
|  CVE-2022-46337  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-202246337](https://nvd.nist.gov/vuln/detail/CVE-2022-46337)  | 
|  CVE-2022-46337  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-202246337](https://nvd.nist.gov/vuln/detail/CVE-2022-46337)  | 
|  CVE-2022-46337  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-202246337](https://nvd.nist.gov/vuln/detail/CVE-2022-46337)  | 
|  CVE-2023-38647  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-38647](https://nvd.nist.gov/vuln/detail/CVE-2023-38647)  | 
|  CVE-2023-38647  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-38647](https://nvd.nist.gov/vuln/detail/CVE-2023-38647)  | 
|  CVE-2023-44981  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-44981](https://nvd.nist.gov/vuln/detail/CVE-2023-44981)  | 
|  CVE-2023-44981  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-44981](https://nvd.nist.gov/vuln/detail/CVE-2023-44981)  | 
|  CVE-2023-44981  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-44981](https://nvd.nist.gov/vuln/detail/CVE-2023-44981)  | 
|  CVE-2023-44981  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-44981](https://nvd.nist.gov/vuln/detail/CVE-2023-44981)  | 
|  CVE-2023-44981  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-44981](https://nvd.nist.gov/vuln/detail/CVE-2023-44981)  | 
|  CVE-2023-44981  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-44981](https://nvd.nist.gov/vuln/detail/CVE-2023-44981)  | 
|  CVE-2024-1597  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-1597](https://nvd.nist.gov/vuln/detail/CVE-2024-1597)  | 
|  CVE-2024-1597  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-1597](https://nvd.nist.gov/vuln/detail/CVE-2024-1597)  | 
|  CVE-2024-1597  |  CRÍTICO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-1597](https://nvd.nist.gov/vuln/detail/CVE-2024-1597)  | 
|  CVE-2012-0881  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2012-0881](https://nvd.nist.gov/vuln/detail/CVE-2012-0881)  | 
|  CVE-2012-0881  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2012-0881](https://nvd.nist.gov/vuln/detail/CVE-2012-0881)  | 
|  CVE-2013-4002  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2013-4002)-2013-4002  | 
|  CVE-2013-4002  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2013-4002)-2013-4002  | 
|  CVE-2014-0114  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2014-0114](https://nvd.nist.gov/vuln/detail/CVE-2014-0114)  | 
|  CVE-2014-0114  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2014-0114](https://nvd.nist.gov/vuln/detail/CVE-2014-0114)  | 
|  CVE-2015-2080  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2015-2080)-2015-2080  | 
|  CVE-2015-2156  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2015-2156)-2015-2156  | 
|  CVE-2015-2156  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2015-2156)-2015-2156  | 
|  CVE-2015-5237  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2015-5237)-2015-5237  | 
|  CVE-2015-5237  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2015-5237)-2015-5237  | 
|  CVE-2015-6420  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2015-6420)-2015-6420  | 
|  CVE-2016-1000338  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2016-1000338)-2016-1000338  | 
|  CVE-2016-1000340  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2016-1000340)-2016-1000340  | 
|  CVE-2016-1000342  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2016-1000342)-2016-1000342  | 
|  CVE-2016-1000343  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2016-1000343)-2016-1000343  | 
|  CVE-2016-1000344  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2016-1000344)-2016-1000344  | 
|  CVE-2016-1000352  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2016-1000352)-2016-1000352  | 
|  CVE-2016-6796  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2016-6796)-2016-6796  | 
|  CVE-2017-1000034  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2017-1000034)-2017-1000034  | 
|  CVE-2017-12612  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2017-12612)-2017-12612  | 
|  CVE-2017-15288  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2017-15288](https://nvd.nist.gov/vuln/detail/CVE-2017-15288)  | 
|  CVE-2017-18640  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2017-18640)-2017-18640  | 
|  CVE-2017-18640  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2017-18640)-2017-18640  | 
|  CVE-2017-5637  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2017-5637)-2017-5637  | 
|  CVE-2017-7656  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2017-7656](https://nvd.nist.gov/vuln/detail/CVE-2017-7656)  | 
|  CVE-2017-7687  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2017-7687](https://nvd.nist.gov/vuln/detail/CVE-2017-7687)  | 
|  CVE-2017-9735  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2017-9735)-2017-9735  | 
|  CVE-2017-9790  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2017-9790](https://nvd.nist.gov/vuln/detail/CVE-2017-9790)  | 
|  CVE-2018-10054  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2018-10054](https://nvd.nist.gov/vuln/detail/CVE-2018-10054)  | 
|  CVE-2018-10936  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-10936)-2018-10936  | 
|  CVE-2018-11793  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2018-11793](https://nvd.nist.gov/vuln/detail/CVE-2018-11793)  | 
|  CVE-2018-11804  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2018-11804](https://nvd.nist.gov/vuln/detail/CVE-2018-11804)  | 
|  CVE-2018-12022  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2018-12022](https://nvd.nist.gov/vuln/detail/CVE-2018-12022)  | 
|  CVE-2018-12022  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2018-12022](https://nvd.nist.gov/vuln/detail/CVE-2018-12022)  | 
|  CVE-2018-12022  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2018-12022](https://nvd.nist.gov/vuln/detail/CVE-2018-12022)  | 
|  CVE-2018-12023  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2018-12023](https://nvd.nist.gov/vuln/detail/CVE-2018-12023)  | 
|  CVE-2018-12023  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2018-12023](https://nvd.nist.gov/vuln/detail/CVE-2018-12023)  | 
|  CVE-2018-12023  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2018-12023](https://nvd.nist.gov/vuln/detail/CVE-2018-12023)  | 
|  CVE-2018-3258  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2018-3258](https://nvd.nist.gov/vuln/detail/CVE-2018-3258)  | 
|  CVE-2018-3827  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-3827)-2018-3827  | 
|  CVE-2018-3831  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-3831)-2018-3831  | 
|  CVE-2018-5968  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-5968)-2018-5968  | 
|  CVE-2018-5968  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-5968)-2018-5968  | 
|  CVE-2018-8012  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-8012)-2018-8012  | 
|  CVE-2018-8768  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-8768)-2018-8768  | 
|  CVE-2019-0204  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2019-0204](https://nvd.nist.gov/vuln/detail/CVE-2019-0204)  | 
|  CVE-2019-0205  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2019-0205](https://nvd.nist.gov/vuln/detail/CVE-2019-0205)  | 
|  CVE-2019-0205  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2019-0205](https://nvd.nist.gov/vuln/detail/CVE-2019-0205)  | 
|  CVE-2019-0205  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2019-0205](https://nvd.nist.gov/vuln/detail/CVE-2019-0205)  | 
|  CVE-2019-0205  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2019-0205](https://nvd.nist.gov/vuln/detail/CVE-2019-0205)  | 
|  CVE-2019-10086  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2019-10086](https://nvd.nist.gov/vuln/detail/CVE-2019-10086)  | 
|  CVE-2019-10086  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2019-10086](https://nvd.nist.gov/vuln/detail/CVE-2019-10086)  | 
|  CVE-2019-10086  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2019-10086](https://nvd.nist.gov/vuln/detail/CVE-2019-10086)  | 
|  CVE-2019-10086  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2019-10086](https://nvd.nist.gov/vuln/detail/CVE-2019-10086)  | 
|  CVE-2019-10099  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2019-10099](https://nvd.nist.gov/vuln/detail/CVE-2019-10099)  | 
|  CVE-2019-10172  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2019-10172](https://nvd.nist.gov/vuln/detail/CVE-2019-10172)  | 
|  CVE-2019-12086  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-12086)-2019-12086  | 
|  CVE-2019-12086  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-12086)-2019-12086  | 
|  CVE-2019-12086  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-12086)-2019-12086  | 
|  CVE-2019-12086  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-12086)-2019-12086  | 
|  CVE-2019-14439  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-14439)-2019-14439  | 
|  CVE-2019-14439  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-14439)-2019-14439  | 
|  CVE-2019-14439  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-14439)-2019-14439  | 
|  CVE-2019-14439  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-14439)-2019-14439  | 
|  CVE-2019-16869  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-16869)-2019-16869  | 
|  CVE-2019-16869  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-16869)-2019-16869  | 
|  CVE-2019-17566  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-17566)-2019-17566  | 
|  CVE-2019-17566  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-17566)-2019-17566  | 
|  CVE-2019-7611  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2019-7611](https://nvd.nist.gov/vuln/detail/CVE-2019-7611)  | 
|  CVE-2020-10650  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-10650](https://nvd.nist.gov/vuln/detail/CVE-2020-10650)  | 
|  CVE-2020-10650  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-10650](https://nvd.nist.gov/vuln/detail/CVE-2020-10650)  | 
|  CVE-2020-10650  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-10650](https://nvd.nist.gov/vuln/detail/CVE-2020-10650)  | 
|  CVE-2020-10650  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-10650](https://nvd.nist.gov/vuln/detail/CVE-2020-10650)  | 
|  CVE-2020-10672  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-10672](https://nvd.nist.gov/vuln/detail/CVE-2020-10672)  | 
|  CVE-2020-10672  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-10672](https://nvd.nist.gov/vuln/detail/CVE-2020-10672)  | 
|  CVE-2020-10672  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-10672](https://nvd.nist.gov/vuln/detail/CVE-2020-10672)  | 
|  CVE-2020-10672  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-10672](https://nvd.nist.gov/vuln/detail/CVE-2020-10672)  | 
|  CVE-2020-10673  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-10673](https://nvd.nist.gov/vuln/detail/CVE-2020-10673)  | 
|  CVE-2020-10673  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-10673](https://nvd.nist.gov/vuln/detail/CVE-2020-10673)  | 
|  CVE-2020-10673  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-10673](https://nvd.nist.gov/vuln/detail/CVE-2020-10673)  | 
|  CVE-2020-10673  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-10673](https://nvd.nist.gov/vuln/detail/CVE-2020-10673)  | 
|  CVE-2020-10968  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-10968)-2020-10968  | 
|  CVE-2020-10968  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-10968)-2020-10968  | 
|  CVE-2020-10968  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-10968)-2020-10968  | 
|  CVE-2020-10968  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-10968)-2020-10968  | 
|  CVE-2020-10969  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-10969)-2020-10969  | 
|  CVE-2020-10969  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-10969)-2020-10969  | 
|  CVE-2020-10969  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-10969)-2020-10969  | 
|  CVE-2020-10969  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-10969)-2020-10969  | 
|  CVE-2020-11111  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-11111](https://nvd.nist.gov/vuln/detail/CVE-2020-11111)  | 
|  CVE-2020-11111  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-11111](https://nvd.nist.gov/vuln/detail/CVE-2020-11111)  | 
|  CVE-2020-11111  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-11111](https://nvd.nist.gov/vuln/detail/CVE-2020-11111)  | 
|  CVE-2020-11111  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-11111](https://nvd.nist.gov/vuln/detail/CVE-2020-11111)  | 
|  CVE-2020-11112  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-11112](https://nvd.nist.gov/vuln/detail/CVE-2020-11112)  | 
|  CVE-2020-11112  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-11112](https://nvd.nist.gov/vuln/detail/CVE-2020-11112)  | 
|  CVE-2020-11112  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-11112](https://nvd.nist.gov/vuln/detail/CVE-2020-11112)  | 
|  CVE-2020-11113  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-11113](https://nvd.nist.gov/vuln/detail/CVE-2020-11113)  | 
|  CVE-2020-11113  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-11113](https://nvd.nist.gov/vuln/detail/CVE-2020-11113)  | 
|  CVE-2020-11113  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-11113](https://nvd.nist.gov/vuln/detail/CVE-2020-11113)  | 
|  CVE-2020-11619  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-11619)-2020-11619  | 
|  CVE-2020-11619  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-11619)-2020-11619  | 
|  CVE-2020-11619  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-11619)-2020-11619  | 
|  CVE-2020-11620  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-11620](https://nvd.nist.gov/vuln/detail/CVE-2020-11620)  | 
|  CVE-2020-11620  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-11620](https://nvd.nist.gov/vuln/detail/CVE-2020-11620)  | 
|  CVE-2020-11620  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-11620](https://nvd.nist.gov/vuln/detail/CVE-2020-11620)  | 
|  CVE-2020-11620  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-11620](https://nvd.nist.gov/vuln/detail/CVE-2020-11620)  | 
|  CVE-2020-11988  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-11988)-2020-11988  | 
|  CVE-2020-13692  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-13692)-2020-13692  | 
|  CVE-2020-13936  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-13936)-2020-13936  | 
|  CVE-2020-13949  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-13949)-2020-13949  | 
|  CVE-2020-13949  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-13949)-2020-13949  | 
|  CVE-2020-13949  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-13949)-2020-13949  | 
|  CVE-2020-13949  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-13949)-2020-13949  | 
|  CVE-2020-13949  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-13949)-2020-13949  | 
|  CVE-2020-14060  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-14060)-2020-14060  | 
|  CVE-2020-14060  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-14060)-2020-14060  | 
|  CVE-2020-14060  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-14060)-2020-14060  | 
|  CVE-2020-14060  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-14060)-2020-14060  | 
|  CVE-2020-14061  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-14061)-2020-14061  | 
|  CVE-2020-14061  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-14061)-2020-14061  | 
|  CVE-2020-14061  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-14061)-2020-14061  | 
|  CVE-2020-14061  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-14061)-2020-14061  | 
|  CVE-2020-14062  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-14062)-2020-14062  | 
|  CVE-2020-14062  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-14062)-2020-14062  | 
|  CVE-2020-14062  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-14062)-2020-14062  | 
|  CVE-2020-14062  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-14062)-2020-14062  | 
|  CVE-2020-14195  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-14195](https://nvd.nist.gov/vuln/detail/CVE-2020-14195)  | 
|  CVE-2020-14195  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-14195](https://nvd.nist.gov/vuln/detail/CVE-2020-14195)  | 
|  CVE-2020-14195  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-14195](https://nvd.nist.gov/vuln/detail/CVE-2020-14195)  | 
|  CVE-2020-14195  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-14195](https://nvd.nist.gov/vuln/detail/CVE-2020-14195)  | 
|  CVE-2020-17533  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-17533)-2020-17533  | 
|  CVE-2020-24616  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-24616](https://nvd.nist.gov/vuln/detail/CVE-2020-24616)  | 
|  CVE-2020-24616  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-24616](https://nvd.nist.gov/vuln/detail/CVE-2020-24616)  | 
|  CVE-2020-24616  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-24616](https://nvd.nist.gov/vuln/detail/CVE-2020-24616)  | 
|  CVE-2020-24616  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-24616](https://nvd.nist.gov/vuln/detail/CVE-2020-24616)  | 
|  CVE-2020-24750  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-24750](https://nvd.nist.gov/vuln/detail/CVE-2020-24750)  | 
|  CVE-2020-24750  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-24750](https://nvd.nist.gov/vuln/detail/CVE-2020-24750)  | 
|  CVE-2020-24750  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-24750](https://nvd.nist.gov/vuln/detail/CVE-2020-24750)  | 
|  CVE-2020-24750  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-24750](https://nvd.nist.gov/vuln/detail/CVE-2020-24750)  | 
|  CVE-2020-25649  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-25649](https://nvd.nist.gov/vuln/detail/CVE-2020-25649)  | 
|  CVE-2020-25649  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-25649](https://nvd.nist.gov/vuln/detail/CVE-2020-25649)  | 
|  CVE-2020-25649  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-25649](https://nvd.nist.gov/vuln/detail/CVE-2020-25649)  | 
|  CVE-2020-25649  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-25649](https://nvd.nist.gov/vuln/detail/CVE-2020-25649)  | 
|  CVE-2020-28491  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-28491](https://nvd.nist.gov/vuln/detail/CVE-2020-28491)  | 
|  CVE-2020-35211  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-35211](https://nvd.nist.gov/vuln/detail/CVE-2020-35211)  | 
|  CVE-2020-35490  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-35490](https://nvd.nist.gov/vuln/detail/CVE-2020-35490)  | 
|  CVE-2020-35490  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-35490](https://nvd.nist.gov/vuln/detail/CVE-2020-35490)  | 
|  CVE-2020-35490  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-35490](https://nvd.nist.gov/vuln/detail/CVE-2020-35490)  | 
|  CVE-2020-35490  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-35490](https://nvd.nist.gov/vuln/detail/CVE-2020-35490)  | 
|  CVE-2020-35490  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-35490](https://nvd.nist.gov/vuln/detail/CVE-2020-35490)  | 
|  CVE-2020-35491  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-35491](https://nvd.nist.gov/vuln/detail/CVE-2020-35491)  | 
|  CVE-2020-35491  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-35491](https://nvd.nist.gov/vuln/detail/CVE-2020-35491)  | 
|  CVE-2020-35491  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-35491](https://nvd.nist.gov/vuln/detail/CVE-2020-35491)  | 
|  CVE-2020-35491  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-35491](https://nvd.nist.gov/vuln/detail/CVE-2020-35491)  | 
|  CVE-2020-35491  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-35491](https://nvd.nist.gov/vuln/detail/CVE-2020-35491)  | 
|  CVE-2020-35728  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-35728](https://nvd.nist.gov/vuln/detail/CVE-2020-35728)  | 
|  CVE-2020-35728  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-35728](https://nvd.nist.gov/vuln/detail/CVE-2020-35728)  | 
|  CVE-2020-35728  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-35728](https://nvd.nist.gov/vuln/detail/CVE-2020-35728)  | 
|  CVE-2020-35728  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-35728](https://nvd.nist.gov/vuln/detail/CVE-2020-35728)  | 
|  CVE-2020-35728  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-35728](https://nvd.nist.gov/vuln/detail/CVE-2020-35728)  | 
|  CVE-2020-36179  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36179](https://nvd.nist.gov/vuln/detail/CVE-2020-36179)  | 
|  CVE-2020-36179  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36179](https://nvd.nist.gov/vuln/detail/CVE-2020-36179)  | 
|  CVE-2020-36179  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36179](https://nvd.nist.gov/vuln/detail/CVE-2020-36179)  | 
|  CVE-2020-36179  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36179](https://nvd.nist.gov/vuln/detail/CVE-2020-36179)  | 
|  CVE-2020-36179  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36179](https://nvd.nist.gov/vuln/detail/CVE-2020-36179)  | 
|  CVE-2020-36180  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36180](https://nvd.nist.gov/vuln/detail/CVE-2020-36180)  | 
|  CVE-2020-36180  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36180](https://nvd.nist.gov/vuln/detail/CVE-2020-36180)  | 
|  CVE-2020-36180  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36180](https://nvd.nist.gov/vuln/detail/CVE-2020-36180)  | 
|  CVE-2020-36180  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36180](https://nvd.nist.gov/vuln/detail/CVE-2020-36180)  | 
|  CVE-2020-36180  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36180](https://nvd.nist.gov/vuln/detail/CVE-2020-36180)  | 
|  CVE-2020-36181  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36181](https://nvd.nist.gov/vuln/detail/CVE-2020-36181)  | 
|  CVE-2020-36181  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36181](https://nvd.nist.gov/vuln/detail/CVE-2020-36181)  | 
|  CVE-2020-36181  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36181](https://nvd.nist.gov/vuln/detail/CVE-2020-36181)  | 
|  CVE-2020-36181  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36181](https://nvd.nist.gov/vuln/detail/CVE-2020-36181)  | 
|  CVE-2020-36181  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36181](https://nvd.nist.gov/vuln/detail/CVE-2020-36181)  | 
|  CVE-2020-36182  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36182](https://nvd.nist.gov/vuln/detail/CVE-2020-36182)  | 
|  CVE-2020-36182  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36182](https://nvd.nist.gov/vuln/detail/CVE-2020-36182)  | 
|  CVE-2020-36182  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36182](https://nvd.nist.gov/vuln/detail/CVE-2020-36182)  | 
|  CVE-2020-36182  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36182](https://nvd.nist.gov/vuln/detail/CVE-2020-36182)  | 
|  CVE-2020-36182  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36182](https://nvd.nist.gov/vuln/detail/CVE-2020-36182)  | 
|  CVE-2020-36183  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36183](https://nvd.nist.gov/vuln/detail/CVE-2020-36183)  | 
|  CVE-2020-36183  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36183](https://nvd.nist.gov/vuln/detail/CVE-2020-36183)  | 
|  CVE-2020-36183  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36183](https://nvd.nist.gov/vuln/detail/CVE-2020-36183)  | 
|  CVE-2020-36183  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36183](https://nvd.nist.gov/vuln/detail/CVE-2020-36183)  | 
|  CVE-2020-36183  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36183](https://nvd.nist.gov/vuln/detail/CVE-2020-36183)  | 
|  CVE-2020-36184  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36184](https://nvd.nist.gov/vuln/detail/CVE-2020-36184)  | 
|  CVE-2020-36184  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36184](https://nvd.nist.gov/vuln/detail/CVE-2020-36184)  | 
|  CVE-2020-36184  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36184](https://nvd.nist.gov/vuln/detail/CVE-2020-36184)  | 
|  CVE-2020-36184  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36184](https://nvd.nist.gov/vuln/detail/CVE-2020-36184)  | 
|  CVE-2020-36184  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36184](https://nvd.nist.gov/vuln/detail/CVE-2020-36184)  | 
|  CVE-2020-36185  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36185](https://nvd.nist.gov/vuln/detail/CVE-2020-36185)  | 
|  CVE-2020-36185  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36185](https://nvd.nist.gov/vuln/detail/CVE-2020-36185)  | 
|  CVE-2020-36185  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36185](https://nvd.nist.gov/vuln/detail/CVE-2020-36185)  | 
|  CVE-2020-36185  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36185](https://nvd.nist.gov/vuln/detail/CVE-2020-36185)  | 
|  CVE-2020-36185  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36185](https://nvd.nist.gov/vuln/detail/CVE-2020-36185)  | 
|  CVE-2020-36186  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36186](https://nvd.nist.gov/vuln/detail/CVE-2020-36186)  | 
|  CVE-2020-36186  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36186](https://nvd.nist.gov/vuln/detail/CVE-2020-36186)  | 
|  CVE-2020-36186  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36186](https://nvd.nist.gov/vuln/detail/CVE-2020-36186)  | 
|  CVE-2020-36186  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36186](https://nvd.nist.gov/vuln/detail/CVE-2020-36186)  | 
|  CVE-2020-36186  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36186](https://nvd.nist.gov/vuln/detail/CVE-2020-36186)  | 
|  CVE-2020-36187  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36187](https://nvd.nist.gov/vuln/detail/CVE-2020-36187)  | 
|  CVE-2020-36187  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36187](https://nvd.nist.gov/vuln/detail/CVE-2020-36187)  | 
|  CVE-2020-36187  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36187](https://nvd.nist.gov/vuln/detail/CVE-2020-36187)  | 
|  CVE-2020-36187  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36187](https://nvd.nist.gov/vuln/detail/CVE-2020-36187)  | 
|  CVE-2020-36187  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36187](https://nvd.nist.gov/vuln/detail/CVE-2020-36187)  | 
|  CVE-2020-36188  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36188](https://nvd.nist.gov/vuln/detail/CVE-2020-36188)  | 
|  CVE-2020-36188  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36188](https://nvd.nist.gov/vuln/detail/CVE-2020-36188)  | 
|  CVE-2020-36188  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36188](https://nvd.nist.gov/vuln/detail/CVE-2020-36188)  | 
|  CVE-2020-36188  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36188](https://nvd.nist.gov/vuln/detail/CVE-2020-36188)  | 
|  CVE-2020-36188  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36188](https://nvd.nist.gov/vuln/detail/CVE-2020-36188)  | 
|  CVE-2020-36189  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36189](https://nvd.nist.gov/vuln/detail/CVE-2020-36189)  | 
|  CVE-2020-36189  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36189](https://nvd.nist.gov/vuln/detail/CVE-2020-36189)  | 
|  CVE-2020-36189  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36189](https://nvd.nist.gov/vuln/detail/CVE-2020-36189)  | 
|  CVE-2020-36189  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36189](https://nvd.nist.gov/vuln/detail/CVE-2020-36189)  | 
|  CVE-2020-36189  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36189](https://nvd.nist.gov/vuln/detail/CVE-2020-36189)  | 
|  CVE-2020-36518  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36518](https://nvd.nist.gov/vuln/detail/CVE-2020-36518)  | 
|  CVE-2020-36518  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36518](https://nvd.nist.gov/vuln/detail/CVE-2020-36518)  | 
|  CVE-2020-36518  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36518](https://nvd.nist.gov/vuln/detail/CVE-2020-36518)  | 
|  CVE-2020-36518  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36518](https://nvd.nist.gov/vuln/detail/CVE-2020-36518)  | 
|  CVE-2020-36518  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36518](https://nvd.nist.gov/vuln/detail/CVE-2020-36518)  | 
|  CVE-2020-36518  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-36518](https://nvd.nist.gov/vuln/detail/CVE-2020-36518)  | 
|  CVE-2020-9492  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-9492](https://nvd.nist.gov/vuln/detail/CVE-2020-9492)  | 
|  CVE-2021-20190  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2021-20190](https://nvd.nist.gov/vuln/detail/CVE-2021-20190)  | 
|  CVE-2021-20190  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2021-20190](https://nvd.nist.gov/vuln/detail/CVE-2021-20190)  | 
|  CVE-2021-20190  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2021-20190](https://nvd.nist.gov/vuln/detail/CVE-2021-20190)  | 
|  CVE-2021-20190  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2021-20190](https://nvd.nist.gov/vuln/detail/CVE-2021-20190)  | 
|  CVE-2021-20190  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2021-20190](https://nvd.nist.gov/vuln/detail/CVE-2021-20190)  | 
|  CVE-2021-22573  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2021-22573](https://nvd.nist.gov/vuln/detail/CVE-2021-22573)  | 
|  CVE-2021-22573  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2021-22573](https://nvd.nist.gov/vuln/detail/CVE-2021-22573)  | 
|  CVE-2021-22573  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2021-22573](https://nvd.nist.gov/vuln/detail/CVE-2021-22573)  | 
|  CVE-2021-25646  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2021-25646](https://nvd.nist.gov/vuln/detail/CVE-2021-25646)  | 
|  CVE-2021-26919  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2021-26919](https://nvd.nist.gov/vuln/detail/CVE-2021-26919)  | 
|  CVE-2021-28165  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2021-28165](https://nvd.nist.gov/vuln/detail/CVE-2021-28165)  | 
|  CVE-2021-31684  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2021-31684](https://nvd.nist.gov/vuln/detail/CVE-2021-31684)  | 
|  CVE-2021-31684  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2021-31684](https://nvd.nist.gov/vuln/detail/CVE-2021-31684)  | 
|  CVE-2021-31684  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2021-31684](https://nvd.nist.gov/vuln/detail/CVE-2021-31684)  | 
|  CVE-2021-33036  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2021-33036](https://nvd.nist.gov/vuln/detail/CVE-2021-33036)  | 
|  CVE-2021-33813  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2021-33813](https://nvd.nist.gov/vuln/detail/CVE-2021-33813)  | 
|  CVE-2021-33813  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2021-33813](https://nvd.nist.gov/vuln/detail/CVE-2021-33813)  | 
|  CVE-2021-34538  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2021-34538](https://nvd.nist.gov/vuln/detail/CVE-2021-34538)  | 
|  CVE-2021-34538  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2021-34538](https://nvd.nist.gov/vuln/detail/CVE-2021-34538)  | 
|  CVE-2021-34538  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2021-34538](https://nvd.nist.gov/vuln/detail/CVE-2021-34538)  | 
|  CVE-2021-35515  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2021-35515](https://nvd.nist.gov/vuln/detail/CVE-2021-35515)  | 
|  CVE-2021-35515  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2021-35515](https://nvd.nist.gov/vuln/detail/CVE-2021-35515)  | 
|  CVE-2021-35515  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2021-35515](https://nvd.nist.gov/vuln/detail/CVE-2021-35515)  | 
|  CVE-2021-35515  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2021-35515](https://nvd.nist.gov/vuln/detail/CVE-2021-35515)  | 
|  CVE-2021-35515  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2021-35515](https://nvd.nist.gov/vuln/detail/CVE-2021-35515)  | 
|  CVE-2021-35515  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2021-35515](https://nvd.nist.gov/vuln/detail/CVE-2021-35515)  | 
|  CVE-2021-35515  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2021-35515](https://nvd.nist.gov/vuln/detail/CVE-2021-35515)  | 
|  CVE-2021-35516  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2021-35516](https://nvd.nist.gov/vuln/detail/CVE-2021-35516)  | 
|  CVE-2021-35516  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2021-35516](https://nvd.nist.gov/vuln/detail/CVE-2021-35516)  | 
|  CVE-2021-35516  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2021-35516](https://nvd.nist.gov/vuln/detail/CVE-2021-35516)  | 
|  CVE-2021-35516  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2021-35516](https://nvd.nist.gov/vuln/detail/CVE-2021-35516)  | 
|  CVE-2021-35516  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2021-35516](https://nvd.nist.gov/vuln/detail/CVE-2021-35516)  | 
|  CVE-2021-35516  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2021-35516](https://nvd.nist.gov/vuln/detail/CVE-2021-35516)  | 
|  CVE-2021-35516  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2021-35516](https://nvd.nist.gov/vuln/detail/CVE-2021-35516)  | 
|  CVE-2021-35517  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2021-35517](https://nvd.nist.gov/vuln/detail/CVE-2021-35517)  | 
|  CVE-2021-35517  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2021-35517](https://nvd.nist.gov/vuln/detail/CVE-2021-35517)  | 
|  CVE-2021-35517  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2021-35517](https://nvd.nist.gov/vuln/detail/CVE-2021-35517)  | 
|  CVE-2021-35517  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2021-35517](https://nvd.nist.gov/vuln/detail/CVE-2021-35517)  | 
|  CVE-2021-35517  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2021-35517](https://nvd.nist.gov/vuln/detail/CVE-2021-35517)  | 
|  CVE-2021-36090  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2021-36090](https://nvd.nist.gov/vuln/detail/CVE-2021-36090)  | 
|  CVE-2021-36090  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2021-36090](https://nvd.nist.gov/vuln/detail/CVE-2021-36090)  | 
|  CVE-2021-36090  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2021-36090](https://nvd.nist.gov/vuln/detail/CVE-2021-36090)  | 
|  CVE-2021-36090  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2021-36090](https://nvd.nist.gov/vuln/detail/CVE-2021-36090)  | 
|  CVE-2021-36090  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2021-36090](https://nvd.nist.gov/vuln/detail/CVE-2021-36090)  | 
|  CVE-2021-37136  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2021-37136](https://nvd.nist.gov/vuln/detail/CVE-2021-37136)  | 
|  CVE-2021-37136  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2021-37136](https://nvd.nist.gov/vuln/detail/CVE-2021-37136)  | 
|  CVE-2021-37137  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2021-37137](https://nvd.nist.gov/vuln/detail/CVE-2021-37137)  | 
|  CVE-2021-37137  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2021-37137](https://nvd.nist.gov/vuln/detail/CVE-2021-37137)  | 
|  CVE-2021-37714  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2021-37714](https://nvd.nist.gov/vuln/detail/CVE-2021-37714)  | 
|  CVE-2021-37714  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2021-37714](https://nvd.nist.gov/vuln/detail/CVE-2021-37714)  | 
|  CVE-2021-37714  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2021-37714](https://nvd.nist.gov/vuln/detail/CVE-2021-37714)  | 
|  CVE-2021-37714  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2021-37714](https://nvd.nist.gov/vuln/detail/CVE-2021-37714)  | 
|  CVE-2021-46877  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2021-46877](https://nvd.nist.gov/vuln/detail/CVE-2021-46877)  | 
|  CVE-2022-24758  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-202224758](https://nvd.nist.gov/vuln/detail/CVE-2022-24758)  | 
|  CVE-2022-25647  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-202225647](https://nvd.nist.gov/vuln/detail/CVE-2022-25647)  | 
|  CVE-2022-25647  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-202225647](https://nvd.nist.gov/vuln/detail/CVE-2022-25647)  | 
|  CVE-2022-25647  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-202225647](https://nvd.nist.gov/vuln/detail/CVE-2022-25647)  | 
|  CVE-2022-25647  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-202225647](https://nvd.nist.gov/vuln/detail/CVE-2022-25647)  | 
|  CVE-2022-25647  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-202225647](https://nvd.nist.gov/vuln/detail/CVE-2022-25647)  | 
|  CVE-2022-25647  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-202225647](https://nvd.nist.gov/vuln/detail/CVE-2022-25647)  | 
|  CVE-2022-25647  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-202225647](https://nvd.nist.gov/vuln/detail/CVE-2022-25647)  | 
|  CVE-2022-25647  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-202225647](https://nvd.nist.gov/vuln/detail/CVE-2022-25647)  | 
|  CVE-2022-25857  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-202225857](https://nvd.nist.gov/vuln/detail/CVE-2022-25857)  | 
|  CVE-2022-25857  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-202225857](https://nvd.nist.gov/vuln/detail/CVE-2022-25857)  | 
|  CVE-2022-25857  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-202225857](https://nvd.nist.gov/vuln/detail/CVE-2022-25857)  | 
|  CVE-2022-25857  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-202225857](https://nvd.nist.gov/vuln/detail/CVE-2022-25857)  | 
|  CVE-2022-31197  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-31197)-2022-31197  | 
|  CVE-2022-3171  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2022-3171](https://nvd.nist.gov/vuln/detail/CVE-2022-3171)  | 
|  CVE-2022-3171  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2022-3171](https://nvd.nist.gov/vuln/detail/CVE-2022-3171)  | 
|  CVE-2022-3171  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2022-3171](https://nvd.nist.gov/vuln/detail/CVE-2022-3171)  | 
|  CVE-2022-3171  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2022-3171](https://nvd.nist.gov/vuln/detail/CVE-2022-3171)  | 
|  CVE-2022-3171  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2022-3171](https://nvd.nist.gov/vuln/detail/CVE-2022-3171)  | 
|  CVE-2022-3171  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2022-3171](https://nvd.nist.gov/vuln/detail/CVE-2022-3171)  | 
|  CVE-2022-3171  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2022-3171](https://nvd.nist.gov/vuln/detail/CVE-2022-3171)  | 
|  CVE-2022-3171  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2022-3171](https://nvd.nist.gov/vuln/detail/CVE-2022-3171)  | 
|  CVE-2022-3171  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2022-3171](https://nvd.nist.gov/vuln/detail/CVE-2022-3171)  | 
|  CVE-2022-34169  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-202234169](https://nvd.nist.gov/vuln/detail/CVE-2022-34169)  | 
|  CVE-2022-3509  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2022-3509](https://nvd.nist.gov/vuln/detail/CVE-2022-3509)  | 
|  CVE-2022-3509  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2022-3509](https://nvd.nist.gov/vuln/detail/CVE-2022-3509)  | 
|  CVE-2022-3509  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2022-3509](https://nvd.nist.gov/vuln/detail/CVE-2022-3509)  | 
|  CVE-2022-3509  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2022-3509](https://nvd.nist.gov/vuln/detail/CVE-2022-3509)  | 
|  CVE-2022-3509  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2022-3509](https://nvd.nist.gov/vuln/detail/CVE-2022-3509)  | 
|  CVE-2022-3509  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2022-3509](https://nvd.nist.gov/vuln/detail/CVE-2022-3509)  | 
|  CVE-2022-3509  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2022-3509](https://nvd.nist.gov/vuln/detail/CVE-2022-3509)  | 
|  CVE-2022-3509  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2022-3509](https://nvd.nist.gov/vuln/detail/CVE-2022-3509)  | 
|  CVE-2022-3509  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2022-3509](https://nvd.nist.gov/vuln/detail/CVE-2022-3509)  | 
|  CVE-2022-3510  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-20223510](https://nvd.nist.gov/vuln/detail/CVE-2022-3510)  | 
|  CVE-2022-3510  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-20223510](https://nvd.nist.gov/vuln/detail/CVE-2022-3510)  | 
|  CVE-2022-3510  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-20223510](https://nvd.nist.gov/vuln/detail/CVE-2022-3510)  | 
|  CVE-2022-3510  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-20223510](https://nvd.nist.gov/vuln/detail/CVE-2022-3510)  | 
|  CVE-2022-3510  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-20223510](https://nvd.nist.gov/vuln/detail/CVE-2022-3510)  | 
|  CVE-2022-3510  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-20223510](https://nvd.nist.gov/vuln/detail/CVE-2022-3510)  | 
|  CVE-2022-3510  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-20223510](https://nvd.nist.gov/vuln/detail/CVE-2022-3510)  | 
|  CVE-2022-3510  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-20223510](https://nvd.nist.gov/vuln/detail/CVE-2022-3510)  | 
|  CVE-2022-3510  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-20223510](https://nvd.nist.gov/vuln/detail/CVE-2022-3510)  | 
|  CVE-2022-36364  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-202236364](https://nvd.nist.gov/vuln/detail/CVE-2022-36364)  | 
|  CVE-2022-37866  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-202237866](https://nvd.nist.gov/vuln/detail/CVE-2022-37866)  | 
|  CVE-2022-37866  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-202237866](https://nvd.nist.gov/vuln/detail/CVE-2022-37866)  | 
|  CVE-2022-40146  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-202240146](https://nvd.nist.gov/vuln/detail/CVE-2022-40146)  | 
|  CVE-2022-40149  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-202240149](https://nvd.nist.gov/vuln/detail/CVE-2022-40149)  | 
|  CVE-2022-40149  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-202240149](https://nvd.nist.gov/vuln/detail/CVE-2022-40149)  | 
|  CVE-2022-40149  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-202240149](https://nvd.nist.gov/vuln/detail/CVE-2022-40149)  | 
|  CVE-2022-40149  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-202240149](https://nvd.nist.gov/vuln/detail/CVE-2022-40149)  | 
|  CVE-2022-40149  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-202240149](https://nvd.nist.gov/vuln/detail/CVE-2022-40149)  | 
|  CVE-2022-40150  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-202240150](https://nvd.nist.gov/vuln/detail/CVE-2022-40150)  | 
|  CVE-2022-40150  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-202240150](https://nvd.nist.gov/vuln/detail/CVE-2022-40150)  | 
|  CVE-2022-40150  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-202240150](https://nvd.nist.gov/vuln/detail/CVE-2022-40150)  | 
|  CVE-2022-40150  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-202240150](https://nvd.nist.gov/vuln/detail/CVE-2022-40150)  | 
|  CVE-2022-40150  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-202240150](https://nvd.nist.gov/vuln/detail/CVE-2022-40150)  | 
|  CVE-2022-40152  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-202240152](https://nvd.nist.gov/vuln/detail/CVE-2022-40152)  | 
|  CVE-2022-40152  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-202240152](https://nvd.nist.gov/vuln/detail/CVE-2022-40152)  | 
|  CVE-2022-41704  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-41704)-2022-41704  | 
|  CVE-2022-42003  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2022-42003](https://nvd.nist.gov/vuln/detail/CVE-2022-42003)  | 
|  CVE-2022-42003  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2022-42003](https://nvd.nist.gov/vuln/detail/CVE-2022-42003)  | 
|  CVE-2022-42003  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2022-42003](https://nvd.nist.gov/vuln/detail/CVE-2022-42003)  | 
|  CVE-2022-42003  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2022-42003](https://nvd.nist.gov/vuln/detail/CVE-2022-42003)  | 
|  CVE-2022-42003  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2022-42003](https://nvd.nist.gov/vuln/detail/CVE-2022-42003)  | 
|  CVE-2022-42003  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2022-42003](https://nvd.nist.gov/vuln/detail/CVE-2022-42003)  | 
|  CVE-2022-42003  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2022-42003](https://nvd.nist.gov/vuln/detail/CVE-2022-42003)  | 
|  CVE-2022-42003  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2022-42003](https://nvd.nist.gov/vuln/detail/CVE-2022-42003)  | 
|  CVE-2022-42003  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2022-42003](https://nvd.nist.gov/vuln/detail/CVE-2022-42003)  | 
|  CVE-2022-42003  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2022-42003](https://nvd.nist.gov/vuln/detail/CVE-2022-42003)  | 
|  CVE-2022-42003  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2022-42003](https://nvd.nist.gov/vuln/detail/CVE-2022-42003)  | 
|  CVE-2022-42003  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2022-42003](https://nvd.nist.gov/vuln/detail/CVE-2022-42003)  | 
|  CVE-2022-42004  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2022-42004](https://nvd.nist.gov/vuln/detail/CVE-2022-42004)  | 
|  CVE-2022-42004  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2022-42004](https://nvd.nist.gov/vuln/detail/CVE-2022-42004)  | 
|  CVE-2022-42004  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2022-42004](https://nvd.nist.gov/vuln/detail/CVE-2022-42004)  | 
|  CVE-2022-42004  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2022-42004](https://nvd.nist.gov/vuln/detail/CVE-2022-42004)  | 
|  CVE-2022-42004  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2022-42004](https://nvd.nist.gov/vuln/detail/CVE-2022-42004)  | 
|  CVE-2022-42004  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2022-42004](https://nvd.nist.gov/vuln/detail/CVE-2022-42004)  | 
|  CVE-2022-42004  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2022-42004](https://nvd.nist.gov/vuln/detail/CVE-2022-42004)  | 
|  CVE-2022-42004  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2022-42004](https://nvd.nist.gov/vuln/detail/CVE-2022-42004)  | 
|  CVE-2022-42004  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2022-42004](https://nvd.nist.gov/vuln/detail/CVE-2022-42004)  | 
|  CVE-2022-42004  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2022-42004](https://nvd.nist.gov/vuln/detail/CVE-2022-42004)  | 
|  CVE-2022-4244  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2022-4244](https://nvd.nist.gov/vuln/detail/CVE-2022-4244)  | 
|  CVE-2022-42890  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2022-42890](https://nvd.nist.gov/vuln/detail/CVE-2022-42890)  | 
|  CVE-2022-44729  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-202244729](https://nvd.nist.gov/vuln/detail/CVE-2022-44729)  | 
|  CVE-2022-44729  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-202244729](https://nvd.nist.gov/vuln/detail/CVE-2022-44729)  | 
|  CVE-2022-44729  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-202244729](https://nvd.nist.gov/vuln/detail/CVE-2022-44729)  | 
|  CVE-2022-45685  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-202245685](https://nvd.nist.gov/vuln/detail/CVE-2022-45685)  | 
|  CVE-2022-45685  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-202245685](https://nvd.nist.gov/vuln/detail/CVE-2022-45685)  | 
|  CVE-2022-45685  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-202245685](https://nvd.nist.gov/vuln/detail/CVE-2022-45685)  | 
|  CVE-2022-45685  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-202245685](https://nvd.nist.gov/vuln/detail/CVE-2022-45685)  | 
|  CVE-2022-45685  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-202245685](https://nvd.nist.gov/vuln/detail/CVE-2022-45685)  | 
|  CVE-2022-45688  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-45688)-202245688  | 
|  CVE-2022-45688  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-45688)-202245688  | 
|  CVE-2022-45688  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-45688)-202245688  | 
|  CVE-2022-45693  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-202245693](https://nvd.nist.gov/vuln/detail/CVE-2022-45693)  | 
|  CVE-2022-45693  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-202245693](https://nvd.nist.gov/vuln/detail/CVE-2022-45693)  | 
|  CVE-2022-45693  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-202245693](https://nvd.nist.gov/vuln/detail/CVE-2022-45693)  | 
|  CVE-2022-45693  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-202245693](https://nvd.nist.gov/vuln/detail/CVE-2022-45693)  | 
|  CVE-2022-45693  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-202245693](https://nvd.nist.gov/vuln/detail/CVE-2022-45693)  | 
|  CVE-2022-46751  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-202246751](https://nvd.nist.gov/vuln/detail/CVE-2022-46751)  | 
|  CVE-2022-46751  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-202246751](https://nvd.nist.gov/vuln/detail/CVE-2022-46751)  | 
|  CVE-2022-46751  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-202246751](https://nvd.nist.gov/vuln/detail/CVE-2022-46751)  | 
|  CVE-2023-1370  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-1370](https://nvd.nist.gov/vuln/detail/CVE-2023-1370)  | 
|  CVE-2023-1370  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-1370](https://nvd.nist.gov/vuln/detail/CVE-2023-1370)  | 
|  CVE-2023-1370  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-1370](https://nvd.nist.gov/vuln/detail/CVE-2023-1370)  | 
|  CVE-2023-1370  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-1370](https://nvd.nist.gov/vuln/detail/CVE-2023-1370)  | 
|  CVE-2023-1370  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-1370](https://nvd.nist.gov/vuln/detail/CVE-2023-1370)  | 
|  CVE-2023-1428  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-1428](https://nvd.nist.gov/vuln/detail/CVE-2023-1428)  | 
|  CVE-2023-1436  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-1436](https://nvd.nist.gov/vuln/detail/CVE-2023-1436)  | 
|  CVE-2023-1436  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-1436](https://nvd.nist.gov/vuln/detail/CVE-2023-1436)  | 
|  CVE-2023-1436  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-1436](https://nvd.nist.gov/vuln/detail/CVE-2023-1436)  | 
|  CVE-2023-1436  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-1436](https://nvd.nist.gov/vuln/detail/CVE-2023-1436)  | 
|  CVE-2023-1436  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-1436](https://nvd.nist.gov/vuln/detail/CVE-2023-1436)  | 
|  CVE-2023-20883  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-20883](https://nvd.nist.gov/vuln/detail/CVE-2023-20883)  | 
|  CVE-2023-24580  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-24580](https://nvd.nist.gov/vuln/detail/CVE-2023-24580)  | 
|  CVE-2023-25194  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-25194](https://nvd.nist.gov/vuln/detail/CVE-2023-25194)  | 
|  CVE-2023-25194  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-25194](https://nvd.nist.gov/vuln/detail/CVE-2023-25194)  | 
|  CVE-2023-25194  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-25194](https://nvd.nist.gov/vuln/detail/CVE-2023-25194)  | 
|  CVE-2023-2976  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-2976](https://nvd.nist.gov/vuln/detail/CVE-2023-2976)  | 
|  CVE-2023-2976  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-2976](https://nvd.nist.gov/vuln/detail/CVE-2023-2976)  | 
|  CVE-2023-2976  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-2976](https://nvd.nist.gov/vuln/detail/CVE-2023-2976)  | 
|  CVE-2023-2976  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-2976](https://nvd.nist.gov/vuln/detail/CVE-2023-2976)  | 
|  CVE-2023-2976  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-2976](https://nvd.nist.gov/vuln/detail/CVE-2023-2976)  | 
|  CVE-2023-2976  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-2976](https://nvd.nist.gov/vuln/detail/CVE-2023-2976)  | 
|  CVE-2023-2976  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-2976](https://nvd.nist.gov/vuln/detail/CVE-2023-2976)  | 
|  CVE-2023-2976  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-2976](https://nvd.nist.gov/vuln/detail/CVE-2023-2976)  | 
|  CVE-2023-2976  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-2976](https://nvd.nist.gov/vuln/detail/CVE-2023-2976)  | 
|  CVE-2023-2976  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-2976](https://nvd.nist.gov/vuln/detail/CVE-2023-2976)  | 
|  CVE-2023-2976  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-2976](https://nvd.nist.gov/vuln/detail/CVE-2023-2976)  | 
|  CVE-2023-2976  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-2976](https://nvd.nist.gov/vuln/detail/CVE-2023-2976)  | 
|  CVE-2023-2976  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-2976](https://nvd.nist.gov/vuln/detail/CVE-2023-2976)  | 
|  CVE-2023-2976  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-2976](https://nvd.nist.gov/vuln/detail/CVE-2023-2976)  | 
|  CVE-2023-2976  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-2976](https://nvd.nist.gov/vuln/detail/CVE-2023-2976)  | 
|  CVE-2023-2976  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-2976](https://nvd.nist.gov/vuln/detail/CVE-2023-2976)  | 
|  CVE-2023-2976  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-2976](https://nvd.nist.gov/vuln/detail/CVE-2023-2976)  | 
|  CVE-2023-2976  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-2976](https://nvd.nist.gov/vuln/detail/CVE-2023-2976)  | 
|  CVE-2023-2976  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-2976](https://nvd.nist.gov/vuln/detail/CVE-2023-2976)  | 
|  CVE-2023-2976  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-2976](https://nvd.nist.gov/vuln/detail/CVE-2023-2976)  | 
|  CVE-2023-2976  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-2976](https://nvd.nist.gov/vuln/detail/CVE-2023-2976)  | 
|  CVE-2023-2976  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-2976](https://nvd.nist.gov/vuln/detail/CVE-2023-2976)  | 
|  CVE-2023-31418  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-31418](https://nvd.nist.gov/vuln/detail/CVE-2023-31418)  | 
|  CVE-2023-32731  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-32731](https://nvd.nist.gov/vuln/detail/CVE-2023-32731)  | 
|  CVE-2023-34453  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-34453](https://nvd.nist.gov/vuln/detail/CVE-2023-34453)  | 
|  CVE-2023-34453  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-34453](https://nvd.nist.gov/vuln/detail/CVE-2023-34453)  | 
|  CVE-2023-34453  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-34453](https://nvd.nist.gov/vuln/detail/CVE-2023-34453)  | 
|  CVE-2023-34453  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-34453](https://nvd.nist.gov/vuln/detail/CVE-2023-34453)  | 
|  CVE-2023-34453  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-34453](https://nvd.nist.gov/vuln/detail/CVE-2023-34453)  | 
|  CVE-2023-34454  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-34454](https://nvd.nist.gov/vuln/detail/CVE-2023-34454)  | 
|  CVE-2023-34454  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-34454](https://nvd.nist.gov/vuln/detail/CVE-2023-34454)  | 
|  CVE-2023-34454  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-34454](https://nvd.nist.gov/vuln/detail/CVE-2023-34454)  | 
|  CVE-2023-34454  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-34454](https://nvd.nist.gov/vuln/detail/CVE-2023-34454)  | 
|  CVE-2023-34454  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-34454](https://nvd.nist.gov/vuln/detail/CVE-2023-34454)  | 
|  CVE-2023-34455  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-34455](https://nvd.nist.gov/vuln/detail/CVE-2023-34455)  | 
|  CVE-2023-34455  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-34455](https://nvd.nist.gov/vuln/detail/CVE-2023-34455)  | 
|  CVE-2023-34455  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-34455](https://nvd.nist.gov/vuln/detail/CVE-2023-34455)  | 
|  CVE-2023-34455  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-34455](https://nvd.nist.gov/vuln/detail/CVE-2023-34455)  | 
|  CVE-2023-34455  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-34455](https://nvd.nist.gov/vuln/detail/CVE-2023-34455)  | 
|  CVE-2023-34610  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-34610](https://nvd.nist.gov/vuln/detail/CVE-2023-34610)  | 
|  CVE-2023-36053  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-36053](https://nvd.nist.gov/vuln/detail/CVE-2023-36053)  | 
|  CVE-2023-3635  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-3635](https://nvd.nist.gov/vuln/detail/CVE-2023-3635)  | 
|  CVE-2023-3635  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-3635](https://nvd.nist.gov/vuln/detail/CVE-2023-3635)  | 
|  CVE-2023-3635  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-3635](https://nvd.nist.gov/vuln/detail/CVE-2023-3635)  | 
|  CVE-2023-3635  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-3635](https://nvd.nist.gov/vuln/detail/CVE-2023-3635)  | 
|  CVE-2023-3635  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-3635](https://nvd.nist.gov/vuln/detail/CVE-2023-3635)  | 
|  CVE-2023-36478  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-36478](https://nvd.nist.gov/vuln/detail/CVE-2023-36478)  | 
|  CVE-2023-36478  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-36478](https://nvd.nist.gov/vuln/detail/CVE-2023-36478)  | 
|  CVE-2023-39410  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-39410](https://nvd.nist.gov/vuln/detail/CVE-2023-39410)  | 
|  CVE-2023-39410  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-39410](https://nvd.nist.gov/vuln/detail/CVE-2023-39410)  | 
|  CVE-2023-39410  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-39410](https://nvd.nist.gov/vuln/detail/CVE-2023-39410)  | 
|  CVE-2023-39410  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-39410](https://nvd.nist.gov/vuln/detail/CVE-2023-39410)  | 
|  CVE-2023-39410  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-39410](https://nvd.nist.gov/vuln/detail/CVE-2023-39410)  | 
|  CVE-2023-39410  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-39410](https://nvd.nist.gov/vuln/detail/CVE-2023-39410)  | 
|  CVE-2023-39410  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-39410](https://nvd.nist.gov/vuln/detail/CVE-2023-39410)  | 
|  CVE-2023-41164  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-41164](https://nvd.nist.gov/vuln/detail/CVE-2023-41164)  | 
|  CVE-2023-43642  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-43642](https://nvd.nist.gov/vuln/detail/CVE-2023-43642)  | 
|  CVE-2023-43642  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-43642](https://nvd.nist.gov/vuln/detail/CVE-2023-43642)  | 
|  CVE-2023-43642  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-43642](https://nvd.nist.gov/vuln/detail/CVE-2023-43642)  | 
|  CVE-2023-43642  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-43642](https://nvd.nist.gov/vuln/detail/CVE-2023-43642)  | 
|  CVE-2023-43642  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-43642](https://nvd.nist.gov/vuln/detail/CVE-2023-43642)  | 
|  CVE-2023-43642  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-43642](https://nvd.nist.gov/vuln/detail/CVE-2023-43642)  | 
|  CVE-2023-43642  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-43642](https://nvd.nist.gov/vuln/detail/CVE-2023-43642)  | 
|  CVE-2023-43665  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-43665](https://nvd.nist.gov/vuln/detail/CVE-2023-43665)  | 
|  CVE-2023-46120  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-46120](https://nvd.nist.gov/vuln/detail/CVE-2023-46120)  | 
|  CVE-2023-46695  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-46695](https://nvd.nist.gov/vuln/detail/CVE-2023-46695)  | 
|  CVE-2023-4759  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-4759](https://nvd.nist.gov/vuln/detail/CVE-2023-4759)  | 
|  CVE-2023-5072  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-5072](https://nvd.nist.gov/vuln/detail/CVE-2023-5072)  | 
|  CVE-2023-5072  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-5072](https://nvd.nist.gov/vuln/detail/CVE-2023-5072)  | 
|  CVE-2023-5072  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-5072](https://nvd.nist.gov/vuln/detail/CVE-2023-5072)  | 
|  CVE-2023-6378  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-6378](https://nvd.nist.gov/vuln/detail/CVE-2023-6378)  | 
|  CVE-2023-6378  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-6378](https://nvd.nist.gov/vuln/detail/CVE-2023-6378)  | 
|  CVE-2023-6378  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-6378](https://nvd.nist.gov/vuln/detail/CVE-2023-6378)  | 
|  CVE-2023-6378  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-6378](https://nvd.nist.gov/vuln/detail/CVE-2023-6378)  | 
|  CVE-2023-6481  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-6481](https://nvd.nist.gov/vuln/detail/CVE-2023-6481)  | 
|  CVE-2023-6481  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-6481](https://nvd.nist.gov/vuln/detail/CVE-2023-6481)  | 
|  CVE-2023-6481  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-6481](https://nvd.nist.gov/vuln/detail/CVE-2023-6481)  | 
|  CVE-2023-6481  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2023-6481](https://nvd.nist.gov/vuln/detail/CVE-2023-6481)  | 
|  CVE-2024-21634  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-21634](https://nvd.nist.gov/vuln/detail/CVE-2024-21634)  | 
|  CVE-2024-24680  |  ALTO  |  [https://nvd.nist. gov/vuln/detail/CVE-2024-24680](https://nvd.nist.gov/vuln/detail/CVE-2024-24680)  | 

## Notas de la versión 7.2.0
<a name="emr-720-relnotes"></a>

Las siguientes notas de la versión incluyen información sobre la versión 7.2.0 de Amazon EMR. Los cambios son respecto a la versión 7.2.0.

**Nuevas características**
+ **Actualizaciones de la aplicación**: Amazon EMR 7.2.0 application upgrades include Iceberg 1.5.0-amzn-0 and Delta 3.1.0.
+ Amazon EMR añade compatibilidad para que pueda utilizar otras aplicaciones HBase, como Flink y Hive, con la clase de almacenamiento Amazon S3 Express One Zone.
+ Esta versión añade la capacidad de leer los objetos restaurados, de modo que puede leer los objetos de Glacier desde una ubicación S3 con el protocolo `S3A`. Esta funcionalidad funciona con Spark, Flink y Hive.
+ Etiquetas de nodos con escalado gestionado: utilice etiquetas de nodos con sus instancias según el tipo de mercado o el tipo de nodo para mejorar el escalado automático desde Amazon EMR. Para obtener más información, consulte [Uso del escalado automático en Amazon EMR](https://docs.aws.amazon.com/emr/latest/ManagementGuide/emr-managed-scaling.html).

**Problemas conocidos**
+ Python 3.11 no es compatible con EMR Studio.

**Cambios, mejoras y problemas resueltos**
+ Esta versión corrige un problema en un script de estado de instancia integrado en el clúster que monitorea el estado de la instancia y que anteriormente consumía demasiados recursos de CPU y memoria cuando hay un gran número de subprocesos abiertos en los identificadores de archivos del nodo. and/or 
+  A partir de Spark 3.3.1 (compatible con las versiones 6.10 y posteriores de EMR), todos los ejecutores de un host de desmantelamiento pasan a un nuevo `ExecutorState`, denominado estado de *RETIRADA*. Yarn no puede utilizar los ejecutores que se están retirando para asignar tareas y, por lo tanto, solicitará nuevos ejecutores, si es necesario, para las tareas que se están ejecutando. Por lo tanto, si deshabilita Spark DRA mientras usa EMR Managed Scaling, EMR Auto Scaling o cualquier mecanismo de escalado personalizado en los clústeres de EMR-EC2, Yarn puede solicitar el máximo de ejecutores permitidos para cada trabajo. Para evitar este problema, deje la propiedad `spark.dynamicAllocation.enabled` establecida en `TRUE` (que es la predeterminada) cuando utilice la combinación de características anterior. Además, también puede establecer restricciones de ejecutor mínimas y máximas si configura valores para las propiedades `spark.dynamicAllocation.maxExecutors` y `spark.dynamicAllocation.minExecutors` para sus trabajos de Spark, a fin de restringir el número de ejecutores asignados durante la ejecución del trabajo. 
+ Esta versión corrige un problema de bloqueo que se puede producir durante las operaciones internas de limpieza por pasos. Esta operación administra el ciclo de vida de los pasos a medida que se completan en el clúster de EMR. Este problema afecta a las operaciones críticas de Amazon EMR, como la operación escalonada y el escalado.
+ Esta versión resuelve un problema por el que los clústeres personalizados con archivos de registro personalizados AMIs que tienen determinados archivos de registro preexistentes podían provocar un error en el daemon de administración de registros de Amazon EMR.
+ Amazon EMR 7.2.0 actualiza el daemon de Amazon EMR responsable de las actividades de administración y supervisión de clústeres de la versión 1 a la versión 2 del SDK. AWS 
+ Al lanzar un clúster con *la versión de parche más reciente* de Amazon EMR 5.36, 6.6 o 7.0 o sus respectivas versiones posteriores, Amazon EMR utiliza la versión más reciente de Amazon Linux 2023 o Amazon Linux 2 para la AMI de Amazon EMR predeterminada. Para más información, consulte [Uso de la AMI de Amazon Linux predeterminada para Amazon EMR](https://docs.aws.amazon.com/emr/latest/ManagementGuide/emr-default-ami.html).    
[\[See the AWS documentation website for more details\]](http://docs.aws.amazon.com/es_es/emr/latest/ReleaseGuide/emr-720-release.html)

## Versiones predeterminadas de Java para la versión 7.2.0
<a name="emr-720-jdk"></a>

Las versiones 7.2 y posteriores de Amazon EMR vienen con Amazon Corretto 17 (basado en OpenJDK) de forma predeterminada para las aplicaciones compatibles con Corretto 17 (JDK 17), con la excepción de Apache Livy.

En la siguiente tabla, se muestran las versiones predeterminadas de Java para las aplicaciones en Amazon EMR 7.2.0. Si desea cambiar la JVM predeterminada del clúster, siga las instrucciones de [Configuración de aplicaciones para utilizar una máquina virtual de Java específica](configuring-java8.md) para cada aplicación que se ejecute en el clúster. Solo se puede usar una versión de tiempo de ejecución de Java en un clúster. Amazon EMR no admite la ejecución de distintos nodos o aplicaciones en distintas versiones de tiempo de ejecución en el mismo clúster.


| Aplicación | Versión de Java o Amazon Corretto (el valor predeterminado está en negrita) | 
| --- | --- | 
| Delta | 17, 11, 8 | 
| Flink | 17, 11, 8 | 
| HBase | 11, 8 | 
| HCatalog | 17, 11, 8 | 
| Hadoop | 17, 11, 8 | 
| Hive | 17, 11, 8 | 
| Hudi | 17, 11, 8 | 
| Iceberg | 17, 11, 8 | 
| Livy | 17, 11, 8 | 
| Oozie | 17, 11, 8 | 
| Phoenix | 8 | 
| PrestoDB | 8 | 
| Spark | 17, 11, 8 | 
| Spark RAPIDS | 17, 11, 8 | 
| Sqoop | 8 | 
| Tez | 17, 11, 8 | 
| Trino | 21, 17 | 
| Zeppelin | 8 | 
| Pig | 8 | 
| ZooKeeper | 8 | 

## Versiones de los componentes de la versión 7.2.0
<a name="emr-720-components"></a>

A continuación, se muestran los componentes que Amazon EMR instala con esta versión. Algunos se instalan como parte de paquetes de aplicación de macrodatos. Otros son exclusivos de Amazon EMR y se instalan para ciertos procesos y características del sistema. Normalmente, estos componentes comienzan con `emr` o `aws`. Normalmente, los paquetes de aplicación de macrodatos de la versión más reciente de Amazon EMR son las versiones más recientes que pueden encontrarse en la comunidad. Intentamos que las versiones de la comunidad estén disponibles en Amazon EMR lo más rápido posible.

Algunos componentes de Amazon EMR son distintos de las versiones que se encuentran en la comunidad. Estos componentes tienen una etiqueta de versión con el formato `CommunityVersion-amzn-EmrVersion`. La `EmrVersion` empieza por 0. Por ejemplo, si un componente de la comunidad de código abierto llamado `myapp-component` con la versión 2.2 se ha modificado tres veces para incluirlo en diferentes versiones de lanzamiento de Amazon EMR, la versión que se mostrará será `2.2-amzn-2`.


| Componente | Versión | Description (Descripción) | 
| --- | --- | --- | 
| adot-java-agent | 1,31,0 | Un agente Java que recopila métricas de los daemons de las aplicaciones. | 
| delta | 3.1.0 | Delta Lake es un formato de tabla abierto para conjuntos de datos analíticos de gran tamaño | 
| emr-amazon-cloudwatch-agent | 1.300032.2-amzn-0 | Se trata de una aplicación que recopila métricas internas de nivel de sistema y métricas de aplicación personalizadas de las instancias de Amazon EC2. | 
| emr-ddb | 5.4.0 | Conector de Amazon DynamoDB para aplicaciones del ecosistema de Hadoop. | 
| emr-goodies | 3.11.0 | Bibliotecas especialmente prácticas para el ecosistema de Hadoop. | 
| emr-kinesis | 3.15.0 | Conector de Amazon Kinesis para aplicaciones del ecosistema de Hadoop. | 
| emr-notebook-env | 1.16.0 | Entorno de Conda para cuaderno de EMR que incluye una puerta de enlace empresarial de Jupyter | 
| emr-s3-dist-cp | 2.32.0 | Aplicación de copia distribuida optimizada para Amazon S3. | 
| emr-s3-select | 2.11.0 | Conector S3Select de EMR | 
| emr-wal-cli | 1.2.2 | CLI utilizada para eliminar o enumerar WAL de ERM. | 
| emrfs | 2.63,0 | Conector de Amazon S3 para aplicaciones del ecosistema de Hadoop. | 
| flink-client | 1.18.1-amzn-1 | Scripts y aplicaciones de cliente de línea de comando de Apache Flink. | 
| flink-jobmanager-config | 1.18.1-amzn-1 | Administración de recursos en nodos EMR para Apache Flink. JobManager | 
| hadoop-client | 3.3.6-amzn-4 | Los clientes de línea de comando de Hadoop como, por ejemplo "hdfs", "hadoop" o "yarn". | 
| hadoop-hdfs-datanode | 3.3.6-amzn-4 | Servicio de nivel de nodos de HDFS para el almacenamiento de bloques. | 
| hadoop-hdfs-library | 3.3.6-amzn-4 | Biblioteca y cliente de línea de comandos HDFS | 
| hadoop-hdfs-namenode | 3.3.6-amzn-4 | Servicio de HDFS para realizar un seguimiento de nombres de archivo y bloquear ubicaciones. | 
| hadoop-hdfs-journalnode | 3.3.6-amzn-4 | Servicio de HDFS para administrar los archivos de Hadoop periódico en clústeres de alta disponibilidad. | 
| hadoop-httpfs-server | 3.3.6-amzn-4 | Punto de enlace HTTP para operaciones HDFS. | 
| hadoop-kms-server | 3.3.6-amzn-4 | Servidor de administración de claves criptográficas basado en la API de Hadoop. KeyProvider  | 
| hadoop-mapred | 3.3.6-amzn-4 | MapReduce bibliotecas de motores de ejecución para ejecutar una aplicación. MapReduce  | 
| hadoop-yarn-nodemanager | 3.3.6-amzn-4 | Servicio de YARN para la administración de contenedores en un nodo individual. | 
| hadoop-yarn-resourcemanager | 3.3.6-amzn-4 | Servicio de YARN para la asignación y administración de recursos de clúster y aplicaciones distribuidas. | 
| hadoop-yarn-timeline-server | 3.3.6-amzn-4 | Servicio para recuperar información actual e histórica para aplicaciones de YARN. | 
| hbase-hmaster | 2.4.17-amzn-6 | Servicio para un HBase clúster responsable de la coordinación de las regiones y la ejecución de los comandos administrativos. | 
| hbase-region-server | 2.4.17-amzn-6 | Servicio para prestar servicio a una o más HBase regiones. | 
| hbase-client | 2.4.17-amzn-6 | HBase cliente de línea de comandos. | 
| hbase-rest-server | 2.4.17-amzn-6 | Servicio que proporciona un punto final RESTful HTTP para. HBase | 
| hbase-thrift-server | 2.4.17-amzn-6 | Servicio que proporciona un punto final de Thrift para HBase. | 
| hbase-operator-tools | 2.4.17-amzn-6 | Herramienta de reparación para HBase clústeres de Apache. | 
| hcatalog-client | 3.1.3-amzn-11 | El cliente de línea de comando "hcat" para manipular hcatalog-server. | 
| hcatalog-server | 3.1.3-amzn-11 | Prestación de servicios HCatalog, una capa de administración de tablas y almacenamiento para aplicaciones distribuidas. | 
| hcatalog-webhcat-server | 3.1.3-amzn-11 | Punto final HTTP que proporciona una interfaz REST para HCatalog. | 
| hive-client | 3.1.3-amzn-11 | Cliente de línea de comando de Hive. | 
| hive-hbase | 3.1.3-amzn-11 | Hive-hbase client. | 
| hive-metastore-server | 3.1.3-amzn-11 | Service para acceder al metaalmacén de Hive, un repositorio semántico que almacena metadatos para SQL en operaciones de Hadoop. | 
| hive-server2 | 3.1.3-amzn-11 | Servicio para aceptar consultas de Hive como solicitudes web. | 
| hudi | 0.14.1-amzn-1 | Marco de procesamiento incremental para impulsar la canalización de datos a baja latencia y alta eficiencia. | 
| hudi-presto | 0.14.1-amzn-1 | Biblioteca de paquetes para ejecutar Presto con Hudi. | 
| hudi-trino | 0.14.1-amzn-1 | Biblioteca de paquetes para ejecutar Trino con Hudi. | 
| hudi-spark | 0.14.1-amzn-1 | Biblioteca de paquetes para ejecutar Spark con Hudi. | 
| hue-server | 4.11.0 | Aplicación web para analizar datos con aplicaciones del ecosistema de Hadoop | 
| iceberg | 1.5.0-amzn-0 | Apache Iceberg es un formato de tabla abierto para conjuntos de datos analíticos muy grandes | 
| jupyterhub | 1.5.0 | Servidor multiusuario para blocs de notas Jupyter | 
| livy-server | 0.8.0-incubating | Interfaz de REST para interactuar con Apache Spark | 
| nginx | 1.12.1 | nginx [engine x] es un servidor HTTP y proxy inverso | 
| mxnet | 1.9.1 | Una biblioteca flexible, escalable y eficiente para el aprendizaje profundo. | 
| mariadb-server | 5.5.68\$1 | Servidor de base de datos de MariaDB. | 
| nvidia-cuda | 11.8.0 | Controladores Nvidia y conjunto de herramientas Cuda | 
| oozie-client | 5.2.1 | Cliente de línea de comando de Oozie. | 
| oozie-server | 5.2.1 | Servicio para aceptar solicitudes de flujo de trabajo de Oozie. | 
| opencv | 4.7.0 | Biblioteca de visión artificial de código abierto. | 
| phoenix-library | 5.1.3 | Las bibliotecas de Phoenix para servidor y cliente | 
| phoenix-connectors | 5.1.3 | Conectores de Apache Phoenix para Spark-3 | 
| phoenix-query-server | 6.0.0 | Un servidor ligero que proporciona acceso a JDBC, así como acceso de formato Protocol Buffers y JSON al API de Avatica  | 
| presto-coordinator | 0.285-amzn-0 | Servicio para aceptar las consultas y administrar la ejecución de consultas entre presto-workers. | 
| presto-worker | 0.285-amzn-0 | Service para ejecutar partes de una consulta. | 
| presto-client | 0.285-amzn-0 | Cliente de línea de comandos Presto que se instala en los nodos principales en espera de un clúster de HA donde el servidor Presto no se ha iniciado. | 
| trino-coordinator | 436-amzn-0 | Servicio para aceptar consultas y administrar la ejecución de consultas entre trino-workers. | 
| trino-worker | 436-amzn-0 | Service para ejecutar partes de una consulta. | 
| trino-client | 436-amzn-0 | Cliente de línea de comandos Trino que se instala en los maestros en espera de un clúster de HA donde el servidor Trino no se ha iniciado. | 
| pig-client | 0.17.0 | Cliente de línea de comando de Pig. | 
| r | 4.3.2 | Proyecto R para análisis estadístico | 
| ranger-kms-server | 2.0.0 | Sistema de administración de claves Apache Ranger | 
| spark-client | 3.5.1-amzn-0 | Clientes de línea de comando de Spark. | 
| spark-history-server | 3.5.1-amzn-0 | IU web para la visualización de eventos registrados durante la vida útil de una aplicación Spark completada. | 
| spark-on-yarn | 3.5.1-amzn-0 | Motor de ejecución en memoria para YARN. | 
| spark-yarn-slave | 3.5.1-amzn-0 | Bibliotecas de Apache Spark necesarias para esclavos de YARN. | 
| spark-rapids | 24.02.0-amzn-0 | El complemento Nvidia Spark RAPIDS que acelera Apache Spark con... GPUs | 
| sqoop-client | 1.4.7 | Cliente de línea de comando de Apache Sqoop. | 
| tensorflow | 2.11.0 | TensorFlow biblioteca de software de código abierto para computación numérica de alto rendimiento. | 
| tez-on-yarn | 0.10.2-amzn-9 | La aplicación YARN de tez y bibliotecas. | 
| tez-on-worker | 0.10.2-amzn-9 | La aplicación YARN de tez y bibliotecas para nodos de trabajo. | 
| zeppelin-server | 0.10.1 | Bloc de notas basado en web que permite el análisis de datos interactivo. | 
| zookeeper-server | 3.9.1-amzn-1 | Servicio centralizado para mantener información de configuración, nomenclatura, proporcionar sincronización distribuida y proporcionar servicios de grupo. | 
| zookeeper-client | 3.9.1-amzn-1 | ZooKeeper cliente de línea de comandos. | 

## Clasificaciones de configuración de la versión 7.2.0
<a name="emr-720-class"></a>

Las clasificaciones de configuración le permiten personalizar las aplicaciones. Suelen corresponder a un archivo XML de configuración para la aplicación como, por ejemplo, `hive-site.xml`. Para obtener más información, consulte [Configuración de aplicaciones](emr-configure-apps.md).

Las acciones de reconfiguración se producen cuando se especifica una configuración para los grupos de instancias de un clúster en ejecución. Amazon EMR solo inicia acciones de reconfiguración para las clasificaciones que se modifican. Para obtener más información, consulte [Reconfiguración de un grupo de instancias en un clúster en ejecución](emr-configure-apps-running-cluster.md).


**Clasificaciones de emr-7.2.0**  

| Clasificaciones | Description (Descripción) | Acciones de reconfiguración | 
| --- | --- | --- | 
| capacity-scheduler | Cambiar los valores en el archivo capacity-scheduler.xml de Hadoop. | Restarts the ResourceManager service. | 
| container-executor | Cambie los valores en el archivo container-executor.cfg de Hadoop YARN. | Not available. | 
| container-log4j | Cambiar los valores en el archivo container-log4j.properties de Hadoop YARN. | Not available. | 
| core-site | Cambiar los valores en el archivo core-site.xml de Hadoop. | Restarts the Hadoop HDFS services Namenode, SecondaryNamenode, Datanode, ZKFC, and Journalnode. Restarts the Hadoop YARN services ResourceManager, NodeManager, ProxyServer, and TimelineServer. Additionally restarts Hadoop KMS, Ranger KMS, HiveServer2, Hive MetaStore, Hadoop Httpfs, and MapReduce-HistoryServer. | 
| docker-conf | Cambie la configuración relacionada con el docker. | Not available. | 
| emrfs-site | Cambiar la configuración de EMRFS. | Restarts the Hadoop HDFS services Namenode, SecondaryNamenode, Datanode, ZKFC, and Journalnode. Restarts the Hadoop YARN services ResourceManager, NodeManager, ProxyServer, and TimelineServer. Additionally restarts HBaseRegionserver, HBaseMaster, HBaseThrift, HBaseRest, HiveServer2, Hive MetaStore, Hadoop Httpfs, and MapReduce-HistoryServer. | 
| flink-conf | Cambiar la configuración de flink-conf.yaml. | Restarts Flink history server. | 
| flink-log4j | Cambiar la configuración de log4j.properties de Flink. | Restarts Flink history server. | 
| flink-log4j-session | Cambie la configuración de Flink log4j-session.properties para la sesión. Kubernetes/Yarn  | Restarts Flink history server. | 
| flink-log4j-cli | Cambiar la configuración de log4j-cli.properties de Flink. | Restarts Flink history server. | 
| hadoop-env | Cambiar los valores en el entorno de Hadoop para todos los componentes de Hadoop. | Restarts the Hadoop HDFS services Namenode, SecondaryNamenode, Datanode, ZKFC, and Journalnode. Restarts the Hadoop YARN services ResourceManager, NodeManager, ProxyServer, and TimelineServer. Additionally restarts PhoenixQueryserver, HiveServer2, Hive MetaStore, and MapReduce-HistoryServer. | 
| hadoop-log4j | Cambiar los valores en el archivo log4j.properties de Hadoop. | Restarts the Hadoop HDFS services SecondaryNamenode, Datanode, and Journalnode. Restarts the Hadoop YARN services ResourceManager, NodeManager, ProxyServer, and TimelineServer. Additionally restarts Hadoop KMS, Hadoop Httpfs, and MapReduce-HistoryServer. | 
| hadoop-ssl-server | Cambiar la configuración del servidor ssl de Hadoop | Not available. | 
| hadoop-ssl-client | Cambiar la configuración del cliente ssl de Hadoop | Not available. | 
| hbase | Configuraciones seleccionadas por Amazon EMR para Apache. HBase | Custom EMR specific property. Sets emrfs-site and hbase-site configs. See those for their associated restarts. | 
| hbase-env | Cambie los valores en su entorno HBase. | Restarts the HBase services RegionServer, HBaseMaster, ThriftServer, RestServer. | 
| hbase-log4j | Cambie los valores en el archivo HBase hbase-log4j.properties. | Restarts the HBase services RegionServer, HBaseMaster, ThriftServer, RestServer. | 
| hbase-metrics | Cambie los valores en el archivo hadoop-metrics2-hbase.properties. HBase | Restarts the HBase services RegionServer, HBaseMaster, ThriftServer, RestServer. | 
| hbase-policy | Cambie los valores en HBase el archivo hbase-policy.xml. | Not available. | 
| hbase-site | Cambie los valores en HBase el archivo hbase-site.xml. | Restarts the HBase services RegionServer, HBaseMaster, ThriftServer, RestServer. Additionally restarts Phoenix QueryServer. | 
| hdfs-encryption-zones | Configurar zonas de cifrado de HDFS. | This classification should not be reconfigured. | 
| hdfs-env | Cambiar los valores en el entorno de HDFS. | Restarts Hadoop HDFS services Namenode, Datanode, and ZKFC. | 
| hdfs-site | Cambiar los valores en hdfs-site.xml de HDFS. | Restarts the Hadoop HDFS services Namenode, SecondaryNamenode, Datanode, ZKFC, and Journalnode. Additionally restarts Hadoop Httpfs. | 
| hcatalog-env | Cambie los valores en HCatalog el entorno. | Restarts Hive HCatalog Server. | 
| hcatalog-server-jndi | Cambie los valores en HCatalog jndi.properties. | Restarts Hive HCatalog Server. | 
| hcatalog-server-proto-hive-site | Cambie los valores en .xml HCatalog. proto-hive-site | Restarts Hive HCatalog Server. | 
| hcatalog-webhcat-env | Cambie los valores en el entorno HCat de la HCatalog Web. | Restarts Hive WebHCat server. | 
| hcatalog-webhcat-log4j2 | Cambie los valores en las propiedades HCatalog HCat log4j2.properties de la Web. | Restarts Hive WebHCat server. | 
| hcatalog-webhcat-site | Cambie los valores del archivo webhcat-site.xml de la HCatalog WebHCat. | Restarts Hive WebHCat server. | 
| hive | Configuración de Amazon EMR mantenida para Apache Hive. | Sets configurations to launch Hive LLAP service. | 
| hive-beeline-log4j2 | Cambiar los valores en el archivo beeline-log4j2.properties de Hive. | Not available. | 
| hive-parquet-logging | Cambiar los valores en el archivo parquet-logging.properties de Hive. | Not available. | 
| hive-env | Cambiar los valores en el entorno de Hive. | Restarts HiveServer2, HiveMetastore, and Hive HCatalog-Server. Runs Hive schemaTool CLI commands to verify hive-metastore. | 
| hive-exec-log4j2 | Cambie los valores en el archivo hive-exec-log 4j2.properties de Hive. | Not available. | 
| hive-llap-daemon-log4j2 | Cambie los valores en el archivo 4j2.properties de Hive. llap-daemon-log | Not available. | 
| hive-log4j2 | Cambiar los valores en el archivo hive-log4j2.properties de Hive. | Not available. | 
| hive-site | Cambiar los valores en el archivo hive-site.xml de Hive. | Restarts HiveServer2, HiveMetastore, and Hive HCatalog-Server. Runs Hive schemaTool CLI commands to verify hive-metastore. Also restarts Oozie and Zeppelin. | 
| hiveserver2-site | Cambiar los valores en el archivo hiveserver2-site.xml de Hive Server2. | Not available. | 
| hue-ini | Cambiar los valores en el archivo ini de Hue | Restarts Hue. Also activates Hue config override CLI commands to pick up new configurations. | 
| httpfs-env | Cambiar los valores en el entorno de HTTPFS. | Restarts Hadoop Httpfs service. | 
| httpfs-site | Cambiar los valores en el archivo httpfs-site.xml de Hadoop. | Restarts Hadoop Httpfs service. | 
| hadoop-kms-acls | Cambiar los valores en el archivo kms-acls.xml de Hadoop. | Not available. | 
| hadoop-kms-env | Cambiar los valores en el entorno de Hadoop KMS. | Restarts Hadoop-KMS service. | 
| hadoop-kms-java-home | Cambie la página de inicio de Java de KMS de Hadoop | Not available. | 
| hadoop-kms-log4j | Cambiar los valores en el archivo kms-log4j.properties de Hadoop. | Not available. | 
| hadoop-kms-site | Cambiar los valores en el archivo kms-site.xml de Hadoop. | Restarts Hadoop-KMS and Ranger-KMS service. | 
| hudi-env | Cambiar los valores en el entorno de Hudi. | Not available. | 
| hudi-defaults | Cambie los valores en el archivo hudi-defaults.conf de Hudi. | Not available. | 
| iceberg-defaults | Cambie los valores del archivo iceberg-defaults.conf de Iceberg. | Not available. | 
| delta-defaults | Cambie los valores del archivo delta-defaults.conf de Delta. | Not available. | 
| jupyter-notebook-conf | Cambiar los valores en el archivo jupyter\$1notebook\$1config.py de Jupyter Notebook. | Not available. | 
| jupyter-hub-conf | Cambie los valores en JupyterHubs el archivo jupyterhub\$1config.py. | Not available. | 
| jupyter-s3-conf | Configurar la persistencia en S3 del bloc de notas de Jupyter. | Not available. | 
| jupyter-sparkmagic-conf | Cambiar los valores en el archivo config.json de Sparkmagic. | Not available. | 
| livy-conf | Cambiar los valores en el archivo livy.conf de Livy. | Restarts Livy Server. | 
| livy-env | Cambiar los valores en el entorno de Livy. | Restarts Livy Server. | 
| livy-log4j2 | Cambiar la configuración de log4j2.properties de Livy. | Restarts Livy Server. | 
| mapred-env | Cambie los valores en el entorno de la MapReduce aplicación. | Restarts Hadoop MapReduce-HistoryServer. | 
| mapred-site | Cambie los valores en el archivo mapred-site.xml de la MapReduce aplicación. | Restarts Hadoop MapReduce-HistoryServer. | 
| oozie-env | Cambiar los valores en el entorno de Oozie. | Restarts Oozie. | 
| oozie-log4j | Cambiar los valores en el archivo oozie-log4j.properties de Oozie. | Restarts Oozie. | 
| oozie-site | Cambiar los valores en el archivo oozie-site.xml de Oozie. | Restarts Oozie. | 
| phoenix-hbase-metrics | Cambiar los valores en el archivo hadoop-metrics2-hbase.properties de Phoenix. | Not available. | 
| phoenix-hbase-site | Cambiar los valores en el archivo hbase-site.xml de Phoenix. | Not available. | 
| phoenix-log4j | Cambiar los valores en el archivo log4j.properties de Phoenix. | Restarts Phoenix-QueryServer. | 
| phoenix-metrics | Cambiar los valores en el archivo hadoop-metrics2-phoenix.properties de Phoenix. | Not available. | 
| pig-env | Cambiar los valores en el entorno de Pig. | Not available. | 
| pig-properties | Cambiar los valores en el archivo pig.properties de Pig. | Restarts Oozie. | 
| pig-log4j | Cambiar los valores en el archivo log4j.properties de Pig. | Not available. | 
| presto-log | Cambiar los valores en el archivo log.properties de Presto. | Restarts Presto-Server (for PrestoDB) | 
| presto-config | Cambiar los valores en el archivo config.properties de Presto. | Restarts Presto-Server (for PrestoDB) | 
| presto-password-authenticator | Cambiar los valores en el archivo password-authenticator.properties de Presto. | Not available. | 
| presto-env | Cambiar valores en el archivo presto-env.sh de Presto. | Restarts Presto-Server (for PrestoDB) | 
| presto-node | Cambiar valores en el archivo node.properties de Presto. | Not available. | 
| presto-connector-blackhole | Cambiar los valores en el archivo blackhole.properties de Presto. | Not available. | 
| presto-connector-cassandra | Cambiar los valores en el archivo cassandra.properties de Presto. | Not available. | 
| presto-connector-hive | Cambiar los valores en el archivo hive.properties de Presto. | Restarts Presto-Server (for PrestoDB) | 
| presto-connector-jmx | Cambiar los valores en el archivo jmx.properties de Presto. | Not available. | 
| presto-connector-kafka | Cambiar los valores en el archivo kafka.properties de Presto. | Not available. | 
| presto-connector-lakeformation | Cambiar los valores en el archivo lakeformation.properties de Presto. | Restarts Presto-Server (for PrestoDB) | 
| presto-connector-localfile | Cambiar los valores en el archivo localfile.properties de Presto. | Not available. | 
| presto-connector-memory | Cambiar los valores del archivo memory.properties de Presto. | Not available. | 
| presto-connector-mongodb | Cambiar los valores en el archivo mongodb.properties de Presto. | Not available. | 
| presto-connector-mysql | Cambiar los valores en el archivo mysql.properties de Presto. | Not available. | 
| presto-connector-postgresql | Cambiar los valores en el archivo postgresql.properties de Presto. | Not available. | 
| presto-connector-raptor | Cambiar los valores en el archivo raptor.properties de Presto. | Not available. | 
| presto-connector-redis | Cambiar los valores en el archivo redis.properties de Presto. | Not available. | 
| presto-connector-redshift | Cambiar los valores en el archivo redshift.properties de Presto. | Not available. | 
| presto-connector-tpch | Cambiar los valores en el archivo tpch.properties de Presto. | Not available. | 
| presto-connector-tpcds | Cambiar los valores del archivo tpcds.properties de Presto. | Not available. | 
| trino-log | Cambiar los valores en el archivo log.properties de Trino. | Restarts Trino-Server (for Trino) | 
| trino-config | Cambiar los valores en el archivo config.properties de Trino. | Restarts Trino-Server (for Trino) | 
| trino-password-authenticator | Cambiar los valores en el archivo password-authenticator.properties de Trino. | Restarts Trino-Server (for Trino) | 
| trino-env | Cambie los valores del archivo trino-env.sh de Trino. | Restarts Trino-Server (for Trino) | 
| trino-node | Cambiar los valores en el archivo node.properties de Trino. | Not available. | 
| trino-connector-blackhole | Cambiar los valores en el archivo blackhole.properties de Trino. | Not available. | 
| trino-connector-cassandra | Cambiar los valores en el archivo cassandra.properties de Trino. | Not available. | 
| trino-connector-delta | Cambie los valores del archivo delta.properties de Trino. | Restarts Trino-Server (for Trino) | 
| trino-connector-hive | Cambiar los valores en el archivo hive.properties de Trino. | Restarts Trino-Server (for Trino) | 
| trino-exchange-manager | Cambie los valores del archivo exchange-manager.properties de Trino. | Restarts Trino-Server (for Trino) | 
| trino-connector-iceberg | Cambiar los valores en el archivo iceberg.properties de Trino. | Restarts Trino-Server (for Trino) | 
| trino-connector-hudi | Cambiar los valores en el archivo hudi.properties de Trino. | Restarts Trino-Server (for Trino) | 
| trino-connector-jmx | Cambiar los valores en el archivo jmx.properties de Trino. | Not available. | 
| trino-connector-kafka | Cambiar los valores en el archivo kafka.properties de Trino. | Not available. | 
| trino-connector-localfile | Cambiar los valores en el archivo localfile.properties de Trino. | Not available. | 
| trino-connector-memory | Cambiar los valores en el archivo memory.properties de Trino. | Not available. | 
| trino-connector-mongodb | Cambiar los valores en el archivo mongodb.properties de Trino. | Not available. | 
| trino-connector-mysql | Cambiar los valores en el archivo mysql.properties de Trino. | Not available. | 
| trino-connector-postgresql | Cambiar los valores en el archivo postgresql.properties de Trino. | Not available. | 
| trino-connector-raptor | Cambiar los valores en el archivo raptor.properties de Trino. | Not available. | 
| trino-connector-redis | Cambiar los valores en el archivo redis.properties de Trino. | Not available. | 
| trino-connector-redshift | Cambiar los valores en el archivo redshift.properties de Trino. | Not available. | 
| trino-connector-tpch | Cambiar los valores en el archivo tpch.properties de Trino. | Not available. | 
| trino-connector-tpcds | Cambiar los valores en el archivo tpcds.properties de Trino. | Not available. | 
| ranger-kms-dbks-site | Cambie los valores del archivo dbks-site.xml de Ranger KMS. | Restarts Ranger KMS Server. | 
| ranger-kms-site | Cambie los valores en el ranger-kms-site archivo.xml de Ranger KMS. | Restarts Ranger KMS Server. | 
| ranger-kms-env | Cambie los valores del entorno Ranger KMS. | Restarts Ranger KMS Server. | 
| ranger-kms-logback | Cambie los valores del archivo kms-logback.xml de Ranger KMS. | Not available. | 
| ranger-kms-db-ca | Cambie los valores del archivo CA en S3 para la conexión SSL de MySQL con Ranger KMS. | Not available. | 
| spark | Configuración de Amazon EMR mantenida para Apache Spark. | This property modifies spark-defaults. See actions there. | 
| spark-defaults | Cambiar los valores en el archivo spark-defaults.conf de Spark. | Restarts Spark history server and Spark thrift server. | 
| spark-env | Cambiar los valores en el entorno de Spark. | Restarts Spark history server and Spark thrift server. | 
| spark-hive-site | Cambiar los valores en el archivo hive-site.xml de Spark. | Not available. | 
| spark-log4j2 | Cambiar los valores en el archivo log4j2.properties de Spark. | Restarts Spark history server and Spark thrift server. | 
| spark-metrics | Cambiar los valores en el archivo metrics.properties de Spark. | Restarts Spark history server and Spark thrift server. | 
| sqoop-env | Cambiar los valores en el entorno de Sqoop. | Not available. | 
| sqoop-oraoop-site | Cambie los valores en el archivo oraoop-site.xml de Sqoop. OraOop | Not available. | 
| sqoop-site | Cambiar los valores en el archivo sqoop-site.xml de Sqoop. | Not available. | 
| tez-site | Cambiar los valores en el archivo tez-site.xml de Tez. | Restart Oozie and HiveServer2. | 
| yarn-env | Cambiar los valores en el entorno de YARN. | Restarts the Hadoop YARN services ResourceManager, NodeManager, ProxyServer, and TimelineServer. Additionally restarts MapReduce-HistoryServer. | 
| yarn-site | Cambiar los valores en el archivo yarn-site.xml de YARN. | Restarts the Hadoop YARN services ResourceManager, NodeManager, ProxyServer, and TimelineServer. Additionally restarts Livy Server and MapReduce-HistoryServer. | 
| zeppelin-env | Cambiar los valores en el entorno de Zeppelin. | Restarts Zeppelin. | 
| zeppelin-site | Cambie los ajustes de configuración de zeppelin-site.xml. | Restarts Zeppelin. | 
| zookeeper-config | Cambie los valores en el ZooKeeper archivo zoo.cfg. | Restarts Zookeeper server. | 
| zookeeper-logback | Cambie los valores en ZooKeeper el archivo logback.xml. | Restarts Zookeeper server. | 
| emr-metrics | Cambie la configuración de la métrica EMR para este nodo. | Restarts the CloudWatchAgent service. | 

## Registro de cambios de la versión 7.2.0
<a name="720-changelog"></a>


**Registro de cambios de la versión 7.2.0 y notas de la versión**  

| Date | Event | Description (Descripción) | 
| --- | --- | --- | 
| 2025-09-03 | Revisión de documentos | Amazon EMR 7.2.0: notas de la versión de Hadoop | 
| 2024-07-25 | Publicación de documentos | Primera publicación de las notas de la versión 7.2.0 de Amazon EMR | 
| 2024-07-16 | Versión inicial | Implementación inicial de Amazon EMR 7.2.0 en regiones comerciales limitadas | 

# Versión 7.1.0 de Amazon EMR
<a name="emr-710-release"></a>

## Versiones de las aplicaciones de la versión 7.1.0
<a name="emr-710-app-versions"></a>

Esta versión incluye las siguientes aplicaciones: [https://docs.aws.amazon.com/AmazonCloudWatch/latest/monitoring/Install-CloudWatch-Agent.html](https://docs.aws.amazon.com/AmazonCloudWatch/latest/monitoring/Install-CloudWatch-Agent.html), [https://delta.io/](https://delta.io/), [https://flink.apache.org/](https://flink.apache.org/), [http://hbase.apache.org/](http://hbase.apache.org/), [https://cwiki.apache.org/confluence/display/Hive/HCatalog](https://cwiki.apache.org/confluence/display/Hive/HCatalog), [http://hadoop.apache.org/docs/current/](http://hadoop.apache.org/docs/current/), [http://hive.apache.org/](http://hive.apache.org/), [https://hudi.apache.org](https://hudi.apache.org), [http://gethue.com/](http://gethue.com/), [https://iceberg.apache.org/](https://iceberg.apache.org/), [https://jupyter-enterprise-gateway.readthedocs.io/en/latest/](https://jupyter-enterprise-gateway.readthedocs.io/en/latest/), [https://jupyterhub.readthedocs.io/en/latest/#](https://jupyterhub.readthedocs.io/en/latest/#), [https://livy.incubator.apache.org/](https://livy.incubator.apache.org/), [https://mxnet.incubator.apache.org/](https://mxnet.incubator.apache.org/), [http://oozie.apache.org/](http://oozie.apache.org/), [https://phoenix.apache.org/](https://phoenix.apache.org/), [http://pig.apache.org/](http://pig.apache.org/), [https://prestodb.io/](https://prestodb.io/), [https://spark.apache.org/docs/latest/](https://spark.apache.org/docs/latest/), [http://sqoop.apache.org/](http://sqoop.apache.org/), [https://www.tensorflow.org/](https://www.tensorflow.org/), [https://tez.apache.org/](https://tez.apache.org/), [https://trino.io/](https://trino.io/), [https://zeppelin.incubator.apache.org/](https://zeppelin.incubator.apache.org/) y [https://zookeeper.apache.org](https://zookeeper.apache.org).

En la siguiente tabla se enumeran las versiones de la aplicación disponibles en esta versión de Amazon EMR y las versiones de la aplicación en las tres versiones anteriores de Amazon EMR (cuando corresponda).

Para ver un historial completo de las versiones de la aplicación disponibles para cada versión de Amazon EMR, consulte los temas siguientes:
+ [Versiones de las aplicaciones en las versiones 7.x de Amazon EMR](emr-release-app-versions-7.x.md)
+ [Versiones de la aplicación en las versiones 6.x de Amazon EMR](emr-release-app-versions-6.x.md)
+ [Versiones de la aplicación en las versiones 5.x de Amazon EMR](emr-release-app-versions-5.x.md)
+ [Versiones de la aplicación en las versiones 4.x de Amazon EMR](emr-release-app-versions-4.x.md)


**Información sobre la versión de la aplicación**  

|  | emr-7.3.0 | emr-7.2.0 | emr-7.1.0 | emr-7.0.0 | 
| --- | --- | --- | --- | --- | 
| AWS SDK for Java | 2.25.70, 1.12.747 | 2.23.18, 1.12.705 | 2.23.18, 1.12.656 | 2.20.160-amzn-0, 1.12.569 | 
| Python | 3.9, 3.11 | 3.9, 3.11 | 3.9, 3.11 | 3.9 | 
| Scala | 2.12.18 | 2.12.17 | 2.12.17 | 2.12.17 | 
| AmazonCloudWatchAgent | 1.300032.2-amzn-0 | 1.300032.2-amzn-0 | 1.300032.2-amzn-0 | 1.300031.1-amzn-0 | 
| Delta | 3.2.0-amzn-0 | 3.1.0 | 3.0.0 | 3.0.0 | 
| Flink | 1.18.1-amzn-2 | 1.18.1-amzn-1 | 1.18.1-amzn-0 | 1.18.0-amzn-0 | 
| Ganglia |  -  |  -  |  -  |  -  | 
| HBase | 2.4.17-amzn-7 | 2.4.17-amzn-6 | 2.4.17-amzn-5 | 2.4.17-amzn-4 | 
| HCatalog | 3.1.3-amzn-12 | 3.1.3-amzn-11 | 3.1.3-amzn-10 | 3.1.3-amzn-9 | 
| Hadoop | 3.3.6-amzn-5 | 3.3.6-amzn-4 | 3.3.6-amzn-3 | 3.3.6-amzn-2 | 
| Hive | 3.1.3-amzn-12 | 3.1.3-amzn-11 | 3.1.3-amzn-10 | 3.1.3-amzn-9 | 
| Hudi | 0.15.0-amzn-0 | 0.14.1-amzn-1 | 0.14.1-amzn-0 | 0.14.0-amzn-1 | 
| Hue | 4.11.0 | 4.11.0 | 4.11.0 | 4.11.0 | 
| Iceberg | 1.5.2-amzn-0 | 1.5.0-amzn-0 | 1.4.3-amzn-0 | 1.4.2-amzn-0 | 
| JupyterEnterpriseGateway | 2.6.0 | 2.6.0 | 2.6.0 | 2.6.0 | 
| JupyterHub | 1.5.0 | 1.5.0 | 1.5.0 | 1.5.0 | 
| Livy | 0.8.0-incubating | 0.8.0-incubating | 0.8.0-incubating | 0.7.1-incubating | 
| MXNet |  -  | 1.9.1 | 1.9.1 | 1.9.1 | 
| Mahout |  -  |  -  |  -  |  -  | 
| Oozie | 5.2.1 | 5.2.1 | 5.2.1 | 5.2.1 | 
| Phoenix | 5.1.3 | 5.1.3 | 5.1.3 | 5.1.3 | 
| Pig | 0.17.0 | 0.17.0 | 0.17.0 | 0.17.0 | 
| Presto | 0.285-amzn-1 | 0.285-amzn-0 | 0.284-amzn-0 | 0.283-amzn-1 | 
| Spark | 3.5.1-amzn-1 | 3.5.1-amzn-0 | 3.5.0-amzn-1 | 3.5.0-amzn-0 | 
| Sqoop | 1.4.7 | 1.4.7 | 1.4.7 | 1.4.7 | 
| TensorFlow | 2.16.1 | 2.11.0 | 2.11.0 | 2.11.0 | 
| Tez | 0.10.2-amzn-10 | 0.10.2-amzn-9 | 0.10.2-amzn-8 | 0.10.2-amzn-7 | 
| Trino (PrestoSQL) | 442-amzn-0 | 436-amzn-0 | 435-amzn-0 | 426-amzn-1 | 
| Zeppelin | 0.11.1 | 0.10.1 | 0.10.1 | 0.10.1 | 
| ZooKeeper | 3.9.1-amzn-1 | 3.9.1-amzn-1 | 3.9.1-amzn-0 | 3.5.10 | 

## Notas de la versión 7.1.0
<a name="emr-710-relnotes"></a>

Las siguientes notas de la versión incluyen información sobre la versión 7.1.0 de Amazon EMR. Los cambios son respecto a la versión 7.1.0.

**Nuevas características**
+ **Actualizaciones de la aplicación**: Amazon EMR 7.1.0 application upgrades include Livy 0.8.0, Trino 435, and ZooKeeper 3.9.1.
+ [https://docs.aws.amazon.com/emr/latest/ManagementGuide/emr-plan-node-replacement.html](https://docs.aws.amazon.com/emr/latest/ManagementGuide/emr-plan-node-replacement.html): con Amazon EMR 7.1.0 y versiones posteriores, el reemplazo de nodos en mal estado está habilitado de forma predeterminada, por lo que Amazon EMR reemplazará sin problemas los nodos en mal estado. Para evitar que sus flujos de trabajo actuales se vean afectados en las versiones 7.0.0 y anteriores de Amazon EMR, el reemplazo de nodos en mal estado está deshabilitado si ha activado la protección de terminación en su clúster.
+ [https://docs.aws.amazon.com/emr/latest/ReleaseGuide/emr-AmazonCloudWatchAgent.html](https://docs.aws.amazon.com/emr/latest/ReleaseGuide/emr-AmazonCloudWatchAgent.html): configure el CloudWatch agente para que utilice métricas de sistema adicionales, añada métricas de aplicación y cambie el destino de las métricas con la API de configuración de Amazon EMR.

**Problemas conocidos**
+ La aplicación JupyterEnterpriseGateway (JEG) no es compatible con Python 3.11 en esta versión.
+ Un script de estado de instancia integrado en el clúster que monitorea el estado de la instancia puede consumir demasiados recursos de CPU y memoria cuando hay un gran número de subprocesos and/or abiertos en los identificadores de archivos del nodo.

**Cambios, mejoras y problemas resueltos**
+  A partir de Spark 3.3.1 (compatible con las versiones 6.10 y posteriores de EMR), todos los ejecutores de un host de desmantelamiento pasan a un nuevo `ExecutorState`, denominado estado de *RETIRADA*. Yarn no puede utilizar los ejecutores que se están retirando para asignar tareas y, por lo tanto, solicitará nuevos ejecutores, si es necesario, para las tareas que se están ejecutando. Por lo tanto, si deshabilita Spark DRA mientras usa EMR Managed Scaling, EMR Auto Scaling o cualquier mecanismo de escalado personalizado en los clústeres de EMR-EC2, Yarn puede solicitar el máximo de ejecutores permitidos para cada trabajo. Para evitar este problema, deje la propiedad `spark.dynamicAllocation.enabled` establecida en `TRUE` (que es la predeterminada) cuando utilice la combinación de características anterior. Además, también puede establecer restricciones de ejecutor mínimas y máximas si configura valores para las propiedades `spark.dynamicAllocation.maxExecutors` y `spark.dynamicAllocation.minExecutors` para sus trabajos de Spark, a fin de restringir el número de ejecutores asignados durante la ejecución del trabajo. 
+ Si bien Amazon EMR 7.1.0 es compatible con Python 3.9 de forma predeterminada, Livy 0.8.0 y Spark de Amazon EMR 7.1.0 admiten Python 3.11.
+ Esta versión corrige el problema de tener que ejecutar cada línea de una en una cuando se usa PySpark con Python versión 3.11.
+ Actualización de **Zeppelin:** Amazon EMR 7.1.0 incluye una actualización de Zeppelin al SDK para Java v2. AWS Esta actualización permite que un portátil Zeppelin S3 acepte un proveedor de materiales de cifrado personalizados. El AWS SDK for Java v2 elimina la EncryptionMaterialsProvider interfaz. Al actualizar a Amazon EMR 7.1.0, debe implementar la [interfaz Keyring](https://github.com/aws/amazon-s3-encryption-client-java/blob/main/src/main/java/software/amazon/encryption/s3/materials/Keyring.java) si desea utilizar un cifrado personalizado. Para ver un ejemplo de cómo implementar la interfaz Keyring, consulte [ KmsKeyring.java.](https://github.com/aws/amazon-s3-encryption-client-java/blob/a5d714fe27f97793997e41745939ef7da8a22167/src/main/java/software/amazon/encryption/s3/materials/KmsKeyring.java#L36)
+ Al actualizar a la versión 7.1.0 de Amazon EMR, cambie su proveedor de claves personalizado para el cifrado de discos locales a fin de generar claves mediante el algoritmo AES de. AES/GCM/NoPadding Si no actualiza el algoritmo, es posible que se produzca un error `Local disk encryption failed on master instance (i-123456789) due to internal error.` en la creación del clúster. Para obtener más información sobre la creación de un proveedor de claves personalizadas, consulte [Creación de un proveedor de claves personalizadas.](https://docs.aws.amazon.com/emr/latest/ManagementGuide/emr-encryption-enable.html#emr-custom-keys)
+ Amazon EMR 7.1.0 mejora la resiliencia de un nodo en condiciones de poco espacio en disco al mejorar la lógica de truncamiento de registros para los archivos con identificadores de archivos abiertos.
+ Esta versión mejora la lógica de codificación y decodificación para minimizar el riesgo de corrupción de datos y errores en los nodos cuando los daemons de Amazon EMR leen y escriben archivos al reiniciar un nodo.
+ Al lanzar un clúster con *la versión de parche más reciente* de Amazon EMR 5.36, 6.6 o 7.0 o sus respectivas versiones posteriores, Amazon EMR utiliza la versión más reciente de Amazon Linux 2023 o Amazon Linux 2 para la AMI de Amazon EMR predeterminada. Para más información, consulte [Uso de la AMI de Amazon Linux predeterminada para Amazon EMR](https://docs.aws.amazon.com/emr/latest/ManagementGuide/emr-default-ami.html).    
[\[See the AWS documentation website for more details\]](http://docs.aws.amazon.com/es_es/emr/latest/ReleaseGuide/emr-710-release.html)

## Versiones predeterminadas de Java para la versión 7.1.0
<a name="emr-710-jdk"></a>

Las versiones 7.1 y posteriores de Amazon EMR vienen con Amazon Corretto 17 (basado en OpenJDK) de forma predeterminada para las aplicaciones compatibles con Corretto 17 (JDK 17), con la excepción de Apache Livy.

En la siguiente tabla, se muestran las versiones predeterminadas de Java para las aplicaciones en Amazon EMR 7.1.0. Si desea cambiar la JVM predeterminada del clúster, siga las instrucciones de [Configuración de aplicaciones para utilizar una máquina virtual de Java específica](configuring-java8.md) para cada aplicación que se ejecute en el clúster. Solo se puede usar una versión de tiempo de ejecución de Java en un clúster. Amazon EMR no admite la ejecución de distintos nodos o aplicaciones en distintas versiones de tiempo de ejecución en el mismo clúster.


| Aplicación | Versión de Java o Amazon Corretto (el valor predeterminado está en negrita) | 
| --- | --- | 
| Delta | 17, 11, 8 | 
| Flink | 17, 11, 8 | 
| HBase | 11, 8 | 
| HCatalog | 17, 11, 8 | 
| Hadoop | 17, 11, 8 | 
| Hive | 17, 11, 8 | 
| Hudi | 17, 11, 8 | 
| Iceberg | 17, 11, 8 | 
| Livy | 17, 11, 8 | 
| Oozie | 17, 11, 8 | 
| Phoenix | 8 | 
| PrestoDB | 8 | 
| Spark | 17, 11, 8 | 
| Spark RAPIDS | 17, 11, 8 | 
| Sqoop | 8 | 
| Tez | 17, 11, 8 | 
| Trino | 17 | 
| Zeppelin | 8 | 
| Pig | 8 | 
| ZooKeeper | 8 | 

## Versiones de los componentes de la versión 7.1.0
<a name="emr-710-components"></a>

A continuación, se muestran los componentes que Amazon EMR instala con esta versión. Algunos se instalan como parte de paquetes de aplicación de macrodatos. Otros son exclusivos de Amazon EMR y se instalan para ciertos procesos y características del sistema. Normalmente, estos componentes comienzan con `emr` o `aws`. Normalmente, los paquetes de aplicación de macrodatos de la versión más reciente de Amazon EMR son las versiones más recientes que pueden encontrarse en la comunidad. Intentamos que las versiones de la comunidad estén disponibles en Amazon EMR lo más rápido posible.

Algunos componentes de Amazon EMR son distintos de las versiones que se encuentran en la comunidad. Estos componentes tienen una etiqueta de versión con el formato `CommunityVersion-amzn-EmrVersion`. La `EmrVersion` empieza por 0. Por ejemplo, si un componente de la comunidad de código abierto llamado `myapp-component` con la versión 2.2 se ha modificado tres veces para incluirlo en diferentes versiones de lanzamiento de Amazon EMR, la versión que se mostrará será `2.2-amzn-2`.


| Componente | Versión | Description (Descripción) | 
| --- | --- | --- | 
| adot-java-agent | 1,31,0 | Un agente Java que recopila métricas de los daemons de las aplicaciones. | 
| delta | 3.0.0 | Delta Lake es un formato de tabla abierto para conjuntos de datos analíticos de gran tamaño | 
| emr-amazon-cloudwatch-agent | 1.300032.2-amzn-0 | Se trata de una aplicación que recopila métricas internas de nivel de sistema y métricas de aplicación personalizadas de las instancias de Amazon EC2. | 
| emr-ddb | 5.3.0 | Conector de Amazon DynamoDB para aplicaciones del ecosistema de Hadoop. | 
| emr-goodies | 3.10.0 | Bibliotecas especialmente prácticas para el ecosistema de Hadoop. | 
| emr-kinesis | 3.14.0 | Conector de Amazon Kinesis para aplicaciones del ecosistema de Hadoop. | 
| emr-notebook-env | 1.7.0 | Entorno de Conda para cuaderno de EMR que incluye una puerta de enlace empresarial de Jupyter | 
| emr-s3-dist-cp | 2.31.0 | Aplicación de copia distribuida optimizada para Amazon S3. | 
| emr-s3-select | 2.10.0 | Conector S3Select de EMR | 
| emr-wal-cli | 1.2.2 | CLI utilizada para eliminar o enumerar WAL de ERM. | 
| emrfs | 2.62.0 | Conector de Amazon S3 para aplicaciones del ecosistema de Hadoop. | 
| flink-client | 1.18.1-amzn-0 | Scripts y aplicaciones de cliente de línea de comando de Apache Flink. | 
| flink-jobmanager-config | 1.18.1-amzn-0 | Administración de recursos en nodos EMR para Apache Flink. JobManager | 
| hadoop-client | 3.3.6-amzn-3 | Los clientes de línea de comando de Hadoop como, por ejemplo "hdfs", "hadoop" o "yarn". | 
| hadoop-hdfs-datanode | 3.3.6-amzn-3 | Servicio de nivel de nodos de HDFS para el almacenamiento de bloques. | 
| hadoop-hdfs-library | 3.3.6-amzn-3 | Biblioteca y cliente de línea de comandos HDFS | 
| hadoop-hdfs-namenode | 3.3.6-amzn-3 | Servicio de HDFS para realizar un seguimiento de nombres de archivo y bloquear ubicaciones. | 
| hadoop-hdfs-journalnode | 3.3.6-amzn-3 | Servicio de HDFS para administrar los archivos de Hadoop periódico en clústeres de alta disponibilidad. | 
| hadoop-httpfs-server | 3.3.6-amzn-3 | Punto de enlace HTTP para operaciones HDFS. | 
| hadoop-kms-server | 3.3.6-amzn-3 | Servidor de administración de claves criptográficas basado en la API de Hadoop. KeyProvider  | 
| hadoop-mapred | 3.3.6-amzn-3 | MapReduce bibliotecas de motores de ejecución para ejecutar una aplicación. MapReduce  | 
| hadoop-yarn-nodemanager | 3.3.6-amzn-3 | Servicio de YARN para la administración de contenedores en un nodo individual. | 
| hadoop-yarn-resourcemanager | 3.3.6-amzn-3 | Servicio de YARN para la asignación y administración de recursos de clúster y aplicaciones distribuidas. | 
| hadoop-yarn-timeline-server | 3.3.6-amzn-3 | Servicio para recuperar información actual e histórica para aplicaciones de YARN. | 
| hbase-hmaster | 2.4.17-amzn-5 | Servicio para un HBase clúster responsable de la coordinación de las regiones y la ejecución de los comandos administrativos. | 
| hbase-region-server | 2.4.17-amzn-5 | Servicio para prestar servicio a una o más HBase regiones. | 
| hbase-client | 2.4.17-amzn-5 | HBase cliente de línea de comandos. | 
| hbase-rest-server | 2.4.17-amzn-5 | Servicio que proporciona un punto final RESTful HTTP para. HBase | 
| hbase-thrift-server | 2.4.17-amzn-5 | Servicio que proporciona un punto final de Thrift para HBase. | 
| hbase-operator-tools | 2.4.17-amzn-5 | Herramienta de reparación para HBase clústeres de Apache. | 
| hcatalog-client | 3.1.3-amzn-10 | El cliente de línea de comando "hcat" para manipular hcatalog-server. | 
| hcatalog-server | 3.1.3-amzn-10 | Prestación de servicios HCatalog, una capa de administración de tablas y almacenamiento para aplicaciones distribuidas. | 
| hcatalog-webhcat-server | 3.1.3-amzn-10 | Punto final HTTP que proporciona una interfaz REST para HCatalog. | 
| hive-client | 3.1.3-amzn-10 | Cliente de línea de comando de Hive. | 
| hive-hbase | 3.1.3-amzn-10 | Hive-hbase client. | 
| hive-metastore-server | 3.1.3-amzn-10 | Service para acceder al metaalmacén de Hive, un repositorio semántico que almacena metadatos para SQL en operaciones de Hadoop. | 
| hive-server2 | 3.1.3-amzn-10 | Servicio para aceptar consultas de Hive como solicitudes web. | 
| hudi | 0.14.1-amzn-0 | Marco de procesamiento incremental para impulsar la canalización de datos a baja latencia y alta eficiencia. | 
| hudi-presto | 0.14.1-amzn-0 | Biblioteca de paquetes para ejecutar Presto con Hudi. | 
| hudi-trino | 0.14.1-amzn-0 | Biblioteca de paquetes para ejecutar Trino con Hudi. | 
| hudi-spark | 0.14.1-amzn-0 | Biblioteca de paquetes para ejecutar Spark con Hudi. | 
| hue-server | 4.11.0 | Aplicación web para analizar datos con aplicaciones del ecosistema de Hadoop | 
| iceberg | 1.4.3-amzn-0 | Apache Iceberg es un formato de tabla abierto para conjuntos de datos analíticos muy grandes | 
| jupyterhub | 1.5.0 | Servidor multiusuario para blocs de notas Jupyter | 
| livy-server | 0.8.0-incubating | Interfaz de REST para interactuar con Apache Spark | 
| nginx | 1.12.1 | nginx [engine x] es un servidor HTTP y proxy inverso | 
| mxnet | 1.9.1 | Una biblioteca flexible, escalable y eficiente para el aprendizaje profundo. | 
| mariadb-server | 5.5.68\$1 | Servidor de base de datos de MariaDB. | 
| nvidia-cuda | 11.8.0 | Controladores Nvidia y conjunto de herramientas Cuda | 
| oozie-client | 5.2.1 | Cliente de línea de comando de Oozie. | 
| oozie-server | 5.2.1 | Servicio para aceptar solicitudes de flujo de trabajo de Oozie. | 
| opencv | 4.7.0 | Biblioteca de visión artificial de código abierto. | 
| phoenix-library | 5.1.3 | Las bibliotecas de Phoenix para servidor y cliente | 
| phoenix-connectors | 5.1.3 | Conectores de Apache Phoenix para Spark-3 | 
| phoenix-query-server | 6.0.0 | Un servidor ligero que proporciona acceso a JDBC, así como acceso de formato Protocol Buffers y JSON al API de Avatica  | 
| presto-coordinator | 0.284-amzn-0 | Servicio para aceptar las consultas y administrar la ejecución de consultas entre presto-workers. | 
| presto-worker | 0.284-amzn-0 | Service para ejecutar partes de una consulta. | 
| presto-client | 0.284-amzn-0 | Cliente de línea de comandos Presto que se instala en los nodos principales en espera de un clúster de HA donde el servidor Presto no se ha iniciado. | 
| trino-coordinator | 435-amzn-0 | Servicio para aceptar consultas y administrar la ejecución de consultas entre trino-workers. | 
| trino-worker | 435-amzn-0 | Service para ejecutar partes de una consulta. | 
| trino-client | 435-amzn-0 | Cliente de línea de comandos Trino que se instala en los maestros en espera de un clúster de HA donde el servidor Trino no se ha iniciado. | 
| pig-client | 0.17.0 | Cliente de línea de comando de Pig. | 
| r | 4.3.2 | Proyecto R para análisis estadístico | 
| ranger-kms-server | 2.0.0 | Sistema de administración de claves Apache Ranger | 
| spark-client | 3.5.0-amzn-1 | Clientes de línea de comando de Spark. | 
| spark-history-server | 3.5.0-amzn-1 | IU web para la visualización de eventos registrados durante la vida útil de una aplicación Spark completada. | 
| spark-on-yarn | 3.5.0-amzn-1 | Motor de ejecución en memoria para YARN. | 
| spark-yarn-slave | 3.5.0-amzn-1 | Bibliotecas de Apache Spark necesarias para esclavos de YARN. | 
| spark-rapids | 23.10.0-amzn-1 | El complemento Nvidia Spark RAPIDS que acelera Apache Spark con... GPUs | 
| sqoop-client | 1.4.7 | Cliente de línea de comando de Apache Sqoop. | 
| tensorflow | 2.11.0 | TensorFlow biblioteca de software de código abierto para computación numérica de alto rendimiento. | 
| tez-on-yarn | 0.10.2-amzn-8 | La aplicación YARN de tez y bibliotecas. | 
| tez-on-worker | 0.10.2-amzn-8 | La aplicación YARN de tez y bibliotecas para nodos de trabajo. | 
| zeppelin-server | 0.10.1 | Bloc de notas basado en web que permite el análisis de datos interactivo. | 
| zookeeper-server | 3.9.1-amzn-0 | Servicio centralizado para mantener información de configuración, nomenclatura, proporcionar sincronización distribuida y proporcionar servicios de grupo. | 
| zookeeper-client | 3.9.1-amzn-0 | ZooKeeper cliente de línea de comandos. | 

## Clasificaciones de configuración de la versión 7.1.0
<a name="emr-710-class"></a>

Las clasificaciones de configuración le permiten personalizar las aplicaciones. Suelen corresponder a un archivo XML de configuración para la aplicación como, por ejemplo, `hive-site.xml`. Para obtener más información, consulte [Configuración de aplicaciones](emr-configure-apps.md).

Las acciones de reconfiguración se producen cuando se especifica una configuración para los grupos de instancias de un clúster en ejecución. Amazon EMR solo inicia acciones de reconfiguración para las clasificaciones que se modifican. Para obtener más información, consulte [Reconfiguración de un grupo de instancias en un clúster en ejecución](emr-configure-apps-running-cluster.md).


**Clasificaciones de emr-7.1.0**  

| Clasificaciones | Description (Descripción) | Acciones de reconfiguración | 
| --- | --- | --- | 
| capacity-scheduler | Cambiar los valores en el archivo capacity-scheduler.xml de Hadoop. | Restarts the ResourceManager service. | 
| container-executor | Cambie los valores en el archivo container-executor.cfg de Hadoop YARN. | Not available. | 
| container-log4j | Cambiar los valores en el archivo container-log4j.properties de Hadoop YARN. | Not available. | 
| core-site | Cambiar los valores en el archivo core-site.xml de Hadoop. | Restarts the Hadoop HDFS services Namenode, SecondaryNamenode, Datanode, ZKFC, and Journalnode. Restarts the Hadoop YARN services ResourceManager, NodeManager, ProxyServer, and TimelineServer. Additionally restarts Hadoop KMS, Ranger KMS, HiveServer2, Hive MetaStore, Hadoop Httpfs, and MapReduce-HistoryServer. | 
| docker-conf | Cambie la configuración relacionada con el docker. | Not available. | 
| emrfs-site | Cambiar la configuración de EMRFS. | Restarts the Hadoop HDFS services Namenode, SecondaryNamenode, Datanode, ZKFC, and Journalnode. Restarts the Hadoop YARN services ResourceManager, NodeManager, ProxyServer, and TimelineServer. Additionally restarts HBaseRegionserver, HBaseMaster, HBaseThrift, HBaseRest, HiveServer2, Hive MetaStore, Hadoop Httpfs, and MapReduce-HistoryServer. | 
| flink-conf | Cambiar la configuración de flink-conf.yaml. | Restarts Flink history server. | 
| flink-log4j | Cambiar la configuración de log4j.properties de Flink. | Restarts Flink history server. | 
| flink-log4j-session | Cambie la configuración de Flink log4j-session.properties para la sesión. Kubernetes/Yarn  | Restarts Flink history server. | 
| flink-log4j-cli | Cambiar la configuración de log4j-cli.properties de Flink. | Restarts Flink history server. | 
| hadoop-env | Cambiar los valores en el entorno de Hadoop para todos los componentes de Hadoop. | Restarts the Hadoop HDFS services Namenode, SecondaryNamenode, Datanode, ZKFC, and Journalnode. Restarts the Hadoop YARN services ResourceManager, NodeManager, ProxyServer, and TimelineServer. Additionally restarts PhoenixQueryserver, HiveServer2, Hive MetaStore, and MapReduce-HistoryServer. | 
| hadoop-log4j | Cambiar los valores en el archivo log4j.properties de Hadoop. | Restarts the Hadoop HDFS services SecondaryNamenode, Datanode, and Journalnode. Restarts the Hadoop YARN services ResourceManager, NodeManager, ProxyServer, and TimelineServer. Additionally restarts Hadoop KMS, Hadoop Httpfs, and MapReduce-HistoryServer. | 
| hadoop-ssl-server | Cambiar la configuración del servidor ssl de Hadoop | Not available. | 
| hadoop-ssl-client | Cambiar la configuración del cliente ssl de Hadoop | Not available. | 
| hbase | Configuraciones seleccionadas por Amazon EMR para Apache. HBase | Custom EMR specific property. Sets emrfs-site and hbase-site configs. See those for their associated restarts. | 
| hbase-env | Cambie los valores en su entorno HBase. | Restarts the HBase services RegionServer, HBaseMaster, ThriftServer, RestServer. | 
| hbase-log4j | Cambie los valores en el archivo HBase hbase-log4j.properties. | Restarts the HBase services RegionServer, HBaseMaster, ThriftServer, RestServer. | 
| hbase-metrics | Cambie los valores en el archivo hadoop-metrics2-hbase.properties. HBase | Restarts the HBase services RegionServer, HBaseMaster, ThriftServer, RestServer. | 
| hbase-policy | Cambie los valores en HBase el archivo hbase-policy.xml. | Not available. | 
| hbase-site | Cambie los valores en HBase el archivo hbase-site.xml. | Restarts the HBase services RegionServer, HBaseMaster, ThriftServer, RestServer. Additionally restarts Phoenix QueryServer. | 
| hdfs-encryption-zones | Configurar zonas de cifrado de HDFS. | This classification should not be reconfigured. | 
| hdfs-env | Cambiar los valores en el entorno de HDFS. | Restarts Hadoop HDFS services Namenode, Datanode, and ZKFC. | 
| hdfs-site | Cambiar los valores en hdfs-site.xml de HDFS. | Restarts the Hadoop HDFS services Namenode, SecondaryNamenode, Datanode, ZKFC, and Journalnode. Additionally restarts Hadoop Httpfs. | 
| hcatalog-env | Cambie los valores en HCatalog el entorno. | Restarts Hive HCatalog Server. | 
| hcatalog-server-jndi | Cambie los valores en HCatalog jndi.properties. | Restarts Hive HCatalog Server. | 
| hcatalog-server-proto-hive-site | Cambie los valores en .xml HCatalog. proto-hive-site | Restarts Hive HCatalog Server. | 
| hcatalog-webhcat-env | Cambie los valores en el entorno HCat de la HCatalog Web. | Restarts Hive WebHCat server. | 
| hcatalog-webhcat-log4j2 | Cambie los valores en las propiedades HCatalog HCat log4j2.properties de la Web. | Restarts Hive WebHCat server. | 
| hcatalog-webhcat-site | Cambie los valores del archivo webhcat-site.xml de la HCatalog WebHCat. | Restarts Hive WebHCat server. | 
| hive | Configuración de Amazon EMR mantenida para Apache Hive. | Sets configurations to launch Hive LLAP service. | 
| hive-beeline-log4j2 | Cambiar los valores en el archivo beeline-log4j2.properties de Hive. | Not available. | 
| hive-parquet-logging | Cambiar los valores en el archivo parquet-logging.properties de Hive. | Not available. | 
| hive-env | Cambiar los valores en el entorno de Hive. | Restarts HiveServer2, HiveMetastore, and Hive HCatalog-Server. Runs Hive schemaTool CLI commands to verify hive-metastore. | 
| hive-exec-log4j2 | Cambie los valores en el archivo hive-exec-log 4j2.properties de Hive. | Not available. | 
| hive-llap-daemon-log4j2 | Cambie los valores en el archivo 4j2.properties de Hive. llap-daemon-log | Not available. | 
| hive-log4j2 | Cambiar los valores en el archivo hive-log4j2.properties de Hive. | Not available. | 
| hive-site | Cambiar los valores en el archivo hive-site.xml de Hive. | Restarts HiveServer2, HiveMetastore, and Hive HCatalog-Server. Runs Hive schemaTool CLI commands to verify hive-metastore. Also restarts Oozie and Zeppelin. | 
| hiveserver2-site | Cambiar los valores en el archivo hiveserver2-site.xml de Hive Server2. | Not available. | 
| hue-ini | Cambiar los valores en el archivo ini de Hue | Restarts Hue. Also activates Hue config override CLI commands to pick up new configurations. | 
| httpfs-env | Cambiar los valores en el entorno de HTTPFS. | Restarts Hadoop Httpfs service. | 
| httpfs-site | Cambiar los valores en el archivo httpfs-site.xml de Hadoop. | Restarts Hadoop Httpfs service. | 
| hadoop-kms-acls | Cambiar los valores en el archivo kms-acls.xml de Hadoop. | Not available. | 
| hadoop-kms-env | Cambiar los valores en el entorno de Hadoop KMS. | Restarts Hadoop-KMS service. | 
| hadoop-kms-java-home | Cambie la página de inicio de Java de KMS de Hadoop | Not available. | 
| hadoop-kms-log4j | Cambiar los valores en el archivo kms-log4j.properties de Hadoop. | Not available. | 
| hadoop-kms-site | Cambiar los valores en el archivo kms-site.xml de Hadoop. | Restarts Hadoop-KMS and Ranger-KMS service. | 
| hudi-env | Cambiar los valores en el entorno de Hudi. | Not available. | 
| hudi-defaults | Cambie los valores en el archivo hudi-defaults.conf de Hudi. | Not available. | 
| iceberg-defaults | Cambie los valores del archivo iceberg-defaults.conf de Iceberg. | Not available. | 
| delta-defaults | Cambie los valores del archivo delta-defaults.conf de Delta. | Not available. | 
| jupyter-notebook-conf | Cambiar los valores en el archivo jupyter\$1notebook\$1config.py de Jupyter Notebook. | Not available. | 
| jupyter-hub-conf | Cambie los valores en JupyterHubs el archivo jupyterhub\$1config.py. | Not available. | 
| jupyter-s3-conf | Configurar la persistencia en S3 del bloc de notas de Jupyter. | Not available. | 
| jupyter-sparkmagic-conf | Cambiar los valores en el archivo config.json de Sparkmagic. | Not available. | 
| livy-conf | Cambiar los valores en el archivo livy.conf de Livy. | Restarts Livy Server. | 
| livy-env | Cambiar los valores en el entorno de Livy. | Restarts Livy Server. | 
| livy-log4j2 | Cambiar la configuración de log4j2.properties de Livy. | Restarts Livy Server. | 
| mapred-env | Cambie los valores en el entorno de la MapReduce aplicación. | Restarts Hadoop MapReduce-HistoryServer. | 
| mapred-site | Cambie los valores en el archivo mapred-site.xml de la MapReduce aplicación. | Restarts Hadoop MapReduce-HistoryServer. | 
| oozie-env | Cambiar los valores en el entorno de Oozie. | Restarts Oozie. | 
| oozie-log4j | Cambiar los valores en el archivo oozie-log4j.properties de Oozie. | Restarts Oozie. | 
| oozie-site | Cambiar los valores en el archivo oozie-site.xml de Oozie. | Restarts Oozie. | 
| phoenix-hbase-metrics | Cambiar los valores en el archivo hadoop-metrics2-hbase.properties de Phoenix. | Not available. | 
| phoenix-hbase-site | Cambiar los valores en el archivo hbase-site.xml de Phoenix. | Not available. | 
| phoenix-log4j | Cambiar los valores en el archivo log4j.properties de Phoenix. | Restarts Phoenix-QueryServer. | 
| phoenix-metrics | Cambiar los valores en el archivo hadoop-metrics2-phoenix.properties de Phoenix. | Not available. | 
| pig-env | Cambiar los valores en el entorno de Pig. | Not available. | 
| pig-properties | Cambiar los valores en el archivo pig.properties de Pig. | Restarts Oozie. | 
| pig-log4j | Cambiar los valores en el archivo log4j.properties de Pig. | Not available. | 
| presto-log | Cambiar los valores en el archivo log.properties de Presto. | Restarts Presto-Server (for PrestoDB) | 
| presto-config | Cambiar los valores en el archivo config.properties de Presto. | Restarts Presto-Server (for PrestoDB) | 
| presto-password-authenticator | Cambiar los valores en el archivo password-authenticator.properties de Presto. | Not available. | 
| presto-env | Cambiar valores en el archivo presto-env.sh de Presto. | Restarts Presto-Server (for PrestoDB) | 
| presto-node | Cambiar valores en el archivo node.properties de Presto. | Not available. | 
| presto-connector-blackhole | Cambiar los valores en el archivo blackhole.properties de Presto. | Not available. | 
| presto-connector-cassandra | Cambiar los valores en el archivo cassandra.properties de Presto. | Not available. | 
| presto-connector-hive | Cambiar los valores en el archivo hive.properties de Presto. | Restarts Presto-Server (for PrestoDB) | 
| presto-connector-jmx | Cambiar los valores en el archivo jmx.properties de Presto. | Not available. | 
| presto-connector-kafka | Cambiar los valores en el archivo kafka.properties de Presto. | Not available. | 
| presto-connector-lakeformation | Cambiar los valores en el archivo lakeformation.properties de Presto. | Restarts Presto-Server (for PrestoDB) | 
| presto-connector-localfile | Cambiar los valores en el archivo localfile.properties de Presto. | Not available. | 
| presto-connector-memory | Cambiar los valores del archivo memory.properties de Presto. | Not available. | 
| presto-connector-mongodb | Cambiar los valores en el archivo mongodb.properties de Presto. | Not available. | 
| presto-connector-mysql | Cambiar los valores en el archivo mysql.properties de Presto. | Not available. | 
| presto-connector-postgresql | Cambiar los valores en el archivo postgresql.properties de Presto. | Not available. | 
| presto-connector-raptor | Cambiar los valores en el archivo raptor.properties de Presto. | Not available. | 
| presto-connector-redis | Cambiar los valores en el archivo redis.properties de Presto. | Not available. | 
| presto-connector-redshift | Cambiar los valores en el archivo redshift.properties de Presto. | Not available. | 
| presto-connector-tpch | Cambiar los valores en el archivo tpch.properties de Presto. | Not available. | 
| presto-connector-tpcds | Cambiar los valores del archivo tpcds.properties de Presto. | Not available. | 
| trino-log | Cambiar los valores en el archivo log.properties de Trino. | Restarts Trino-Server (for Trino) | 
| trino-config | Cambiar los valores en el archivo config.properties de Trino. | Restarts Trino-Server (for Trino) | 
| trino-password-authenticator | Cambiar los valores en el archivo password-authenticator.properties de Trino. | Restarts Trino-Server (for Trino) | 
| trino-env | Cambie los valores del archivo trino-env.sh de Trino. | Restarts Trino-Server (for Trino) | 
| trino-node | Cambiar los valores en el archivo node.properties de Trino. | Not available. | 
| trino-connector-blackhole | Cambiar los valores en el archivo blackhole.properties de Trino. | Not available. | 
| trino-connector-cassandra | Cambiar los valores en el archivo cassandra.properties de Trino. | Not available. | 
| trino-connector-delta | Cambie los valores del archivo delta.properties de Trino. | Restarts Trino-Server (for Trino) | 
| trino-connector-hive | Cambiar los valores en el archivo hive.properties de Trino. | Restarts Trino-Server (for Trino) | 
| trino-exchange-manager | Cambie los valores del archivo exchange-manager.properties de Trino. | Restarts Trino-Server (for Trino) | 
| trino-connector-iceberg | Cambiar los valores en el archivo iceberg.properties de Trino. | Restarts Trino-Server (for Trino) | 
| trino-connector-hudi | Cambiar los valores en el archivo hudi.properties de Trino. | Restarts Trino-Server (for Trino) | 
| trino-connector-jmx | Cambiar los valores en el archivo jmx.properties de Trino. | Not available. | 
| trino-connector-kafka | Cambiar los valores en el archivo kafka.properties de Trino. | Not available. | 
| trino-connector-localfile | Cambiar los valores en el archivo localfile.properties de Trino. | Not available. | 
| trino-connector-memory | Cambiar los valores en el archivo memory.properties de Trino. | Not available. | 
| trino-connector-mongodb | Cambiar los valores en el archivo mongodb.properties de Trino. | Not available. | 
| trino-connector-mysql | Cambiar los valores en el archivo mysql.properties de Trino. | Not available. | 
| trino-connector-postgresql | Cambiar los valores en el archivo postgresql.properties de Trino. | Not available. | 
| trino-connector-raptor | Cambiar los valores en el archivo raptor.properties de Trino. | Not available. | 
| trino-connector-redis | Cambiar los valores en el archivo redis.properties de Trino. | Not available. | 
| trino-connector-redshift | Cambiar los valores en el archivo redshift.properties de Trino. | Not available. | 
| trino-connector-tpch | Cambiar los valores en el archivo tpch.properties de Trino. | Not available. | 
| trino-connector-tpcds | Cambiar los valores en el archivo tpcds.properties de Trino. | Not available. | 
| ranger-kms-dbks-site | Cambie los valores del archivo dbks-site.xml de Ranger KMS. | Restarts Ranger KMS Server. | 
| ranger-kms-site | Cambie los valores en el ranger-kms-site archivo.xml de Ranger KMS. | Restarts Ranger KMS Server. | 
| ranger-kms-env | Cambie los valores del entorno Ranger KMS. | Restarts Ranger KMS Server. | 
| ranger-kms-logback | Cambie los valores del archivo kms-logback.xml de Ranger KMS. | Not available. | 
| ranger-kms-db-ca | Cambie los valores del archivo CA en S3 para la conexión SSL de MySQL con Ranger KMS. | Not available. | 
| spark | Configuración de Amazon EMR mantenida para Apache Spark. | This property modifies spark-defaults. See actions there. | 
| spark-defaults | Cambiar los valores en el archivo spark-defaults.conf de Spark. | Restarts Spark history server and Spark thrift server. | 
| spark-env | Cambiar los valores en el entorno de Spark. | Restarts Spark history server and Spark thrift server. | 
| spark-hive-site | Cambiar los valores en el archivo hive-site.xml de Spark. | Not available. | 
| spark-log4j2 | Cambiar los valores en el archivo log4j2.properties de Spark. | Restarts Spark history server and Spark thrift server. | 
| spark-metrics | Cambiar los valores en el archivo metrics.properties de Spark. | Restarts Spark history server and Spark thrift server. | 
| sqoop-env | Cambiar los valores en el entorno de Sqoop. | Not available. | 
| sqoop-oraoop-site | Cambie los valores en el archivo oraoop-site.xml de Sqoop. OraOop | Not available. | 
| sqoop-site | Cambiar los valores en el archivo sqoop-site.xml de Sqoop. | Not available. | 
| tez-site | Cambiar los valores en el archivo tez-site.xml de Tez. | Restart Oozie and HiveServer2. | 
| yarn-env | Cambiar los valores en el entorno de YARN. | Restarts the Hadoop YARN services ResourceManager, NodeManager, ProxyServer, and TimelineServer. Additionally restarts MapReduce-HistoryServer. | 
| yarn-site | Cambiar los valores en el archivo yarn-site.xml de YARN. | Restarts the Hadoop YARN services ResourceManager, NodeManager, ProxyServer, and TimelineServer. Additionally restarts Livy Server and MapReduce-HistoryServer. | 
| zeppelin-env | Cambiar los valores en el entorno de Zeppelin. | Restarts Zeppelin. | 
| zeppelin-site | Cambie los ajustes de configuración de zeppelin-site.xml. | Restarts Zeppelin. | 
| zookeeper-config | Cambie los valores en el ZooKeeper archivo zoo.cfg. | Restarts Zookeeper server. | 
| zookeeper-logback | Cambie los valores en ZooKeeper el archivo logback.xml. | Restarts Zookeeper server. | 
| emr-metrics | Cambie la configuración de la métrica EMR para este nodo. | Restarts the CloudWatchAgent service. | 

## Registro de cambios de la versión 7.1.0
<a name="710-changelog"></a>


**Registro de cambios de la versión 7.1.0 y notas de la versión**  

| Date | Event | Description (Descripción) | 
| --- | --- | --- | 
| 2025-09-03 | Revisión de documentos | Las notas de la versión 7.1.0 de Amazon EMR agregaron un problema conocido | 
| 2024-05-10 | Publicación de documentos | Primera publicación de las notas de la versión 7.1.0 de Amazon EMR | 
| 2024-05-10 | Publicación de documentos | Primera publicación de las notas de la versión 7.1.0 de Amazon EMR | 
| 2024-05-08 | Implementación completa | Amazon EMR 7.1.0 se ha implementado completamente en todas las [regiones compatibles](https://aws.amazon.com/about-aws/global-infrastructure/regional-product-services/) | 
| 2024-04-23 | Versión inicial | Implementación inicial de Amazon EMR 7.1.0 en regiones comerciales limitadas | 

# Amazon EMR, versión 7.0.0
<a name="emr-700-release"></a>

## Versiones de las aplicaciones de la versión 7.0.0
<a name="emr-700-app-versions"></a>

Esta versión incluye las siguientes aplicaciones: [https://docs.aws.amazon.com/AmazonCloudWatch/latest/monitoring/Install-CloudWatch-Agent.html](https://docs.aws.amazon.com/AmazonCloudWatch/latest/monitoring/Install-CloudWatch-Agent.html), [https://delta.io/](https://delta.io/), [https://flink.apache.org/](https://flink.apache.org/), [http://hbase.apache.org/](http://hbase.apache.org/), [https://cwiki.apache.org/confluence/display/Hive/HCatalog](https://cwiki.apache.org/confluence/display/Hive/HCatalog), [http://hadoop.apache.org/docs/current/](http://hadoop.apache.org/docs/current/), [http://hive.apache.org/](http://hive.apache.org/), [https://hudi.apache.org](https://hudi.apache.org), [http://gethue.com/](http://gethue.com/), [https://iceberg.apache.org/](https://iceberg.apache.org/), [https://jupyter-enterprise-gateway.readthedocs.io/en/latest/](https://jupyter-enterprise-gateway.readthedocs.io/en/latest/), [https://jupyterhub.readthedocs.io/en/latest/#](https://jupyterhub.readthedocs.io/en/latest/#), [https://livy.incubator.apache.org/](https://livy.incubator.apache.org/), [https://mxnet.incubator.apache.org/](https://mxnet.incubator.apache.org/), [http://oozie.apache.org/](http://oozie.apache.org/), [https://phoenix.apache.org/](https://phoenix.apache.org/), [http://pig.apache.org/](http://pig.apache.org/), [https://prestodb.io/](https://prestodb.io/), [https://spark.apache.org/docs/latest/](https://spark.apache.org/docs/latest/), [http://sqoop.apache.org/](http://sqoop.apache.org/), [https://www.tensorflow.org/](https://www.tensorflow.org/), [https://tez.apache.org/](https://tez.apache.org/), [https://trino.io/](https://trino.io/), [https://zeppelin.incubator.apache.org/](https://zeppelin.incubator.apache.org/) y [https://zookeeper.apache.org](https://zookeeper.apache.org).

En la siguiente tabla se enumeran las versiones de la aplicación disponibles en esta versión de Amazon EMR y las versiones de la aplicación en las tres versiones anteriores de Amazon EMR (cuando corresponda).

Para ver un historial completo de las versiones de la aplicación disponibles para cada versión de Amazon EMR, consulte los temas siguientes:
+ [Versiones de las aplicaciones en las versiones 7.x de Amazon EMR](emr-release-app-versions-7.x.md)
+ [Versiones de la aplicación en las versiones 6.x de Amazon EMR](emr-release-app-versions-6.x.md)
+ [Versiones de la aplicación en las versiones 5.x de Amazon EMR](emr-release-app-versions-5.x.md)
+ [Versiones de la aplicación en las versiones 4.x de Amazon EMR](emr-release-app-versions-4.x.md)


**Información sobre la versión de la aplicación**  

|  | emr-7.3.0 | emr-7.2.0 | emr-7.1.0 | emr-7.0.0 | 
| --- | --- | --- | --- | --- | 
| AWS SDK for Java | 2.25.70, 1.12.747 | 2.23.18, 1.12.705 | 2.23.18, 1.12.656 | 2.20.160-amzn-0, 1.12.569 | 
| Python | 3.9, 3.11 | 3.9, 3.11 | 3.9, 3.11 | 3.9 | 
| Scala | 2.12.18 | 2.12.17 | 2.12.17 | 2.12.17 | 
| AmazonCloudWatchAgent | 1.300032.2-amzn-0 | 1.300032.2-amzn-0 | 1.300032.2-amzn-0 | 1.300031.1-amzn-0 | 
| Delta | 3.2.0-amzn-0 | 3.1.0 | 3.0.0 | 3.0.0 | 
| Flink | 1.18.1-amzn-2 | 1.18.1-amzn-1 | 1.18.1-amzn-0 | 1.18.0-amzn-0 | 
| Ganglia |  -  |  -  |  -  |  -  | 
| HBase | 2.4.17-amzn-7 | 2.4.17-amzn-6 | 2.4.17-amzn-5 | 2.4.17-amzn-4 | 
| HCatalog | 3.1.3-amzn-12 | 3.1.3-amzn-11 | 3.1.3-amzn-10 | 3.1.3-amzn-9 | 
| Hadoop | 3.3.6-amzn-5 | 3.3.6-amzn-4 | 3.3.6-amzn-3 | 3.3.6-amzn-2 | 
| Hive | 3.1.3-amzn-12 | 3.1.3-amzn-11 | 3.1.3-amzn-10 | 3.1.3-amzn-9 | 
| Hudi | 0.15.0-amzn-0 | 0.14.1-amzn-1 | 0.14.1-amzn-0 | 0.14.0-amzn-1 | 
| Hue | 4.11.0 | 4.11.0 | 4.11.0 | 4.11.0 | 
| Iceberg | 1.5.2-amzn-0 | 1.5.0-amzn-0 | 1.4.3-amzn-0 | 1.4.2-amzn-0 | 
| JupyterEnterpriseGateway | 2.6.0 | 2.6.0 | 2.6.0 | 2.6.0 | 
| JupyterHub | 1.5.0 | 1.5.0 | 1.5.0 | 1.5.0 | 
| Livy | 0.8.0-incubating | 0.8.0-incubating | 0.8.0-incubating | 0.7.1-incubating | 
| MXNet |  -  | 1.9.1 | 1.9.1 | 1.9.1 | 
| Mahout |  -  |  -  |  -  |  -  | 
| Oozie | 5.2.1 | 5.2.1 | 5.2.1 | 5.2.1 | 
| Phoenix | 5.1.3 | 5.1.3 | 5.1.3 | 5.1.3 | 
| Pig | 0.17.0 | 0.17.0 | 0.17.0 | 0.17.0 | 
| Presto | 0.285-amzn-1 | 0.285-amzn-0 | 0.284-amzn-0 | 0.283-amzn-1 | 
| Spark | 3.5.1-amzn-1 | 3.5.1-amzn-0 | 3.5.0-amzn-1 | 3.5.0-amzn-0 | 
| Sqoop | 1.4.7 | 1.4.7 | 1.4.7 | 1.4.7 | 
| TensorFlow | 2.16.1 | 2.11.0 | 2.11.0 | 2.11.0 | 
| Tez | 0.10.2-amzn-10 | 0.10.2-amzn-9 | 0.10.2-amzn-8 | 0.10.2-amzn-7 | 
| Trino (PrestoSQL) | 442-amzn-0 | 436-amzn-0 | 435-amzn-0 | 426-amzn-1 | 
| Zeppelin | 0.11.1 | 0.10.1 | 0.10.1 | 0.10.1 | 
| ZooKeeper | 3.9.1-amzn-1 | 3.9.1-amzn-1 | 3.9.1-amzn-0 | 3.5.10 | 

## Notas de la versión 7.0.0
<a name="emr-700-relnotes"></a>

Las siguientes notas de la versión incluyen información sobre la versión 7.0.0 de Amazon EMR. Los cambios son respecto a la versión 6.15.0.

**Nuevas características**
+ **Actualizaciones de la aplicación**: Amazon EMR 7.0.0 application upgrades include Python 3.9, Spark 3.5, Flink 1.18, and Delta 3.0. Esta versión también agrega soporte para la aplicación [CloudWatch Agente de Amazon](emr-AmazonCloudWatchAgent.md) y elimina el soporte para Ganglia.
+ **Amazon Corretto 17**: las versiones 7.0 y posteriores de Amazon EMR vienen con Amazon Corretto 17 (basado en OpenJDK) de forma predeterminada para las aplicaciones compatibles con Corretto 17 (JDK 17), con la excepción de Apache Livy. Para obtener más información acerca de las versiones del JDK compatibles con las aplicaciones de esta versión, consulte [Versiones predeterminadas de Java para la versión 7.0.0](#emr-700-jdk).
+ **Amazon Linux 2023**: con la versión 7.0, los clústeres de Amazon EMR ahora se ejecutan de forma predeterminada AL2023 . Para obtener información sobre cómo afecta esto a la versión de la AMI predeterminada, consulte [Consideraciones sobre la actualización de software](https://docs.aws.amazon.com/emr/latest/ManagementGuide/emr-default-ami.html#emr-default-ami-managing) en la *Guía de administración de Amazon EMR.* Tenga en cuenta también que AL2023 se eliminó Python 2.7, por lo que cualquier componente que requiera Python ahora debería escribirse con Python 3.
+ **S3 en Outposts con `s3a`**: Amazon EMR ahora es compatible con los buckets de Amazon S3 en Outposts con el sistema de archivos `s3a`. Para obtener más información acerca de S3 en Outposts, consulte [¿Qué es S3 en Outposts?](https://docs.aws.amazon.com/AmazonS3/latest/userguide/S3onOutposts.html) en la *Guía del usuario de Amazon Simple Storage Service*.

**Problemas conocidos**
+ Tenga en cuenta que no puede ejecutar más de una línea a la vez si utiliza Python PySpark con la versión 3.10 o posterior. Debe ejecutar cada línea de una en una.
+ Un script de estado de instancia integrado en el clúster que monitorea el estado de la instancia puede consumir demasiados recursos de CPU y memoria cuando hay un gran número de subprocesos and/or abiertos (identificadores de archivos) en el nodo.

**Cambios, mejoras y problemas resueltos**
+  A partir de Spark 3.3.1 (compatible con las versiones 6.10 y posteriores de EMR), todos los ejecutores de un host de desmantelamiento pasan a un nuevo `ExecutorState`, denominado estado de *RETIRADA*. Yarn no puede utilizar los ejecutores que se están retirando para asignar tareas y, por lo tanto, solicitará nuevos ejecutores, si es necesario, para las tareas que se están ejecutando. Por lo tanto, si deshabilita Spark DRA mientras usa EMR Managed Scaling, EMR Auto Scaling o cualquier mecanismo de escalado personalizado en los clústeres de EMR-EC2, Yarn puede solicitar el máximo de ejecutores permitidos para cada trabajo. Para evitar este problema, deje la propiedad `spark.dynamicAllocation.enabled` establecida en `TRUE` (que es la predeterminada) cuando utilice la combinación de características anterior. Además, también puede establecer restricciones de ejecutor mínimas y máximas configurando los valores para las propiedades `spark.dynamicAllocation.maxExecutors` y `spark.dynamicAllocation.minExecutors` para sus trabajos de Spark, a fin de restringir el número de ejecutores asignados durante la ejecución del trabajo. 
+ Para mantener el estado de todas las instancias de un clúster, Amazon EMR se integra con Apache YARN, Apache HDFS y Kerberos. Con la versión 7.0, mejoramos estas integraciones para eliminar de forma fiable el estado de las instancias que se terminan debido al escalado o a otras operaciones. Esto es especialmente importante en el caso de los clústeres de larga duración que tienen habilitado el escalado administrado, ya que se escalan con frecuencia y acumulan miles de instancias terminadas a lo largo de su vida útil.
+ Esta versión mejora la configuración de Kerberos para incluir únicamente la compatibilidad con cifrados basados en AES. Los clústeres de EMR que se ejecutan en las versiones 7.0.0 y posteriores de Amazon EMR ya no admiten el KDC de Kerberos con cifrados que no estén basados en AES. Los cifrados basados en AES ofrecen la máxima seguridad para sus clústeres.
+ Como parte de la migración del AWS SDK 2.x, Amazon EMR 7.0 incluye una actualización del conector Spark Kinesis por motivos de compatibilidad. Esta actualización no está disponible en la versión comunitaria de Apache Spark. Si utiliza el conector de Spark Kinesis de una versión de Amazon EMR anterior a la 7.0, debe migrar los códigos de sus aplicaciones para que se ejecuten en el SDK 2.x antes de poder migrar sus cargas de trabajo a Amazon EMR 7.0. Para obtener más información, consulte [Migración del conector de Spark Kinesis al SDK 2.x para Amazon EMR 7.0](migrating-spark-kinesis.md).
+ El componente `aws-sagemaker-spark-sdk` no está disponible a partir de Amazon EMR 7.x.
+ Al lanzar un clúster con *la versión de parche más reciente* de Amazon EMR 5.36, 6.6 o 7.0 o sus respectivas versiones posteriores, Amazon EMR utiliza la versión más reciente de Amazon Linux 2023 o Amazon Linux 2 para la AMI de Amazon EMR predeterminada. Para más información, consulte [Uso de la AMI de Amazon Linux predeterminada para Amazon EMR](https://docs.aws.amazon.com/emr/latest/ManagementGuide/emr-default-ami.html).    
[\[See the AWS documentation website for more details\]](http://docs.aws.amazon.com/es_es/emr/latest/ReleaseGuide/emr-700-release.html)

## Versiones predeterminadas de Java para la versión 7.0.0
<a name="emr-700-jdk"></a>

Las versiones 7.0 y posteriores de Amazon EMR vienen con Amazon Corretto 17 (basado en OpenJDK) de forma predeterminada para las aplicaciones compatibles con Corretto 17 (JDK 17), con la excepción de Apache Livy.

En la siguiente tabla, se muestran las versiones predeterminadas de Java para las aplicaciones en Amazon EMR 7.0.0. Si desea cambiar la JVM predeterminada del clúster, siga las instrucciones de [Configuración de aplicaciones para utilizar una máquina virtual de Java específica](configuring-java8.md) para cada aplicación que se ejecute en el clúster. Solo se puede usar una versión de tiempo de ejecución de Java en un clúster. Amazon EMR no admite la ejecución de distintos nodos o aplicaciones en distintas versiones de tiempo de ejecución en el mismo clúster.


| Aplicación | Versión de Java o Amazon Corretto (el valor predeterminado está en negrita) | 
| --- | --- | 
| Delta | 17, 11, 8 | 
| Flink | 11, 8 | 
| HBase | 11, 8 | 
| HCatalog | 17, 11, 8 | 
| Hadoop | 17, 11, 8 | 
| Hive | 17, 11, 8 | 
| Hudi | 17, 11, 8 | 
| Iceberg | 17, 11, 8 | 
| Livy | 17, 11, 8 | 
| Oozie | 17, 11, 8 | 
| Phoenix | 8 | 
| PrestoDB | 8 | 
| Spark | 17, 11, 8 | 
| Spark RAPIDS | 17, 11, 8 | 
| Sqoop | 8 | 
| Tez | 17, 11, 8 | 
| Trino | 17 | 
| Zeppelin | 8 | 
| Pig | 8 | 
| ZooKeeper | 8 | 

## Versiones de los componentes de la versión 7.0.0
<a name="emr-700-components"></a>

A continuación, se muestran los componentes que Amazon EMR instala con esta versión. Algunos se instalan como parte de paquetes de aplicación de macrodatos. Otros son exclusivos de Amazon EMR y se instalan para ciertos procesos y características del sistema. Normalmente, estos componentes comienzan con `emr` o `aws`. Normalmente, los paquetes de aplicación de macrodatos de la versión más reciente de Amazon EMR son las versiones más recientes que pueden encontrarse en la comunidad. Intentamos que las versiones de la comunidad estén disponibles en Amazon EMR lo más rápido posible.

Algunos componentes de Amazon EMR son distintos de las versiones que se encuentran en la comunidad. Estos componentes tienen una etiqueta de versión con el formato `CommunityVersion-amzn-EmrVersion`. La `EmrVersion` empieza por 0. Por ejemplo, si un componente de la comunidad de código abierto llamado `myapp-component` con la versión 2.2 se ha modificado tres veces para incluirlo en diferentes versiones de lanzamiento de Amazon EMR, la versión que se mostrará será `2.2-amzn-2`.


| Componente | Versión | Description (Descripción) | 
| --- | --- | --- | 
| adot-java-agent | 1,31,0 | Un agente Java que recopila métricas de los daemons de las aplicaciones. | 
| delta | 3.0.0 | Delta Lake es un formato de tabla abierto para conjuntos de datos analíticos de gran tamaño | 
| delta-standalone-connectors | 0.6.0 | Los conectores de Delta ofrecen diferentes tiempos de ejecución para integrar Delta Lake con motores como Flink, Hive y Presto. | 
| emr-amazon-cloudwatch-agent | 1.300031.1-amzn-0 | Se trata de una aplicación que recopila métricas internas de nivel de sistema y métricas de aplicación personalizadas de las instancias de Amazon EC2. | 
| emr-ddb | 5.2.0 | Conector de Amazon DynamoDB para aplicaciones del ecosistema de Hadoop. | 
| emr-goodies | 3.9.0 | Bibliotecas especialmente prácticas para el ecosistema de Hadoop. | 
| emr-kinesis | 3.13.0 | Conector de Amazon Kinesis para aplicaciones del ecosistema de Hadoop. | 
| emr-notebook-env | 1.7.0 | Entorno de Conda para cuaderno de EMR que incluye una puerta de enlace empresarial de Jupyter | 
| emr-s3-dist-cp | 2.30.0 | Aplicación de copia distribuida optimizada para Amazon S3. | 
| emr-s3-select | 2.9.0 | Conector S3Select de EMR | 
| emr-wal-cli | 1.2.1 | CLI utilizada para eliminar o enumerar WAL de ERM. | 
| emrfs | 2.61.0 | Conector de Amazon S3 para aplicaciones del ecosistema de Hadoop. | 
| flink-client | 1.18.0-amzn-0 | Scripts y aplicaciones de cliente de línea de comando de Apache Flink. | 
| flink-jobmanager-config | 1.18.0-amzn-0 | Administración de recursos en nodos EMR para Apache Flink. JobManager | 
| hadoop-client | 3.3.6-amzn-2 | Los clientes de línea de comando de Hadoop como, por ejemplo "hdfs", "hadoop" o "yarn". | 
| hadoop-hdfs-datanode | 3.3.6-amzn-2 | Servicio de nivel de nodos de HDFS para el almacenamiento de bloques. | 
| hadoop-hdfs-library | 3.3.6-amzn-2 | Biblioteca y cliente de línea de comandos HDFS | 
| hadoop-hdfs-namenode | 3.3.6-amzn-2 | Servicio de HDFS para realizar un seguimiento de nombres de archivo y bloquear ubicaciones. | 
| hadoop-hdfs-journalnode | 3.3.6-amzn-2 | Servicio de HDFS para administrar los archivos de Hadoop periódico en clústeres de alta disponibilidad. | 
| hadoop-httpfs-server | 3.3.6-amzn-2 | Punto de enlace HTTP para operaciones HDFS. | 
| hadoop-kms-server | 3.3.6-amzn-2 | Servidor de administración de claves criptográficas basado en la API de Hadoop. KeyProvider  | 
| hadoop-mapred | 3.3.6-amzn-2 | MapReduce bibliotecas de motores de ejecución para ejecutar una aplicación. MapReduce  | 
| hadoop-yarn-nodemanager | 3.3.6-amzn-2 | Servicio de YARN para la administración de contenedores en un nodo individual. | 
| hadoop-yarn-resourcemanager | 3.3.6-amzn-2 | Servicio de YARN para la asignación y administración de recursos de clúster y aplicaciones distribuidas. | 
| hadoop-yarn-timeline-server | 3.3.6-amzn-2 | Servicio para recuperar información actual e histórica para aplicaciones de YARN. | 
| hbase-hmaster | 2.4.17-amzn-4 | Servicio para un HBase clúster responsable de la coordinación de las regiones y la ejecución de los comandos administrativos. | 
| hbase-region-server | 2.4.17-amzn-4 | Servicio para prestar servicio a una o más HBase regiones. | 
| hbase-client | 2.4.17-amzn-4 | HBase cliente de línea de comandos. | 
| hbase-rest-server | 2.4.17-amzn-4 | Servicio que proporciona un punto final RESTful HTTP para. HBase | 
| hbase-thrift-server | 2.4.17-amzn-4 | Servicio que proporciona un punto final de Thrift para HBase. | 
| hbase-operator-tools | 2.4.17-amzn-4 | Herramienta de reparación para HBase clústeres de Apache. | 
| hcatalog-client | 3.1.3-amzn-9 | El cliente de línea de comando "hcat" para manipular hcatalog-server. | 
| hcatalog-server | 3.1.3-amzn-9 | Prestación de servicios HCatalog, una capa de administración de tablas y almacenamiento para aplicaciones distribuidas. | 
| hcatalog-webhcat-server | 3.1.3-amzn-9 | Punto final HTTP que proporciona una interfaz REST para HCatalog. | 
| hive-client | 3.1.3-amzn-9 | Cliente de línea de comando de Hive. | 
| hive-hbase | 3.1.3-amzn-9 | Hive-hbase client. | 
| hive-metastore-server | 3.1.3-amzn-9 | Service para acceder al metaalmacén de Hive, un repositorio semántico que almacena metadatos para SQL en operaciones de Hadoop. | 
| hive-server2 | 3.1.3-amzn-9 | Servicio para aceptar consultas de Hive como solicitudes web. | 
| hudi | 0.14.0-amzn-1 | Marco de procesamiento incremental para impulsar la canalización de datos a baja latencia y alta eficiencia. | 
| hudi-presto | 0.14.0-amzn-1 | Biblioteca de paquetes para ejecutar Presto con Hudi. | 
| hudi-trino | 0.14.0-amzn-1 | Biblioteca de paquetes para ejecutar Trino con Hudi. | 
| hudi-spark | 0.14.0-amzn-1 | Biblioteca de paquetes para ejecutar Spark con Hudi. | 
| hue-server | 4.11.0 | Aplicación web para analizar datos con aplicaciones del ecosistema de Hadoop | 
| iceberg | 1.4.2-amzn-0 | Apache Iceberg es un formato de tabla abierto para conjuntos de datos analíticos muy grandes | 
| jupyterhub | 1.5.0 | Servidor multiusuario para blocs de notas Jupyter | 
| livy-server | 0.7.1-incubating | Interfaz de REST para interactuar con Apache Spark | 
| nginx | 1.12.1 | nginx [engine x] es un servidor HTTP y proxy inverso | 
| mxnet | 1.9.1 | Una biblioteca flexible, escalable y eficiente para el aprendizaje profundo. | 
| mariadb-server | 5.5.68\$1 | Servidor de base de datos de MariaDB. | 
| nvidia-cuda | 11.8.0 | Controladores Nvidia y conjunto de herramientas Cuda | 
| oozie-client | 5.2.1 | Cliente de línea de comando de Oozie. | 
| oozie-server | 5.2.1 | Servicio para aceptar solicitudes de flujo de trabajo de Oozie. | 
| opencv | 4.7.0 | Biblioteca de visión artificial de código abierto. | 
| phoenix-library | 5.1.3 | Las bibliotecas de Phoenix para servidor y cliente | 
| phoenix-connectors | 5.1.3 | Conectores de Apache Phoenix para Spark-3 | 
| phoenix-query-server | 6.0.0 | Un servidor ligero que proporciona acceso a JDBC, así como acceso de formato Protocol Buffers y JSON al API de Avatica  | 
| presto-coordinator | 0.283-amzn-1 | Servicio para aceptar las consultas y administrar la ejecución de consultas entre presto-workers. | 
| presto-worker | 0.283-amzn-1 | Service para ejecutar partes de una consulta. | 
| presto-client | 0.283-amzn-1 | Cliente de línea de comandos Presto que se instala en los nodos principales en espera de un clúster de HA donde el servidor Presto no se ha iniciado. | 
| trino-coordinator | 426-amzn-1 | Servicio para aceptar consultas y administrar la ejecución de consultas entre trino-workers. | 
| trino-worker | 426-amzn-1 | Service para ejecutar partes de una consulta. | 
| trino-client | 426-amzn-1 | Cliente de línea de comandos Trino que se instala en los maestros en espera de un clúster de HA donde el servidor Trino no se ha iniciado. | 
| pig-client | 0.17.0 | Cliente de línea de comando de Pig. | 
| r | 4.3.2 | Proyecto R para análisis estadístico | 
| ranger-kms-server | 2.0.0 | Sistema de administración de claves Apache Ranger | 
| spark-client | 3.5.0-amzn-0 | Clientes de línea de comando de Spark. | 
| spark-history-server | 3.5.0-amzn-0 | IU web para la visualización de eventos registrados durante la vida útil de una aplicación Spark completada. | 
| spark-on-yarn | 3.5.0-amzn-0 | Motor de ejecución en memoria para YARN. | 
| spark-yarn-slave | 3.5.0-amzn-0 | Bibliotecas de Apache Spark necesarias para esclavos de YARN. | 
| spark-rapids | 23.10.0-amzn-0 | El complemento Nvidia Spark RAPIDS que acelera Apache Spark con... GPUs | 
| sqoop-client | 1.4.7 | Cliente de línea de comando de Apache Sqoop. | 
| tensorflow | 2.11.0 | TensorFlow biblioteca de software de código abierto para computación numérica de alto rendimiento. | 
| tez-on-yarn | 0.10.2-amzn-7 | La aplicación YARN de tez y bibliotecas. | 
| tez-on-worker | 0.10.2-amzn-7 | La aplicación YARN de tez y bibliotecas para nodos de trabajo. | 
| webserver | 2.4.58 | Servidor HTTP de Apache. | 
| zeppelin-server | 0.10.1 | Bloc de notas basado en web que permite el análisis de datos interactivo. | 
| zookeeper-server | 3.5.10 | Servicio centralizado para mantener información de configuración, nomenclatura, proporcionar sincronización distribuida y proporcionar servicios de grupo. | 
| zookeeper-client | 3.5.10 | ZooKeeper cliente de línea de comandos. | 

## Clasificaciones de configuración de la versión 7.0.0
<a name="emr-700-class"></a>

Las clasificaciones de configuración le permiten personalizar las aplicaciones. Suelen corresponder a un archivo XML de configuración para la aplicación como, por ejemplo, `hive-site.xml`. Para obtener más información, consulte [Configuración de aplicaciones](emr-configure-apps.md).

Las acciones de reconfiguración se producen cuando se especifica una configuración para los grupos de instancias de un clúster en ejecución. Amazon EMR solo inicia acciones de reconfiguración para las clasificaciones que se modifican. Para obtener más información, consulte [Reconfiguración de un grupo de instancias en un clúster en ejecución](emr-configure-apps-running-cluster.md).


**Clasificaciones de emr-7.0.0**  

| Clasificaciones | Description (Descripción) | Acciones de reconfiguración | 
| --- | --- | --- | 
| capacity-scheduler | Cambiar los valores en el archivo capacity-scheduler.xml de Hadoop. | Restarts the ResourceManager service. | 
| container-executor | Cambie los valores en el archivo container-executor.cfg de Hadoop YARN. | Not available. | 
| container-log4j | Cambiar los valores en el archivo container-log4j.properties de Hadoop YARN. | Not available. | 
| core-site | Cambiar los valores en el archivo core-site.xml de Hadoop. | Restarts the Hadoop HDFS services Namenode, SecondaryNamenode, Datanode, ZKFC, and Journalnode. Restarts the Hadoop YARN services ResourceManager, NodeManager, ProxyServer, and TimelineServer. Additionally restarts Hadoop KMS, Ranger KMS, HiveServer2, Hive MetaStore, Hadoop Httpfs, and MapReduce-HistoryServer. | 
| docker-conf | Cambie la configuración relacionada con el docker. | Not available. | 
| emrfs-site | Cambiar la configuración de EMRFS. | Restarts the Hadoop HDFS services Namenode, SecondaryNamenode, Datanode, ZKFC, and Journalnode. Restarts the Hadoop YARN services ResourceManager, NodeManager, ProxyServer, and TimelineServer. Additionally restarts HBaseRegionserver, HBaseMaster, HBaseThrift, HBaseRest, HiveServer2, Hive MetaStore, Hadoop Httpfs, and MapReduce-HistoryServer. | 
| flink-conf | Cambiar la configuración de flink-conf.yaml. | Restarts Flink history server. | 
| flink-log4j | Cambiar la configuración de log4j.properties de Flink. | Restarts Flink history server. | 
| flink-log4j-session | Cambie la configuración de Flink log4j-session.properties para la sesión. Kubernetes/Yarn  | Restarts Flink history server. | 
| flink-log4j-cli | Cambiar la configuración de log4j-cli.properties de Flink. | Restarts Flink history server. | 
| hadoop-env | Cambiar los valores en el entorno de Hadoop para todos los componentes de Hadoop. | Restarts the Hadoop HDFS services Namenode, SecondaryNamenode, Datanode, ZKFC, and Journalnode. Restarts the Hadoop YARN services ResourceManager, NodeManager, ProxyServer, and TimelineServer. Additionally restarts PhoenixQueryserver, HiveServer2, Hive MetaStore, and MapReduce-HistoryServer. | 
| hadoop-log4j | Cambiar los valores en el archivo log4j.properties de Hadoop. | Restarts the Hadoop HDFS services SecondaryNamenode, Datanode, and Journalnode. Restarts the Hadoop YARN services ResourceManager, NodeManager, ProxyServer, and TimelineServer. Additionally restarts Hadoop KMS, Hadoop Httpfs, and MapReduce-HistoryServer. | 
| hadoop-ssl-server | Cambiar la configuración del servidor ssl de Hadoop | Not available. | 
| hadoop-ssl-client | Cambiar la configuración del cliente ssl de Hadoop | Not available. | 
| hbase | Configuraciones seleccionadas por Amazon EMR para Apache. HBase | Custom EMR specific property. Sets emrfs-site and hbase-site configs. See those for their associated restarts. | 
| hbase-env | Cambie los valores en su entorno HBase. | Restarts the HBase services RegionServer, HBaseMaster, ThriftServer, RestServer. | 
| hbase-log4j | Cambie los valores en el archivo HBase hbase-log4j.properties. | Restarts the HBase services RegionServer, HBaseMaster, ThriftServer, RestServer. | 
| hbase-metrics | Cambie los valores en el archivo hadoop-metrics2-hbase.properties. HBase | Restarts the HBase services RegionServer, HBaseMaster, ThriftServer, RestServer. | 
| hbase-policy | Cambie los valores en HBase el archivo hbase-policy.xml. | Not available. | 
| hbase-site | Cambie los valores en HBase el archivo hbase-site.xml. | Restarts the HBase services RegionServer, HBaseMaster, ThriftServer, RestServer. Additionally restarts Phoenix QueryServer. | 
| hdfs-encryption-zones | Configurar zonas de cifrado de HDFS. | This classification should not be reconfigured. | 
| hdfs-env | Cambiar los valores en el entorno de HDFS. | Restarts Hadoop HDFS services Namenode, Datanode, and ZKFC. | 
| hdfs-site | Cambiar los valores en hdfs-site.xml de HDFS. | Restarts the Hadoop HDFS services Namenode, SecondaryNamenode, Datanode, ZKFC, and Journalnode. Additionally restarts Hadoop Httpfs. | 
| hcatalog-env | Cambie los valores en HCatalog el entorno. | Restarts Hive HCatalog Server. | 
| hcatalog-server-jndi | Cambie los valores en HCatalog jndi.properties. | Restarts Hive HCatalog Server. | 
| hcatalog-server-proto-hive-site | Cambie los valores en .xml HCatalog. proto-hive-site | Restarts Hive HCatalog Server. | 
| hcatalog-webhcat-env | Cambie los valores en el entorno HCat de la HCatalog Web. | Restarts Hive WebHCat server. | 
| hcatalog-webhcat-log4j2 | Cambie los valores en las propiedades HCatalog HCat log4j2.properties de la Web. | Restarts Hive WebHCat server. | 
| hcatalog-webhcat-site | Cambie los valores del archivo webhcat-site.xml de la HCatalog WebHCat. | Restarts Hive WebHCat server. | 
| hive | Configuración de Amazon EMR mantenida para Apache Hive. | Sets configurations to launch Hive LLAP service. | 
| hive-beeline-log4j2 | Cambiar los valores en el archivo beeline-log4j2.properties de Hive. | Not available. | 
| hive-parquet-logging | Cambiar los valores en el archivo parquet-logging.properties de Hive. | Not available. | 
| hive-env | Cambiar los valores en el entorno de Hive. | Restarts HiveServer2, HiveMetastore, and Hive HCatalog-Server. Runs Hive schemaTool CLI commands to verify hive-metastore. | 
| hive-exec-log4j2 | Cambie los valores en el archivo hive-exec-log 4j2.properties de Hive. | Not available. | 
| hive-llap-daemon-log4j2 | Cambie los valores en el archivo 4j2.properties de Hive. llap-daemon-log | Not available. | 
| hive-log4j2 | Cambiar los valores en el archivo hive-log4j2.properties de Hive. | Not available. | 
| hive-site | Cambiar los valores en el archivo hive-site.xml de Hive. | Restarts HiveServer2, HiveMetastore, and Hive HCatalog-Server. Runs Hive schemaTool CLI commands to verify hive-metastore. Also restarts Oozie and Zeppelin. | 
| hiveserver2-site | Cambiar los valores en el archivo hiveserver2-site.xml de Hive Server2. | Not available. | 
| hue-ini | Cambiar los valores en el archivo ini de Hue | Restarts Hue. Also activates Hue config override CLI commands to pick up new configurations. | 
| httpfs-env | Cambiar los valores en el entorno de HTTPFS. | Restarts Hadoop Httpfs service. | 
| httpfs-site | Cambiar los valores en el archivo httpfs-site.xml de Hadoop. | Restarts Hadoop Httpfs service. | 
| hadoop-kms-acls | Cambiar los valores en el archivo kms-acls.xml de Hadoop. | Not available. | 
| hadoop-kms-env | Cambiar los valores en el entorno de Hadoop KMS. | Restarts Hadoop-KMS service. | 
| hadoop-kms-java-home | Cambie la página de inicio de Java de KMS de Hadoop | Not available. | 
| hadoop-kms-log4j | Cambiar los valores en el archivo kms-log4j.properties de Hadoop. | Not available. | 
| hadoop-kms-site | Cambiar los valores en el archivo kms-site.xml de Hadoop. | Restarts Hadoop-KMS and Ranger-KMS service. | 
| hudi-env | Cambiar los valores en el entorno de Hudi. | Not available. | 
| hudi-defaults | Cambie los valores en el archivo hudi-defaults.conf de Hudi. | Not available. | 
| iceberg-defaults | Cambie los valores del archivo iceberg-defaults.conf de Iceberg. | Not available. | 
| delta-defaults | Cambie los valores del archivo delta-defaults.conf de Delta. | Not available. | 
| jupyter-notebook-conf | Cambiar los valores en el archivo jupyter\$1notebook\$1config.py de Jupyter Notebook. | Not available. | 
| jupyter-hub-conf | Cambie los valores en JupyterHubs el archivo jupyterhub\$1config.py. | Not available. | 
| jupyter-s3-conf | Configurar la persistencia en S3 del bloc de notas de Jupyter. | Not available. | 
| jupyter-sparkmagic-conf | Cambiar los valores en el archivo config.json de Sparkmagic. | Not available. | 
| livy-conf | Cambiar los valores en el archivo livy.conf de Livy. | Restarts Livy Server. | 
| livy-env | Cambiar los valores en el entorno de Livy. | Restarts Livy Server. | 
| livy-log4j2 | Cambiar la configuración de log4j2.properties de Livy. | Restarts Livy Server. | 
| mapred-env | Cambie los valores en el entorno de la MapReduce aplicación. | Restarts Hadoop MapReduce-HistoryServer. | 
| mapred-site | Cambie los valores en el archivo mapred-site.xml de la MapReduce aplicación. | Restarts Hadoop MapReduce-HistoryServer. | 
| oozie-env | Cambiar los valores en el entorno de Oozie. | Restarts Oozie. | 
| oozie-log4j | Cambiar los valores en el archivo oozie-log4j.properties de Oozie. | Restarts Oozie. | 
| oozie-site | Cambiar los valores en el archivo oozie-site.xml de Oozie. | Restarts Oozie. | 
| phoenix-hbase-metrics | Cambiar los valores en el archivo hadoop-metrics2-hbase.properties de Phoenix. | Not available. | 
| phoenix-hbase-site | Cambiar los valores en el archivo hbase-site.xml de Phoenix. | Not available. | 
| phoenix-log4j | Cambiar los valores en el archivo log4j.properties de Phoenix. | Restarts Phoenix-QueryServer. | 
| phoenix-metrics | Cambiar los valores en el archivo hadoop-metrics2-phoenix.properties de Phoenix. | Not available. | 
| pig-env | Cambiar los valores en el entorno de Pig. | Not available. | 
| pig-properties | Cambiar los valores en el archivo pig.properties de Pig. | Restarts Oozie. | 
| pig-log4j | Cambiar los valores en el archivo log4j.properties de Pig. | Not available. | 
| presto-log | Cambiar los valores en el archivo log.properties de Presto. | Restarts Presto-Server (for PrestoDB) | 
| presto-config | Cambiar los valores en el archivo config.properties de Presto. | Restarts Presto-Server (for PrestoDB) | 
| presto-password-authenticator | Cambiar los valores en el archivo password-authenticator.properties de Presto. | Not available. | 
| presto-env | Cambiar valores en el archivo presto-env.sh de Presto. | Restarts Presto-Server (for PrestoDB) | 
| presto-node | Cambiar valores en el archivo node.properties de Presto. | Not available. | 
| presto-connector-blackhole | Cambiar los valores en el archivo blackhole.properties de Presto. | Not available. | 
| presto-connector-cassandra | Cambiar los valores en el archivo cassandra.properties de Presto. | Not available. | 
| presto-connector-hive | Cambiar los valores en el archivo hive.properties de Presto. | Restarts Presto-Server (for PrestoDB) | 
| presto-connector-jmx | Cambiar los valores en el archivo jmx.properties de Presto. | Not available. | 
| presto-connector-kafka | Cambiar los valores en el archivo kafka.properties de Presto. | Not available. | 
| presto-connector-lakeformation | Cambiar los valores en el archivo lakeformation.properties de Presto. | Restarts Presto-Server (for PrestoDB) | 
| presto-connector-localfile | Cambiar los valores en el archivo localfile.properties de Presto. | Not available. | 
| presto-connector-memory | Cambiar los valores del archivo memory.properties de Presto. | Not available. | 
| presto-connector-mongodb | Cambiar los valores en el archivo mongodb.properties de Presto. | Not available. | 
| presto-connector-mysql | Cambiar los valores en el archivo mysql.properties de Presto. | Not available. | 
| presto-connector-postgresql | Cambiar los valores en el archivo postgresql.properties de Presto. | Not available. | 
| presto-connector-raptor | Cambiar los valores en el archivo raptor.properties de Presto. | Not available. | 
| presto-connector-redis | Cambiar los valores en el archivo redis.properties de Presto. | Not available. | 
| presto-connector-redshift | Cambiar los valores en el archivo redshift.properties de Presto. | Not available. | 
| presto-connector-tpch | Cambiar los valores en el archivo tpch.properties de Presto. | Not available. | 
| presto-connector-tpcds | Cambiar los valores del archivo tpcds.properties de Presto. | Not available. | 
| trino-log | Cambiar los valores en el archivo log.properties de Trino. | Restarts Trino-Server (for Trino) | 
| trino-config | Cambiar los valores en el archivo config.properties de Trino. | Restarts Trino-Server (for Trino) | 
| trino-password-authenticator | Cambiar los valores en el archivo password-authenticator.properties de Trino. | Restarts Trino-Server (for Trino) | 
| trino-env | Cambie los valores del archivo trino-env.sh de Trino. | Restarts Trino-Server (for Trino) | 
| trino-node | Cambiar los valores en el archivo node.properties de Trino. | Not available. | 
| trino-connector-blackhole | Cambiar los valores en el archivo blackhole.properties de Trino. | Not available. | 
| trino-connector-cassandra | Cambiar los valores en el archivo cassandra.properties de Trino. | Not available. | 
| trino-connector-delta | Cambie los valores del archivo delta.properties de Trino. | Restarts Trino-Server (for Trino) | 
| trino-connector-hive | Cambiar los valores en el archivo hive.properties de Trino. | Restarts Trino-Server (for Trino) | 
| trino-exchange-manager | Cambie los valores del archivo exchange-manager.properties de Trino. | Restarts Trino-Server (for Trino) | 
| trino-connector-iceberg | Cambiar los valores en el archivo iceberg.properties de Trino. | Restarts Trino-Server (for Trino) | 
| trino-connector-hudi | Cambiar los valores en el archivo hudi.properties de Trino. | Restarts Trino-Server (for Trino) | 
| trino-connector-jmx | Cambiar los valores en el archivo jmx.properties de Trino. | Not available. | 
| trino-connector-kafka | Cambiar los valores en el archivo kafka.properties de Trino. | Not available. | 
| trino-connector-localfile | Cambiar los valores en el archivo localfile.properties de Trino. | Not available. | 
| trino-connector-memory | Cambiar los valores en el archivo memory.properties de Trino. | Not available. | 
| trino-connector-mongodb | Cambiar los valores en el archivo mongodb.properties de Trino. | Not available. | 
| trino-connector-mysql | Cambiar los valores en el archivo mysql.properties de Trino. | Not available. | 
| trino-connector-postgresql | Cambiar los valores en el archivo postgresql.properties de Trino. | Not available. | 
| trino-connector-raptor | Cambiar los valores en el archivo raptor.properties de Trino. | Not available. | 
| trino-connector-redis | Cambiar los valores en el archivo redis.properties de Trino. | Not available. | 
| trino-connector-redshift | Cambiar los valores en el archivo redshift.properties de Trino. | Not available. | 
| trino-connector-tpch | Cambiar los valores en el archivo tpch.properties de Trino. | Not available. | 
| trino-connector-tpcds | Cambiar los valores en el archivo tpcds.properties de Trino. | Not available. | 
| ranger-kms-dbks-site | Cambie los valores del archivo dbks-site.xml de Ranger KMS. | Restarts Ranger KMS Server. | 
| ranger-kms-site | Cambie los valores en el ranger-kms-site archivo.xml de Ranger KMS. | Restarts Ranger KMS Server. | 
| ranger-kms-env | Cambie los valores del entorno Ranger KMS. | Restarts Ranger KMS Server. | 
| ranger-kms-logback | Cambie los valores del archivo kms-logback.xml de Ranger KMS. | Not available. | 
| ranger-kms-db-ca | Cambie los valores del archivo CA en S3 para la conexión SSL de MySQL con Ranger KMS. | Not available. | 
| spark | Configuración de Amazon EMR mantenida para Apache Spark. | This property modifies spark-defaults. See actions there. | 
| spark-defaults | Cambiar los valores en el archivo spark-defaults.conf de Spark. | Restarts Spark history server and Spark thrift server. | 
| spark-env | Cambiar los valores en el entorno de Spark. | Restarts Spark history server and Spark thrift server. | 
| spark-hive-site | Cambiar los valores en el archivo hive-site.xml de Spark. | Not available. | 
| spark-log4j2 | Cambiar los valores en el archivo log4j2.properties de Spark. | Restarts Spark history server and Spark thrift server. | 
| spark-metrics | Cambiar los valores en el archivo metrics.properties de Spark. | Restarts Spark history server and Spark thrift server. | 
| sqoop-env | Cambiar los valores en el entorno de Sqoop. | Not available. | 
| sqoop-oraoop-site | Cambie los valores en el archivo oraoop-site.xml de Sqoop. OraOop | Not available. | 
| sqoop-site | Cambiar los valores en el archivo sqoop-site.xml de Sqoop. | Not available. | 
| tez-site | Cambiar los valores en el archivo tez-site.xml de Tez. | Restart Oozie and HiveServer2. | 
| yarn-env | Cambiar los valores en el entorno de YARN. | Restarts the Hadoop YARN services ResourceManager, NodeManager, ProxyServer, and TimelineServer. Additionally restarts MapReduce-HistoryServer. | 
| yarn-site | Cambiar los valores en el archivo yarn-site.xml de YARN. | Restarts the Hadoop YARN services ResourceManager, NodeManager, ProxyServer, and TimelineServer. Additionally restarts Livy Server and MapReduce-HistoryServer. | 
| zeppelin-env | Cambiar los valores en el entorno de Zeppelin. | Restarts Zeppelin. | 
| zeppelin-site | Cambie los ajustes de configuración de zeppelin-site.xml. | Restarts Zeppelin. | 
| zookeeper-config | Cambie los valores en el ZooKeeper archivo zoo.cfg. | Restarts Zookeeper server. | 
| zookeeper-log4j | Cambie los valores en el ZooKeeper archivo log4j.properties. | Restarts Zookeeper server. | 

## Registro de cambios de la versión 7.0.0
<a name="700-changelog"></a>


**Registro de cambios de la versión 7.0.0 y notas de la versión**  

| Date | Event | Description (Descripción) | 
| --- | --- | --- | 
| 2025-09-03 | Revisión de documentos | Las notas de la versión 7.0.0 de Amazon EMR agregaron un problema conocido | 
| 2023-12-29 | Implementación completa | Amazon EMR 7.0.0 se ha implementado completamente en todas las [regiones compatibles](https://aws.amazon.com/about-aws/global-infrastructure/regional-product-services/) | 
| 2023-12-28 | Publicación de documentos | Primera publicación de las notas de la versión 7.0.0 de Amazon EMR | 
| 2023-12-19 | Versión inicial | Implementación inicial de Amazon EMR 7.0.0 en regiones comerciales limitadas | 