

Terjemahan disediakan oleh mesin penerjemah. Jika konten terjemahan yang diberikan bertentangan dengan versi bahasa Inggris aslinya, utamakan versi bahasa Inggris.

# Amazon EMR 7.x versi rilis
<a name="emr-release-7x"></a>

Bagian ini berisi versi aplikasi, catatan rilis, versi komponen, dan klasifikasi konfigurasi yang tersedia di setiap versi rilis Amazon EMR 7.x.

Saat meluncurkan klaster, Anda dapat memilih dari beberapa rilis Amazon EMR. Ini memungkinkan Anda untuk menguji dan menggunakan versi aplikasi yang sesuai dengan kebutuhan kompatibilitas Anda. Anda menentukan nomor rilis dengan *label rilis*. Label rilis ada dalam bentuk`emr-x.x.x`. Misalnya, `emr-7.12.0`.

Rilis EMR Amazon baru tersedia di berbagai Wilayah selama beberapa hari, dimulai dengan Wilayah pertama pada tanggal rilis awal. Versi rilis terbaru mungkin tidak tersedia di Wilayah Anda selama periode ini.

Untuk tabel lengkap versi aplikasi di setiap rilis Amazon EMR 7.x, lihat. [Versi aplikasi di Amazon EMR 7.x rilis](emr-release-app-versions-7.x.md)

**Topics**
+ [Versi aplikasi di Amazon EMR 7.x rilis](emr-release-app-versions-7.x.md)
+ [Amazon EMR rilis 7.12.0](emr-7120-release.md)
+ [Amazon EMR rilis 7.11.0](emr-7110-release.md)
+ [Amazon EMR rilis 7.10.0](emr-7100-release.md)
+ [Amazon EMR rilis 7.9.0](emr-790-release.md)
+ [Amazon EMR rilis 7.8.0](emr-780-release.md)
+ [Amazon EMR rilis 7.7.0](emr-770-release.md)
+ [Amazon EMR rilis 7.6.0](emr-760-release.md)
+ [Amazon EMR rilis 7.5.0](emr-750-release.md)
+ [Amazon EMR rilis 7.4.0](emr-740-release.md)
+ [Amazon EMR rilis 7.3.0](emr-730-release.md)
+ [Amazon EMR rilis 7.2.0](emr-720-release.md)
+ [Amazon EMR rilis 7.1.0](emr-710-release.md)
+ [Amazon EMR rilis 7.0.0](emr-700-release.md)

# Versi aplikasi di Amazon EMR 7.x rilis
<a name="emr-release-app-versions-7.x"></a>

Tabel berikut mencantumkan versi aplikasi yang tersedia di setiap rilis Amazon EMR 7.x.


**Informasi versi aplikasi**  

|  | emr-7.12.0 | emr-7.11.0 | emr-7.10.0 | emr-7.9.0 | emr-7.8.0 | emr-7.7.0 | emr-7.6.0 | emr-7.5.0 | emr-7.4.0 | emr-7.3.0 | emr-7.2.0 | emr-7.1.0 | emr-7.0.0 | 
| --- | --- | --- | --- | --- | --- | --- | --- | --- | --- | --- | --- | --- | --- | 
| AWS SDK for Java | 2.35.5, 1.12.792 | 2.35.5, 1.12.792 | 2.31.48, 1.12.782 | 2.31.16, 1.12.782 | 2.29.52, 1.12.780 | 2.29.44, 1.12.780 | 2.29.25, 1.12.779 | 2.28.8, 1.12.772 | 2.28.8, 1.12.772 | 2.25.70, 1.12.747 | 2.23.18, 1.12.705 | 2.23.18, 1.12.656 | 2.20.160-amzn-0, 1.12.569 | 
| Python | 3.9, 3.11 | 3.9, 3.11 | 3.9, 3.11 | 3.9, 3.11 | 3.9, 3.11 | 3.9, 3.11 | 3.9, 3.11 | 3.9, 3.11 | 3.9, 3.11 | 3.9, 3.11 | 3.9, 3.11 | 3.9, 3.11 | 3.9 | 
| Skala | 2.12.18 | 2.12.18 | 2.12.18 | 2.12.18 | 2.12.18 | 2.12.18 | 2.12.18 | 2.12.18 | 2.12.18 | 2.12.18 | 2.12.17 | 2.12.17 | 2.12.17 | 
| AmazonCloudWatchAgent | 1.300032.2-amzn-0 | 1.300032.2-amzn-0 | 1.300032.2-amzn-0 | 1.300032.2-amzn-0 | 1.300032.2-amzn-0 | 1.300032.2-amzn-0 | 1.300032.2-amzn-0 | 1.300032.2-amzn-0 | 1.300032.2-amzn-0 | 1.300032.2-amzn-0 | 1.300032.2-amzn-0 | 1.300032.2-amzn-0 | 1.300031.1-amzn-0 | 
| Delta | 3.3.2-amzn-1 | 3.3.2-amzn-0 | 3.3.0-amzn-2 | 3.3.0-amzn-1 | 3.3.0-amzn-0 | 3.2.1-amzn-2 | Versi 3.2.1-amzn-1 | 3.2.1-amzn-0 | 3.2.0-amzn-1 | 3.2.0-amzn-0 | 3.1.0 | 3.0.0 | 3.0.0 | 
| Flink | 1.20.0-amzn-6 | 1.20.0-amzn-5 | 1.20.0-amzn-4 | 1.20.0-amzn-3 | 1.20.0-amzn-2 | 1.20.0-amzn-1 | 1.20.0-amzn-0 | 1.19.1-amzn-1 | 1.19.1-amzn-0 | 1.18.1-amzn-2 | 1.18.1-amzn-1 | 1.18.1-amzn-0 | 1.18.0-amzn-0 | 
| Ganglia |  -  |  -  |  -  |  -  |  -  |  -  |  -  |  -  |  -  |  -  |  -  |  -  |  -  | 
| HBase | 2.6.2-amzn-3 | 2.6.2-amzn-2 | 2.6.2-amzn-1 | 2.6.2-amzn-0 | 2.6.1-amzn-2 | 2.6.1-amzn-1 | 2.6.1-amzn-0 | 2.5.10-amzn-0 | 2.5.5-amzn-0 | 2.4.17-amzn-7 | 2.4.17-amzn-6 | 2.4.17-amzn-5 | 2.4.17-amzn-4 | 
| HCatalog | 3.1.3-amzn-21 | 3.1.3-amzn-20 | 3.1.3-amzn-19 | 3.1.3-amzn-18 | 3.1.3-amzn-17 | 3.1.3-amzn-16 | 3.1.3-amzn-15 | 3.1.3-amzn-14 | 3.1.3-amzn-13 | 3.1.3-amzn-12 | 3.1.3-amzn-11 | 3.1.3-amzn-10 | 3.1.3-amzn-9 | 
| Hadoop | 3.4.1-amzn-4 | 3.4.1-amzn-3 | 3.4.1-amzn-2 | 3.4.1-amzn-1 | 3.4.1-amzn-0 | 3.4.0-amzn-3 | 3.4.0-amzn-2 | 3.4.0-amzn-1 | 3.4.0-amzn-0 | 3.3.6-amzn-5 | 3.3.6-amzn-4 | 3.3.6-amzn-3 | 3.3.6-amzn-2 | 
| Hive | 3.1.3-amzn-21 | 3.1.3-amzn-20 | 3.1.3-amzn-19 | 3.1.3-amzn-18 | 3.1.3-amzn-17 | 3.1.3-amzn-16 | 3.1.3-amzn-15 | 3.1.3-amzn-14 | 3.1.3-amzn-13 | 3.1.3-amzn-12 | 3.1.3-amzn-11 | 3.1.3-amzn-10 | 3.1.3-amzn-9 | 
| Hudi | 1.0.2-amzn-1 | 1.0.2-amzn-0 | 0.15.0-amzn-7 | 0.15.0-amzn-6 | 0.15.0-amzn-5 | 0.15.0-amzn-4 | 0.15.0-amzn-3 | 0.15.0-amzn-2 | 0.15.0-amzn-1 | 0.15.0-amzn-0 | 0.14.1-amzn-1 | 0.14.1-amzn-0 | 0.14.0-amzn-1 | 
| Hue | 4.11.0 | 4.11.0 | 4.11.0 | 4.11.0 | 4.11.0 | 4.11.0 | 4.11.0 | 4.11.0 | 4.11.0 | 4.11.0 | 4.11.0 | 4.11.0 | 4.11.0 | 
| Iceberg | 1.10.0-amzn-0 | 1.9.1-amzn-0 | 1.8.1-amzn-0 | 1.7.1-amzn-2 | 1.7.1-amzn-1 | 1.7.1-amzn-0 | 1.6.1-amzn-2 | 1.6.1-amzn-1 | 1.6.1-amzn-0 | 1.5.2-amzn-0 | 1.5.0-amzn-0 | 1.4.3-amzn-0 | 1.4.2-amzn-0 | 
| JupyterEnterpriseGateway | 2.6.0 | 2.6.0 | 2.6.0 | 2.6.0 | 2.6.0 | 2.6.0 | 2.6.0 | 2.6.0 | 2.6.0 | 2.6.0 | 2.6.0 | 2.6.0 | 2.6.0 | 
| JupyterHub | 1.5.0 | 1.5.0 | 1.5.0 | 1.5.0 | 1.5.0 | 1.5.0 | 1.5.0 | 1.5.0 | 1.5.0 | 1.5.0 | 1.5.0 | 1.5.0 | 1.5.0 | 
| Livy | 0.8.0-inkubasi | 0.8.0-inkubasi | 0.8.0-inkubasi | 0.8.0-inkubasi | 0.8.0-inkubasi | 0.8.0-inkubasi | 0.8.0-inkubasi | 0.8.0-inkubasi | 0.8.0-inkubasi | 0.8.0-inkubasi | 0.8.0-inkubasi | 0.8.0-inkubasi | 0.7.1-inkubasi | 
| MXNet |  -  |  -  |  -  |  -  |  -  |  -  |  -  |  -  |  -  |  -  | 1.9.1 | 1.9.1 | 1.9.1 | 
| Mahout |  -  |  -  |  -  |  -  |  -  |  -  |  -  |  -  |  -  |  -  |  -  |  -  |  -  | 
| Oozie | 5.2.1 | 5.2.1 | 5.2.1 | 5.2.1 | 5.2.1 | 5.2.1 | 5.2.1 | 5.2.1 | 5.2.1 | 5.2.1 | 5.2.1 | 5.2.1 | 5.2.1 | 
| Phoenix | 5.2.1 | 5.2.1 | 5.2.1 | 5.2.1 | 5.2.1 | 5.2.1 | 5.2.0 | 5.2.0 | 5.2.0 | 5.1.3 | 5.1.3 | 5.1.3 | 5.1.3 | 
| Pig | 0.17.0 | 0.17.0 | 0.17.0 | 0.17.0 | 0.17.0 | 0.17.0 | 0.17.0 | 0.17.0 | 0.17.0 | 0.17.0 | 0.17.0 | 0.17.0 | 0.17.0 | 
| Presto | 0,27-amzn-6 | 0,27-amzn-5 | 0,27-amzn-4 | 0,287-amzn-3 | 0,287-amzn-2 | 0,287-amzn-1 | 0,287-amzn-1 | 0,287-amzn-0 | 0,287-amzn-0 | 0.285-amzn-1 | 0,285-amzn-0 | 0,284-amzn-0 | 0,283-amzn-1 | 
| Spark | 3.5.6-amzn-1 | 3.5.6-amzn-0 | 3.5.5-amzn-1 | 3.5.5-amzn-0 | 3.5.4-amzn-0 | 3.5.3-amzn-1 | 3.5.3-amzn-0 | 3.5.2-amzn-1 | 3.5.2-amzn-0 | 3.5.1-amzn-1 | 3.5.1-amzn-0 | 3.5.0-amzn-1 | 3.5.0-amzn-0 | 
| Sqoop |  -  |  -  |  -  |  -  |  -  |  -  |  -  |  -  | 1.4.7 | 1.4.7 | 1.4.7 | 1.4.7 | 1.4.7 | 
| TensorFlow | 2.19.0 | 2.19.0 | 2.18.0 | 2.16.1 | 2.16.1 | 2.16.1 | 2.16.1 | 2.16.1 | 2.16.1 | 2.16.1 | 2.11.0 | 2.11.0 | 2.11.0 | 
| Tez | 0.10.2-amzn-19 | 0.10.2-amzn-18 | 0.10.2-amzn-17 | 0.10.2-amzn-16 | 0.10.2-amzn-15 | 0.10.2-amzn-14 | 0.10.2-amzn-13 | 0.10.2-amzn-12 | 0.10.2-amzn-11 | 0.10.2-amzn-10 | 0.10.2-amzn-9 | 0.10.2-amzn-8 | 0.10.2-amzn-7 | 
| Trino (PrestoSQL) | 476-amzn-1 | 475-amzn-0 | 470-amzn-0 | 467-amzn-2 | 467-amzn-1 | 467-amzn-0 | 457-amzn-0 | 446-amzn-0 | 446-amzn-0 | 442-amzn-0 | 436-amzn-0 | 435-amzn-0 | 426-amzn-1 | 
| Zeppelin | 0.11.1 | 0.11.1 | 0.11.1 | 0.11.1 | 0.11.1 | 0.11.1 | 0.11.1 | 0.11.1 | 0.11.1 | 0.11.1 | 0.10.1 | 0.10.1 | 0.10.1 | 
| ZooKeeper | 3.9.3-amzn-4 | 3.9.3-amzn-3 | 3.9.3-amzn-2 | 3.9.3-amzn-1 | 3.9.3-amzn-0 | 3.9.2-amzn-1 | 3.9.2-amzn-0 | 3.9.2-amzn-0 | 3.9.2-amzn-0 | 3.9.1-amzn-1 | 3.9.1-amzn-1 | 3.9.1-amzn-0 | 3.5.10 | 

# Amazon EMR rilis 7.12.0
<a name="emr-7120-release"></a>

## 7.12.0 siklus hidup yang didukung
<a name="emr-7120-supported-lifecycle"></a>

Tabel berikut menjelaskan tanggal siklus hidup yang didukung untuk rilis Amazon EMR 7.12.0.


| Fase Support | Date | 
| --- | --- | 
| Tanggal rilis awal | November 21, 2025 | 
| Dukungan standar sampai | November 21, 2027 | 
| Akhir dari dukungan | November 22, 2027 | 
| Akhir hidup | November 21, 2028 | 

## 7.12.0 versi aplikasi
<a name="emr-7120-app-versions"></a>

Rilis ini mencakup aplikasi berikut: [https://docs.aws.amazon.com/AmazonCloudWatch/latest/monitoring/Install-CloudWatch-Agent.html](https://docs.aws.amazon.com/AmazonCloudWatch/latest/monitoring/Install-CloudWatch-Agent.html), [https://delta.io/](https://delta.io/), [https://flink.apache.org/](https://flink.apache.org/), [http://hbase.apache.org/](http://hbase.apache.org/), [https://cwiki.apache.org/confluence/display/Hive/HCatalog](https://cwiki.apache.org/confluence/display/Hive/HCatalog), [http://hive.apache.org/](http://hive.apache.org/), [https://hudi.apache.org](https://hudi.apache.org), [http://gethue.com/](http://gethue.com/), [https://iceberg.apache.org/](https://iceberg.apache.org/), [https://jupyter-enterprise-gateway.readthedocs.io/en/latest/](https://jupyter-enterprise-gateway.readthedocs.io/en/latest/), [https://jupyterhub.readthedocs.io/en/latest/#](https://jupyterhub.readthedocs.io/en/latest/#), [https://livy.incubator.apache.org/](https://livy.incubator.apache.org/), [http://oozie.apache.org/](http://oozie.apache.org/), [https://phoenix.apache.org/](https://phoenix.apache.org/), [http://pig.apache.org/](http://pig.apache.org/), [https://prestodb.io/](https://prestodb.io/), [https://spark.apache.org/docs/latest/](https://spark.apache.org/docs/latest/), [https://www.tensorflow.org/](https://www.tensorflow.org/), [https://tez.apache.org/](https://tez.apache.org/), [https://trino.io/](https://trino.io/), [https://zeppelin.incubator.apache.org/](https://zeppelin.incubator.apache.org/), dan [https://zookeeper.apache.org](https://zookeeper.apache.org).

Tabel di bawah ini mencantumkan versi aplikasi yang tersedia dalam rilis Amazon EMR ini dan versi aplikasi dalam tiga rilis EMR Amazon sebelumnya (bila berlaku).

Untuk riwayat lengkap versi aplikasi untuk setiap rilis Amazon EMR, lihat topik berikut:
+ [Versi aplikasi di Amazon EMR 7.x rilis](emr-release-app-versions-7.x.md)
+ [Versi aplikasi di Amazon EMR 6.x rilis](emr-release-app-versions-6.x.md)
+ [Versi aplikasi di Amazon EMR 5.x rilis](emr-release-app-versions-5.x.md)
+ [Versi aplikasi di Amazon EMR 4.x rilis](emr-release-app-versions-4.x.md)


**Informasi versi aplikasi**  

|  | emr-7.12.0 | emr-7.11.0 | emr-7.10.0 | emr-7.9.0 | 
| --- | --- | --- | --- | --- | 
| AWS SDK for Java | 2.35.5, 1.12.792 | 2.35.5, 1.12.792 | 2.31.48, 1.12.782 | 2.31.16, 1.12.782 | 
| Python | 3.9, 3.11 | 3.9, 3.11 | 3.9, 3.11 | 3.9, 3.11 | 
| Skala | 2.12.18 | 2.12.18 | 2.12.18 | 2.12.18 | 
| AmazonCloudWatchAgent | 1.300032.2-amzn-0 | 1.300032.2-amzn-0 | 1.300032.2-amzn-0 | 1.300032.2-amzn-0 | 
| Delta | 3.3.2-amzn-1 | 3.3.2-amzn-0 | 3.3.0-amzn-2 | 3.3.0-amzn-1 | 
| Flink | 1.20.0-amzn-6 | 1.20.0-amzn-5 | 1.20.0-amzn-4 | 1.20.0-amzn-3 | 
| Ganglia |  -  |  -  |  -  |  -  | 
| HBase | 2.6.2-amzn-3 | 2.6.2-amzn-2 | 2.6.2-amzn-1 | 2.6.2-amzn-0 | 
| HCatalog | 3.1.3-amzn-21 | 3.1.3-amzn-20 | 3.1.3-amzn-19 | 3.1.3-amzn-18 | 
| Hadoop | 3.4.1-amzn-4 | 3.4.1-amzn-3 | 3.4.1-amzn-2 | 3.4.1-amzn-1 | 
| Hive | 3.1.3-amzn-21 | 3.1.3-amzn-20 | 3.1.3-amzn-19 | 3.1.3-amzn-18 | 
| Hudi | 1.0.2-amzn-1 | 1.0.2-amzn-0 | 0.15.0-amzn-7 | 0.15.0-amzn-6 | 
| Hue | 4.11.0 | 4.11.0 | 4.11.0 | 4.11.0 | 
| Iceberg | 1.10.0-amzn-0 | 1.9.1-amzn-0 | 1.8.1-amzn-0 | 1.7.1-amzn-2 | 
| JupyterEnterpriseGateway | 2.6.0 | 2.6.0 | 2.6.0 | 2.6.0 | 
| JupyterHub | 1.5.0 | 1.5.0 | 1.5.0 | 1.5.0 | 
| Livy | 0.8.0-inkubasi | 0.8.0-inkubasi | 0.8.0-inkubasi | 0.8.0-inkubasi | 
| MXNet |  -  |  -  |  -  |  -  | 
| Mahout |  -  |  -  |  -  |  -  | 
| Oozie | 5.2.1 | 5.2.1 | 5.2.1 | 5.2.1 | 
| Phoenix | 5.2.1 | 5.2.1 | 5.2.1 | 5.2.1 | 
| Pig | 0.17.0 | 0.17.0 | 0.17.0 | 0.17.0 | 
| Presto | 0,27-amzn-6 | 0,27-amzn-5 | 0,27-amzn-4 | 0,287-amzn-3 | 
| Spark | 3.5.6-amzn-1 | 3.5.6-amzn-0 | 3.5.5-amzn-1 | 3.5.5-amzn-0 | 
| Sqoop |  -  |  -  |  -  |  -  | 
| TensorFlow | 2.19.0 | 2.19.0 | 2.18.0 | 2.16.1 | 
| Tez | 0.10.2-amzn-19 | 0.10.2-amzn-18 | 0.10.2-amzn-17 | 0.10.2-amzn-16 | 
| Trino (PrestoSQL) | 476-amzn-1 | 475-amzn-0 | 470-amzn-0 | 467-amzn-2 | 
| Zeppelin | 0.11.1 | 0.11.1 | 0.11.1 | 0.11.1 | 
| ZooKeeper | 3.9.3-amzn-4 | 3.9.3-amzn-3 | 3.9.3-amzn-2 | 3.9.3-amzn-1 | 

# 7.12.0 kerentanan dan eksposur umum
<a name="7120-common-vulnerabilities-exposures"></a>

Tabel berikut mencantumkan semua CVEs yang tidak memengaruhi kluster EMR yang berjalan pada konfigurasi Amazon EMR 7.12.0 yang direkomendasikan. Amazon EMR bergantung pada sumber terbuka hulu untuk ketersediaan perbaikan dan akan memberikan versi stabil terbaru sebagai bagian dari komponen Core Engine dalam waktu 90 hari setelah Amazon EMR memverifikasi perbaikan.

Tabel ini diperbarui pada 13 November 2025.


| ID CVE | Kepelikan | URL detail CVE | 
| --- | --- | --- | 
|  CVE-2015-1832  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2015-1832)-2015-1832  | 
|  CVE-2016-5018  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2016-5018)-2016-5018  | 
|  CVE-2017-15095  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2017-15095)-2017-15095  | 
|  CVE-2017-17485  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2017-17485)-2017-17485  | 
|  CVE-2017-7525  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2017-7525)-2017-7525  | 
|  CVE-2018-11307  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-11307)-2018-11307  | 
|  CVE-2018-11307  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-11307)-2018-11307  | 
|  CVE-2018-14718  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-14718)-2018-14718  | 
|  CVE-2018-14718  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-14718)-2018-14718  | 
|  CVE-2018-14719  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE-2018-14719](https://nvd.nist.gov/vuln/detail/CVE-2018-14719)  | 
|  CVE-2018-14719  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE-2018-14719](https://nvd.nist.gov/vuln/detail/CVE-2018-14719)  | 
|  CVE-2018-14720  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-14720)-2018-14720  | 
|  CVE-2018-14720  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-14720)-2018-14720  | 
|  CVE-2018-14721  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-14721)-2018-14721  | 
|  CVE-2018-14721  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-14721)-2018-14721  | 
|  CVE-2018-19360  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-19360)-2018-19360  | 
|  CVE-2018-19360  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-19360)-2018-19360  | 
|  CVE-2018-19361  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-19361)-2018-19361  | 
|  CVE-2018-19361  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-19361)-2018-19361  | 
|  CVE-2018-19362  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-19362)-2018-19362  | 
|  CVE-2018-19362  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-19362)-2018-19362  | 
|  CVE-2018-7489  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-7489)-2018-7489  | 
|  CVE-2018-7489  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-7489)-2018-7489  | 
|  CVE-2019-10202  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-10202)-2019-10202  | 
|  CVE-2019-14379  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-14379)-2019-14379  | 
|  CVE-2019-14379  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-14379)-2019-14379  | 
|  CVE-2019-14540  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-14540)-2019-14540  | 
|  CVE-2019-14540  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-14540)-2019-14540  | 
|  CVE-2019-14892  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-14892)-2019-14892  | 
|  CVE-2019-14892  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-14892)-2019-14892  | 
|  CVE-2019-14893  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-14893)-2019-14893  | 
|  CVE-2019-14893  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-14893)-2019-14893  | 
|  CVE-2019-16335  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-16335)-2019-16335  | 
|  CVE-2019-16335  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-16335)-2019-16335  | 
|  CVE-2019-16942  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-16942)-2019-16942  | 
|  CVE-2019-16942  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-16942)-2019-16942  | 
|  CVE-2019-16943  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-16943)-2019-16943  | 
|  CVE-2019-16943  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-16943)-2019-16943  | 
|  CVE-2019-17267  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-17267)-2019-17267  | 
|  CVE-2019-17267  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-17267)-2019-17267  | 
|  CVE-2019-17531  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-17531)-2019-17531  | 
|  CVE-2019-17531  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-17531)-2019-17531  | 
|  CVE-2019-20330  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-20330)-2019-20330  | 
|  CVE-2019-20330  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-20330)-2019-20330  | 
|  CVE-2020-8840  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-8840)-2020-8840  | 
|  CVE-2020-8840  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-8840)-2020-8840  | 
|  CVE-2020-9546  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-9546)-2020-9546  | 
|  CVE-2020-9546  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-9546)-2020-9546  | 
|  CVE-2020-9547  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-9547)-2020-9547  | 
|  CVE-2020-9547  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-9547)-2020-9547  | 
|  CVE-2020-9548  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-9548)-2020-9548  | 
|  CVE-2020-9548  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-9548)-2020-9548  | 
|  CVE-2022-1471  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-1471)-2022-1471  | 
|  CVE-2022-1471  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-1471)-2022-1471  | 
|  CVE-2022-37865  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-37865)-2022-37865  | 
|  CVE-2022-39135  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-39135)-2022-39135  | 
|  CVE-2022-46337  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-46337)-2022-46337  | 
|  CVE-2022-46337  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-46337)-2022-46337  | 
|  CVE-2024-51504  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-51504)-2024-51504  | 
|  CVE-2024-51504  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-51504)-2024-51504  | 
|  CVE-2024-52046  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-52046)-2024-52046  | 
|  CVE-2024-52046  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-52046)-2024-52046  | 
|  CVE-2024-53990  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-53990)-2024-53990  | 
|  CVE-2025-30065  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2025-30065)-2025-30065  | 
|  CVE-2025-30065  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2025-30065)-2025-30065  | 
|  CVE-2014-3643  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2014-3643)-2014-3643  | 
|  CVE-2015-5237  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2015-5237)-2015-5237  | 
|  CVE-2015-5237  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2015-5237)-2015-5237  | 
|  CVE-2016-6796  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2016-6796)-2016-6796  | 
|  CVE-2018-1000180  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-1000180)-2018-1000180  | 
|  CVE-2018-1000180  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-1000180)-2018-1000180  | 
|  CVE-2018-12022  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-12022)-2018-12022  | 
|  CVE-2018-12022  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-12022)-2018-12022  | 
|  CVE-2018-12023  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-12023)-2018-12023  | 
|  CVE-2018-12023  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-12023)-2018-12023  | 
|  CVE-2018-5968  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-5968)-2018-5968  | 
|  CVE-2019-0205  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-0205)-2019-0205  | 
|  CVE-2019-0205  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-0205)-2019-0205  | 
|  CVE-2019-10172  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-10172)-2019-10172  | 
|  CVE-2019-12086  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-12086)-2019-12086  | 
|  CVE-2019-12086  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-12086)-2019-12086  | 
|  CVE-2019-14439  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-14439)-2019-14439  | 
|  CVE-2019-14439  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-14439)-2019-14439  | 
|  CVE-2020-10650  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-10650)-2020-10650  | 
|  CVE-2020-10650  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-10650)-2020-10650  | 
|  CVE-2020-10672  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-10672)-2020-10672  | 
|  CVE-2020-10672  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-10672)-2020-10672  | 
|  CVE-2020-10673  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-10673)-2020-10673  | 
|  CVE-2020-10673  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-10673)-2020-10673  | 
|  CVE-2020-10968  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-10968)-2020-10968  | 
|  CVE-2020-10968  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-10968)-2020-10968  | 
|  CVE-2020-10969  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-10969)-2020-10969  | 
|  CVE-2020-10969  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-10969)-2020-10969  | 
|  CVE-2020-11111  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-11111)-2020-11111  | 
|  CVE-2020-11111  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-11111)-2020-11111  | 
|  CVE-2020-11112  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-11112)-2020-11112  | 
|  CVE-2020-11112  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-11112)-2020-11112  | 
|  CVE-2020-11113  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-11113)-2020-11113  | 
|  CVE-2020-11113  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-11113)-2020-11113  | 
|  CVE-2020-11619  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-11619](https://nvd.nist.gov/vuln/detail/CVE-2020-11619)  | 
|  CVE-2020-11619  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-11619](https://nvd.nist.gov/vuln/detail/CVE-2020-11619)  | 
|  CVE-2020-11620  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-11620)-2020-11620  | 
|  CVE-2020-11620  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-11620)-2020-11620  | 
|  CVE-2020-13949  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-13949)-2020-13949  | 
|  CVE-2020-13949  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-13949)-2020-13949  | 
|  CVE-2020-13949  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-13949)-2020-13949  | 
|  CVE-2020-14060  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-14060)-2020-14060  | 
|  CVE-2020-14060  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-14060)-2020-14060  | 
|  CVE-2020-14061  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-14061)-2020-14061  | 
|  CVE-2020-14061  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-14061)-2020-14061  | 
|  CVE-2020-14062  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-14062)-2020-14062  | 
|  CVE-2020-14062  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-14062)-2020-14062  | 
|  CVE-2020-14195  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-14195)-2020-14195  | 
|  CVE-2020-14195  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-14195)-2020-14195  | 
|  CVE-2020-24616  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-24616)-2020-24616  | 
|  CVE-2020-24616  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-24616)-2020-24616  | 
|  CVE-2020-24750  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-24750)-2020-24750  | 
|  CVE-2020-24750  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-24750)-2020-24750  | 
|  CVE-2020-25649  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-25649)-2020-25649  | 
|  CVE-2020-28052  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-28052)-2020-28052  | 
|  CVE-2020-35490  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-35490)-2020-35490  | 
|  CVE-2020-35490  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-35490)-2020-35490  | 
|  CVE-2020-35491  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-35491)-2020-35491  | 
|  CVE-2020-35491  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-35491)-2020-35491  | 
|  CVE-2020-35728  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-35728)-2020-35728  | 
|  CVE-2020-35728  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-35728)-2020-35728  | 
|  CVE-2020-36179  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36179)-2020-36179  | 
|  CVE-2020-36179  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36179)-2020-36179  | 
|  CVE-2020-36180  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36180)-2020-36180  | 
|  CVE-2020-36180  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36180)-2020-36180  | 
|  CVE-2020-36181  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36181)-2020-36181  | 
|  CVE-2020-36181  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36181)-2020-36181  | 
|  CVE-2020-36182  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36182)-2020-36182  | 
|  CVE-2020-36182  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36182)-2020-36182  | 
|  CVE-2020-36183  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36183)-2020-36183  | 
|  CVE-2020-36183  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36183)-2020-36183  | 
|  CVE-2020-36184  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36184)-2020-36184  | 
|  CVE-2020-36184  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36184)-2020-36184  | 
|  CVE-2020-36185  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36185)-2020-36185  | 
|  CVE-2020-36185  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36185)-2020-36185  | 
|  CVE-2020-36186  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36186)-2020-36186  | 
|  CVE-2020-36186  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36186)-2020-36186  | 
|  CVE-2020-36187  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36187)-2020-36187  | 
|  CVE-2020-36187  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36187)-2020-36187  | 
|  CVE-2020-36188  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36188)-2020-36188  | 
|  CVE-2020-36188  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36188)-2020-36188  | 
|  CVE-2020-36189  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36189)-2020-36189  | 
|  CVE-2020-36189  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36189)-2020-36189  | 
|  CVE-2020-36518  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36518)-2020-36518  | 
|  CVE-2020-36518  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36518)-2020-36518  | 
|  CVE-2021-0341  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2021-0341)-2021-0341  | 
|  CVE-2021-20190  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2021-20190)-2021-20190  | 
|  CVE-2021-20190  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2021-20190)-2021-20190  | 
|  CVE-2021-31684  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2021-31684)-2021-31684  | 
|  CVE-2021-34538  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2021-34538)-2021-34538  | 
|  CVE-2021-34538  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2021-34538)-2021-34538  | 
|  CVE-2021-34538  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2021-34538)-2021-34538  | 
|  CVE-2022-25647  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-25647)-2022-25647  | 
|  CVE-2022-25647  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-25647)-2022-25647  | 
|  CVE-2022-25857  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-25857)-2022-25857  | 
|  CVE-2022-3171  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-3171)-2022-3171  | 
|  CVE-2022-3171  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-3171)-2022-3171  | 
|  CVE-2022-3509  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-3509)-2022-3509  | 
|  CVE-2022-3509  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-3509)-2022-3509  | 
|  CVE-2022-3510  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-3510)-2022-3510  | 
|  CVE-2022-36364  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-36364)-2022-36364  | 
|  CVE-2022-37866  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-37866)-2022-37866  | 
|  CVE-2022-40149  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-40149)-2022-40149  | 
|  CVE-2022-40149  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-40149)-2022-40149  | 
|  CVE-2022-40150  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-40150)-2022-40150  | 
|  CVE-2022-40150  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-40150)-2022-40150  | 
|  CVE-2022-41404  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-41404)-2022-41404  | 
|  CVE-2022-42003  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-42003)-2022-42003  | 
|  CVE-2022-42003  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-42003)-2022-42003  | 
|  CVE-2022-42003  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-42003)-2022-42003  | 
|  CVE-2022-42003  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-42003)-2022-42003  | 
|  CVE-2022-42004  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-42004)-2022-42004  | 
|  CVE-2022-42004  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-42004)-2022-42004  | 
|  CVE-2022-42004  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-42004)-2022-42004  | 
|  CVE-2022-45685  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-45685)-2022-45685  | 
|  CVE-2022-45685  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-45685)-2022-45685  | 
|  CVE-2022-45693  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-45693)-2022-45693  | 
|  CVE-2022-45693  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-45693)-2022-45693  | 
|  CVE-2022-46751  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-46751)-2022-46751  | 
|  CVE-2022-46751  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-46751)-2022-46751  | 
|  CVE-2023-1370  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-1370)-2023-1370  | 
|  CVE-2023-1436  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-1436)-2023-1436  | 
|  CVE-2023-1436  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-1436)-2023-1436  | 
|  CVE-2023-2976  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-2976)-2023-2976  | 
|  CVE-2023-2976  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-2976)-2023-2976  | 
|  CVE-2023-2976  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-2976)-2023-2976  | 
|  CVE-2023-2976  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-2976)-2023-2976  | 
|  CVE-2023-2976  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-2976)-2023-2976  | 
|  CVE-2023-2976  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-2976)-2023-2976  | 
|  CVE-2023-2976  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-2976)-2023-2976  | 
|  CVE-2023-2976  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-2976)-2023-2976  | 
|  CVE-2023-2976  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-2976)-2023-2976  | 
|  CVE-2023-6378  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-6378)-2023-6378  | 
|  CVE-2023-6378  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-6378)-2023-6378  | 
|  CVE-2023-6481  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-6481)-2023-6481  | 
|  CVE-2023-6481  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-6481)-2023-6481  | 
|  CVE-2024-13009  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-13009)-2024-13009  | 
|  CVE-2024-13009  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-13009)-2024-13009  | 
|  CVE-2024-29857  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-29857)-2024-29857  | 
|  CVE-2024-29857  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-29857)-2024-29857  | 
|  CVE-2024-29857  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-29857)-2024-29857  | 
|  CVE-2024-29857  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-29857)-2024-29857  | 
|  CVE-2024-30172  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-30172)-2024-30172  | 
|  CVE-2024-30172  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-30172)-2024-30172  | 
|  CVE-2024-34447  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-34447)-2024-34447  | 
|  CVE-2024-34447  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-34447)-2024-34447  | 
|  CVE-2024-36114  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-36114)-2024-36114  | 
|  CVE-2024-47561  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-47561)-2024-47561  | 
|  CVE-2024-7254  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-7254)-2024-7254  | 
|  CVE-2024-7254  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-7254)-2024-7254  | 
|  CVE-2024-7254  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-7254)-2024-7254  | 
|  CVE-2024-7254  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-7254)-2024-7254  | 
|  CVE-2024-7254  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-7254)-2024-7254  | 
|  CVE-2024-7254  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-7254)-2024-7254  | 
|  CVE-2024-7254  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-7254)-2024-7254  | 
|  CVE-2024-9823  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-9823)-2024-9823  | 
|  CVE-2025-24970  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2025-24970)-2025-24970  | 
|  CVE-2025-24970  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2025-24970)-2025-24970  | 
|  CVE-2025-27553  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2025-27553)-2025-27553  | 
|  CVE-2025-27817  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2025-27817)-2025-27817  | 
|  CVE-2025-46762  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2025-46762)-2025-46762  | 
|  CVE-2025-46762  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2025-46762)-2025-46762  | 
|  CVE-2025-46762  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2025-46762)-2025-46762  | 
|  CVE-2025-48734  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2025-48734)-2025-48734  | 
|  CVE-2025-52434  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2025-52434)-2025-52434  | 
|  CVE-2025-52999  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2025-52999)-2025-52999  | 
|  CVE-2025-52999  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2025-52999)-2025-52999  | 
|  CVE-2025-52999  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2025-52999)-2025-52999  | 
|  CVE-2025-52999  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2025-52999)-2025-52999  | 
|  CVE-2025-52999  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2025-52999)-2025-52999  | 
|  CVE-2025-52999  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2025-52999)-2025-52999  | 
|  CVE-2025-55163  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2025-55163)-2025-55163  | 
|  CVE-2025-58056  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2025-58056)-2025-58056  | 
|  CVE-2025-58057  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2025-58057)-2025-58057  | 
|  CVE-2025-58057  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2025-58057)-2025-58057  | 
|  CVE-2025-58057  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2025-58057)-2025-58057  | 
|  CVE-2025-59250  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2025-59250)-2025-59250  | 
|  CVE-2012-5783  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2012-5783)-2012-5783  | 
|  CVE-2012-5783  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2012-5783)-2012-5783  | 
|  CVE-2012-6153  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2012-6153)-2012-6153  | 
|  CVE-2012-6153  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2012-6153)-2012-6153  | 
|  CVE-2018-10237  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-10237)-2018-10237  | 
|  CVE-2018-10237  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-10237)-2018-10237  | 
|  CVE-2018-10237  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-10237)-2018-10237  | 
|  CVE-2018-10237  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-10237)-2018-10237  | 
|  CVE-2018-10237  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-10237)-2018-10237  | 
|  CVE-2018-11798  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-11798)-2018-11798  | 
|  CVE-2018-1313  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-1313)-2018-1313  | 
|  CVE-2019-12384  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-12384)-2019-12384  | 
|  CVE-2019-12384  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-12384)-2019-12384  | 
|  CVE-2019-12814  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-12814)-2019-12814  | 
|  CVE-2019-12814  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-12814)-2019-12814  | 
|  CVE-2020-13955  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-13955)-2020-13955  | 
|  CVE-2020-13956  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-13956)-2020-13956  | 
|  CVE-2020-15250  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-15250)-2020-15250  | 
|  CVE-2020-15250  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-15250)-2020-15250  | 
|  CVE-2020-15522  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-15522)-2020-15522  | 
|  CVE-2020-15522  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-15522)-2020-15522  | 
|  CVE-2020-15522  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-15522)-2020-15522  | 
|  CVE-2020-17521  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-17521)-2020-17521  | 
|  CVE-2020-17521  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-17521)-2020-17521  | 
|  CVE-2020-1945  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-1945](https://nvd.nist.gov/vuln/detail/CVE-2020-1945)  | 
|  CVE-2020-26939  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-26939)-2020-26939  | 
|  CVE-2020-26939  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-26939)-2020-26939  | 
|  CVE-2020-26939  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-26939)-2020-26939  | 
|  CVE-2021-22569  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2021-22569)-2021-22569  | 
|  CVE-2021-22569  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2021-22569)-2021-22569  | 
|  CVE-2021-27568  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2021-27568)-2021-27568  | 
|  CVE-2021-28170  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2021-28170)-2021-28170  | 
|  CVE-2021-29425  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2021-29425)-2021-29425  | 
|  CVE-2021-36373  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2021-36373)-2021-36373  | 
|  CVE-2021-36374  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2021-36374)-2021-36374  | 
|  CVE-2022-38749  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-38749)-2022-38749  | 
|  CVE-2022-38750  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-38750)-2022-38750  | 
|  CVE-2022-38751  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-38751)-2022-38751  | 
|  CVE-2022-38752  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-38752)-2022-38752  | 
|  CVE-2022-41854  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-41854)-2022-41854  | 
|  CVE-2023-0833  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-0833)-2023-0833  | 
|  CVE-2023-33201  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-33201)-2023-33201  | 
|  CVE-2023-33201  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-33201)-2023-33201  | 
|  CVE-2023-33201  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-33201)-2023-33201  | 
|  CVE-2023-33201  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-33201)-2023-33201  | 
|  CVE-2023-33202  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-33202)-2023-33202  | 
|  CVE-2023-33202  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-33202)-2023-33202  | 
|  CVE-2023-33202  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-33202)-2023-33202  | 
|  CVE-2023-33202  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-33202)-2023-33202  | 
|  CVE-2023-42503  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-42503)-2023-42503  | 
|  CVE-2023-51074  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-51074)-2023-51074  | 
|  CVE-2024-12798  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-12798)-2024-12798  | 
|  CVE-2024-12798  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-12798)-2024-12798  | 
|  CVE-2024-12798  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-12798)-2024-12798  | 
|  CVE-2024-12798  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-12798)-2024-12798  | 
|  CVE-2024-12798  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-12798)-2024-12798  | 
|  CVE-2024-12798  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-12798)-2024-12798  | 
|  CVE-2024-23944  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-23944)-2024-23944  | 
|  CVE-2024-23945  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-23945)-2024-23945  | 
|  CVE-2024-23945  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-23945)-2024-23945  | 
|  CVE-2024-23953  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-23953)-2024-23953  | 
|  CVE-2024-23953  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-23953)-2024-23953  | 
|  CVE-2024-25710  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-25710)-2024-25710  | 
|  CVE-2024-25710  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-25710)-2024-25710  | 
|  CVE-2024-26308  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-26308)-2024-26308  | 
|  CVE-2024-26308  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-26308)-2024-26308  | 
|  CVE-2024-29025  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-29025)-2024-29025  | 
|  CVE-2024-29869  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-29869)-2024-29869  | 
|  CVE-2024-29869  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-29869)-2024-29869  | 
|  CVE-2024-30171  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-30171)-2024-30171  | 
|  CVE-2024-30171  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-30171)-2024-30171  | 
|  CVE-2024-30171  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-30171)-2024-30171  | 
|  CVE-2024-30171  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-30171)-2024-30171  | 
|  CVE-2024-31141  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-31141)-2024-31141  | 
|  CVE-2024-47535  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-47535)-2024-47535  | 
|  CVE-2024-47535  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-47535)-2024-47535  | 
|  CVE-2024-47554  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-47554)-2024-47554  | 
|  CVE-2024-47554  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-47554)-2024-47554  | 
|  CVE-2024-47554  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-47554)-2024-47554  | 
|  CVE-2024-56128  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-56128)-2024-56128  | 
|  CVE-2024-6763  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-6763)-2024-6763  | 
|  CVE-2024-6763  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-6763)-2024-6763  | 
|  CVE-2024-6763  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-6763)-2024-6763  | 
|  CVE-2024-6763  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-6763)-2024-6763  | 
|  CVE-2024-6763  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-6763)-2024-6763  | 
|  CVE-2024-8184  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-8184)-2024-8184  | 
|  CVE-2025-11226  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2025-11226)-2025-11226  | 
|  CVE-2025-11226  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2025-11226)-2025-11226  | 
|  CVE-2025-11226  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2025-11226)-2025-11226  | 
|  CVE-2025-25193  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2025-25193)-2025-25193  | 
|  CVE-2025-25193  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2025-25193)-2025-25193  | 
|  CVE-2025-30474  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2025-30474)-2025-30474  | 
|  CVE-2025-3588  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2025-3588)-2025-3588  | 
|  CVE-2025-46392  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2025-46392)-2025-46392  | 
|  CVE-2025-48924  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2025-48924)-2025-48924  | 
|  CVE-2025-48924  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2025-48924)-2025-48924  | 
|  CVE-2025-48924  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2025-48924)-2025-48924  | 
|  CVE-2025-48924  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2025-48924)-2025-48924  | 
|  CVE-2025-48924  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2025-48924)-2025-48924  | 
|  CVE-2025-48924  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2025-48924)-2025-48924  | 
|  CVE-2025-48924  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2025-48924)-2025-48924  | 
|  CVE-2025-48924  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2025-48924)-2025-48924  | 
|  CVE-2025-49128  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2025-49128)-2025-49128  | 
|  CVE-2025-49128  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2025-49128)-2025-49128  | 
|  CVE-2025-49128  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2025-49128)-2025-49128  | 
|  CVE-2025-53864  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2025-53864)-2025-53864  | 
|  CVE-2025-58457  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2025-58457)-2025-58457  | 
|  CVE-2025-58457  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2025-58457)-2025-58457  | 
|  CVE-2025-59419  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE-2025-59419](https://nvd.nist.gov/vuln/detail/CVE-2025-59419)  | 
|  CVE-2025-59419  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE-2025-59419](https://nvd.nist.gov/vuln/detail/CVE-2025-59419)  | 
|  CVE-2025-8885  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2025-8885)-2025-8885  | 
|  CVE-2025-8885  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2025-8885)-2025-8885  | 
|  CVE-2025-8916  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE-2025-8916](https://nvd.nist.gov/vuln/detail/CVE-2025-8916)  | 
|  CVE-2025-8916  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE-2025-8916](https://nvd.nist.gov/vuln/detail/CVE-2025-8916)  | 
|  CVE-2025-8916  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE-2025-8916](https://nvd.nist.gov/vuln/detail/CVE-2025-8916)  | 
|  CVE-2025-8916  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE-2025-8916](https://nvd.nist.gov/vuln/detail/CVE-2025-8916)  | 
|  CVE-2020-8908  |  RENDAH  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-8908)-2020-8908  | 
|  CVE-2020-8908  |  RENDAH  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-8908)-2020-8908  | 
|  CVE-2020-8908  |  RENDAH  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-8908)-2020-8908  | 
|  CVE-2020-8908  |  RENDAH  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-8908)-2020-8908  | 
|  CVE-2020-8908  |  RENDAH  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-8908)-2020-8908  | 
|  CVE-2020-8908  |  RENDAH  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-8908)-2020-8908  | 
|  CVE-2020-8908  |  RENDAH  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-8908)-2020-8908  | 
|  CVE-2020-8908  |  RENDAH  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-8908)-2020-8908  | 
|  CVE-2020-8908  |  RENDAH  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-8908)-2020-8908  | 
|  CVE-2024-12801  |  RENDAH  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-12801)-2024-12801  | 
|  CVE-2024-12801  |  RENDAH  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-12801)-2024-12801  | 
|  CVE-2024-12801  |  RENDAH  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-12801)-2024-12801  | 
|  CVE-2025-46551  |  RENDAH  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2025-46551)-2025-46551  | 

## Catatan terbitan 7.12.0
<a name="emr-7120-relnotes"></a>

Catatan rilis berikut mencakup informasi untuk Amazon EMR rilis 7.12.0.
+ **Fitur baru**
  + **Penyimpanan tanpa server untuk EMR Tanpa Server - Amazon EMR tanpa server** memperkenalkan penyimpanan tanpa server, dengan rilis EMR 7.12 dan yang lebih baru, yang menghilangkan penyediaan disk lokal untuk beban kerja Apache Spark. EMR Serverless secara otomatis menangani operasi data perantara seperti shuffle tanpa biaya penyimpanan. Penyimpanan tanpa server memisahkan penyimpanan dari komputasi, memungkinkan Spark untuk segera melepaskan pekerja saat idle daripada membuat mereka tetap aktif untuk menyimpan data sementara. Untuk mempelajari selengkapnya, lihat [aws.amazon.com/serverless-storage-for-emr-serverless](aws.amazon.com/serverless-storage-for-emr-serverless). 
  + **Peningkatan aplikasi - Peningkatan aplikasi** Amazon EMR 7.12.0 termasuk Delta 3.3.2-amzn-1, Flink 1.20.0-amzn-6, 2.6.2-amzn-3, 3.1.3-amzn-21, Hadoop 3.4.1-amzn-4, Hive 3.1.3-amzn-21, Hudi 1.0.2-amzn-1, Iceberg 1.10.0-amzn-0, Presto 0.287-amzn-6 HBase , Spark 3.5.6-amzn-1, Tez 0.10.2-amzn-19, Trino 476-amzn-1 HCatalog , dan 3.9.3-amzn-4. ZooKeeper 
  + **Iceberg Materialized Views** - Memulai Amazon EMR 7.12.0, Amazon EMR Spark mendukung pembuatan dan pengelolaan Iceberg Materialized Views (MV)
  + **Akses Tabel Lengkap Hudi** - Memulai Amazon EMR 7.12.0, Amazon EMR sekarang mendukung kontrol Akses Tabel Penuh (FTA) untuk Apache Hudi di Apache Spark berdasarkan kebijakan Anda yang ditentukan dalam Lake Formation. Fitur ini memungkinkan operasi baca dan tulis dari pekerjaan Amazon EMR Spark Anda di tabel terdaftar Lake Formation saat peran pekerjaan memiliki akses tabel penuh.
  + **Peningkatan versi Iceberg** - Amazon EMR 7.12.0 mendukung Apache Iceberg versi 1.10
  + **Spark dukungan FGAC asli menggunakan Lake Formation** - Anda dapat melakukan DDL/DML operasi (seperti CREATE, ALTER, DELETE, DROP) dengan kontrol akses berbutir halus untuk tabel Apache Hive, Apache Iceberg, dan Delta Lake yang terdaftar di Lake Formation.
  + **Konteks audit untuk pekerjaan Spark - Memulai Amazon EMR 7.12.0, konteks** audit untuk pekerjaan Amazon EMR Spark dengan kluster yang diaktifkan Lake Formation akan tersedia untuk panggilan Glue dan Lake Formation API di AWS log. CloudTrail 
  + Amazon EMR 7.12.0 meningkatkan proses otentikasi kredensi GetClusterSessionCredentials sesi, secara signifikan mengurangi latensi untuk Sesi Interaktif Livy dan akses UI on-cluster pada kluster yang mendukung IAM Identity Center dibandingkan dengan rilis EMR Amazon sebelumnya.
  + Mulai Amazon EMR 7.12.0, Amazon HBase EMR di S3 telah menambahkan fitur prewarm baca-replika untuk menyederhanakan peningkatan versi Amazon EMR. Fitur ini dapat digunakan untuk meng-upgrade HBase cluster yang ada ke dan dari Amazon EMR versi 7.12\$1
+ **Masalah dan keterbatasan yang diketahui**
  + **Athena SQL kompatibilitas**
    + Athena SQL tidak dapat membaca tabel Iceberg tipe V3 yang dibuat oleh Amazon EMR Spark karena kesalahan berikut: GENERIC\$1INTERNAL\$1ERROR: Tidak dapat membaca versi 3 yang tidak didukung.
    + Menulis data menggunakan Amazon EMR Spark ke dalam tabel gunung es yang dibuat menggunakan Athena gagal karena kesalahan berikut: Properti 'write.object-storage.path' telah usang dan akan dihapus di 2.0, gunakan 'write.data.path' sebagai gantinya.
  + **Iceberg Materialized Views (MV) - Amazon** EMR 7.12.0 memiliki dukungan terbatas untuk klausa tampilan SQL untuk pembuatan tampilan terwujud, penulisan ulang kueri, dan penyegaran tambahan. Rincian lebih lanjut dapat ditemukan di halaman dokumentasi fitur Iceberg Materialized Views
  + **Hudi FTA menulis** require using HoodieCredentialedHadoopStorage for credential vending selama eksekusi pekerjaan. Atur konfigurasi berikut saat menjalankan pekerjaan Hudi:
    + `hoodie.storage.class=org.apache.spark.sql.hudi.storage.HoodieCredentialedHadoopStorage`
  + Dukungan penulisan Hudi FTA hanya berfungsi dengan konfigurasi Hudi default. Pengaturan Hudi khusus atau non-default mungkin tidak sepenuhnya didukung dan dapat mengakibatkan perilaku yang tidak terduga. Pengelompokan untuk tabel Hudi Merge-On-Read (MOR) juga tidak didukung dalam mode tulis FTA.
+ **Perubahan, penyempurnaan, dan masalah yang diselesaikan**
  + Mulai EMR 7.12.0, EMR mendukung KMS Key ARN untuk log percikan yang dihosting layanan melalui server riwayat percikan yang persisten. Versi EMR sebelumnya hanya mendukung KeyID.
  + Mulai EMR 7.12.0, EMR telah mengatasi masalah dengan Hue yang mencegah penggunaan sertifikat SSL saat menghosting Hue di Cluster EMR.

## 7.12.0 versi Java default
<a name="emr-7120-jdk"></a>

Amazon EMR rilis 7.12.0 dikirimkan dengan Amazon Corretto 17 (dibangun di atas OpenJDK) secara default untuk aplikasi yang mendukung Corretto 17 (JDK 17), dengan pengecualian Apache Livy.

Tabel berikut menunjukkan versi Java default untuk aplikasi di Amazon EMR 7.12.0.


| Aplikasi | Versi Java/Amazon Corretto (defaultnya tebal) | 
| --- | --- | 
| kuala | 17, 11, 8 | 
| Flink | 17, 11, 8 | 
| HBase | 17, 11, 8 | 
| HCatalog | 17, 11, 8 | 
| Hadoop | 17, 11, 8 | 
| Hive | 17, 11, 8 | 
| Hudi | 17, 11, 8 | 
| Gunung es | 17, 11 | 
| Livy | 17, 11, 8 | 
| Oozie | 17, 11, 8 | 
| Phoenix | 17, 11, 8 | 
| PrestoDB | 8 | 
| Spark | 17, 11, 8 | 
| Spark RAPIDS | 17, 11, 8 | 
| Tez | 17, 11, 8 | 
| Trino | 21, 17 | 
| Zeppelin | 17, 11, 8 | 
| Pig | 17, 11, 8 | 
| Zookeeper | 17, 11, 8 | 

## 7.12.0 versi komponen
<a name="emr-7120-components"></a>

Komponen yang diinstal oleh Amazon EMR dengan rilis ini tercantum di bawah ini. Beberapa komponen diinstal sebagai bagian dari paket aplikasi big data. Sedangkan komponen lainnya bersifak unik untuk Amazon EMR dan diinstal untuk proses sistem dan fitur. Ini biasanya dimulai dengan `emr` atau `aws`. Paket aplikasi big data dalam rilis Amazon EMR terbaru biasanya versi terbaru yang ditemukan di komunitas. Kami menyediakan rilis komunitas di Amazon EMR secepat mungkin.

Beberapa komponen yang ada di Amazon EMR berbeda dari versi komunitas. Komponen ini mempunyai label versi dalam bentuk `CommunityVersion-amzn-EmrVersion`. `EmrVersion` dimulai dari 0. Misalnya, jika komponen komunitas open source bernama `myapp-component` dengan versi 2.2 telah dimodifikasi tiga kali untuk dimasukkan dalam rilis EMR Amazon yang berbeda, versi rilisnya terdaftar sebagai. `2.2-amzn-2`


| Komponen | Versi | Deskripsi | 
| --- | --- | --- | 
| adot-java-agent | 1.31.0 | Agen Java yang mengumpulkan metrik dari daemon aplikasi. | 
| delta | 3.3.2-amzn-1 | Danau Delta adalah format tabel terbuka untuk kumpulan data analitik yang sangat besar | 
| emr-amazon-cloudwatch-agent | 1.300032.2-amzn-0 | Aplikasi yang mengumpulkan metrik tingkat sistem internal dan metrik aplikasi khusus dari instans Amazon EC2. | 
| emr-ddb | 5.7.0 | Konektor Amazon DynamoDB untuk aplikasi ekosistem Hadoop. | 
| emr-goodies | 3.21.0 | Perpustakaan kenyamanan ekstra untuk ekosistem Hadoop. | 
| emr-kinesis | 3.25.0 | Konektor Amazon Kinesis untuk aplikasi ekosistem Hadoop. | 
| emr-notebook-env | 1.18.0 | Conda env untuk emr notebook yang mencakup gateway jupyter korporasi | 
| emr-s3-dist-cp | 2.42.0 | Aplikasi salinan terdistribusi yang dioptimalkan untuk Amazon S3. | 
| emr-s3-select | 2.21.0 | EMR S3Select Connector | 
| emr-wal-cli | 1.3.6 | Cli digunakan untuk daftar emrwal/penghapusan. | 
| emrfs | 2.73.0 | Konektor Amazon S3 untuk aplikasi ekosistem Hadoop. | 
| flink-client | 1.20.0-amzn-6 | Skrip dan aplikasi klien baris perintah Apache Flink. | 
| flink-jobmanager-config | 1.20.0-amzn-6 | Mengelola sumber daya pada node EMR untuk Apache Flink. JobManager | 
| hadoop-client | 3.4.1-amzn-4 | Klien baris perintah Hadoop seperti 'hdfs', 'Hadoop', atau 'yarn'. | 
| hadoop-hdfs-datanode | 3.4.1-amzn-4 | Layanan tingkat simpul HDFS untuk menyimpan blok. | 
| hadoop-hdfs-library | 3.4.1-amzn-4 | Klien dan perpustakaan baris perintah HDFS | 
| hadoop-hdfs-namenode | 3.4.1-amzn-4 | Layanan HDFS untuk melacak nama file dan lokasi blok. | 
| hadoop-hdfs-zkfc | 3.4.1-amzn-4 | Layanan ZKFC untuk melacak namenodes untuk mode HA. | 
| hadoop-hdfs-journalnode | 3.4.1-amzn-4 | Layanan HDFS untuk mengelola jurnal filesystem Hadoop pada klaster HA. | 
| hadoop-httpfs-server | 3.4.1-amzn-4 | Titik akhir HTTP untuk operasi HDFS. | 
| hadoop-kms-server | 3.4.1-amzn-4 | Server manajemen kunci kriptografi berdasarkan API Hadoop. KeyProvider  | 
| hadoop-mapred | 3.4.1-amzn-4 | MapReduce pustaka mesin eksekusi untuk menjalankan MapReduce aplikasi. | 
| hadoop-yarn-nodemanager | 3.4.1-amzn-4 | Layanan YARN untuk mengelola kontainer pada simpul individu. | 
| hadoop-yarn-resourcemanager | 3.4.1-amzn-4 | Layanan YARN untuk mengalokasikan dan mengelola sumber daya klaster dan aplikasi terdistribusi. | 
| hadoop-yarn-timeline-server | 3.4.1-amzn-4 | Layanan untuk mengambil informasi terkini dan historis untuk aplikasi YARN. | 
| hbase-hmaster | 2.6.2-amzn-3 | Layanan untuk HBase cluster yang bertanggung jawab untuk koordinasi Daerah dan pelaksanaan perintah administratif. | 
| hbase-region-server | 2.6.2-amzn-3 | Layanan untuk melayani satu atau lebih HBase wilayah. | 
| hbase-client | 2.6.2-amzn-3 | HBase klien baris perintah. | 
| hbase-rest-server | 2.6.2-amzn-3 | Layanan menyediakan titik akhir RESTful HTTP untuk HBase. | 
| hbase-thrift-server | 2.6.2-amzn-3 | Layanan menyediakan titik akhir Thrift ke. HBase | 
| hbase-operator-tools | 2.6.2-amzn-3 | Alat perbaikan untuk HBase cluster Apache. | 
| hcatalog-client | 3.1.3-amzn-21 | Klien baris perintah 'hcat' untuk memanipulasi hcatalog-server. | 
| hcatalog-server | 3.1.3-amzn-21 | Penyediaan layanan HCatalog, tabel dan lapisan manajemen penyimpanan untuk aplikasi terdistribusi. | 
| hcatalog-webhcat-server | 3.1.3-amzn-21 | Titik akhir HTTP menyediakan antarmuka REST ke HCatalog. | 
| hive-client | 3.1.3-amzn-21 | Klien baris perintah Hive. | 
| hive-hbase | 3.1.3-amzn-21 | Klien Hive-hbase. | 
| hive-metastore-server | 3.1.3-amzn-21 | Layanan untuk mengakses metastore Hive, repositori semantik yang menyimpan metadata untuk SQL pada operasi Hadoop. | 
| hive-server2 | 3.1.3-amzn-21 | Layanan untuk menerima kueri Hive sebagai permintaan web. | 
| hudi | 1.0.2-amzn-1 | Kerangka pemrosesan tambahan untuk memberi daya pada pipa data pada latensi rendah dan efisiensi tinggi. | 
| hudi-presto | 1.0.2-amzn-1 | Perpustakaan paket untuk menjalankan Presto dengan Hudi. | 
| hudi-trino | 1.0.2-amzn-1 | Perpustakaan bundel untuk menjalankan Trino dengan Hudi. | 
| hudi-spark | 1.0.2-amzn-1 | Perpustakaan paket untuk menjalankan Spark dengan Hudi. | 
| hue-server | 4.11.0 | Aplikasi web untuk menganalisis data menggunakan aplikasi ekosistem Hadoop | 
| iceberg | 1.10.0-amzn-0 | Apache Iceberg adalah format tabel terbuka untuk kumpulan data analitik besar | 
| jupyterhub | 1.5.0 | Server multi-pengguna untuk notebook Jupyter | 
| livy-server | 0.8.0-inkubasi | Antarmuka REST untuk berinteraksi dengan Apache Spark | 
| nginx | 1.12.1 | nginx [engine x] adalah server HTTP dan server proksi balik | 
| mariadb-server | 5.5.68\$1 | Server basis data MariaDB. | 
| nvidia-cuda | 12.5.0 | Driver Nvidia dan kit alat Cuda | 
| oozie-client | 5.2.1 | Klien baris perintah Oozie. | 
| oozie-server | 5.2.1 | Layanan untuk menerima permintaan alur kerja Oozie. | 
| opencv | 4.7.0 | Perpustakaan Visi Komputer Sumber Terbuka. | 
| phoenix-library | 5.2.1 | Perpustakaan phoenix untuk server dan klien | 
| phoenix-connectors | 6.0.0 | Konektor Apache Phoenix untuk Spark-3 | 
| phoenix-query-server | 6.0.0 | Sebuah server ringan yang menyediakan akses JDBC serta Protocol Buffers dan akses format JSON ke API Avatica  | 
| presto-coordinator | 0,27-amzn-6 | Layanan untuk menerima kueri dan mengelola eksekusi kueri antara presto-worker. | 
| presto-worker | 0,27-amzn-6 | Layanan untuk mengeksekusi potongan kueri. | 
| presto-client | 0,27-amzn-6 | Klien baris perintah Presto yang diinstal pada master klaster HA yang siaga di mana server Presto server tidak dimulai. | 
| trino-coordinator | 476-amzn-1 | Layanan untuk menerima kueri dan mengelola eksekusi kueri di antara trino-workers. | 
| trino-worker | 476-amzn-1 | Layanan untuk mengeksekusi potongan kueri. | 
| trino-client | 476-amzn-1 | Klien baris perintah Trino yang diinstal pada master siaga cluster HA di mana server Trino tidak dimulai. | 
| pig-client | 0.17.0 | Klien baris perintah Pig. | 
| r | 4.3.2 | Proyek R untuk Komputasi Statistik | 
| ranger-kms-server | 2.0.0 | Sistem Pengelolaan Kunci Ranger Apache | 
| spark-client | 3.5.6-amzn-1 | Klien baris perintah Spark. | 
| spark-history-server | 3.5.6-amzn-1 | Web UI untuk melihat log acara untuk seluruh masa pakai aplikasi Spark. | 
| spark-on-yarn | 3.5.6-amzn-1 | Mesin eksekusi dalam memori untuk YARN. | 
| spark-yarn-slave | 3.5.6-amzn-1 | Perpustakaan Apache Spark yang dibutuhkan oleh slave YARN. | 
| spark-rapids | 25.08.0-amzn-0 | Plugin Nvidia Spark RAPIDS yang mempercepat Apache Spark dengan. GPUs | 
| tensorflow | 2.19.0 | TensorFlow pustaka perangkat lunak open source untuk perhitungan numerik kinerja tinggi. | 
| tez-on-yarn | 0.10.2-amzn-19 | Aplikasi dan perpustakaan tez YARN. | 
| tez-on-worker | 0.10.2-amzn-19 | Aplikasi dan pustaka YARN tez untuk node pekerja. | 
| zeppelin-server | 0.11.1 | Notebook berbasis web yang memungkinkan analisis data interaktif. | 
| zookeeper-server | 3.9.3-amzn-4 | Layanan terpusat untuk menjaga informasi konfigurasi, penamaan, yang menyediakan sinkronisasi terdistribusi, dan menyediakan layanan grup. | 
| zookeeper-client | 3.9.3-amzn-4 | ZooKeeper klien baris perintah. | 

## 7.12.0 klasifikasi konfigurasi
<a name="emr-7120-class"></a>

Klasifikasi konfigurasi memungkinkan Anda menyesuaikan aplikasi. Ini sering kali bersesuaian dengan file XML konfigurasi untuk aplikasi, seperti `hive-site.xml`. Untuk informasi selengkapnya, lihat [Konfigurasikan aplikasi](emr-configure-apps.md).

Tindakan konfigurasi ulang terjadi ketika Anda menentukan konfigurasi untuk grup instans di klaster yang sedang berjalan. Amazon EMR hanya memulai tindakan konfigurasi ulang untuk klasifikasi yang Anda modifikasi. Untuk informasi selengkapnya, lihat [Lakukan konfigurasi ulang pada grup instans di klaster yang sedang berjalan](emr-configure-apps-running-cluster.md).


**klasifikasi emr-7.12.0**  

| Klasifikasi | Deskripsi | Tindakan Konfigurasi Ulang | 
| --- | --- | --- | 
| capacity-scheduler | Ubah nilai dalam file capacity-scheduler.xml Hadoop. | Restarts the ResourceManager service. | 
| container-executor | Ubah nilai dalam file container-executor.cfg Hadoop YARN ini. | Not available. | 
| container-log4j | Ubah nilai dalam file container-log4j.properties Hadoop YARN. | Not available. | 
| core-site | Ubah nilai dalam file core-site.xml Hadoop. | Restarts the Hadoop HDFS services Namenode, SecondaryNamenode, Datanode, ZKFC, and Journalnode. Restarts the Hadoop YARN services ResourceManager, NodeManager, ProxyServer, and TimelineServer. Additionally restarts Hadoop KMS, Ranger KMS, HiveServer2, Hive MetaStore, Hadoop Httpfs, and MapReduce-HistoryServer. | 
| docker-conf | Ubah pengaturan terkait docker. | Not available. | 
| emrfs-site | Ubah pengaturan EMRFS. | Restarts the Hadoop HDFS services Namenode, SecondaryNamenode, Datanode, ZKFC, and Journalnode. Restarts the Hadoop YARN services ResourceManager, NodeManager, ProxyServer, and TimelineServer. Additionally restarts HBaseRegionserver, HBaseMaster, HBaseThrift, HBaseRest, HiveServer2, Hive MetaStore, Hadoop Httpfs, and MapReduce-HistoryServer. | 
| flink-conf | Ubah pengaturan flink-conf.yaml. | Restarts Flink history server. | 
| flink-log4j | Ubah pengaturan log4j.properties Flink. | Restarts Flink history server. | 
| flink-log4j-session | Ubah pengaturan Flink log4j-session.properties untuk sesi. Kubernetes/Yarn  | Restarts Flink history server. | 
| flink-log4j-cli | Ubah pengaturan log4j-cli.properties Flink. | Restarts Flink history server. | 
| hadoop-env | Ubah nilai dalam lingkungan Hadoop untuk semua komponen Hadoop. | Restarts the Hadoop HDFS services Namenode, SecondaryNamenode, Datanode, ZKFC, and Journalnode. Restarts the Hadoop YARN services ResourceManager, NodeManager, ProxyServer, and TimelineServer. Additionally restarts PhoenixQueryserver, HiveServer2, Hive MetaStore, and MapReduce-HistoryServer. | 
| hadoop-log4j | Ubah nilai dalam file log4j.properties Hadoop ini. | Restarts the Hadoop HDFS services SecondaryNamenode, Datanode, and Journalnode. Restarts the Hadoop YARN services ResourceManager, NodeManager, ProxyServer, and TimelineServer. Additionally restarts Hadoop KMS, Hadoop Httpfs, and MapReduce-HistoryServer. | 
| hadoop-ssl-server | Ubah konfigurasi server ssl hadoop | Not available. | 
| hadoop-ssl-client | Ubah konfigurasi klien ssl hadoop | Not available. | 
| hbase | Pengaturan Amazon EMR-curated untuk Apache. HBase | Custom EMR specific property. Sets emrfs-site and hbase-site configs. See those for their associated restarts. | 
| hbase-env | Ubah nilai HBase di lingkungan. | Restarts the HBase services RegionServer, HBaseMaster, ThriftServer, RestServer. | 
| hbase-log4j2 | Ubah nilai dalam file HBase hbase-log4j2.properties. | Restarts the HBase services RegionServer, HBaseMaster, ThriftServer, RestServer. | 
| hbase-metrics | Ubah nilai dalam file HBase hadoop-metrics2-hbase.properties. | Restarts the HBase services RegionServer, HBaseMaster, ThriftServer, RestServer. | 
| hbase-policy | Ubah nilai dalam HBase file hbase-policy.xml. | Not available. | 
| hbase-site | Ubah nilai dalam HBase file hbase-site.xml. | Restarts the HBase services RegionServer, HBaseMaster, ThriftServer, RestServer. Additionally restarts Phoenix QueryServer. | 
| hdfs-encryption-zones | Konfigurasikan zona enkripsi HDFS. | This classification should not be reconfigured. | 
| hdfs-env | Ubah nilai dalam lingkungan HDFS. | Restarts Hadoop HDFS services Namenode, Datanode, and ZKFC. | 
| hdfs-site | Ubah nilai dalam hdfs-site.xml HDFS. | Restarts the Hadoop HDFS services Namenode, SecondaryNamenode, Datanode, ZKFC, and Journalnode. Additionally restarts Hadoop Httpfs. | 
| hcatalog-env | Ubah nilai HCatalog di lingkungan. | Restarts Hive HCatalog Server. | 
| hcatalog-server-jndi | Ubah nilai di HCatalog jndi.properties. | Restarts Hive HCatalog Server. | 
| hcatalog-server-proto-hive-site | Ubah nilai HCatalog proto-hive-site dalam.xml's. | Restarts Hive HCatalog Server. | 
| hcatalog-webhcat-env | Ubah nilai di lingkungan HCatalog WebHCat. | Restarts Hive WebHCat server. | 
| hcatalog-webhcat-log4j2 | Ubah nilai di HCat log4j2.properties HCatalog Web. | Restarts Hive WebHCat server. | 
| hcatalog-webhcat-site | Ubah nilai dalam file webhcat-site.xml HCatalog WebHCat. | Restarts Hive WebHCat server. | 
| hive | Pengaturan dikurasi Amazon EMR untuk Apache Hive. | Sets configurations to launch Hive LLAP service. | 
| hive-beeline-log4j2 | Ubah nilai dalam file beeline-log4j2.properties Hive. | Not available. | 
| hive-parquet-logging | Ubah nilai dalam file parquet-logging.properties Hive. | Not available. | 
| hive-env | Ubah nilai dalam lingkungan Hive. | Restarts HiveServer2, HiveMetastore, and Hive HCatalog-Server. Runs Hive schemaTool CLI commands to verify hive-metastore. | 
| hive-exec-log4j2 | Ubah nilai dalam file hive-exec-log 4j2.properties Hive. | Not available. | 
| hive-llap-daemon-log4j2 | Ubah nilai dalam file llap-daemon-log 4j2.properties Hive. | Not available. | 
| hive-log4j2 | Ubah nilai dalam file hive-log4j2.properties Hive. | Not available. | 
| hive-site | Ubah nilai dalam file hive-site.xml Hive | Restarts HiveServer2, HiveMetastore, and Hive HCatalog-Server. Runs Hive schemaTool CLI commands to verify hive-metastore. Also restarts Oozie and Zeppelin. | 
| hiveserver2-site | Ubah nilai dalam file hiveserver2-site.xml Hive Server2 | Not available. | 
| hue-ini | Ubah nilai dalam file ini Hue | Restarts Hue. Also activates Hue config override CLI commands to pick up new configurations. | 
| httpfs-env | Ubah nilai di lingkungan HTTPFS. | Restarts Hadoop Httpfs service. | 
| httpfs-site | Ubah nilai dalam file httpfs-site.xml Hadoop. | Restarts Hadoop Httpfs service. | 
| hadoop-kms-acls | Ubah nilai dalam file kms-acls.xml Hadoop. | Not available. | 
| hadoop-kms-env | Ubah nilai dalam lingkungan Hadoop KMS. | Restarts Hadoop-KMS service. | 
| hadoop-kms-java-home | Ubah rumah java KMS Hadoop | Not available. | 
| hadoop-kms-log4j | Ubah nilai dalam file kms-log4j.properties Hadoop. | Not available. | 
| hadoop-kms-site | Ubah nilai dalam file kms-site.xml Hadoop. | Restarts Hadoop-KMS and Ranger-KMS service. | 
| hudi-env | Ubah nilai di lingkungan Hudi. | Not available. | 
| hudi-defaults | Ubah nilai dalam file hudi-defaults.conf Hudi. | Not available. | 
| iceberg-defaults | Ubah nilai dalam file iceberg-defaults.conf Iceberg. | Not available. | 
| delta-defaults | Ubah nilai dalam file delta-defaults.conf Delta. | Not available. | 
| jupyter-notebook-conf | Ubah nilai dalam file jupyter\$1notebook\$1config.py Jupyter Notebook. | Not available. | 
| jupyter-hub-conf | Ubah nilai dalam JupyterHubs file jupyterhub\$1config.py. | Not available. | 
| jupyter-s3-conf | Konfigurasikan persistensi Jupyter Notebook S3. | Not available. | 
| jupyter-sparkmagic-conf | Ubah nilai dalam file config.json Sparkmagic. | Not available. | 
| livy-conf | Ubah nilai dalam file livy.conf Livy. | Restarts Livy Server. | 
| livy-env | Ubah nilai di lingkungan Livy. | Restarts Livy Server. | 
| livy-log4j2 | Ubah pengaturan Livy log4j2.properties. | Restarts Livy Server. | 
| mapred-env | Ubah nilai di lingkungan MapReduce aplikasi. | Restarts Hadoop MapReduce-HistoryServer. | 
| mapred-site | Ubah nilai dalam file mapred-site.xml MapReduce aplikasi. | Restarts Hadoop MapReduce-HistoryServer. | 
| oozie-env | Ubah nilai di lingkungan Oozie. | Restarts Oozie. | 
| oozie-log4j | Ubah nilai dalam file oozie-log4j.properties Oozie. | Restarts Oozie. | 
| oozie-site | Ubah nilai dalam file oozie-site.xml Oozie. | Restarts Oozie. | 
| phoenix-hbase-metrics | Ubah nilai dalam file hadoop-metrics2-hbase.properties Phoenix. | Not available. | 
| phoenix-hbase-site | Ubah nilai dalam file hbase-site.xml Phoenix. | Not available. | 
| phoenix-log4j2 | Ubah nilai dalam file log4j2.properties Phoenix. | Restarts Phoenix-QueryServer. | 
| phoenix-metrics | Ubah nilai dalam file hadoop-metrics2-phoenix.properties Phoenix. | Not available. | 
| pig-env | Ubah nilai di lingkungan Pig. | Not available. | 
| pig-properties | Ubah nilai dalam file pig.properties Pig. | Restarts Oozie. | 
| pig-log4j | Ubah nilai dalam file log4j.properties Pig. | Not available. | 
| presto-log | Ubah nilai dalam file log.properties Presto. | Restarts Presto-Server (for PrestoDB) | 
| presto-config | Ubah nilai dalam file config.properties Presto. | Restarts Presto-Server (for PrestoDB) | 
| presto-password-authenticator | Ubah nilai dalam file password-authenticator.properties Presto. | Not available. | 
| presto-env | Ubah nilai dalam file presto-env.sh Presto. | Restarts Presto-Server (for PrestoDB) | 
| presto-node | Ubah nilai dalam file node.properties Presto. | Not available. | 
| presto-connector-blackhole | Ubah nilai dalam file blackhole.properties Presto. | Not available. | 
| presto-connector-cassandra | Ubah nilai dalam file cassandra.properties Presto. | Not available. | 
| presto-connector-hive | Ubah nilai dalam file hive.properties Presto. | Restarts Presto-Server (for PrestoDB) | 
| presto-connector-jmx | Ubah nilai dalam file jmx.properties Presto. | Not available. | 
| presto-connector-kafka | Ubah nilai dalam file kafka.properties Presto. | Not available. | 
| presto-connector-lakeformation | Ubah nilai dalam file lakeformation.properties Presto. | Restarts Presto-Server (for PrestoDB) | 
| presto-connector-localfile | Ubah nilai dalam file localfile.properties Presto. | Not available. | 
| presto-connector-memory | Ubah nilai dalam file memory.properties Presto. | Not available. | 
| presto-connector-mongodb | Ubah nilai dalam file mongodb.properties Presto. | Not available. | 
| presto-connector-mysql | Ubah nilai dalam file mysql.properties Presto. | Not available. | 
| presto-connector-postgresql | Ubah nilai dalam file postgresql.properties Presto. | Not available. | 
| presto-connector-raptor | Ubah nilai dalam file raptor.properties Presto. | Not available. | 
| presto-connector-redis | Ubah nilai dalam file redis.properties Presto. | Not available. | 
| presto-connector-redshift | Ubah nilai dalam file redshift.properties Presto. | Not available. | 
| presto-connector-tpch | Ubah nilai dalam file tpch.properties Presto. | Not available. | 
| presto-connector-tpcds | Ubah nilai dalam file tpcds.properties Presto. | Not available. | 
| trino-log | Ubah nilai dalam file log.properties Trino. | Restarts Trino-Server (for Trino) | 
| trino-config | Ubah nilai dalam file config.properties Trino. | Restarts Trino-Server (for Trino) | 
| trino-password-authenticator | Ubah nilai dalam file password-authenticator.properties Trino. | Restarts Trino-Server (for Trino) | 
| trino-env | Ubah nilai dalam file trino-env.sh Trino. | Restarts Trino-Server (for Trino) | 
| trino-node | Ubah nilai dalam file node.properties Trino. | Not available. | 
| trino-connector-blackhole | Ubah nilai dalam file blackhole.properties Trino. | Not available. | 
| trino-connector-cassandra | Ubah nilai dalam file cassandra.properties Trino. | Not available. | 
| trino-connector-delta | Ubah nilai dalam file delta.properties Trino. | Restarts Trino-Server (for Trino) | 
| trino-connector-hive | Ubah nilai dalam file hive.properties Trino. | Restarts Trino-Server (for Trino) | 
| trino-exchange-manager | Ubah nilai dalam file exchange-manager.properties Trino. | Restarts Trino-Server (for Trino) | 
| trino-connector-iceberg | Ubah nilai dalam file iceberg.properties Trino. | Restarts Trino-Server (for Trino) | 
| trino-connector-hudi | Ubah nilai dalam file hudi.properties Trino. | Restarts Trino-Server (for Trino) | 
| trino-connector-jmx | Ubah nilai dalam file jmx.properties Trino. | Not available. | 
| trino-connector-kafka | Ubah nilai dalam file kafka.properties Trino. | Not available. | 
| trino-connector-localfile | Ubah nilai dalam file localfile.properties Trino. | Not available. | 
| trino-connector-memory | Ubah nilai dalam file memory.properties Trino. | Not available. | 
| trino-connector-mongodb | Ubah nilai dalam file mongodb.properties Trino. | Not available. | 
| trino-connector-mysql | Ubah nilai dalam file mysql.properties Trino. | Not available. | 
| trino-connector-postgresql | Ubah nilai dalam file postgresql.properties Trino. | Not available. | 
| trino-connector-raptor | Ubah nilai dalam file raptor.properties Trino. | Not available. | 
| trino-connector-redis | Ubah nilai dalam file redis.properties Trino. | Not available. | 
| trino-connector-redshift | Ubah nilai dalam file redshift.properties Trino. | Not available. | 
| trino-connector-tpch | Ubah nilai dalam file tpch.properties Trino. | Not available. | 
| trino-connector-tpcds | Ubah nilai dalam file tpcds.properties Trino. | Not available. | 
| ranger-kms-dbks-site | Ubah nilai dalam file dbks-site.xml Ranger KMS. | Restarts Ranger KMS Server. | 
| ranger-kms-site | Ubah nilai dalam ranger-kms-site file.xml. dari Ranger KMS. | Restarts Ranger KMS Server. | 
| ranger-kms-env | Ubah nilai di lingkungan Ranger KMS. | Restarts Ranger KMS Server. | 
| ranger-kms-logback | Ubah nilai dalam file kms-logback.xml dari Ranger KMS. | Not available. | 
| ranger-kms-db-ca | Ubah nilai untuk file CA pada S3 untuk koneksi MySQL SSL dengan Ranger KMS. | Not available. | 
| spark | Pengaturan terkurasi Amazon EMR untuk Apache Spark. | This property modifies spark-defaults. See actions there. | 
| spark-defaults | Ubah nilai dalam file spark-defaults.conf Spark. | Restarts Spark history server and Spark thrift server. | 
| spark-env | Ubah nilai di lingkungan Spark. | Restarts Spark history server and Spark thrift server. | 
| spark-hive-site | Ubah nilai dalam file hive-site.xml Spark | Not available. | 
| spark-log4j2 | Ubah nilai dalam file log4j2.properties Spark. | Restarts Spark history server and Spark thrift server. | 
| spark-metrics | Ubah nilai dalam file metrics.properties Spark. | Restarts Spark history server and Spark thrift server. | 
| tez-site | Ubah nilai dalam file tez-site.xml Tez. | Restart Oozie and HiveServer2. | 
| yarn-env | Ubah nilai di lingkungan YARN. | Restarts the Hadoop YARN services ResourceManager, NodeManager, ProxyServer, and TimelineServer. Additionally restarts MapReduce-HistoryServer. | 
| yarn-site | Ubah nilai dalam file yarn-site.xml YARN. | Restarts the Hadoop YARN services ResourceManager, NodeManager, ProxyServer, and TimelineServer. Additionally restarts Livy Server and MapReduce-HistoryServer. | 
| zeppelin-env | Ubah nilai di lingkungan Zeppelin. | Restarts Zeppelin. | 
| zeppelin-site | Ubah pengaturan konfigurasi di zeppelin-site.xml. | Restarts Zeppelin. | 
| zookeeper-config | Ubah nilai dalam ZooKeeper file zoo.cfg. | Restarts Zookeeper server. | 
| zookeeper-logback | Ubah nilai dalam ZooKeeper file logback.xml. | Restarts Zookeeper server. | 
| cloudwatch-logs | Konfigurasikan integrasi CloudWatch Log untuk node cluster EMR. | Not available. | 
| emr-metrics | Ubah pengaturan metrik emr untuk simpul ini. | Restarts the CloudWatchAgent service. | 

## 7.12.0 perubahan log
<a name="7120-changelog"></a>


**Ubah log untuk catatan rilis dan rilis 7.12.0**  

| Date | Peristiwa | Deskripsi | 
| --- | --- | --- | 
| 2025-11-21 | Publikasi Docs | Amazon EMR 7.12.0 catatan rilis pertama kali diterbitkan | 

# Amazon EMR rilis 7.11.0
<a name="emr-7110-release"></a>

## 7.11.0 siklus hidup yang didukung
<a name="emr-7110-supported-lifecycle"></a>

Tabel berikut menjelaskan tanggal siklus hidup yang didukung untuk rilis Amazon EMR 7.11.0.


| Fase Support | Date | 
| --- | --- | 
| Tanggal rilis awal | November 03, 2025 | 
| Dukungan standar sampai | November 03, 2027 | 
| Akhir dari dukungan | November 04, 2027 | 
| Akhir hidup | November 03, 2028 | 

## 7.11.0 versi aplikasi
<a name="emr-7110-app-versions"></a>

Rilis ini mencakup aplikasi berikut: [https://docs.aws.amazon.com/AmazonCloudWatch/latest/monitoring/Install-CloudWatch-Agent.html](https://docs.aws.amazon.com/AmazonCloudWatch/latest/monitoring/Install-CloudWatch-Agent.html), [https://delta.io/](https://delta.io/), [https://flink.apache.org/](https://flink.apache.org/), [http://hbase.apache.org/](http://hbase.apache.org/), [https://cwiki.apache.org/confluence/display/Hive/HCatalog](https://cwiki.apache.org/confluence/display/Hive/HCatalog), [http://hive.apache.org/](http://hive.apache.org/), [https://hudi.apache.org](https://hudi.apache.org), [http://gethue.com/](http://gethue.com/), [https://iceberg.apache.org/](https://iceberg.apache.org/), [https://jupyter-enterprise-gateway.readthedocs.io/en/latest/](https://jupyter-enterprise-gateway.readthedocs.io/en/latest/), [https://jupyterhub.readthedocs.io/en/latest/#](https://jupyterhub.readthedocs.io/en/latest/#), [https://livy.incubator.apache.org/](https://livy.incubator.apache.org/), [http://oozie.apache.org/](http://oozie.apache.org/), [https://phoenix.apache.org/](https://phoenix.apache.org/), [http://pig.apache.org/](http://pig.apache.org/), [https://prestodb.io/](https://prestodb.io/), [https://spark.apache.org/docs/latest/](https://spark.apache.org/docs/latest/), [https://www.tensorflow.org/](https://www.tensorflow.org/), [https://tez.apache.org/](https://tez.apache.org/), [https://trino.io/](https://trino.io/), [https://zeppelin.incubator.apache.org/](https://zeppelin.incubator.apache.org/), dan [https://zookeeper.apache.org](https://zookeeper.apache.org).

Tabel di bawah ini mencantumkan versi aplikasi yang tersedia dalam rilis Amazon EMR ini dan versi aplikasi dalam tiga rilis EMR Amazon sebelumnya (bila berlaku).

Untuk riwayat lengkap versi aplikasi untuk setiap rilis Amazon EMR, lihat topik berikut:
+ [Versi aplikasi di Amazon EMR 7.x rilis](emr-release-app-versions-7.x.md)
+ [Versi aplikasi di Amazon EMR 6.x rilis](emr-release-app-versions-6.x.md)
+ [Versi aplikasi di Amazon EMR 5.x rilis](emr-release-app-versions-5.x.md)
+ [Versi aplikasi di Amazon EMR 4.x rilis](emr-release-app-versions-4.x.md)


**Informasi versi aplikasi**  

|  | emr-7.11.0 | emr-7.10.0 | emr-7.9.0 | emr-7.8.0 | 
| --- | --- | --- | --- | --- | 
| AWS SDK for Java | 2.35.5, 1.12.792 | 2.31.48, 1.12.782 | 2.31.16, 1.12.782 | 2.29.52, 1.12.780 | 
| Python | 3.9, 3.11 | 3.9, 3.11 | 3.9, 3.11 | 3.9, 3.11 | 
| Skala | 2.12.18 | 2.12.18 | 2.12.18 | 2.12.18 | 
| AmazonCloudWatchAgent | 1.300032.2-amzn-0 | 1.300032.2-amzn-0 | 1.300032.2-amzn-0 | 1.300032.2-amzn-0 | 
| Delta | 3.3.2-amzn-0 | 3.3.0-amzn-2 | 3.3.0-amzn-1 | 3.3.0-amzn-0 | 
| Flink | 1.20.0-amzn-5 | 1.20.0-amzn-4 | 1.20.0-amzn-3 | 1.20.0-amzn-2 | 
| Ganglia |  -  |  -  |  -  |  -  | 
| HBase | 2.6.2-amzn-2 | 2.6.2-amzn-1 | 2.6.2-amzn-0 | 2.6.1-amzn-2 | 
| HCatalog | 3.1.3-amzn-20 | 3.1.3-amzn-19 | 3.1.3-amzn-18 | 3.1.3-amzn-17 | 
| Hadoop | 3.4.1-amzn-3 | 3.4.1-amzn-2 | 3.4.1-amzn-1 | 3.4.1-amzn-0 | 
| Hive | 3.1.3-amzn-20 | 3.1.3-amzn-19 | 3.1.3-amzn-18 | 3.1.3-amzn-17 | 
| Hudi | 1.0.2-amzn-0 | 0.15.0-amzn-7 | 0.15.0-amzn-6 | 0.15.0-amzn-5 | 
| Hue | 4.11.0 | 4.11.0 | 4.11.0 | 4.11.0 | 
| Iceberg | 1.9.1-amzn-0 | 1.8.1-amzn-0 | 1.7.1-amzn-2 | 1.7.1-amzn-1 | 
| JupyterEnterpriseGateway | 2.6.0 | 2.6.0 | 2.6.0 | 2.6.0 | 
| JupyterHub | 1.5.0 | 1.5.0 | 1.5.0 | 1.5.0 | 
| Livy | 0.8.0-inkubasi | 0.8.0-inkubasi | 0.8.0-inkubasi | 0.8.0-inkubasi | 
| MXNet |  -  |  -  |  -  |  -  | 
| Mahout |  -  |  -  |  -  |  -  | 
| Oozie | 5.2.1 | 5.2.1 | 5.2.1 | 5.2.1 | 
| Phoenix | 5.2.1 | 5.2.1 | 5.2.1 | 5.2.1 | 
| Pig | 0.17.0 | 0.17.0 | 0.17.0 | 0.17.0 | 
| Presto | 0,27-amzn-5 | 0,27-amzn-4 | 0,287-amzn-3 | 0,287-amzn-2 | 
| Spark | 3.5.6-amzn-0 | 3.5.5-amzn-1 | 3.5.5-amzn-0 | 3.5.4-amzn-0 | 
| Sqoop |  -  |  -  |  -  |  -  | 
| TensorFlow | 2.19.0 | 2.18.0 | 2.16.1 | 2.16.1 | 
| Tez | 0.10.2-amzn-18 | 0.10.2-amzn-17 | 0.10.2-amzn-16 | 0.10.2-amzn-15 | 
| Trino (PrestoSQL) | 475-amzn-0 | 470-amzn-0 | 467-amzn-2 | 467-amzn-1 | 
| Zeppelin | 0.11.1 | 0.11.1 | 0.11.1 | 0.11.1 | 
| ZooKeeper | 3.9.3-amzn-3 | 3.9.3-amzn-2 | 3.9.3-amzn-1 | 3.9.3-amzn-0 | 

# 7.11.0 kerentanan dan eksposur umum
<a name="7110-common-vulnerabilities-exposures"></a>

Tabel berikut mencantumkan semua CVEs yang tidak memengaruhi kluster EMR yang berjalan pada konfigurasi yang direkomendasikan Amazon EMR 7.11.0. Amazon EMR bergantung pada sumber terbuka hulu untuk ketersediaan perbaikan dan akan memberikan versi stabil terbaru sebagai bagian dari komponen Core Engine dalam waktu 90 hari setelah Amazon EMR memverifikasi perbaikan.

Tabel ini diperbarui pada 18 November 2025.


| ID CVE | Kepelikan | URL detail CVE | 
| --- | --- | --- | 
|  CVE-2015-1832  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2015-1832)-2015-1832  | 
|  CVE-2016-5018  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2016-5018)-2016-5018  | 
|  CVE-2017-15095  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2017-15095)-2017-15095  | 
|  CVE-2017-17485  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2017-17485)-2017-17485  | 
|  CVE-2017-7525  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2017-7525)-2017-7525  | 
|  CVE-2018-11307  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-11307)-2018-11307  | 
|  CVE-2018-11307  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-11307)-2018-11307  | 
|  CVE-2018-14718  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-14718)-2018-14718  | 
|  CVE-2018-14718  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-14718)-2018-14718  | 
|  CVE-2018-14719  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE-2018-14719](https://nvd.nist.gov/vuln/detail/CVE-2018-14719)  | 
|  CVE-2018-14719  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE-2018-14719](https://nvd.nist.gov/vuln/detail/CVE-2018-14719)  | 
|  CVE-2018-14720  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-14720)-2018-14720  | 
|  CVE-2018-14720  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-14720)-2018-14720  | 
|  CVE-2018-14721  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-14721)-2018-14721  | 
|  CVE-2018-14721  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-14721)-2018-14721  | 
|  CVE-2018-19360  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-19360)-2018-19360  | 
|  CVE-2018-19360  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-19360)-2018-19360  | 
|  CVE-2018-19361  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-19361)-2018-19361  | 
|  CVE-2018-19361  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-19361)-2018-19361  | 
|  CVE-2018-19362  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-19362)-2018-19362  | 
|  CVE-2018-19362  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-19362)-2018-19362  | 
|  CVE-2018-7489  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-7489)-2018-7489  | 
|  CVE-2018-7489  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-7489)-2018-7489  | 
|  CVE-2019-10202  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-10202)-2019-10202  | 
|  CVE-2019-14379  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-14379)-2019-14379  | 
|  CVE-2019-14379  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-14379)-2019-14379  | 
|  CVE-2019-14540  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-14540)-2019-14540  | 
|  CVE-2019-14540  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-14540)-2019-14540  | 
|  CVE-2019-14892  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-14892)-2019-14892  | 
|  CVE-2019-14892  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-14892)-2019-14892  | 
|  CVE-2019-14893  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-14893)-2019-14893  | 
|  CVE-2019-14893  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-14893)-2019-14893  | 
|  CVE-2019-16335  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-16335)-2019-16335  | 
|  CVE-2019-16335  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-16335)-2019-16335  | 
|  CVE-2019-16942  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-16942)-2019-16942  | 
|  CVE-2019-16942  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-16942)-2019-16942  | 
|  CVE-2019-16943  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-16943)-2019-16943  | 
|  CVE-2019-16943  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-16943)-2019-16943  | 
|  CVE-2019-17267  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-17267)-2019-17267  | 
|  CVE-2019-17267  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-17267)-2019-17267  | 
|  CVE-2019-17531  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-17531)-2019-17531  | 
|  CVE-2019-17531  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-17531)-2019-17531  | 
|  CVE-2019-20330  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-20330)-2019-20330  | 
|  CVE-2019-20330  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-20330)-2019-20330  | 
|  CVE-2020-8840  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-8840)-2020-8840  | 
|  CVE-2020-8840  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-8840)-2020-8840  | 
|  CVE-2020-9546  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-9546)-2020-9546  | 
|  CVE-2020-9546  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-9546)-2020-9546  | 
|  CVE-2020-9547  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-9547)-2020-9547  | 
|  CVE-2020-9547  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-9547)-2020-9547  | 
|  CVE-2020-9548  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-9548)-2020-9548  | 
|  CVE-2020-9548  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-9548)-2020-9548  | 
|  CVE-2022-1471  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-1471)-2022-1471  | 
|  CVE-2022-1471  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-1471)-2022-1471  | 
|  CVE-2022-37865  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-37865)-2022-37865  | 
|  CVE-2022-39135  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-39135)-2022-39135  | 
|  CVE-2022-46337  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-46337)-2022-46337  | 
|  CVE-2022-46337  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-46337)-2022-46337  | 
|  CVE-2024-51504  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-51504)-2024-51504  | 
|  CVE-2024-51504  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-51504)-2024-51504  | 
|  CVE-2024-52046  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-52046)-2024-52046  | 
|  CVE-2024-52046  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-52046)-2024-52046  | 
|  CVE-2024-53990  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-53990)-2024-53990  | 
|  CVE-2025-30065  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2025-30065)-2025-30065  | 
|  CVE-2014-3643  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2014-3643)-2014-3643  | 
|  CVE-2015-5237  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2015-5237)-2015-5237  | 
|  CVE-2015-5237  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2015-5237)-2015-5237  | 
|  CVE-2016-6796  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2016-6796)-2016-6796  | 
|  CVE-2018-1000180  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-1000180)-2018-1000180  | 
|  CVE-2018-1000180  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-1000180)-2018-1000180  | 
|  CVE-2018-12022  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-12022)-2018-12022  | 
|  CVE-2018-12022  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-12022)-2018-12022  | 
|  CVE-2018-12023  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-12023)-2018-12023  | 
|  CVE-2018-12023  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-12023)-2018-12023  | 
|  CVE-2018-5968  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-5968)-2018-5968  | 
|  CVE-2019-0205  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-0205)-2019-0205  | 
|  CVE-2019-0205  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-0205)-2019-0205  | 
|  CVE-2019-10172  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-10172)-2019-10172  | 
|  CVE-2019-12086  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-12086)-2019-12086  | 
|  CVE-2019-12086  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-12086)-2019-12086  | 
|  CVE-2019-14439  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-14439)-2019-14439  | 
|  CVE-2019-14439  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-14439)-2019-14439  | 
|  CVE-2020-10650  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-10650)-2020-10650  | 
|  CVE-2020-10650  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-10650)-2020-10650  | 
|  CVE-2020-10672  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-10672)-2020-10672  | 
|  CVE-2020-10672  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-10672)-2020-10672  | 
|  CVE-2020-10673  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-10673)-2020-10673  | 
|  CVE-2020-10673  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-10673)-2020-10673  | 
|  CVE-2020-10968  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-10968)-2020-10968  | 
|  CVE-2020-10968  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-10968)-2020-10968  | 
|  CVE-2020-10969  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-10969)-2020-10969  | 
|  CVE-2020-10969  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-10969)-2020-10969  | 
|  CVE-2020-11111  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-11111)-2020-11111  | 
|  CVE-2020-11111  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-11111)-2020-11111  | 
|  CVE-2020-11112  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-11112)-2020-11112  | 
|  CVE-2020-11112  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-11112)-2020-11112  | 
|  CVE-2020-11113  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-11113)-2020-11113  | 
|  CVE-2020-11113  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-11113)-2020-11113  | 
|  CVE-2020-11619  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-11619](https://nvd.nist.gov/vuln/detail/CVE-2020-11619)  | 
|  CVE-2020-11619  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-11619](https://nvd.nist.gov/vuln/detail/CVE-2020-11619)  | 
|  CVE-2020-11620  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-11620)-2020-11620  | 
|  CVE-2020-11620  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-11620)-2020-11620  | 
|  CVE-2020-13949  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-13949)-2020-13949  | 
|  CVE-2020-13949  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-13949)-2020-13949  | 
|  CVE-2020-13949  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-13949)-2020-13949  | 
|  CVE-2020-14060  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-14060)-2020-14060  | 
|  CVE-2020-14060  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-14060)-2020-14060  | 
|  CVE-2020-14061  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-14061)-2020-14061  | 
|  CVE-2020-14061  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-14061)-2020-14061  | 
|  CVE-2020-14062  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-14062)-2020-14062  | 
|  CVE-2020-14062  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-14062)-2020-14062  | 
|  CVE-2020-14195  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-14195)-2020-14195  | 
|  CVE-2020-14195  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-14195)-2020-14195  | 
|  CVE-2020-24616  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-24616)-2020-24616  | 
|  CVE-2020-24616  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-24616)-2020-24616  | 
|  CVE-2020-24750  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-24750)-2020-24750  | 
|  CVE-2020-24750  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-24750)-2020-24750  | 
|  CVE-2020-25649  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-25649)-2020-25649  | 
|  CVE-2020-28052  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-28052)-2020-28052  | 
|  CVE-2020-35490  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-35490)-2020-35490  | 
|  CVE-2020-35490  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-35490)-2020-35490  | 
|  CVE-2020-35491  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-35491)-2020-35491  | 
|  CVE-2020-35491  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-35491)-2020-35491  | 
|  CVE-2020-35728  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-35728)-2020-35728  | 
|  CVE-2020-35728  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-35728)-2020-35728  | 
|  CVE-2020-36179  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36179)-2020-36179  | 
|  CVE-2020-36179  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36179)-2020-36179  | 
|  CVE-2020-36180  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36180)-2020-36180  | 
|  CVE-2020-36180  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36180)-2020-36180  | 
|  CVE-2020-36181  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36181)-2020-36181  | 
|  CVE-2020-36181  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36181)-2020-36181  | 
|  CVE-2020-36182  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36182)-2020-36182  | 
|  CVE-2020-36182  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36182)-2020-36182  | 
|  CVE-2020-36183  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36183)-2020-36183  | 
|  CVE-2020-36183  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36183)-2020-36183  | 
|  CVE-2020-36184  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36184)-2020-36184  | 
|  CVE-2020-36184  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36184)-2020-36184  | 
|  CVE-2020-36185  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36185)-2020-36185  | 
|  CVE-2020-36185  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36185)-2020-36185  | 
|  CVE-2020-36186  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36186)-2020-36186  | 
|  CVE-2020-36186  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36186)-2020-36186  | 
|  CVE-2020-36187  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36187)-2020-36187  | 
|  CVE-2020-36187  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36187)-2020-36187  | 
|  CVE-2020-36188  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36188)-2020-36188  | 
|  CVE-2020-36188  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36188)-2020-36188  | 
|  CVE-2020-36189  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36189)-2020-36189  | 
|  CVE-2020-36189  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36189)-2020-36189  | 
|  CVE-2020-36518  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36518)-2020-36518  | 
|  CVE-2020-36518  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36518)-2020-36518  | 
|  CVE-2021-0341  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2021-0341)-2021-0341  | 
|  CVE-2021-20190  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2021-20190)-2021-20190  | 
|  CVE-2021-20190  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2021-20190)-2021-20190  | 
|  CVE-2021-31684  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2021-31684)-2021-31684  | 
|  CVE-2021-34538  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2021-34538)-2021-34538  | 
|  CVE-2021-34538  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2021-34538)-2021-34538  | 
|  CVE-2021-34538  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2021-34538)-2021-34538  | 
|  CVE-2022-25647  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-25647)-2022-25647  | 
|  CVE-2022-25647  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-25647)-2022-25647  | 
|  CVE-2022-25857  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-25857)-2022-25857  | 
|  CVE-2022-3171  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-3171)-2022-3171  | 
|  CVE-2022-3171  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-3171)-2022-3171  | 
|  CVE-2022-3509  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-3509)-2022-3509  | 
|  CVE-2022-3509  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-3509)-2022-3509  | 
|  CVE-2022-3510  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-3510)-2022-3510  | 
|  CVE-2022-36364  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-36364)-2022-36364  | 
|  CVE-2022-37866  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-37866)-2022-37866  | 
|  CVE-2022-40149  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-40149)-2022-40149  | 
|  CVE-2022-40149  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-40149)-2022-40149  | 
|  CVE-2022-40150  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-40150)-2022-40150  | 
|  CVE-2022-40150  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-40150)-2022-40150  | 
|  CVE-2022-41404  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-41404)-2022-41404  | 
|  CVE-2022-42003  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-42003)-2022-42003  | 
|  CVE-2022-42003  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-42003)-2022-42003  | 
|  CVE-2022-42003  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-42003)-2022-42003  | 
|  CVE-2022-42003  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-42003)-2022-42003  | 
|  CVE-2022-42003  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-42003)-2022-42003  | 
|  CVE-2022-42004  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-42004)-2022-42004  | 
|  CVE-2022-42004  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-42004)-2022-42004  | 
|  CVE-2022-42004  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-42004)-2022-42004  | 
|  CVE-2022-42004  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-42004)-2022-42004  | 
|  CVE-2022-45685  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-45685)-2022-45685  | 
|  CVE-2022-45685  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-45685)-2022-45685  | 
|  CVE-2022-45693  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-45693)-2022-45693  | 
|  CVE-2022-45693  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-45693)-2022-45693  | 
|  CVE-2022-46751  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-46751)-2022-46751  | 
|  CVE-2022-46751  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-46751)-2022-46751  | 
|  CVE-2023-1370  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-1370)-2023-1370  | 
|  CVE-2023-1436  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-1436)-2023-1436  | 
|  CVE-2023-1436  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-1436)-2023-1436  | 
|  CVE-2023-2976  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-2976)-2023-2976  | 
|  CVE-2023-2976  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-2976)-2023-2976  | 
|  CVE-2023-2976  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-2976)-2023-2976  | 
|  CVE-2023-2976  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-2976)-2023-2976  | 
|  CVE-2023-2976  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-2976)-2023-2976  | 
|  CVE-2023-2976  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-2976)-2023-2976  | 
|  CVE-2023-2976  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-2976)-2023-2976  | 
|  CVE-2023-2976  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-2976)-2023-2976  | 
|  CVE-2023-2976  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-2976)-2023-2976  | 
|  CVE-2023-6378  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-6378)-2023-6378  | 
|  CVE-2023-6378  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-6378)-2023-6378  | 
|  CVE-2023-6481  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-6481)-2023-6481  | 
|  CVE-2023-6481  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-6481)-2023-6481  | 
|  CVE-2024-13009  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-13009)-2024-13009  | 
|  CVE-2024-13009  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-13009)-2024-13009  | 
|  CVE-2024-29857  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-29857)-2024-29857  | 
|  CVE-2024-29857  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-29857)-2024-29857  | 
|  CVE-2024-29857  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-29857)-2024-29857  | 
|  CVE-2024-29857  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-29857)-2024-29857  | 
|  CVE-2024-30172  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-30172)-2024-30172  | 
|  CVE-2024-30172  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-30172)-2024-30172  | 
|  CVE-2024-34447  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-34447)-2024-34447  | 
|  CVE-2024-34447  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-34447)-2024-34447  | 
|  CVE-2024-36114  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-36114)-2024-36114  | 
|  CVE-2024-7254  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-7254)-2024-7254  | 
|  CVE-2024-7254  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-7254)-2024-7254  | 
|  CVE-2024-7254  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-7254)-2024-7254  | 
|  CVE-2024-7254  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-7254)-2024-7254  | 
|  CVE-2024-7254  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-7254)-2024-7254  | 
|  CVE-2024-7254  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-7254)-2024-7254  | 
|  CVE-2024-7254  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-7254)-2024-7254  | 
|  CVE-2024-9823  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-9823)-2024-9823  | 
|  CVE-2025-24970  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2025-24970)-2025-24970  | 
|  CVE-2025-24970  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2025-24970)-2025-24970  | 
|  CVE-2025-27553  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2025-27553)-2025-27553  | 
|  CVE-2025-27817  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2025-27817)-2025-27817  | 
|  CVE-2025-46762  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2025-46762)-2025-46762  | 
|  CVE-2025-46762  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2025-46762)-2025-46762  | 
|  CVE-2025-48734  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2025-48734)-2025-48734  | 
|  CVE-2025-52434  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2025-52434)-2025-52434  | 
|  CVE-2025-52999  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2025-52999)-2025-52999  | 
|  CVE-2025-52999  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2025-52999)-2025-52999  | 
|  CVE-2025-52999  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2025-52999)-2025-52999  | 
|  CVE-2025-52999  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2025-52999)-2025-52999  | 
|  CVE-2025-52999  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2025-52999)-2025-52999  | 
|  CVE-2025-52999  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2025-52999)-2025-52999  | 
|  CVE-2025-55163  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2025-55163)-2025-55163  | 
|  CVE-2025-55163  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2025-55163)-2025-55163  | 
|  CVE-2025-55163  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2025-55163)-2025-55163  | 
|  CVE-2025-58056  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2025-58056)-2025-58056  | 
|  CVE-2025-58056  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2025-58056)-2025-58056  | 
|  CVE-2025-58056  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2025-58056)-2025-58056  | 
|  CVE-2025-58056  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2025-58056)-2025-58056  | 
|  CVE-2025-58057  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2025-58057)-2025-58057  | 
|  CVE-2025-58057  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2025-58057)-2025-58057  | 
|  CVE-2025-58057  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2025-58057)-2025-58057  | 
|  CVE-2025-58057  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2025-58057)-2025-58057  | 
|  CVE-2025-58057  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2025-58057)-2025-58057  | 
|  CVE-2025-59250  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2025-59250)-2025-59250  | 
|  CVE-2012-5783  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2012-5783)-2012-5783  | 
|  CVE-2012-5783  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2012-5783)-2012-5783  | 
|  CVE-2012-6153  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2012-6153)-2012-6153  | 
|  CVE-2012-6153  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2012-6153)-2012-6153  | 
|  CVE-2018-10237  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-10237)-2018-10237  | 
|  CVE-2018-10237  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-10237)-2018-10237  | 
|  CVE-2018-10237  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-10237)-2018-10237  | 
|  CVE-2018-10237  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-10237)-2018-10237  | 
|  CVE-2018-10237  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-10237)-2018-10237  | 
|  CVE-2018-11798  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-11798)-2018-11798  | 
|  CVE-2018-1313  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-1313)-2018-1313  | 
|  CVE-2019-12384  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-12384)-2019-12384  | 
|  CVE-2019-12384  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-12384)-2019-12384  | 
|  CVE-2019-12814  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-12814)-2019-12814  | 
|  CVE-2019-12814  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-12814)-2019-12814  | 
|  CVE-2020-13955  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-13955)-2020-13955  | 
|  CVE-2020-13956  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-13956)-2020-13956  | 
|  CVE-2020-15250  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-15250)-2020-15250  | 
|  CVE-2020-15250  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-15250)-2020-15250  | 
|  CVE-2020-15522  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-15522)-2020-15522  | 
|  CVE-2020-15522  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-15522)-2020-15522  | 
|  CVE-2020-15522  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-15522)-2020-15522  | 
|  CVE-2020-17521  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-17521)-2020-17521  | 
|  CVE-2020-17521  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-17521)-2020-17521  | 
|  CVE-2020-1945  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-1945](https://nvd.nist.gov/vuln/detail/CVE-2020-1945)  | 
|  CVE-2020-26939  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-26939)-2020-26939  | 
|  CVE-2020-26939  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-26939)-2020-26939  | 
|  CVE-2020-26939  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-26939)-2020-26939  | 
|  CVE-2021-22569  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2021-22569)-2021-22569  | 
|  CVE-2021-22569  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2021-22569)-2021-22569  | 
|  CVE-2021-27568  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2021-27568)-2021-27568  | 
|  CVE-2021-28170  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2021-28170)-2021-28170  | 
|  CVE-2021-29425  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2021-29425)-2021-29425  | 
|  CVE-2021-36373  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2021-36373)-2021-36373  | 
|  CVE-2021-36374  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2021-36374)-2021-36374  | 
|  CVE-2022-38749  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-38749)-2022-38749  | 
|  CVE-2022-38750  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-38750)-2022-38750  | 
|  CVE-2022-38751  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-38751)-2022-38751  | 
|  CVE-2022-38752  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-38752)-2022-38752  | 
|  CVE-2022-41854  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-41854)-2022-41854  | 
|  CVE-2023-0833  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-0833)-2023-0833  | 
|  CVE-2023-33201  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-33201)-2023-33201  | 
|  CVE-2023-33201  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-33201)-2023-33201  | 
|  CVE-2023-33201  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-33201)-2023-33201  | 
|  CVE-2023-33201  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-33201)-2023-33201  | 
|  CVE-2023-33202  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-33202)-2023-33202  | 
|  CVE-2023-33202  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-33202)-2023-33202  | 
|  CVE-2023-33202  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-33202)-2023-33202  | 
|  CVE-2023-33202  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-33202)-2023-33202  | 
|  CVE-2023-42503  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-42503)-2023-42503  | 
|  CVE-2023-51074  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-51074)-2023-51074  | 
|  CVE-2024-12798  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-12798)-2024-12798  | 
|  CVE-2024-12798  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-12798)-2024-12798  | 
|  CVE-2024-12798  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-12798)-2024-12798  | 
|  CVE-2024-12798  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-12798)-2024-12798  | 
|  CVE-2024-12798  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-12798)-2024-12798  | 
|  CVE-2024-12798  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-12798)-2024-12798  | 
|  CVE-2024-23944  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-23944)-2024-23944  | 
|  CVE-2024-23945  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-23945)-2024-23945  | 
|  CVE-2024-23945  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-23945)-2024-23945  | 
|  CVE-2024-23953  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-23953)-2024-23953  | 
|  CVE-2024-23953  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-23953)-2024-23953  | 
|  CVE-2024-25710  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-25710)-2024-25710  | 
|  CVE-2024-25710  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-25710)-2024-25710  | 
|  CVE-2024-26308  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-26308)-2024-26308  | 
|  CVE-2024-26308  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-26308)-2024-26308  | 
|  CVE-2024-29025  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-29025)-2024-29025  | 
|  CVE-2024-29869  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-29869)-2024-29869  | 
|  CVE-2024-29869  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-29869)-2024-29869  | 
|  CVE-2024-30171  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-30171)-2024-30171  | 
|  CVE-2024-30171  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-30171)-2024-30171  | 
|  CVE-2024-30171  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-30171)-2024-30171  | 
|  CVE-2024-30171  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-30171)-2024-30171  | 
|  CVE-2024-31141  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-31141)-2024-31141  | 
|  CVE-2024-47535  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-47535)-2024-47535  | 
|  CVE-2024-47535  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-47535)-2024-47535  | 
|  CVE-2024-47554  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-47554)-2024-47554  | 
|  CVE-2024-47554  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-47554)-2024-47554  | 
|  CVE-2024-47554  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-47554)-2024-47554  | 
|  CVE-2024-56128  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-56128)-2024-56128  | 
|  CVE-2024-6763  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-6763)-2024-6763  | 
|  CVE-2024-6763  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-6763)-2024-6763  | 
|  CVE-2024-6763  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-6763)-2024-6763  | 
|  CVE-2024-6763  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-6763)-2024-6763  | 
|  CVE-2024-6763  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-6763)-2024-6763  | 
|  CVE-2024-8184  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-8184)-2024-8184  | 
|  CVE-2025-11226  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2025-11226)-2025-11226  | 
|  CVE-2025-11226  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2025-11226)-2025-11226  | 
|  CVE-2025-11226  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2025-11226)-2025-11226  | 
|  CVE-2025-25193  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2025-25193)-2025-25193  | 
|  CVE-2025-25193  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2025-25193)-2025-25193  | 
|  CVE-2025-30474  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2025-30474)-2025-30474  | 
|  CVE-2025-3588  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2025-3588)-2025-3588  | 
|  CVE-2025-46392  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2025-46392)-2025-46392  | 
|  CVE-2025-48924  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2025-48924)-2025-48924  | 
|  CVE-2025-48924  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2025-48924)-2025-48924  | 
|  CVE-2025-48924  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2025-48924)-2025-48924  | 
|  CVE-2025-48924  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2025-48924)-2025-48924  | 
|  CVE-2025-48924  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2025-48924)-2025-48924  | 
|  CVE-2025-48924  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2025-48924)-2025-48924  | 
|  CVE-2025-48924  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2025-48924)-2025-48924  | 
|  CVE-2025-48924  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2025-48924)-2025-48924  | 
|  CVE-2025-48924  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2025-48924)-2025-48924  | 
|  CVE-2025-49128  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2025-49128)-2025-49128  | 
|  CVE-2025-49128  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2025-49128)-2025-49128  | 
|  CVE-2025-49128  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2025-49128)-2025-49128  | 
|  CVE-2025-53864  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2025-53864)-2025-53864  | 
|  CVE-2025-58457  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2025-58457)-2025-58457  | 
|  CVE-2025-58457  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2025-58457)-2025-58457  | 
|  CVE-2025-59419  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE-2025-59419](https://nvd.nist.gov/vuln/detail/CVE-2025-59419)  | 
|  CVE-2025-8885  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2025-8885)-2025-8885  | 
|  CVE-2025-8885  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2025-8885)-2025-8885  | 
|  CVE-2025-8916  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE-2025-8916](https://nvd.nist.gov/vuln/detail/CVE-2025-8916)  | 
|  CVE-2025-8916  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE-2025-8916](https://nvd.nist.gov/vuln/detail/CVE-2025-8916)  | 
|  CVE-2025-8916  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE-2025-8916](https://nvd.nist.gov/vuln/detail/CVE-2025-8916)  | 
|  CVE-2025-8916  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE-2025-8916](https://nvd.nist.gov/vuln/detail/CVE-2025-8916)  | 
|  CVE-2020-8908  |  RENDAH  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-8908)-2020-8908  | 
|  CVE-2020-8908  |  RENDAH  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-8908)-2020-8908  | 
|  CVE-2020-8908  |  RENDAH  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-8908)-2020-8908  | 
|  CVE-2020-8908  |  RENDAH  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-8908)-2020-8908  | 
|  CVE-2020-8908  |  RENDAH  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-8908)-2020-8908  | 
|  CVE-2020-8908  |  RENDAH  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-8908)-2020-8908  | 
|  CVE-2020-8908  |  RENDAH  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-8908)-2020-8908  | 
|  CVE-2020-8908  |  RENDAH  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-8908)-2020-8908  | 
|  CVE-2020-8908  |  RENDAH  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-8908)-2020-8908  | 
|  CVE-2024-12801  |  RENDAH  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-12801)-2024-12801  | 
|  CVE-2024-12801  |  RENDAH  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-12801)-2024-12801  | 
|  CVE-2024-12801  |  RENDAH  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-12801)-2024-12801  | 
|  CVE-2025-46551  |  RENDAH  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2025-46551)-2025-46551  | 

## Catatan terbitan 7.11.0
<a name="emr-7110-relnotes"></a>

Catatan rilis berikut mencakup informasi untuk Amazon EMR rilis 7.11.0.
+ **Fitur baru**
  + **Peningkatan aplikasi - Peningkatan aplikasi** Amazon EMR 7.11.0 termasuk Delta 3.3.2-amzn-0, Flink 1.20.0-amzn-5, 2.6.2-amzn-2, 3.1.3-amzn-20, Hadoop 3.4.1-amzn-3, Hive 3.1.3-amzn-20, Hudi 1.0.2-amzn-0, Iceberg 1.9.1-amzn-0, Presto 0.287-amzn-5 HBase , Spark 3.5.6-amzn-0, 2.19.0, Tez 0.10.2-amzn-18 HCatalog , Trino 475-amzn-0, dan 3.9.3-amzn-3. TensorFlow ZooKeeper 
  + Amazon EMR di EC2 sekarang mendukung Sesi Latar Belakang Pengguna Pusat Identitas IAM
    + **Sesi Latar Belakang Pengguna**: Memungkinkan beban kerja Spark yang berjalan lama untuk terus berjalan bahkan setelah pengguna log off dari SageMaker Unified Studio, mendukung sesi hingga 90 hari
    + **Konfigurasi Sesi Latar Belakang Fleksibel**: Konfigurasi dua tingkat (instans Pusat Identitas IAM dan cluster Amazon EMR-EC2) dengan durasi sesi latar belakang yang dapat disesuaikan dari 15 menit hingga 90 hari (default: 7 hari)
    + **Propagasi Identitas Tepercaya**: Mempertahankan konteks identitas aman sepanjang siklus hidup sesi latar belakang menggunakan fitur propagasi identitas tepercaya Amazon EMR
    + **SageMaker Integrasi Studio Terpadu**: Sesi latar belakang dimulai melalui sesi interaktif Livy di Unified Studio SageMaker 
  + **Sesi jangka panjang dengan identitas perusahaan** - Amazon SageMaker Unified Studio kini mendukung sesi jangka panjang dengan identitas perusahaan melalui Propagasi Identitas Tepercaya (TIP) IAM Identity Center. Pengguna dapat meluncurkan notebook interaktif dan sesi pemrosesan data di Amazon EMR dan AWS Glue yang bertahan menggunakan kredensyal perusahaan, bahkan ketika log off atau sesi kedaluwarsa. Sesi berjalan hingga 90 hari (default 7 hari) sambil mempertahankan izin identitas dan kontrol keamanan yang konsisten.

## 7.11.0 versi Java default
<a name="emr-7110-jdk"></a>

Amazon EMR rilis 7.11.0 dikirimkan dengan Amazon Corretto 17 (dibangun di atas OpenJDK) secara default untuk aplikasi yang mendukung Corretto 17 (JDK 17), dengan pengecualian Apache Livy.

Tabel berikut menunjukkan versi Java default untuk aplikasi di Amazon EMR 7.11.0.


| Aplikasi | Versi Java/Amazon Corretto (defaultnya tebal) | 
| --- | --- | 
| kuala | 17, 11, 8 | 
| Flink | 17, 11, 8 | 
| HBase | 17, 11, 8 | 
| HCatalog | 17, 11, 8 | 
| Hadoop | 17, 11, 8 | 
| Hive | 17, 11, 8 | 
| Hudi | 17, 11, 8 | 
| Gunung es | 17, 11 | 
| Livy | 17, 11, 8 | 
| Oozie | 17, 11, 8 | 
| Phoenix | 17, 11, 8 | 
| PrestoDB | 8 | 
| Spark | 17, 11, 8 | 
| Spark RAPIDS | 17, 11, 8 | 
| Tez | 17, 11, 8 | 
| Trino | 21, 17 | 
| Zeppelin | 17, 11, 8 | 
| Pig | 17, 11, 8 | 
| Zookeeper | 17, 11, 8 | 

## 7.11.0 versi komponen
<a name="emr-7110-components"></a>

Komponen yang diinstal oleh Amazon EMR dengan rilis ini tercantum di bawah ini. Beberapa komponen diinstal sebagai bagian dari paket aplikasi big data. Sedangkan komponen lainnya bersifak unik untuk Amazon EMR dan diinstal untuk proses sistem dan fitur. Ini biasanya dimulai dengan `emr` atau `aws`. Paket aplikasi big data dalam rilis Amazon EMR terbaru biasanya versi terbaru yang ditemukan di komunitas. Kami menyediakan rilis komunitas di Amazon EMR secepat mungkin.

Beberapa komponen yang ada di Amazon EMR berbeda dari versi komunitas. Komponen ini mempunyai label versi dalam bentuk `CommunityVersion-amzn-EmrVersion`. `EmrVersion` dimulai dari 0. Misalnya, jika komponen komunitas open source bernama `myapp-component` dengan versi 2.2 telah dimodifikasi tiga kali untuk dimasukkan dalam rilis EMR Amazon yang berbeda, versi rilisnya terdaftar sebagai. `2.2-amzn-2`


| Komponen | Versi | Deskripsi | 
| --- | --- | --- | 
| adot-java-agent | 1.31.0 | Agen Java yang mengumpulkan metrik dari daemon aplikasi. | 
| delta | 3.3.2-amzn-0 | Danau Delta adalah format tabel terbuka untuk kumpulan data analitik yang sangat besar | 
| emr-amazon-cloudwatch-agent | 1.300032.2-amzn-0 | Aplikasi yang mengumpulkan metrik tingkat sistem internal dan metrik aplikasi khusus dari instans Amazon EC2. | 
| emr-ddb | 5.7.0 | Konektor Amazon DynamoDB untuk aplikasi ekosistem Hadoop. | 
| emr-goodies | 3.20.0 | Perpustakaan kenyamanan ekstra untuk ekosistem Hadoop. | 
| emr-kinesis | 3.24.0 | Konektor Amazon Kinesis untuk aplikasi ekosistem Hadoop. | 
| emr-notebook-env | 1.18.0 | Conda env untuk emr notebook yang mencakup gateway jupyter korporasi | 
| emr-s3-dist-cp | 2.41.0 | Aplikasi salinan terdistribusi yang dioptimalkan untuk Amazon S3. | 
| emr-s3-select | 2.20.0 | EMR S3Select Connector | 
| emr-wal-cli | 1.3.5 | Cli digunakan untuk daftar emrwal/penghapusan. | 
| emrfs | 2.72.0 | Konektor Amazon S3 untuk aplikasi ekosistem Hadoop. | 
| flink-client | 1.20.0-amzn-5 | Skrip dan aplikasi klien baris perintah Apache Flink. | 
| flink-jobmanager-config | 1.20.0-amzn-5 | Mengelola sumber daya pada node EMR untuk Apache Flink. JobManager | 
| hadoop-client | 3.4.1-amzn-3 | Klien baris perintah Hadoop seperti 'hdfs', 'Hadoop', atau 'yarn'. | 
| hadoop-hdfs-datanode | 3.4.1-amzn-3 | Layanan tingkat simpul HDFS untuk menyimpan blok. | 
| hadoop-hdfs-library | 3.4.1-amzn-3 | Klien dan perpustakaan baris perintah HDFS | 
| hadoop-hdfs-namenode | 3.4.1-amzn-3 | Layanan HDFS untuk melacak nama file dan lokasi blok. | 
| hadoop-hdfs-zkfc | 3.4.1-amzn-3 | Layanan ZKFC untuk melacak namenodes untuk mode HA. | 
| hadoop-hdfs-journalnode | 3.4.1-amzn-3 | Layanan HDFS untuk mengelola jurnal filesystem Hadoop pada klaster HA. | 
| hadoop-httpfs-server | 3.4.1-amzn-3 | Titik akhir HTTP untuk operasi HDFS. | 
| hadoop-kms-server | 3.4.1-amzn-3 | Server manajemen kunci kriptografi berdasarkan API Hadoop. KeyProvider  | 
| hadoop-mapred | 3.4.1-amzn-3 | MapReduce pustaka mesin eksekusi untuk menjalankan MapReduce aplikasi. | 
| hadoop-yarn-nodemanager | 3.4.1-amzn-3 | Layanan YARN untuk mengelola kontainer pada simpul individu. | 
| hadoop-yarn-resourcemanager | 3.4.1-amzn-3 | Layanan YARN untuk mengalokasikan dan mengelola sumber daya klaster dan aplikasi terdistribusi. | 
| hadoop-yarn-timeline-server | 3.4.1-amzn-3 | Layanan untuk mengambil informasi terkini dan historis untuk aplikasi YARN. | 
| hbase-hmaster | 2.6.2-amzn-2 | Layanan untuk HBase cluster yang bertanggung jawab untuk koordinasi Daerah dan pelaksanaan perintah administratif. | 
| hbase-region-server | 2.6.2-amzn-2 | Layanan untuk melayani satu atau lebih HBase wilayah. | 
| hbase-client | 2.6.2-amzn-2 | HBase klien baris perintah. | 
| hbase-rest-server | 2.6.2-amzn-2 | Layanan menyediakan titik akhir RESTful HTTP untuk HBase. | 
| hbase-thrift-server | 2.6.2-amzn-2 | Layanan menyediakan titik akhir Thrift ke. HBase | 
| hbase-operator-tools | 2.6.2-amzn-2 | Alat perbaikan untuk HBase cluster Apache. | 
| hcatalog-client | 3.1.3-amzn-20 | Klien baris perintah 'hcat' untuk memanipulasi hcatalog-server. | 
| hcatalog-server | 3.1.3-amzn-20 | Penyediaan layanan HCatalog, tabel dan lapisan manajemen penyimpanan untuk aplikasi terdistribusi. | 
| hcatalog-webhcat-server | 3.1.3-amzn-20 | Titik akhir HTTP menyediakan antarmuka REST ke HCatalog. | 
| hive-client | 3.1.3-amzn-20 | Klien baris perintah Hive. | 
| hive-hbase | 3.1.3-amzn-20 | Klien Hive-hbase. | 
| hive-metastore-server | 3.1.3-amzn-20 | Layanan untuk mengakses metastore Hive, repositori semantik yang menyimpan metadata untuk SQL pada operasi Hadoop. | 
| hive-server2 | 3.1.3-amzn-20 | Layanan untuk menerima kueri Hive sebagai permintaan web. | 
| hudi | 1.0.2-amzn-0 | Kerangka pemrosesan tambahan untuk memberi daya pada pipa data pada latensi rendah dan efisiensi tinggi. | 
| hudi-presto | 1.0.2-amzn-0 | Perpustakaan paket untuk menjalankan Presto dengan Hudi. | 
| hudi-trino | 1.0.2-amzn-0 | Perpustakaan bundel untuk menjalankan Trino dengan Hudi. | 
| hudi-spark | 1.0.2-amzn-0 | Perpustakaan paket untuk menjalankan Spark dengan Hudi. | 
| hue-server | 4.11.0 | Aplikasi web untuk menganalisis data menggunakan aplikasi ekosistem Hadoop | 
| iceberg | 1.9.1-amzn-0 | Apache Iceberg adalah format tabel terbuka untuk kumpulan data analitik besar | 
| jupyterhub | 1.5.0 | Server multi-pengguna untuk notebook Jupyter | 
| livy-server | 0.8.0-inkubasi | Antarmuka REST untuk berinteraksi dengan Apache Spark | 
| nginx | 1.12.1 | nginx [engine x] adalah server HTTP dan server proksi balik | 
| mariadb-server | 5.5.68\$1 | Server basis data MariaDB. | 
| nvidia-cuda | 12.5.0 | Driver Nvidia dan kit alat Cuda | 
| oozie-client | 5.2.1 | Klien baris perintah Oozie. | 
| oozie-server | 5.2.1 | Layanan untuk menerima permintaan alur kerja Oozie. | 
| opencv | 4.7.0 | Perpustakaan Visi Komputer Sumber Terbuka. | 
| phoenix-library | 5.2.1 | Perpustakaan phoenix untuk server dan klien | 
| phoenix-connectors | 6.0.0 | Konektor Apache Phoenix untuk Spark-3 | 
| phoenix-query-server | 6.0.0 | Sebuah server ringan yang menyediakan akses JDBC serta Protocol Buffers dan akses format JSON ke API Avatica  | 
| presto-coordinator | 0,27-amzn-5 | Layanan untuk menerima kueri dan mengelola eksekusi kueri antara presto-worker. | 
| presto-worker | 0,27-amzn-5 | Layanan untuk mengeksekusi potongan kueri. | 
| presto-client | 0,27-amzn-5 | Klien baris perintah Presto yang diinstal pada master klaster HA yang siaga di mana server Presto server tidak dimulai. | 
| trino-coordinator | 475-amzn-0 | Layanan untuk menerima kueri dan mengelola eksekusi kueri di antara trino-workers. | 
| trino-worker | 475-amzn-0 | Layanan untuk mengeksekusi potongan kueri. | 
| trino-client | 475-amzn-0 | Klien baris perintah Trino yang diinstal pada master siaga cluster HA di mana server Trino tidak dimulai. | 
| pig-client | 0.17.0 | Klien baris perintah Pig. | 
| r | 4.3.2 | Proyek R untuk Komputasi Statistik | 
| ranger-kms-server | 2.0.0 | Sistem Pengelolaan Kunci Ranger Apache | 
| spark-client | 3.5.6-amzn-0 | Klien baris perintah Spark. | 
| spark-history-server | 3.5.6-amzn-0 | Web UI untuk melihat log acara untuk seluruh masa pakai aplikasi Spark. | 
| spark-on-yarn | 3.5.6-amzn-0 | Mesin eksekusi dalam memori untuk YARN. | 
| spark-yarn-slave | 3.5.6-amzn-0 | Perpustakaan Apache Spark yang dibutuhkan oleh slave YARN. | 
| spark-rapids | 25.06.0-amzn-0 | Plugin Nvidia Spark RAPIDS yang mempercepat Apache Spark dengan. GPUs | 
| tensorflow | 2.19.0 | TensorFlow pustaka perangkat lunak open source untuk perhitungan numerik kinerja tinggi. | 
| tez-on-yarn | 0.10.2-amzn-18 | Aplikasi dan perpustakaan tez YARN. | 
| tez-on-worker | 0.10.2-amzn-18 | Aplikasi dan pustaka YARN tez untuk node pekerja. | 
| zeppelin-server | 0.11.1 | Notebook berbasis web yang memungkinkan analisis data interaktif. | 
| zookeeper-server | 3.9.3-amzn-3 | Layanan terpusat untuk menjaga informasi konfigurasi, penamaan, yang menyediakan sinkronisasi terdistribusi, dan menyediakan layanan grup. | 
| zookeeper-client | 3.9.3-amzn-3 | ZooKeeper klien baris perintah. | 

## 7.11.0 klasifikasi konfigurasi
<a name="emr-7110-class"></a>

Klasifikasi konfigurasi memungkinkan Anda menyesuaikan aplikasi. Ini sering kali bersesuaian dengan file XML konfigurasi untuk aplikasi, seperti `hive-site.xml`. Untuk informasi selengkapnya, lihat [Konfigurasikan aplikasi](emr-configure-apps.md).

Tindakan konfigurasi ulang terjadi ketika Anda menentukan konfigurasi untuk grup instans di klaster yang sedang berjalan. Amazon EMR hanya memulai tindakan konfigurasi ulang untuk klasifikasi yang Anda modifikasi. Untuk informasi selengkapnya, lihat [Lakukan konfigurasi ulang pada grup instans di klaster yang sedang berjalan](emr-configure-apps-running-cluster.md).


**klasifikasi emr-7.11.0**  

| Klasifikasi | Deskripsi | Tindakan Konfigurasi Ulang | 
| --- | --- | --- | 
| capacity-scheduler | Ubah nilai dalam file capacity-scheduler.xml Hadoop. | Restarts the ResourceManager service. | 
| container-executor | Ubah nilai dalam file container-executor.cfg Hadoop YARN ini. | Not available. | 
| container-log4j | Ubah nilai dalam file container-log4j.properties Hadoop YARN. | Not available. | 
| core-site | Ubah nilai dalam file core-site.xml Hadoop. | Restarts the Hadoop HDFS services Namenode, SecondaryNamenode, Datanode, ZKFC, and Journalnode. Restarts the Hadoop YARN services ResourceManager, NodeManager, ProxyServer, and TimelineServer. Additionally restarts Hadoop KMS, Ranger KMS, HiveServer2, Hive MetaStore, Hadoop Httpfs, and MapReduce-HistoryServer. | 
| docker-conf | Ubah pengaturan terkait docker. | Not available. | 
| emrfs-site | Ubah pengaturan EMRFS. | Restarts the Hadoop HDFS services Namenode, SecondaryNamenode, Datanode, ZKFC, and Journalnode. Restarts the Hadoop YARN services ResourceManager, NodeManager, ProxyServer, and TimelineServer. Additionally restarts HBaseRegionserver, HBaseMaster, HBaseThrift, HBaseRest, HiveServer2, Hive MetaStore, Hadoop Httpfs, and MapReduce-HistoryServer. | 
| flink-conf | Ubah pengaturan flink-conf.yaml. | Restarts Flink history server. | 
| flink-log4j | Ubah pengaturan log4j.properties Flink. | Restarts Flink history server. | 
| flink-log4j-session | Ubah pengaturan Flink log4j-session.properties untuk sesi. Kubernetes/Yarn  | Restarts Flink history server. | 
| flink-log4j-cli | Ubah pengaturan log4j-cli.properties Flink. | Restarts Flink history server. | 
| hadoop-env | Ubah nilai dalam lingkungan Hadoop untuk semua komponen Hadoop. | Restarts the Hadoop HDFS services Namenode, SecondaryNamenode, Datanode, ZKFC, and Journalnode. Restarts the Hadoop YARN services ResourceManager, NodeManager, ProxyServer, and TimelineServer. Additionally restarts PhoenixQueryserver, HiveServer2, Hive MetaStore, and MapReduce-HistoryServer. | 
| hadoop-log4j | Ubah nilai dalam file log4j.properties Hadoop ini. | Restarts the Hadoop HDFS services SecondaryNamenode, Datanode, and Journalnode. Restarts the Hadoop YARN services ResourceManager, NodeManager, ProxyServer, and TimelineServer. Additionally restarts Hadoop KMS, Hadoop Httpfs, and MapReduce-HistoryServer. | 
| hadoop-ssl-server | Ubah konfigurasi server ssl hadoop | Not available. | 
| hadoop-ssl-client | Ubah konfigurasi klien ssl hadoop | Not available. | 
| hbase | Pengaturan Amazon EMR-curated untuk Apache. HBase | Custom EMR specific property. Sets emrfs-site and hbase-site configs. See those for their associated restarts. | 
| hbase-env | Ubah nilai HBase di lingkungan. | Restarts the HBase services RegionServer, HBaseMaster, ThriftServer, RestServer. | 
| hbase-log4j2 | Ubah nilai dalam file HBase hbase-log4j2.properties. | Restarts the HBase services RegionServer, HBaseMaster, ThriftServer, RestServer. | 
| hbase-metrics | Ubah nilai dalam file HBase hadoop-metrics2-hbase.properties. | Restarts the HBase services RegionServer, HBaseMaster, ThriftServer, RestServer. | 
| hbase-policy | Ubah nilai dalam HBase file hbase-policy.xml. | Not available. | 
| hbase-site | Ubah nilai dalam HBase file hbase-site.xml. | Restarts the HBase services RegionServer, HBaseMaster, ThriftServer, RestServer. Additionally restarts Phoenix QueryServer. | 
| hdfs-encryption-zones | Konfigurasikan zona enkripsi HDFS. | This classification should not be reconfigured. | 
| hdfs-env | Ubah nilai dalam lingkungan HDFS. | Restarts Hadoop HDFS services Namenode, Datanode, and ZKFC. | 
| hdfs-site | Ubah nilai dalam hdfs-site.xml HDFS. | Restarts the Hadoop HDFS services Namenode, SecondaryNamenode, Datanode, ZKFC, and Journalnode. Additionally restarts Hadoop Httpfs. | 
| hcatalog-env | Ubah nilai HCatalog di lingkungan. | Restarts Hive HCatalog Server. | 
| hcatalog-server-jndi | Ubah nilai di HCatalog jndi.properties. | Restarts Hive HCatalog Server. | 
| hcatalog-server-proto-hive-site | Ubah nilai HCatalog proto-hive-site dalam.xml's. | Restarts Hive HCatalog Server. | 
| hcatalog-webhcat-env | Ubah nilai di lingkungan HCatalog WebHCat. | Restarts Hive WebHCat server. | 
| hcatalog-webhcat-log4j2 | Ubah nilai di HCat log4j2.properties HCatalog Web. | Restarts Hive WebHCat server. | 
| hcatalog-webhcat-site | Ubah nilai dalam file webhcat-site.xml HCatalog WebHCat. | Restarts Hive WebHCat server. | 
| hive | Pengaturan dikurasi Amazon EMR untuk Apache Hive. | Sets configurations to launch Hive LLAP service. | 
| hive-beeline-log4j2 | Ubah nilai dalam file beeline-log4j2.properties Hive. | Not available. | 
| hive-parquet-logging | Ubah nilai dalam file parquet-logging.properties Hive. | Not available. | 
| hive-env | Ubah nilai dalam lingkungan Hive. | Restarts HiveServer2, HiveMetastore, and Hive HCatalog-Server. Runs Hive schemaTool CLI commands to verify hive-metastore. | 
| hive-exec-log4j2 | Ubah nilai dalam file hive-exec-log 4j2.properties Hive. | Not available. | 
| hive-llap-daemon-log4j2 | Ubah nilai dalam file llap-daemon-log 4j2.properties Hive. | Not available. | 
| hive-log4j2 | Ubah nilai dalam file hive-log4j2.properties Hive. | Not available. | 
| hive-site | Ubah nilai dalam file hive-site.xml Hive | Restarts HiveServer2, HiveMetastore, and Hive HCatalog-Server. Runs Hive schemaTool CLI commands to verify hive-metastore. Also restarts Oozie and Zeppelin. | 
| hiveserver2-site | Ubah nilai dalam file hiveserver2-site.xml Hive Server2 | Not available. | 
| hue-ini | Ubah nilai dalam file ini Hue | Restarts Hue. Also activates Hue config override CLI commands to pick up new configurations. | 
| httpfs-env | Ubah nilai di lingkungan HTTPFS. | Restarts Hadoop Httpfs service. | 
| httpfs-site | Ubah nilai dalam file httpfs-site.xml Hadoop. | Restarts Hadoop Httpfs service. | 
| hadoop-kms-acls | Ubah nilai dalam file kms-acls.xml Hadoop. | Not available. | 
| hadoop-kms-env | Ubah nilai dalam lingkungan Hadoop KMS. | Restarts Hadoop-KMS service. | 
| hadoop-kms-java-home | Ubah rumah java KMS Hadoop | Not available. | 
| hadoop-kms-log4j | Ubah nilai dalam file kms-log4j.properties Hadoop. | Not available. | 
| hadoop-kms-site | Ubah nilai dalam file kms-site.xml Hadoop. | Restarts Hadoop-KMS and Ranger-KMS service. | 
| hudi-env | Ubah nilai di lingkungan Hudi. | Not available. | 
| hudi-defaults | Ubah nilai dalam file hudi-defaults.conf Hudi. | Not available. | 
| iceberg-defaults | Ubah nilai dalam file iceberg-defaults.conf Iceberg. | Not available. | 
| delta-defaults | Ubah nilai dalam file delta-defaults.conf Delta. | Not available. | 
| jupyter-notebook-conf | Ubah nilai dalam file jupyter\$1notebook\$1config.py Jupyter Notebook. | Not available. | 
| jupyter-hub-conf | Ubah nilai dalam JupyterHubs file jupyterhub\$1config.py. | Not available. | 
| jupyter-s3-conf | Konfigurasikan persistensi Jupyter Notebook S3. | Not available. | 
| jupyter-sparkmagic-conf | Ubah nilai dalam file config.json Sparkmagic. | Not available. | 
| livy-conf | Ubah nilai dalam file livy.conf Livy. | Restarts Livy Server. | 
| livy-env | Ubah nilai di lingkungan Livy. | Restarts Livy Server. | 
| livy-log4j2 | Ubah pengaturan Livy log4j2.properties. | Restarts Livy Server. | 
| mapred-env | Ubah nilai di lingkungan MapReduce aplikasi. | Restarts Hadoop MapReduce-HistoryServer. | 
| mapred-site | Ubah nilai dalam file mapred-site.xml MapReduce aplikasi. | Restarts Hadoop MapReduce-HistoryServer. | 
| oozie-env | Ubah nilai di lingkungan Oozie. | Restarts Oozie. | 
| oozie-log4j | Ubah nilai dalam file oozie-log4j.properties Oozie. | Restarts Oozie. | 
| oozie-site | Ubah nilai dalam file oozie-site.xml Oozie. | Restarts Oozie. | 
| phoenix-hbase-metrics | Ubah nilai dalam file hadoop-metrics2-hbase.properties Phoenix. | Not available. | 
| phoenix-hbase-site | Ubah nilai dalam file hbase-site.xml Phoenix. | Not available. | 
| phoenix-log4j2 | Ubah nilai dalam file log4j2.properties Phoenix. | Restarts Phoenix-QueryServer. | 
| phoenix-metrics | Ubah nilai dalam file hadoop-metrics2-phoenix.properties Phoenix. | Not available. | 
| pig-env | Ubah nilai di lingkungan Pig. | Not available. | 
| pig-properties | Ubah nilai dalam file pig.properties Pig. | Restarts Oozie. | 
| pig-log4j | Ubah nilai dalam file log4j.properties Pig. | Not available. | 
| presto-log | Ubah nilai dalam file log.properties Presto. | Restarts Presto-Server (for PrestoDB) | 
| presto-config | Ubah nilai dalam file config.properties Presto. | Restarts Presto-Server (for PrestoDB) | 
| presto-password-authenticator | Ubah nilai dalam file password-authenticator.properties Presto. | Not available. | 
| presto-env | Ubah nilai dalam file presto-env.sh Presto. | Restarts Presto-Server (for PrestoDB) | 
| presto-node | Ubah nilai dalam file node.properties Presto. | Not available. | 
| presto-connector-blackhole | Ubah nilai dalam file blackhole.properties Presto. | Not available. | 
| presto-connector-cassandra | Ubah nilai dalam file cassandra.properties Presto. | Not available. | 
| presto-connector-hive | Ubah nilai dalam file hive.properties Presto. | Restarts Presto-Server (for PrestoDB) | 
| presto-connector-jmx | Ubah nilai dalam file jmx.properties Presto. | Not available. | 
| presto-connector-kafka | Ubah nilai dalam file kafka.properties Presto. | Not available. | 
| presto-connector-lakeformation | Ubah nilai dalam file lakeformation.properties Presto. | Restarts Presto-Server (for PrestoDB) | 
| presto-connector-localfile | Ubah nilai dalam file localfile.properties Presto. | Not available. | 
| presto-connector-memory | Ubah nilai dalam file memory.properties Presto. | Not available. | 
| presto-connector-mongodb | Ubah nilai dalam file mongodb.properties Presto. | Not available. | 
| presto-connector-mysql | Ubah nilai dalam file mysql.properties Presto. | Not available. | 
| presto-connector-postgresql | Ubah nilai dalam file postgresql.properties Presto. | Not available. | 
| presto-connector-raptor | Ubah nilai dalam file raptor.properties Presto. | Not available. | 
| presto-connector-redis | Ubah nilai dalam file redis.properties Presto. | Not available. | 
| presto-connector-redshift | Ubah nilai dalam file redshift.properties Presto. | Not available. | 
| presto-connector-tpch | Ubah nilai dalam file tpch.properties Presto. | Not available. | 
| presto-connector-tpcds | Ubah nilai dalam file tpcds.properties Presto. | Not available. | 
| trino-log | Ubah nilai dalam file log.properties Trino. | Restarts Trino-Server (for Trino) | 
| trino-config | Ubah nilai dalam file config.properties Trino. | Restarts Trino-Server (for Trino) | 
| trino-password-authenticator | Ubah nilai dalam file password-authenticator.properties Trino. | Restarts Trino-Server (for Trino) | 
| trino-env | Ubah nilai dalam file trino-env.sh Trino. | Restarts Trino-Server (for Trino) | 
| trino-node | Ubah nilai dalam file node.properties Trino. | Not available. | 
| trino-connector-blackhole | Ubah nilai dalam file blackhole.properties Trino. | Not available. | 
| trino-connector-cassandra | Ubah nilai dalam file cassandra.properties Trino. | Not available. | 
| trino-connector-delta | Ubah nilai dalam file delta.properties Trino. | Restarts Trino-Server (for Trino) | 
| trino-connector-hive | Ubah nilai dalam file hive.properties Trino. | Restarts Trino-Server (for Trino) | 
| trino-exchange-manager | Ubah nilai dalam file exchange-manager.properties Trino. | Restarts Trino-Server (for Trino) | 
| trino-connector-iceberg | Ubah nilai dalam file iceberg.properties Trino. | Restarts Trino-Server (for Trino) | 
| trino-connector-hudi | Ubah nilai dalam file hudi.properties Trino. | Restarts Trino-Server (for Trino) | 
| trino-connector-jmx | Ubah nilai dalam file jmx.properties Trino. | Not available. | 
| trino-connector-kafka | Ubah nilai dalam file kafka.properties Trino. | Not available. | 
| trino-connector-localfile | Ubah nilai dalam file localfile.properties Trino. | Not available. | 
| trino-connector-memory | Ubah nilai dalam file memory.properties Trino. | Not available. | 
| trino-connector-mongodb | Ubah nilai dalam file mongodb.properties Trino. | Not available. | 
| trino-connector-mysql | Ubah nilai dalam file mysql.properties Trino. | Not available. | 
| trino-connector-postgresql | Ubah nilai dalam file postgresql.properties Trino. | Not available. | 
| trino-connector-raptor | Ubah nilai dalam file raptor.properties Trino. | Not available. | 
| trino-connector-redis | Ubah nilai dalam file redis.properties Trino. | Not available. | 
| trino-connector-redshift | Ubah nilai dalam file redshift.properties Trino. | Not available. | 
| trino-connector-tpch | Ubah nilai dalam file tpch.properties Trino. | Not available. | 
| trino-connector-tpcds | Ubah nilai dalam file tpcds.properties Trino. | Not available. | 
| ranger-kms-dbks-site | Ubah nilai dalam file dbks-site.xml Ranger KMS. | Restarts Ranger KMS Server. | 
| ranger-kms-site | Ubah nilai dalam ranger-kms-site file.xml. dari Ranger KMS. | Restarts Ranger KMS Server. | 
| ranger-kms-env | Ubah nilai di lingkungan Ranger KMS. | Restarts Ranger KMS Server. | 
| ranger-kms-logback | Ubah nilai dalam file kms-logback.xml dari Ranger KMS. | Not available. | 
| ranger-kms-db-ca | Ubah nilai untuk file CA pada S3 untuk koneksi MySQL SSL dengan Ranger KMS. | Not available. | 
| spark | Pengaturan terkurasi Amazon EMR untuk Apache Spark. | This property modifies spark-defaults. See actions there. | 
| spark-defaults | Ubah nilai dalam file spark-defaults.conf Spark. | Restarts Spark history server and Spark thrift server. | 
| spark-env | Ubah nilai di lingkungan Spark. | Restarts Spark history server and Spark thrift server. | 
| spark-hive-site | Ubah nilai dalam file hive-site.xml Spark | Not available. | 
| spark-log4j2 | Ubah nilai dalam file log4j2.properties Spark. | Restarts Spark history server and Spark thrift server. | 
| spark-metrics | Ubah nilai dalam file metrics.properties Spark. | Restarts Spark history server and Spark thrift server. | 
| tez-site | Ubah nilai dalam file tez-site.xml Tez. | Restart Oozie and HiveServer2. | 
| yarn-env | Ubah nilai di lingkungan YARN. | Restarts the Hadoop YARN services ResourceManager, NodeManager, ProxyServer, and TimelineServer. Additionally restarts MapReduce-HistoryServer. | 
| yarn-site | Ubah nilai dalam file yarn-site.xml YARN. | Restarts the Hadoop YARN services ResourceManager, NodeManager, ProxyServer, and TimelineServer. Additionally restarts Livy Server and MapReduce-HistoryServer. | 
| zeppelin-env | Ubah nilai di lingkungan Zeppelin. | Restarts Zeppelin. | 
| zeppelin-site | Ubah pengaturan konfigurasi di zeppelin-site.xml. | Restarts Zeppelin. | 
| zookeeper-config | Ubah nilai dalam ZooKeeper file zoo.cfg. | Restarts Zookeeper server. | 
| zookeeper-logback | Ubah nilai dalam ZooKeeper file logback.xml. | Restarts Zookeeper server. | 
| cloudwatch-logs | Konfigurasikan integrasi CloudWatch Log untuk node cluster EMR. | Not available. | 
| emr-metrics | Ubah pengaturan metrik emr untuk simpul ini. | Restarts the CloudWatchAgent service. | 

## 7.11.0 perubahan log
<a name="7110-changelog"></a>


**Ubah log untuk catatan rilis dan rilis 7.11.0**  

| Date | Peristiwa | Deskripsi | 
| --- | --- | --- | 
| 2025-11-12 | Publikasi Docs | Amazon EMR 7.11.0 catatan rilis pertama kali diterbitkan | 

# Amazon EMR rilis 7.10.0
<a name="emr-7100-release"></a>

## 7.10.0 siklus hidup yang didukung
<a name="emr-7100-supported-lifecycle"></a>

Tabel berikut menjelaskan tanggal siklus hidup yang didukung untuk rilis Amazon EMR 7.10.0.


| Fase Support | Date | 
| --- | --- | 
| Tanggal rilis awal | Agustus 15, 2025 | 
| Dukungan standar sampai | Agustus 15, 2027 | 
| Akhir dari dukungan | Agustus 16, 2027 | 
| Akhir hidup | Agustus 15, 2028 | 

## 7.10.0 versi aplikasi
<a name="emr-7100-app-versions"></a>

Rilis ini mencakup aplikasi berikut: [https://docs.aws.amazon.com/AmazonCloudWatch/latest/monitoring/Install-CloudWatch-Agent.html](https://docs.aws.amazon.com/AmazonCloudWatch/latest/monitoring/Install-CloudWatch-Agent.html), [https://delta.io/](https://delta.io/), [https://flink.apache.org/](https://flink.apache.org/), [http://hbase.apache.org/](http://hbase.apache.org/), [https://cwiki.apache.org/confluence/display/Hive/HCatalog](https://cwiki.apache.org/confluence/display/Hive/HCatalog), [http://hive.apache.org/](http://hive.apache.org/), [https://hudi.apache.org](https://hudi.apache.org), [http://gethue.com/](http://gethue.com/), [https://iceberg.apache.org/](https://iceberg.apache.org/), [https://jupyter-enterprise-gateway.readthedocs.io/en/latest/](https://jupyter-enterprise-gateway.readthedocs.io/en/latest/), [https://jupyterhub.readthedocs.io/en/latest/#](https://jupyterhub.readthedocs.io/en/latest/#), [https://livy.incubator.apache.org/](https://livy.incubator.apache.org/), [http://oozie.apache.org/](http://oozie.apache.org/), [https://phoenix.apache.org/](https://phoenix.apache.org/), [http://pig.apache.org/](http://pig.apache.org/), [https://prestodb.io/](https://prestodb.io/), [https://spark.apache.org/docs/latest/](https://spark.apache.org/docs/latest/), [https://www.tensorflow.org/](https://www.tensorflow.org/), [https://tez.apache.org/](https://tez.apache.org/), [https://trino.io/](https://trino.io/), [https://zeppelin.incubator.apache.org/](https://zeppelin.incubator.apache.org/), dan [https://zookeeper.apache.org](https://zookeeper.apache.org).

Tabel di bawah ini mencantumkan versi aplikasi yang tersedia dalam rilis Amazon EMR ini dan versi aplikasi dalam tiga rilis EMR Amazon sebelumnya (bila berlaku).

Untuk riwayat lengkap versi aplikasi untuk setiap rilis Amazon EMR, lihat topik berikut:
+ [Versi aplikasi di Amazon EMR 7.x rilis](emr-release-app-versions-7.x.md)
+ [Versi aplikasi di Amazon EMR 6.x rilis](emr-release-app-versions-6.x.md)
+ [Versi aplikasi di Amazon EMR 5.x rilis](emr-release-app-versions-5.x.md)
+ [Versi aplikasi di Amazon EMR 4.x rilis](emr-release-app-versions-4.x.md)


**Informasi versi aplikasi**  

|  | emr-7.10.0 | emr-7.9.0 | emr-7.8.0 | emr-7.7.0 | 
| --- | --- | --- | --- | --- | 
| AWS SDK for Java | 2.31.48, 1.12.782 | 2.31.16, 1.12.782 | 2.29.52, 1.12.780 | 2.29.44, 1.12.780 | 
| Python | 3.9, 3.11 | 3.9, 3.11 | 3.9, 3.11 | 3.9, 3.11 | 
| Skala | 2.12.18 | 2.12.18 | 2.12.18 | 2.12.18 | 
| AmazonCloudWatchAgent | 1.300032.2-amzn-0 | 1.300032.2-amzn-0 | 1.300032.2-amzn-0 | 1.300032.2-amzn-0 | 
| Delta | 3.3.0-amzn-2 | 3.3.0-amzn-1 | 3.3.0-amzn-0 | 3.2.1-amzn-2 | 
| Flink | 1.20.0-amzn-4 | 1.20.0-amzn-3 | 1.20.0-amzn-2 | 1.20.0-amzn-1 | 
| Ganglia |  -  |  -  |  -  |  -  | 
| HBase | 2.6.2-amzn-1 | 2.6.2-amzn-0 | 2.6.1-amzn-2 | 2.6.1-amzn-1 | 
| HCatalog | 3.1.3-amzn-19 | 3.1.3-amzn-18 | 3.1.3-amzn-17 | 3.1.3-amzn-16 | 
| Hadoop | 3.4.1-amzn-2 | 3.4.1-amzn-1 | 3.4.1-amzn-0 | 3.4.0-amzn-3 | 
| Hive | 3.1.3-amzn-19 | 3.1.3-amzn-18 | 3.1.3-amzn-17 | 3.1.3-amzn-16 | 
| Hudi | 0.15.0-amzn-7 | 0.15.0-amzn-6 | 0.15.0-amzn-5 | 0.15.0-amzn-4 | 
| Hue | 4.11.0 | 4.11.0 | 4.11.0 | 4.11.0 | 
| Iceberg | 1.8.1-amzn-0 | 1.7.1-amzn-2 | 1.7.1-amzn-1 | 1.7.1-amzn-0 | 
| JupyterEnterpriseGateway | 2.6.0 | 2.6.0 | 2.6.0 | 2.6.0 | 
| JupyterHub | 1.5.0 | 1.5.0 | 1.5.0 | 1.5.0 | 
| Livy | 0.8.0-inkubasi | 0.8.0-inkubasi | 0.8.0-inkubasi | 0.8.0-inkubasi | 
| MXNet |  -  |  -  |  -  |  -  | 
| Mahout |  -  |  -  |  -  |  -  | 
| Oozie | 5.2.1 | 5.2.1 | 5.2.1 | 5.2.1 | 
| Phoenix | 5.2.1 | 5.2.1 | 5.2.1 | 5.2.1 | 
| Pig | 0.17.0 | 0.17.0 | 0.17.0 | 0.17.0 | 
| Presto | 0,27-amzn-4 | 0,27-amzn-3 | 0,287-amzn-2 | 0,287-amzn-1 | 
| Spark | 3.5.5-amzn-1 | 3.5.5-amzn-0 | 3.5.4-amzn-0 | 3.5.3-amzn-1 | 
| Sqoop |  -  |  -  |  -  |  -  | 
| TensorFlow | 2.18.0 | 2.16.1 | 2.16.1 | 2.16.1 | 
| Tez | 0.10.2-amzn-17 | 0.10.2-amzn-16 | 0.10.2-amzn-15 | 0.10.2-amzn-14 | 
| Trino (PrestoSQL) | 470-amzn-0 | 467-amzn-2 | 467-amzn-1 | 467-amzn-0 | 
| Zeppelin | 0.11.1 | 0.11.1 | 0.11.1 | 0.11.1 | 
| ZooKeeper | 3.9.3-amzn-2 | 3.9.3-amzn-1 | 3.9.3-amzn-0 | 3.9.2-amzn-1 | 

# 7.10.0 kerentanan dan eksposur umum
<a name="7100-common-vulnerabilities-exposures"></a>

Tabel berikut mencantumkan semua CVEs yang tidak memengaruhi kluster EMR yang berjalan pada konfigurasi yang direkomendasikan Amazon EMR 7.10.0. Amazon EMR bergantung pada sumber terbuka hulu untuk ketersediaan perbaikan dan akan memberikan versi stabil terbaru sebagai bagian dari komponen Core Engine dalam waktu 90 hari setelah Amazon EMR memverifikasi perbaikan.

Tabel ini diperbarui pada 25 September 2025.


| ID CVE | Kepelikan | URL detail CVE | 
| --- | --- | --- | 
|  CVE-2015-1832  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2015-1832)-2015-1832  | 
|  CVE-2016-5018  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2016-5018)-2016-5018  | 
|  CVE-2017-15095  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2017-15095)-2017-15095  | 
|  CVE-2017-17485  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2017-17485)-2017-17485  | 
|  CVE-2017-7525  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2017-7525)-2017-7525  | 
|  CVE-2018-11307  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-11307)-2018-11307  | 
|  CVE-2018-11307  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-11307)-2018-11307  | 
|  CVE-2018-14718  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-14718)-2018-14718  | 
|  CVE-2018-14718  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-14718)-2018-14718  | 
|  CVE-2018-14719  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE-2018-14719](https://nvd.nist.gov/vuln/detail/CVE-2018-14719)  | 
|  CVE-2018-14719  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE-2018-14719](https://nvd.nist.gov/vuln/detail/CVE-2018-14719)  | 
|  CVE-2018-14720  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-14720)-2018-14720  | 
|  CVE-2018-14720  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-14720)-2018-14720  | 
|  CVE-2018-14721  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-14721)-2018-14721  | 
|  CVE-2018-14721  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-14721)-2018-14721  | 
|  CVE-2018-19360  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-19360)-2018-19360  | 
|  CVE-2018-19360  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-19360)-2018-19360  | 
|  CVE-2018-19361  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-19361)-2018-19361  | 
|  CVE-2018-19361  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-19361)-2018-19361  | 
|  CVE-2018-19362  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-19362)-2018-19362  | 
|  CVE-2018-19362  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-19362)-2018-19362  | 
|  CVE-2018-7489  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-7489)-2018-7489  | 
|  CVE-2018-7489  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-7489)-2018-7489  | 
|  CVE-2019-10202  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-10202)-2019-10202  | 
|  CVE-2019-14379  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-14379)-2019-14379  | 
|  CVE-2019-14379  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-14379)-2019-14379  | 
|  CVE-2019-14540  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-14540)-2019-14540  | 
|  CVE-2019-14540  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-14540)-2019-14540  | 
|  CVE-2019-14892  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-14892)-2019-14892  | 
|  CVE-2019-14892  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-14892)-2019-14892  | 
|  CVE-2019-14893  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-14893)-2019-14893  | 
|  CVE-2019-14893  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-14893)-2019-14893  | 
|  CVE-2019-16335  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-16335)-2019-16335  | 
|  CVE-2019-16335  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-16335)-2019-16335  | 
|  CVE-2019-16942  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-16942)-2019-16942  | 
|  CVE-2019-16942  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-16942)-2019-16942  | 
|  CVE-2019-16943  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-16943)-2019-16943  | 
|  CVE-2019-16943  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-16943)-2019-16943  | 
|  CVE-2019-17267  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-17267)-2019-17267  | 
|  CVE-2019-17267  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-17267)-2019-17267  | 
|  CVE-2019-17531  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-17531)-2019-17531  | 
|  CVE-2019-17531  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-17531)-2019-17531  | 
|  CVE-2019-20330  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-20330)-2019-20330  | 
|  CVE-2019-20330  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-20330)-2019-20330  | 
|  CVE-2020-8840  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-8840)-2020-8840  | 
|  CVE-2020-8840  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-8840)-2020-8840  | 
|  CVE-2020-9546  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-9546)-2020-9546  | 
|  CVE-2020-9546  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-9546)-2020-9546  | 
|  CVE-2020-9547  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-9547)-2020-9547  | 
|  CVE-2020-9547  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-9547)-2020-9547  | 
|  CVE-2020-9548  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-9548)-2020-9548  | 
|  CVE-2020-9548  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-9548)-2020-9548  | 
|  CVE-2022-1471  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-1471)-2022-1471  | 
|  CVE-2022-1471  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-1471)-2022-1471  | 
|  CVE-2022-37865  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-37865)-2022-37865  | 
|  CVE-2022-39135  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-39135)-2022-39135  | 
|  CVE-2022-42889  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-42889)-2022-42889  | 
|  CVE-2022-46337  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-46337)-2022-46337  | 
|  CVE-2022-46337  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-46337)-2022-46337  | 
|  CVE-2024-51504  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-51504)-2024-51504  | 
|  CVE-2024-51504  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-51504)-2024-51504  | 
|  CVE-2024-52046  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-52046)-2024-52046  | 
|  CVE-2024-52046  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-52046)-2024-52046  | 
|  CVE-2024-52577  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-52577)-2024-52577  | 
|  CVE-2024-53990  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-53990)-2024-53990  | 
|  CVE-2024-56325  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-56325)-2024-56325  | 
|  CVE-2025-30065  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2025-30065)-2025-30065  | 
|  CVE-2014-3643  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2014-3643)-2014-3643  | 
|  CVE-2015-5237  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2015-5237)-2015-5237  | 
|  CVE-2015-5237  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2015-5237)-2015-5237  | 
|  CVE-2016-6796  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2016-6796)-2016-6796  | 
|  CVE-2018-1000180  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-1000180)-2018-1000180  | 
|  CVE-2018-1000180  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-1000180)-2018-1000180  | 
|  CVE-2018-12022  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-12022)-2018-12022  | 
|  CVE-2018-12022  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-12022)-2018-12022  | 
|  CVE-2018-12023  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-12023)-2018-12023  | 
|  CVE-2018-12023  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-12023)-2018-12023  | 
|  CVE-2018-5968  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-5968)-2018-5968  | 
|  CVE-2019-0205  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-0205)-2019-0205  | 
|  CVE-2019-0205  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-0205)-2019-0205  | 
|  CVE-2019-10172  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-10172)-2019-10172  | 
|  CVE-2019-12086  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-12086)-2019-12086  | 
|  CVE-2019-12086  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-12086)-2019-12086  | 
|  CVE-2019-14439  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-14439)-2019-14439  | 
|  CVE-2019-14439  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-14439)-2019-14439  | 
|  CVE-2020-10650  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-10650)-2020-10650  | 
|  CVE-2020-10650  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-10650)-2020-10650  | 
|  CVE-2020-10672  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-10672)-2020-10672  | 
|  CVE-2020-10672  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-10672)-2020-10672  | 
|  CVE-2020-10673  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-10673)-2020-10673  | 
|  CVE-2020-10673  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-10673)-2020-10673  | 
|  CVE-2020-10968  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-10968)-2020-10968  | 
|  CVE-2020-10968  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-10968)-2020-10968  | 
|  CVE-2020-10969  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-10969)-2020-10969  | 
|  CVE-2020-10969  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-10969)-2020-10969  | 
|  CVE-2020-11111  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-11111)-2020-11111  | 
|  CVE-2020-11111  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-11111)-2020-11111  | 
|  CVE-2020-11112  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-11112)-2020-11112  | 
|  CVE-2020-11112  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-11112)-2020-11112  | 
|  CVE-2020-11113  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-11113)-2020-11113  | 
|  CVE-2020-11113  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-11113)-2020-11113  | 
|  CVE-2020-11619  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-11619](https://nvd.nist.gov/vuln/detail/CVE-2020-11619)  | 
|  CVE-2020-11619  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-11619](https://nvd.nist.gov/vuln/detail/CVE-2020-11619)  | 
|  CVE-2020-11620  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-11620)-2020-11620  | 
|  CVE-2020-11620  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-11620)-2020-11620  | 
|  CVE-2020-13949  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-13949)-2020-13949  | 
|  CVE-2020-13949  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-13949)-2020-13949  | 
|  CVE-2020-13949  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-13949)-2020-13949  | 
|  CVE-2020-14060  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-14060)-2020-14060  | 
|  CVE-2020-14060  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-14060)-2020-14060  | 
|  CVE-2020-14061  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-14061)-2020-14061  | 
|  CVE-2020-14061  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-14061)-2020-14061  | 
|  CVE-2020-14062  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-14062)-2020-14062  | 
|  CVE-2020-14062  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-14062)-2020-14062  | 
|  CVE-2020-14195  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-14195)-2020-14195  | 
|  CVE-2020-14195  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-14195)-2020-14195  | 
|  CVE-2020-24616  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-24616)-2020-24616  | 
|  CVE-2020-24616  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-24616)-2020-24616  | 
|  CVE-2020-24750  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-24750)-2020-24750  | 
|  CVE-2020-24750  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-24750)-2020-24750  | 
|  CVE-2020-25649  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-25649)-2020-25649  | 
|  CVE-2020-28052  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-28052)-2020-28052  | 
|  CVE-2020-35490  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-35490)-2020-35490  | 
|  CVE-2020-35490  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-35490)-2020-35490  | 
|  CVE-2020-35491  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-35491)-2020-35491  | 
|  CVE-2020-35491  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-35491)-2020-35491  | 
|  CVE-2020-35728  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-35728)-2020-35728  | 
|  CVE-2020-35728  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-35728)-2020-35728  | 
|  CVE-2020-36179  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36179)-2020-36179  | 
|  CVE-2020-36179  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36179)-2020-36179  | 
|  CVE-2020-36180  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36180)-2020-36180  | 
|  CVE-2020-36180  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36180)-2020-36180  | 
|  CVE-2020-36181  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36181)-2020-36181  | 
|  CVE-2020-36181  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36181)-2020-36181  | 
|  CVE-2020-36182  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36182)-2020-36182  | 
|  CVE-2020-36182  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36182)-2020-36182  | 
|  CVE-2020-36183  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36183)-2020-36183  | 
|  CVE-2020-36183  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36183)-2020-36183  | 
|  CVE-2020-36184  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36184)-2020-36184  | 
|  CVE-2020-36184  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36184)-2020-36184  | 
|  CVE-2020-36185  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36185)-2020-36185  | 
|  CVE-2020-36185  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36185)-2020-36185  | 
|  CVE-2020-36186  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36186)-2020-36186  | 
|  CVE-2020-36186  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36186)-2020-36186  | 
|  CVE-2020-36187  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36187)-2020-36187  | 
|  CVE-2020-36187  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36187)-2020-36187  | 
|  CVE-2020-36188  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36188)-2020-36188  | 
|  CVE-2020-36188  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36188)-2020-36188  | 
|  CVE-2020-36189  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36189)-2020-36189  | 
|  CVE-2020-36189  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36189)-2020-36189  | 
|  CVE-2020-36518  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36518)-2020-36518  | 
|  CVE-2020-36518  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36518)-2020-36518  | 
|  CVE-2021-20190  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2021-20190)-2021-20190  | 
|  CVE-2021-20190  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2021-20190)-2021-20190  | 
|  CVE-2021-31684  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2021-31684)-2021-31684  | 
|  CVE-2021-34538  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2021-34538)-2021-34538  | 
|  CVE-2021-34538  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2021-34538)-2021-34538  | 
|  CVE-2021-34538  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2021-34538)-2021-34538  | 
|  CVE-2022-25647  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-25647)-2022-25647  | 
|  CVE-2022-25647  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-25647)-2022-25647  | 
|  CVE-2022-25647  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-25647)-2022-25647  | 
|  CVE-2022-25857  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-25857)-2022-25857  | 
|  CVE-2022-3171  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-3171)-2022-3171  | 
|  CVE-2022-3171  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-3171)-2022-3171  | 
|  CVE-2022-3509  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-3509)-2022-3509  | 
|  CVE-2022-3509  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-3509)-2022-3509  | 
|  CVE-2022-3510  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-3510)-2022-3510  | 
|  CVE-2022-36364  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-36364)-2022-36364  | 
|  CVE-2022-37866  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-37866)-2022-37866  | 
|  CVE-2022-40149  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-40149)-2022-40149  | 
|  CVE-2022-40149  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-40149)-2022-40149  | 
|  CVE-2022-40150  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-40150)-2022-40150  | 
|  CVE-2022-40150  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-40150)-2022-40150  | 
|  CVE-2022-41404  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-41404)-2022-41404  | 
|  CVE-2022-42003  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-42003)-2022-42003  | 
|  CVE-2022-42003  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-42003)-2022-42003  | 
|  CVE-2022-42003  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-42003)-2022-42003  | 
|  CVE-2022-42003  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-42003)-2022-42003  | 
|  CVE-2022-42003  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-42003)-2022-42003  | 
|  CVE-2022-42004  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-42004)-2022-42004  | 
|  CVE-2022-42004  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-42004)-2022-42004  | 
|  CVE-2022-42004  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-42004)-2022-42004  | 
|  CVE-2022-42004  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-42004)-2022-42004  | 
|  CVE-2022-45685  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-45685)-2022-45685  | 
|  CVE-2022-45685  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-45685)-2022-45685  | 
|  CVE-2022-45693  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-45693)-2022-45693  | 
|  CVE-2022-45693  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-45693)-2022-45693  | 
|  CVE-2022-46751  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-46751)-2022-46751  | 
|  CVE-2022-46751  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-46751)-2022-46751  | 
|  CVE-2023-1370  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-1370)-2023-1370  | 
|  CVE-2023-1436  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-1436)-2023-1436  | 
|  CVE-2023-1436  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-1436)-2023-1436  | 
|  CVE-2023-2976  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-2976)-2023-2976  | 
|  CVE-2023-2976  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-2976)-2023-2976  | 
|  CVE-2023-2976  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-2976)-2023-2976  | 
|  CVE-2023-2976  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-2976)-2023-2976  | 
|  CVE-2023-2976  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-2976)-2023-2976  | 
|  CVE-2023-2976  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-2976)-2023-2976  | 
|  CVE-2023-2976  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-2976)-2023-2976  | 
|  CVE-2023-2976  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-2976)-2023-2976  | 
|  CVE-2023-2976  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-2976)-2023-2976  | 
|  CVE-2023-2976  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-2976)-2023-2976  | 
|  CVE-2023-39410  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-39410)-2023-39410  | 
|  CVE-2023-6378  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-6378)-2023-6378  | 
|  CVE-2023-6378  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-6378)-2023-6378  | 
|  CVE-2023-6481  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-6481)-2023-6481  | 
|  CVE-2023-6481  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-6481)-2023-6481  | 
|  CVE-2024-13009  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-13009)-2024-13009  | 
|  CVE-2024-13009  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-13009)-2024-13009  | 
|  CVE-2024-29131  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-29131)-2024-29131  | 
|  CVE-2024-29857  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-29857)-2024-29857  | 
|  CVE-2024-29857  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-29857)-2024-29857  | 
|  CVE-2024-29857  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-29857)-2024-29857  | 
|  CVE-2024-29857  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-29857)-2024-29857  | 
|  CVE-2024-30172  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-30172)-2024-30172  | 
|  CVE-2024-30172  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-30172)-2024-30172  | 
|  CVE-2024-34447  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-34447)-2024-34447  | 
|  CVE-2024-34447  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-34447)-2024-34447  | 
|  CVE-2024-36114  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-36114)-2024-36114  | 
|  CVE-2024-36114  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-36114)-2024-36114  | 
|  CVE-2024-47561  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-47561)-2024-47561  | 
|  CVE-2024-57699  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-57699)-2024-57699  | 
|  CVE-2024-7254  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-7254)-2024-7254  | 
|  CVE-2024-7254  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-7254)-2024-7254  | 
|  CVE-2024-7254  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-7254)-2024-7254  | 
|  CVE-2024-7254  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-7254)-2024-7254  | 
|  CVE-2024-7254  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-7254)-2024-7254  | 
|  CVE-2024-7254  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-7254)-2024-7254  | 
|  CVE-2024-7254  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-7254)-2024-7254  | 
|  CVE-2024-9823  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-9823)-2024-9823  | 
|  CVE-2025-1948  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2025-1948)-2025-1948  | 
|  CVE-2025-24970  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2025-24970)-2025-24970  | 
|  CVE-2025-24970  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2025-24970)-2025-24970  | 
|  CVE-2025-27553  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2025-27553)-2025-27553  | 
|  CVE-2025-27817  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2025-27817)-2025-27817  | 
|  CVE-2025-27817  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2025-27817)-2025-27817  | 
|  CVE-2025-27817  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2025-27817)-2025-27817  | 
|  CVE-2025-27820  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2025-27820)-2025-27820  | 
|  CVE-2025-27820  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2025-27820)-2025-27820  | 
|  CVE-2025-30706  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2025-30706)-2025-30706  | 
|  CVE-2025-30706  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2025-30706)-2025-30706  | 
|  CVE-2025-46762  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2025-46762)-2025-46762  | 
|  CVE-2025-48734  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2025-48734)-2025-48734  | 
|  CVE-2025-48734  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2025-48734)-2025-48734  | 
|  CVE-2025-49146  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2025-49146)-2025-49146  | 
|  CVE-2025-5115  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2025-5115)-2025-5115  | 
|  CVE-2025-52434  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2025-52434)-2025-52434  | 
|  CVE-2025-52999  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2025-52999)-2025-52999  | 
|  CVE-2025-52999  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2025-52999)-2025-52999  | 
|  CVE-2025-52999  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2025-52999)-2025-52999  | 
|  CVE-2025-52999  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2025-52999)-2025-52999  | 
|  CVE-2025-52999  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2025-52999)-2025-52999  | 
|  CVE-2025-52999  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2025-52999)-2025-52999  | 
|  CVE-2025-55163  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2025-55163)-2025-55163  | 
|  CVE-2025-55163  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2025-55163)-2025-55163  | 
|  CVE-2025-58056  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2025-58056)-2025-58056  | 
|  CVE-2025-58056  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2025-58056)-2025-58056  | 
|  CVE-2025-58057  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2025-58057)-2025-58057  | 
|  CVE-2025-58057  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2025-58057)-2025-58057  | 
|  CVE-2025-58057  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2025-58057)-2025-58057  | 
|  CVE-2025-58057  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2025-58057)-2025-58057  | 
|  CVE-2012-5783  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2012-5783)-2012-5783  | 
|  CVE-2012-5783  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2012-5783)-2012-5783  | 
|  CVE-2012-6153  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2012-6153)-2012-6153  | 
|  CVE-2012-6153  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2012-6153)-2012-6153  | 
|  CVE-2018-10237  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-10237)-2018-10237  | 
|  CVE-2018-10237  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-10237)-2018-10237  | 
|  CVE-2018-10237  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-10237)-2018-10237  | 
|  CVE-2018-10237  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-10237)-2018-10237  | 
|  CVE-2018-10237  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-10237)-2018-10237  | 
|  CVE-2018-11798  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-11798)-2018-11798  | 
|  CVE-2018-1313  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-1313)-2018-1313  | 
|  CVE-2019-12384  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-12384)-2019-12384  | 
|  CVE-2019-12384  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-12384)-2019-12384  | 
|  CVE-2019-12814  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-12814)-2019-12814  | 
|  CVE-2019-12814  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-12814)-2019-12814  | 
|  CVE-2020-13955  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-13955)-2020-13955  | 
|  CVE-2020-13956  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-13956)-2020-13956  | 
|  CVE-2020-15250  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-15250)-2020-15250  | 
|  CVE-2020-15250  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-15250)-2020-15250  | 
|  CVE-2020-15522  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-15522)-2020-15522  | 
|  CVE-2020-15522  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-15522)-2020-15522  | 
|  CVE-2020-15522  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-15522)-2020-15522  | 
|  CVE-2020-17521  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-17521)-2020-17521  | 
|  CVE-2020-17521  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-17521)-2020-17521  | 
|  CVE-2020-1945  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-1945](https://nvd.nist.gov/vuln/detail/CVE-2020-1945)  | 
|  CVE-2020-26939  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-26939)-2020-26939  | 
|  CVE-2020-26939  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-26939)-2020-26939  | 
|  CVE-2020-26939  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-26939)-2020-26939  | 
|  CVE-2021-22569  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2021-22569)-2021-22569  | 
|  CVE-2021-22569  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2021-22569)-2021-22569  | 
|  CVE-2021-27568  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2021-27568)-2021-27568  | 
|  CVE-2021-28170  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2021-28170)-2021-28170  | 
|  CVE-2021-29425  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2021-29425)-2021-29425  | 
|  CVE-2021-36373  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2021-36373)-2021-36373  | 
|  CVE-2021-36374  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2021-36374)-2021-36374  | 
|  CVE-2022-38749  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-38749)-2022-38749  | 
|  CVE-2022-38750  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-38750)-2022-38750  | 
|  CVE-2022-38751  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-38751)-2022-38751  | 
|  CVE-2022-38752  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-38752)-2022-38752  | 
|  CVE-2022-41854  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-41854)-2022-41854  | 
|  CVE-2023-0833  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-0833)-2023-0833  | 
|  CVE-2023-33201  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-33201)-2023-33201  | 
|  CVE-2023-33201  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-33201)-2023-33201  | 
|  CVE-2023-33201  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-33201)-2023-33201  | 
|  CVE-2023-33201  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-33201)-2023-33201  | 
|  CVE-2023-33202  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-33202)-2023-33202  | 
|  CVE-2023-33202  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-33202)-2023-33202  | 
|  CVE-2023-33202  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-33202)-2023-33202  | 
|  CVE-2023-33202  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-33202)-2023-33202  | 
|  CVE-2023-42503  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-42503)-2023-42503  | 
|  CVE-2023-51074  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-51074)-2023-51074  | 
|  CVE-2024-12798  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-12798)-2024-12798  | 
|  CVE-2024-12798  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-12798)-2024-12798  | 
|  CVE-2024-12798  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-12798)-2024-12798  | 
|  CVE-2024-12798  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-12798)-2024-12798  | 
|  CVE-2024-12798  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-12798)-2024-12798  | 
|  CVE-2024-12798  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-12798)-2024-12798  | 
|  CVE-2024-23944  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-23944)-2024-23944  | 
|  CVE-2024-23945  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-23945)-2024-23945  | 
|  CVE-2024-23945  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-23945)-2024-23945  | 
|  CVE-2024-23953  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-23953)-2024-23953  | 
|  CVE-2024-23953  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-23953)-2024-23953  | 
|  CVE-2024-25710  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-25710)-2024-25710  | 
|  CVE-2024-25710  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-25710)-2024-25710  | 
|  CVE-2024-26308  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-26308)-2024-26308  | 
|  CVE-2024-26308  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-26308)-2024-26308  | 
|  CVE-2024-29025  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-29025)-2024-29025  | 
|  CVE-2024-29133  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-29133)-2024-29133  | 
|  CVE-2024-29869  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-29869)-2024-29869  | 
|  CVE-2024-29869  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-29869)-2024-29869  | 
|  CVE-2024-30171  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-30171)-2024-30171  | 
|  CVE-2024-30171  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-30171)-2024-30171  | 
|  CVE-2024-30171  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-30171)-2024-30171  | 
|  CVE-2024-30171  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-30171)-2024-30171  | 
|  CVE-2024-31141  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-31141)-2024-31141  | 
|  CVE-2024-47535  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-47535)-2024-47535  | 
|  CVE-2024-47535  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-47535)-2024-47535  | 
|  CVE-2024-47554  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-47554)-2024-47554  | 
|  CVE-2024-47554  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-47554)-2024-47554  | 
|  CVE-2024-47554  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-47554)-2024-47554  | 
|  CVE-2024-47554  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-47554)-2024-47554  | 
|  CVE-2024-52980  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-52980)-2024-52980  | 
|  CVE-2024-56128  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-56128)-2024-56128  | 
|  CVE-2024-6763  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-6763)-2024-6763  | 
|  CVE-2024-6763  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-6763)-2024-6763  | 
|  CVE-2024-6763  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-6763)-2024-6763  | 
|  CVE-2024-6763  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-6763)-2024-6763  | 
|  CVE-2024-6763  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-6763)-2024-6763  | 
|  CVE-2024-8184  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-8184)-2024-8184  | 
|  CVE-2025-22227  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE-2025-22227](https://nvd.nist.gov/vuln/detail/CVE-2025-22227)  | 
|  CVE-2025-25193  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2025-25193)-2025-25193  | 
|  CVE-2025-25193  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2025-25193)-2025-25193  | 
|  CVE-2025-25193  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2025-25193)-2025-25193  | 
|  CVE-2025-30474  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2025-30474)-2025-30474  | 
|  CVE-2025-3588  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2025-3588)-2025-3588  | 
|  CVE-2025-46392  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2025-46392)-2025-46392  | 
|  CVE-2025-46551  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2025-46551)-2025-46551  | 
|  CVE-2025-48924  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2025-48924)-2025-48924  | 
|  CVE-2025-48924  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2025-48924)-2025-48924  | 
|  CVE-2025-48924  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2025-48924)-2025-48924  | 
|  CVE-2025-48924  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2025-48924)-2025-48924  | 
|  CVE-2025-48924  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2025-48924)-2025-48924  | 
|  CVE-2025-48924  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2025-48924)-2025-48924  | 
|  CVE-2025-48924  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2025-48924)-2025-48924  | 
|  CVE-2025-48924  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2025-48924)-2025-48924  | 
|  CVE-2025-48924  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2025-48924)-2025-48924  | 
|  CVE-2025-48924  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2025-48924)-2025-48924  | 
|  CVE-2025-49128  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2025-49128)-2025-49128  | 
|  CVE-2025-49128  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2025-49128)-2025-49128  | 
|  CVE-2025-49128  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2025-49128)-2025-49128  | 
|  CVE-2025-49128  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2025-49128)-2025-49128  | 
|  CVE-2025-53864  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2025-53864)-2025-53864  | 
|  CVE-2025-53864  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2025-53864)-2025-53864  | 
|  CVE-2025-58457  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2025-58457)-2025-58457  | 
|  CVE-2025-58457  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2025-58457)-2025-58457  | 
|  CVE-2025-58457  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2025-58457)-2025-58457  | 
|  CVE-2025-8885  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2025-8885)-2025-8885  | 
|  CVE-2025-8885  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2025-8885)-2025-8885  | 
|  CVE-2025-8916  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE-2025-8916](https://nvd.nist.gov/vuln/detail/CVE-2025-8916)  | 
|  CVE-2025-8916  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE-2025-8916](https://nvd.nist.gov/vuln/detail/CVE-2025-8916)  | 
|  CVE-2025-8916  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE-2025-8916](https://nvd.nist.gov/vuln/detail/CVE-2025-8916)  | 
|  CVE-2025-8916  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE-2025-8916](https://nvd.nist.gov/vuln/detail/CVE-2025-8916)  | 
|  CVE-2020-8908  |  RENDAH  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-8908)-2020-8908  | 
|  CVE-2020-8908  |  RENDAH  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-8908)-2020-8908  | 
|  CVE-2020-8908  |  RENDAH  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-8908)-2020-8908  | 
|  CVE-2020-8908  |  RENDAH  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-8908)-2020-8908  | 
|  CVE-2020-8908  |  RENDAH  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-8908)-2020-8908  | 
|  CVE-2020-8908  |  RENDAH  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-8908)-2020-8908  | 
|  CVE-2020-8908  |  RENDAH  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-8908)-2020-8908  | 
|  CVE-2020-8908  |  RENDAH  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-8908)-2020-8908  | 
|  CVE-2020-8908  |  RENDAH  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-8908)-2020-8908  | 
|  CVE-2020-8908  |  RENDAH  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-8908)-2020-8908  | 
|  CVE-2024-12801  |  RENDAH  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-12801)-2024-12801  | 
|  CVE-2024-12801  |  RENDAH  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-12801)-2024-12801  | 
|  CVE-2024-12801  |  RENDAH  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-12801)-2024-12801  | 
|  CVE-2025-27496  |  RENDAH  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2025-27496)-2025-27496  | 

## Catatan terbitan 7.10.0
<a name="emr-7100-relnotes"></a>

Catatan rilis berikut mencakup informasi untuk rilis Amazon EMR 7.10.0.

**Fitur baru**
+ **Upgrade aplikasi** —Amazon EMR 7.10.0 application upgrades include AWS SDK for Java 2.31.48/1.12.782, Delta 3.3.0-amzn-2, Hadoop 3.4.1-amzn-2, Hudi 0.15.0-amzn-7, Iceberg 1.8.1-amzn-0, Spark 3.5.5-amzn-1, and Zookeeper 3.9.3-amzn-2.
+ Sistem **file S3A - Mulai dari rilis EMR 7.10.0, sistem** file S3A telah menggantikan EMRFS sebagai konektor EMR S3 default. Untuk informasi selengkapnya, lihat [Panduan Migrasi: Sistem File EMRFS ke S3A](https://docs.aws.amazon.com/emr/latest/ReleaseGuide/emr-s3a-migrate.html).
+ **Dukungan streaming Spark Kafka** - Mulai dari rilis EMR 7.10.0, dependensi aws-msk-iam-auth 2.3.2 dan commons-pool2 2.11.1 disertakan untuk beban kerja streaming Spark dengan sumber data Kafka. Ini JARs tersedia ketika aplikasi Spark dipilih pada peluncuran cluster.
+ **Konektor streaming Flink** - Mulai dari rilis EMR 7.10.0 flink-sql-connector-kafka, 3.4.0, 5.0.0, aws-msk-iam-auth dan 2.3.2 flink-sql-connector-kinesis disertakan untuk beban kerja streaming Flink dengan sumber data Kafka dan Kinesis. Konektor ini JARs tersedia ketika aplikasi Flink dipilih pada peluncuran cluster.

**Masalah yang diketahui**
+ **Status DITERIMA** - Aplikasi YARN macet Dalam Status DITERIMA karena bug sumber terbuka [YARN-11834](https://issues.apache.org/jira/browse/YARN-11834). Hubungi tim AWS dukungan jika Anda mengalami masalah ini.
+ **ConcurrentModificationException pengecualian** [- YARN sering memulai ulang dengan ConcurrentModificationException pengecualian karena bug sumber terbuka YARN-11838.](https://issues.apache.org/jira/browse/YARN-11838) Hubungi tim AWS dukungan jika Anda mengalami masalah ini.
+ **Log aplikasi YARN** - log aplikasi YARN tidak terlihat melalui UI Manajer Sumber Daya. Untuk memperbaiki masalah ini, ikuti langkah-langkah berikut:

  1. Perbarui `yarn.log.server.url` konfigurasi di yarn-site.xml ke nilai berikut:

     ```
     <property>
       <name>yarn.log.server.url</name>
       <value>https://<private-dns-master-node>:19890/jobhistory/logs</value>
     </property>
     ```

  1. Mulai ulang layanan pengelola sumber daya hadoop: `systemctl restart hadoop-resourcemanager.service`
+ **Mengunggah log langkah** — Beberapa cluster mungkin tidak dapat mengunggah log langkah ke bucket S3 Anda karena kondisi balapan. Hubungi tim AWS dukungan jika Anda mengalami masalah ini.
+  **HBase pembuatan tabel di katalog Hive with Glue** - Dari EMR-7.3.0 hingga EMR-7.10.0, ada bug karena integrasi Hive Iceberg, yang menyebabkan HBase pembuatan tabel di Hive gagal saat Glue Data Catalog digunakan sebagai metastore. Silakan hubungi tim AWS dukungan jika Anda mengalami masalah ini.
+  **Tez UI** - Dari EMR-7.3 ke EMR-7.10, ada bug di mana mengakses UI Tez melalui UI Web Manajer Sumber Daya YARN gagal saat enkripsi dalam transit diaktifkan. Ini terjadi karena proxy YARN mencoba menggunakan protokol HTTP sementara Tez UI memerlukan HTTPS. Harap ubah `tez.tez-ui.history-url.base` konfigurasi `tez-site` dari `http` ke `https` untuk menyelesaikan masalah ini.
+ Label rilis dan wilayah yang didukung.    
[\[See the AWS documentation website for more details\]](http://docs.aws.amazon.com/id_id/emr/latest/ReleaseGuide/emr-7100-release.html)

## 7.10.0 versi Java default
<a name="emr-7100-jdk"></a>

Amazon EMR merilis 7.10 dan lebih tinggi dikirimkan dengan Amazon Corretto 17 (dibangun di atas OpenJDK) secara default untuk aplikasi yang mendukung Corretto 17 (JDK 17), dengan pengecualian Apache Livy.

Tabel berikut menunjukkan versi Java default untuk aplikasi di Amazon EMR 7.10.0. Jika Anda ingin mengubah JVM default pada cluster Anda, ikuti instruksi [Konfigurasikan aplikasi untuk menggunakan Java Virtual Machine tertentu](configuring-java8.md) untuk setiap aplikasi yang berjalan di cluster. Anda hanya dapat menggunakan satu versi runtime Java untuk sebuah cluster. Amazon EMR tidak mendukung menjalankan node atau aplikasi yang berbeda pada versi runtime yang berbeda pada cluster yang sama.


| Aplikasi | Versi Java/Amazon Corretto (defaultnya tebal) | 
| --- | --- | 
| kuala | 17, 11, 8 | 
| Flink | 17, 11, 8 | 
| HBase | 17, 11, 8 | 
| HCatalog | 17, 11, 8 | 
| Hadoop | 17, 11, 8 | 
| Hive | 17, 11, 8 | 
| Hudi | 17, 11, 8 | 
| Gunung es | 17, 11 | 
| Livy | 17, 11, 8 | 
| Oozie | 17, 11, 8 | 
| Phoenix | 17, 11, 8 | 
| PrestoDB | 8 | 
| Spark | 17, 11, 8 | 
| JERAM Spark | 17, 11, 8 | 
| Tez | 17, 11, 8 | 
| Trino | 21, 17 | 
| Zeppelin | 17, 11, 8 | 
| Pig | 17, 11, 8 | 
| Zookeeper | 17, 11, 8 | 

## 7.10.0 versi komponen
<a name="emr-7100-components"></a>

Komponen yang diinstal oleh Amazon EMR dengan rilis ini tercantum di bawah ini. Beberapa komponen diinstal sebagai bagian dari paket aplikasi big data. Sedangkan komponen lainnya bersifak unik untuk Amazon EMR dan diinstal untuk proses sistem dan fitur. Ini biasanya dimulai dengan `emr` atau `aws`. Paket aplikasi big data dalam rilis Amazon EMR terbaru biasanya versi terbaru yang ditemukan di komunitas. Kami menyediakan rilis komunitas di Amazon EMR secepat mungkin.

Beberapa komponen yang ada di Amazon EMR berbeda dari versi komunitas. Komponen ini mempunyai label versi dalam bentuk `CommunityVersion-amzn-EmrVersion`. `EmrVersion` dimulai dari 0. Misalnya, jika komponen komunitas open source bernama `myapp-component` dengan versi 2.2 telah dimodifikasi tiga kali untuk dimasukkan dalam rilis EMR Amazon yang berbeda, versi rilisnya terdaftar sebagai. `2.2-amzn-2`


| Komponen | Versi | Deskripsi | 
| --- | --- | --- | 
| adot-java-agent | 1.31.0 | Agen Java yang mengumpulkan metrik dari daemon aplikasi. | 
| delta | 3.3.0-amzn-2 | Danau Delta adalah format tabel terbuka untuk kumpulan data analitik yang sangat besar | 
| emr-amazon-cloudwatch-agent | 1.300032.2-amzn-0 | Aplikasi yang mengumpulkan metrik tingkat sistem internal dan metrik aplikasi khusus dari instans Amazon EC2. | 
| emr-ddb | 5.7.0 | Konektor Amazon DynamoDB untuk aplikasi ekosistem Hadoop. | 
| emr-goodies | 3.19.0 | Perpustakaan kenyamanan ekstra untuk ekosistem Hadoop. | 
| emr-kinesis | 3.23.0 | Konektor Amazon Kinesis untuk aplikasi ekosistem Hadoop. | 
| emr-notebook-env | 1.18.0 | Conda env untuk emr notebook yang mencakup gateway jupyter korporasi | 
| emr-s3-dist-cp | 2.40.0 | Aplikasi salinan terdistribusi yang dioptimalkan untuk Amazon S3. | 
| emr-s3-select | 2.19.0 | EMR S3Select Connector | 
| emr-wal-cli | 1.3.4 | Cli digunakan untuk daftar emrwal/penghapusan. | 
| emrfs | 2.71.0 | Konektor Amazon S3 untuk aplikasi ekosistem Hadoop. | 
| flink-client | 1.20.0-amzn-4 | Skrip dan aplikasi klien baris perintah Apache Flink. | 
| flink-jobmanager-config | 1.20.0-amzn-4 | Mengelola sumber daya pada node EMR untuk Apache Flink. JobManager | 
| hadoop-client | 3.4.1-amzn-2 | Klien baris perintah Hadoop seperti 'hdfs', 'Hadoop', atau 'yarn'. | 
| hadoop-hdfs-datanode | 3.4.1-amzn-2 | Layanan tingkat simpul HDFS untuk menyimpan blok. | 
| hadoop-hdfs-library | 3.4.1-amzn-2 | Klien dan perpustakaan baris perintah HDFS | 
| hadoop-hdfs-namenode | 3.4.1-amzn-2 | Layanan HDFS untuk melacak nama file dan lokasi blok. | 
| hadoop-hdfs-journalnode | 3.4.1-amzn-2 | Layanan HDFS untuk mengelola jurnal filesystem Hadoop pada klaster HA. | 
| hadoop-httpfs-server | 3.4.1-amzn-2 | Titik akhir HTTP untuk operasi HDFS. | 
| hadoop-kms-server | 3.4.1-amzn-2 | Server manajemen kunci kriptografi berdasarkan API Hadoop. KeyProvider  | 
| hadoop-mapred | 3.4.1-amzn-2 | MapReduce pustaka mesin eksekusi untuk menjalankan MapReduce aplikasi. | 
| hadoop-yarn-nodemanager | 3.4.1-amzn-2 | Layanan YARN untuk mengelola kontainer pada simpul individu. | 
| hadoop-yarn-resourcemanager | 3.4.1-amzn-2 | Layanan YARN untuk mengalokasikan dan mengelola sumber daya klaster dan aplikasi terdistribusi. | 
| hadoop-yarn-timeline-server | 3.4.1-amzn-2 | Layanan untuk mengambil informasi terkini dan historis untuk aplikasi YARN. | 
| hbase-hmaster | 2.6.2-amzn-1 | Layanan untuk HBase cluster yang bertanggung jawab untuk koordinasi Daerah dan pelaksanaan perintah administratif. | 
| hbase-region-server | 2.6.2-amzn-1 | Layanan untuk melayani satu atau lebih HBase wilayah. | 
| hbase-client | 2.6.2-amzn-1 | HBase klien baris perintah. | 
| hbase-rest-server | 2.6.2-amzn-1 | Layanan menyediakan titik akhir RESTful HTTP untuk HBase. | 
| hbase-thrift-server | 2.6.2-amzn-1 | Layanan menyediakan titik akhir Thrift ke. HBase | 
| hbase-operator-tools | 2.6.2-amzn-1 | Alat perbaikan untuk HBase cluster Apache. | 
| hcatalog-client | 3.1.3-amzn-19 | Klien baris perintah 'hcat' untuk memanipulasi hcatalog-server. | 
| hcatalog-server | 3.1.3-amzn-19 | Penyediaan layanan HCatalog, tabel dan lapisan manajemen penyimpanan untuk aplikasi terdistribusi. | 
| hcatalog-webhcat-server | 3.1.3-amzn-19 | Titik akhir HTTP menyediakan antarmuka REST ke HCatalog. | 
| hive-client | 3.1.3-amzn-19 | Klien baris perintah Hive. | 
| hive-hbase | 3.1.3-amzn-19 | Klien Hive-hbase. | 
| hive-metastore-server | 3.1.3-amzn-19 | Layanan untuk mengakses metastore Hive, repositori semantik yang menyimpan metadata untuk SQL pada operasi Hadoop. | 
| hive-server2 | 3.1.3-amzn-19 | Layanan untuk menerima kueri Hive sebagai permintaan web. | 
| hudi | 0.15.0-amzn-7 | Kerangka pemrosesan tambahan untuk memberi daya pada pipa data pada latensi rendah dan efisiensi tinggi. | 
| hudi-presto | 0.15.0-amzn-7 | Perpustakaan paket untuk menjalankan Presto dengan Hudi. | 
| hudi-trino | 0.15.0-amzn-7 | Perpustakaan bundel untuk menjalankan Trino dengan Hudi. | 
| hudi-spark | 0.15.0-amzn-7 | Perpustakaan paket untuk menjalankan Spark dengan Hudi. | 
| hue-server | 4.11.0 | Aplikasi web untuk menganalisis data menggunakan aplikasi ekosistem Hadoop | 
| iceberg | 1.8.1-amzn-0 | Apache Iceberg adalah format tabel terbuka untuk kumpulan data analitik besar | 
| jupyterhub | 1.5.0 | Server multi-pengguna untuk notebook Jupyter | 
| livy-server | 0.8.0-inkubasi | Antarmuka REST untuk berinteraksi dengan Apache Spark | 
| nginx | 1.12.1 | nginx [engine x] adalah server HTTP dan server proksi balik | 
| mariadb-server | 5.5.68\$1 | Server basis data MariaDB. | 
| nvidia-cuda | 12.5.0 | Driver Nvidia dan kit alat Cuda | 
| oozie-client | 5.2.1 | Klien baris perintah Oozie. | 
| oozie-server | 5.2.1 | Layanan untuk menerima permintaan alur kerja Oozie. | 
| opencv | 4.7.0 | Perpustakaan Visi Komputer Sumber Terbuka. | 
| phoenix-library | 5.2.1 | Perpustakaan phoenix untuk server dan klien | 
| phoenix-connectors | 6.0.0 | Konektor Apache Phoenix untuk Spark-3 | 
| phoenix-query-server | 6.0.0 | Sebuah server ringan yang menyediakan akses JDBC serta Protocol Buffers dan akses format JSON ke API Avatica  | 
| presto-coordinator | 0,27-amzn-4 | Layanan untuk menerima kueri dan mengelola eksekusi kueri antara presto-worker. | 
| presto-worker | 0,27-amzn-4 | Layanan untuk mengeksekusi potongan kueri. | 
| presto-client | 0,27-amzn-4 | Klien baris perintah Presto yang diinstal pada master klaster HA yang siaga di mana server Presto server tidak dimulai. | 
| trino-coordinator | 470-amzn-0 | Layanan untuk menerima kueri dan mengelola eksekusi kueri di antara trino-workers. | 
| trino-worker | 470-amzn-0 | Layanan untuk mengeksekusi potongan kueri. | 
| trino-client | 470-amzn-0 | Klien baris perintah Trino yang diinstal pada master siaga cluster HA di mana server Trino tidak dimulai. | 
| pig-client | 0.17.0 | Klien baris perintah Pig. | 
| r | 4.3.2 | Proyek R untuk Komputasi Statistik | 
| ranger-kms-server | 2.0.0 | Sistem Pengelolaan Kunci Ranger Apache | 
| spark-client | 3.5.5-amzn-1 | Klien baris perintah Spark. | 
| spark-history-server | 3.5.5-amzn-1 | Web UI untuk melihat log acara untuk seluruh masa pakai aplikasi Spark. | 
| spark-on-yarn | 3.5.5-amzn-1 | Mesin eksekusi dalam memori untuk YARN. | 
| spark-yarn-slave | 3.5.5-amzn-1 | Perpustakaan Apache Spark yang dibutuhkan oleh slave YARN. | 
| spark-rapids | 3.5.5-amzn-1 | Plugin Nvidia Spark RAPIDS yang mempercepat Apache Spark dengan. GPUs | 
| tensorflow | 2.18.0 | TensorFlow pustaka perangkat lunak open source untuk perhitungan numerik kinerja tinggi. | 
| tez-on-yarn | 0.10.2-amzn-17 | Aplikasi dan perpustakaan tez YARN. | 
| tez-on-worker | 0.10.2-amzn-17 | Aplikasi dan pustaka YARN tez untuk node pekerja. | 
| zeppelin-server | 0.11.1 | Notebook berbasis web yang memungkinkan analisis data interaktif. | 
| zookeeper-server | 3.9.3-amzn-2 | Layanan terpusat untuk menjaga informasi konfigurasi, penamaan, yang menyediakan sinkronisasi terdistribusi, dan menyediakan layanan grup. | 
| zookeeper-client | 3.9.3-amzn-2 | ZooKeeper klien baris perintah. | 

## 7.10.0 klasifikasi konfigurasi
<a name="emr-7100-class"></a>

Klasifikasi konfigurasi memungkinkan Anda menyesuaikan aplikasi. Ini sering kali bersesuaian dengan file XML konfigurasi untuk aplikasi, seperti `hive-site.xml`. Untuk informasi selengkapnya, lihat [Konfigurasikan aplikasi](emr-configure-apps.md).

Tindakan konfigurasi ulang terjadi ketika Anda menentukan konfigurasi untuk grup instans di klaster yang sedang berjalan. Amazon EMR hanya memulai tindakan konfigurasi ulang untuk klasifikasi yang Anda modifikasi. Untuk informasi selengkapnya, lihat [Lakukan konfigurasi ulang pada grup instans di klaster yang sedang berjalan](emr-configure-apps-running-cluster.md).


**klasifikasi emr-7.10.0**  

| Klasifikasi | Deskripsi | Tindakan Konfigurasi Ulang | 
| --- | --- | --- | 
| capacity-scheduler | Ubah nilai dalam file capacity-scheduler.xml Hadoop. | Restarts the ResourceManager service. | 
| container-executor | Ubah nilai dalam file container-executor.cfg Hadoop YARN ini. | Not available. | 
| container-log4j | Ubah nilai dalam file container-log4j.properties Hadoop YARN. | Not available. | 
| core-site | Ubah nilai dalam file core-site.xml Hadoop. | Restarts the Hadoop HDFS services Namenode, SecondaryNamenode, Datanode, ZKFC, and Journalnode. Restarts the Hadoop YARN services ResourceManager, NodeManager, ProxyServer, and TimelineServer. Additionally restarts Hadoop KMS, Ranger KMS, HiveServer2, Hive MetaStore, Hadoop Httpfs, and MapReduce-HistoryServer. | 
| docker-conf | Ubah pengaturan terkait docker. | Not available. | 
| emrfs-site | Ubah pengaturan EMRFS. | Restarts the Hadoop HDFS services Namenode, SecondaryNamenode, Datanode, ZKFC, and Journalnode. Restarts the Hadoop YARN services ResourceManager, NodeManager, ProxyServer, and TimelineServer. Additionally restarts HBaseRegionserver, HBaseMaster, HBaseThrift, HBaseRest, HiveServer2, Hive MetaStore, Hadoop Httpfs, and MapReduce-HistoryServer. | 
| flink-conf | Ubah pengaturan flink-conf.yaml. | Restarts Flink history server. | 
| flink-log4j | Ubah pengaturan log4j.properties Flink. | Restarts Flink history server. | 
| flink-log4j-session | Ubah pengaturan Flink log4j-session.properties untuk sesi. Kubernetes/Yarn  | Restarts Flink history server. | 
| flink-log4j-cli | Ubah pengaturan log4j-cli.properties Flink. | Restarts Flink history server. | 
| hadoop-env | Ubah nilai dalam lingkungan Hadoop untuk semua komponen Hadoop. | Restarts the Hadoop HDFS services Namenode, SecondaryNamenode, Datanode, ZKFC, and Journalnode. Restarts the Hadoop YARN services ResourceManager, NodeManager, ProxyServer, and TimelineServer. Additionally restarts PhoenixQueryserver, HiveServer2, Hive MetaStore, and MapReduce-HistoryServer. | 
| hadoop-log4j | Ubah nilai dalam file log4j.properties Hadoop ini. | Restarts the Hadoop HDFS services SecondaryNamenode, Datanode, and Journalnode. Restarts the Hadoop YARN services ResourceManager, NodeManager, ProxyServer, and TimelineServer. Additionally restarts Hadoop KMS, Hadoop Httpfs, and MapReduce-HistoryServer. | 
| hadoop-ssl-server | Ubah konfigurasi server ssl hadoop | Not available. | 
| hadoop-ssl-client | Ubah konfigurasi klien ssl hadoop | Not available. | 
| hbase | Pengaturan Amazon EMR-curated untuk Apache. HBase | Custom EMR specific property. Sets emrfs-site and hbase-site configs. See those for their associated restarts. | 
| hbase-env | Ubah nilai HBase di lingkungan. | Restarts the HBase services RegionServer, HBaseMaster, ThriftServer, RestServer. | 
| hbase-log4j2 | Ubah nilai dalam file HBase hbase-log4j2.properties. | Restarts the HBase services RegionServer, HBaseMaster, ThriftServer, RestServer. | 
| hbase-metrics | Ubah nilai dalam file HBase hadoop-metrics2-hbase.properties. | Restarts the HBase services RegionServer, HBaseMaster, ThriftServer, RestServer. | 
| hbase-policy | Ubah nilai dalam HBase file hbase-policy.xml. | Not available. | 
| hbase-site | Ubah nilai dalam HBase file hbase-site.xml. | Restarts the HBase services RegionServer, HBaseMaster, ThriftServer, RestServer. Additionally restarts Phoenix QueryServer. | 
| hdfs-encryption-zones | Konfigurasikan zona enkripsi HDFS. | This classification should not be reconfigured. | 
| hdfs-env | Ubah nilai dalam lingkungan HDFS. | Restarts Hadoop HDFS services Namenode, Datanode, and ZKFC. | 
| hdfs-site | Ubah nilai dalam hdfs-site.xml HDFS. | Restarts the Hadoop HDFS services Namenode, SecondaryNamenode, Datanode, ZKFC, and Journalnode. Additionally restarts Hadoop Httpfs. | 
| hcatalog-env | Ubah nilai HCatalog di lingkungan. | Restarts Hive HCatalog Server. | 
| hcatalog-server-jndi | Ubah nilai di HCatalog jndi.properties. | Restarts Hive HCatalog Server. | 
| hcatalog-server-proto-hive-site | Ubah nilai HCatalog proto-hive-site dalam.xml's. | Restarts Hive HCatalog Server. | 
| hcatalog-webhcat-env | Ubah nilai di lingkungan HCatalog WebHCat. | Restarts Hive WebHCat server. | 
| hcatalog-webhcat-log4j2 | Ubah nilai di HCat log4j2.properties HCatalog Web. | Restarts Hive WebHCat server. | 
| hcatalog-webhcat-site | Ubah nilai dalam file webhcat-site.xml HCatalog WebHCat. | Restarts Hive WebHCat server. | 
| hive | Pengaturan dikurasi Amazon EMR untuk Apache Hive. | Sets configurations to launch Hive LLAP service. | 
| hive-beeline-log4j2 | Ubah nilai dalam file beeline-log4j2.properties Hive. | Not available. | 
| hive-parquet-logging | Ubah nilai dalam file parquet-logging.properties Hive. | Not available. | 
| hive-env | Ubah nilai dalam lingkungan Hive. | Restarts HiveServer2, HiveMetastore, and Hive HCatalog-Server. Runs Hive schemaTool CLI commands to verify hive-metastore. | 
| hive-exec-log4j2 | Ubah nilai dalam file hive-exec-log 4j2.properties Hive. | Not available. | 
| hive-llap-daemon-log4j2 | Ubah nilai dalam file llap-daemon-log 4j2.properties Hive. | Not available. | 
| hive-log4j2 | Ubah nilai dalam file hive-log4j2.properties Hive. | Not available. | 
| hive-site | Ubah nilai dalam file hive-site.xml Hive | Restarts HiveServer2, HiveMetastore, and Hive HCatalog-Server. Runs Hive schemaTool CLI commands to verify hive-metastore. Also restarts Oozie and Zeppelin. | 
| hiveserver2-site | Ubah nilai dalam file hiveserver2-site.xml Hive Server2 | Not available. | 
| hue-ini | Ubah nilai dalam file ini Hue | Restarts Hue. Also activates Hue config override CLI commands to pick up new configurations. | 
| httpfs-env | Ubah nilai di lingkungan HTTPFS. | Restarts Hadoop Httpfs service. | 
| httpfs-site | Ubah nilai dalam file httpfs-site.xml Hadoop. | Restarts Hadoop Httpfs service. | 
| hadoop-kms-acls | Ubah nilai dalam file kms-acls.xml Hadoop. | Not available. | 
| hadoop-kms-env | Ubah nilai dalam lingkungan Hadoop KMS. | Restarts Hadoop-KMS service. | 
| hadoop-kms-java-home | Ubah rumah java KMS Hadoop | Not available. | 
| hadoop-kms-log4j | Ubah nilai dalam file kms-log4j.properties Hadoop. | Not available. | 
| hadoop-kms-site | Ubah nilai dalam file kms-site.xml Hadoop. | Restarts Hadoop-KMS and Ranger-KMS service. | 
| hudi-env | Ubah nilai di lingkungan Hudi. | Not available. | 
| hudi-defaults | Ubah nilai dalam file hudi-defaults.conf Hudi. | Not available. | 
| iceberg-defaults | Ubah nilai dalam file iceberg-defaults.conf Iceberg. | Not available. | 
| delta-defaults | Ubah nilai dalam file delta-defaults.conf Delta. | Not available. | 
| jupyter-notebook-conf | Ubah nilai dalam file jupyter\$1notebook\$1config.py Jupyter Notebook. | Not available. | 
| jupyter-hub-conf | Ubah nilai dalam JupyterHubs file jupyterhub\$1config.py. | Not available. | 
| jupyter-s3-conf | Konfigurasikan persistensi Jupyter Notebook S3. | Not available. | 
| jupyter-sparkmagic-conf | Ubah nilai dalam file config.json Sparkmagic. | Not available. | 
| livy-conf | Ubah nilai dalam file livy.conf Livy. | Restarts Livy Server. | 
| livy-env | Ubah nilai di lingkungan Livy. | Restarts Livy Server. | 
| livy-log4j2 | Ubah pengaturan Livy log4j2.properties. | Restarts Livy Server. | 
| mapred-env | Ubah nilai di lingkungan MapReduce aplikasi. | Restarts Hadoop MapReduce-HistoryServer. | 
| mapred-site | Ubah nilai dalam file mapred-site.xml MapReduce aplikasi. | Restarts Hadoop MapReduce-HistoryServer. | 
| oozie-env | Ubah nilai di lingkungan Oozie. | Restarts Oozie. | 
| oozie-log4j | Ubah nilai dalam file oozie-log4j.properties Oozie. | Restarts Oozie. | 
| oozie-site | Ubah nilai dalam file oozie-site.xml Oozie. | Restarts Oozie. | 
| phoenix-hbase-metrics | Ubah nilai dalam file hadoop-metrics2-hbase.properties Phoenix. | Not available. | 
| phoenix-hbase-site | Ubah nilai dalam file hbase-site.xml Phoenix. | Not available. | 
| phoenix-log4j2 | Ubah nilai dalam file log4j2.properties Phoenix. | Restarts Phoenix-QueryServer. | 
| phoenix-metrics | Ubah nilai dalam file hadoop-metrics2-phoenix.properties Phoenix. | Not available. | 
| pig-env | Ubah nilai di lingkungan Pig. | Not available. | 
| pig-properties | Ubah nilai dalam file pig.properties Pig. | Restarts Oozie. | 
| pig-log4j | Ubah nilai dalam file log4j.properties Pig. | Not available. | 
| presto-log | Ubah nilai dalam file log.properties Presto. | Restarts Presto-Server (for PrestoDB) | 
| presto-config | Ubah nilai dalam file config.properties Presto. | Restarts Presto-Server (for PrestoDB) | 
| presto-password-authenticator | Ubah nilai dalam file password-authenticator.properties Presto. | Not available. | 
| presto-env | Ubah nilai dalam file presto-env.sh Presto. | Restarts Presto-Server (for PrestoDB) | 
| presto-node | Ubah nilai dalam file node.properties Presto. | Not available. | 
| presto-connector-blackhole | Ubah nilai dalam file blackhole.properties Presto. | Not available. | 
| presto-connector-cassandra | Ubah nilai dalam file cassandra.properties Presto. | Not available. | 
| presto-connector-hive | Ubah nilai dalam file hive.properties Presto. | Restarts Presto-Server (for PrestoDB) | 
| presto-connector-jmx | Ubah nilai dalam file jmx.properties Presto. | Not available. | 
| presto-connector-kafka | Ubah nilai dalam file kafka.properties Presto. | Not available. | 
| presto-connector-lakeformation | Ubah nilai dalam file lakeformation.properties Presto. | Restarts Presto-Server (for PrestoDB) | 
| presto-connector-localfile | Ubah nilai dalam file localfile.properties Presto. | Not available. | 
| presto-connector-memory | Ubah nilai dalam file memory.properties Presto. | Not available. | 
| presto-connector-mongodb | Ubah nilai dalam file mongodb.properties Presto. | Not available. | 
| presto-connector-mysql | Ubah nilai dalam file mysql.properties Presto. | Not available. | 
| presto-connector-postgresql | Ubah nilai dalam file postgresql.properties Presto. | Not available. | 
| presto-connector-raptor | Ubah nilai dalam file raptor.properties Presto. | Not available. | 
| presto-connector-redis | Ubah nilai dalam file redis.properties Presto. | Not available. | 
| presto-connector-redshift | Ubah nilai dalam file redshift.properties Presto. | Not available. | 
| presto-connector-tpch | Ubah nilai dalam file tpch.properties Presto. | Not available. | 
| presto-connector-tpcds | Ubah nilai dalam file tpcds.properties Presto. | Not available. | 
| trino-log | Ubah nilai dalam file log.properties Trino. | Restarts Trino-Server (for Trino) | 
| trino-config | Ubah nilai dalam file config.properties Trino. | Restarts Trino-Server (for Trino) | 
| trino-password-authenticator | Ubah nilai dalam file password-authenticator.properties Trino. | Restarts Trino-Server (for Trino) | 
| trino-env | Ubah nilai dalam file trino-env.sh Trino. | Restarts Trino-Server (for Trino) | 
| trino-node | Ubah nilai dalam file node.properties Trino. | Not available. | 
| trino-connector-blackhole | Ubah nilai dalam file blackhole.properties Trino. | Not available. | 
| trino-connector-cassandra | Ubah nilai dalam file cassandra.properties Trino. | Not available. | 
| trino-connector-delta | Ubah nilai dalam file delta.properties Trino. | Restarts Trino-Server (for Trino) | 
| trino-connector-hive | Ubah nilai dalam file hive.properties Trino. | Restarts Trino-Server (for Trino) | 
| trino-exchange-manager | Ubah nilai dalam file exchange-manager.properties Trino. | Restarts Trino-Server (for Trino) | 
| trino-connector-iceberg | Ubah nilai dalam file iceberg.properties Trino. | Restarts Trino-Server (for Trino) | 
| trino-connector-hudi | Ubah nilai dalam file hudi.properties Trino. | Restarts Trino-Server (for Trino) | 
| trino-connector-jmx | Ubah nilai dalam file jmx.properties Trino. | Not available. | 
| trino-connector-kafka | Ubah nilai dalam file kafka.properties Trino. | Not available. | 
| trino-connector-localfile | Ubah nilai dalam file localfile.properties Trino. | Not available. | 
| trino-connector-memory | Ubah nilai dalam file memory.properties Trino. | Not available. | 
| trino-connector-mongodb | Ubah nilai dalam file mongodb.properties Trino. | Not available. | 
| trino-connector-mysql | Ubah nilai dalam file mysql.properties Trino. | Not available. | 
| trino-connector-postgresql | Ubah nilai dalam file postgresql.properties Trino. | Not available. | 
| trino-connector-raptor | Ubah nilai dalam file raptor.properties Trino. | Not available. | 
| trino-connector-redis | Ubah nilai dalam file redis.properties Trino. | Not available. | 
| trino-connector-redshift | Ubah nilai dalam file redshift.properties Trino. | Not available. | 
| trino-connector-tpch | Ubah nilai dalam file tpch.properties Trino. | Not available. | 
| trino-connector-tpcds | Ubah nilai dalam file tpcds.properties Trino. | Not available. | 
| ranger-kms-dbks-site | Ubah nilai dalam file dbks-site.xml Ranger KMS. | Restarts Ranger KMS Server. | 
| ranger-kms-site | Ubah nilai dalam ranger-kms-site file.xml. dari Ranger KMS. | Restarts Ranger KMS Server. | 
| ranger-kms-env | Ubah nilai di lingkungan Ranger KMS. | Restarts Ranger KMS Server. | 
| ranger-kms-logback | Ubah nilai dalam file kms-logback.xml dari Ranger KMS. | Not available. | 
| ranger-kms-db-ca | Ubah nilai untuk file CA pada S3 untuk koneksi MySQL SSL dengan Ranger KMS. | Not available. | 
| spark | Pengaturan terkurasi Amazon EMR untuk Apache Spark. | This property modifies spark-defaults. See actions there. | 
| spark-defaults | Ubah nilai dalam file spark-defaults.conf Spark. | Restarts Spark history server and Spark thrift server. | 
| spark-env | Ubah nilai di lingkungan Spark. | Restarts Spark history server and Spark thrift server. | 
| spark-hive-site | Ubah nilai dalam file hive-site.xml Spark | Not available. | 
| spark-log4j2 | Ubah nilai dalam file log4j2.properties Spark. | Restarts Spark history server and Spark thrift server. | 
| spark-metrics | Ubah nilai dalam file metrics.properties Spark. | Restarts Spark history server and Spark thrift server. | 
| tez-site | Ubah nilai dalam file tez-site.xml Tez. | Restart Oozie and HiveServer2. | 
| yarn-env | Ubah nilai di lingkungan YARN. | Restarts the Hadoop YARN services ResourceManager, NodeManager, ProxyServer, and TimelineServer. Additionally restarts MapReduce-HistoryServer. | 
| yarn-site | Ubah nilai dalam file yarn-site.xml YARN. | Restarts the Hadoop YARN services ResourceManager, NodeManager, ProxyServer, and TimelineServer. Additionally restarts Livy Server and MapReduce-HistoryServer. | 
| zeppelin-env | Ubah nilai di lingkungan Zeppelin. | Restarts Zeppelin. | 
| zeppelin-site | Ubah pengaturan konfigurasi di zeppelin-site.xml. | Restarts Zeppelin. | 
| zookeeper-config | Ubah nilai dalam ZooKeeper file zoo.cfg. | Restarts Zookeeper server. | 
| zookeeper-logback | Ubah nilai dalam ZooKeeper file logback.xml. | Restarts Zookeeper server. | 
| emr-metrics | Ubah pengaturan metrik emr untuk simpul ini. | Restarts the CloudWatchAgent service. | 

## 7.10.0 perubahan log
<a name="7100-changelog"></a>


**Ubah log untuk catatan rilis dan rilis 7.10.0**  

| Date | Peristiwa | Deskripsi | 
| --- | --- | --- | 
| 2025-08-15 | Publikasi Docs | Amazon EMR 7.10.0 catatan rilis pertama kali diterbitkan | 
| 2025-08-15 | Penerapan selesai | [Amazon EMR 7.10.0 sepenuhnya diterapkan ke semua Wilayah yang didukung](https://aws.amazon.com/about-aws/global-infrastructure/regional-product-services/) | 
| 2025-08-15 | Rilis terbatas awal | Amazon EMR 7.10.0 pertama kali dikerahkan ke Wilayah komersial awal | 

# Amazon EMR rilis 7.9.0
<a name="emr-790-release"></a>

## 7.9.0 siklus hidup yang didukung
<a name="emr-790-supported-lifecycle"></a>

Tabel berikut menjelaskan tanggal siklus hidup yang didukung untuk rilis Amazon EMR 7.9.0.


| Fase Support | Date | 
| --- | --- | 
| Tanggal rilis awal | 19 Mei 2025 | 
| Dukungan standar sampai | 19 Mei 2027 | 
| Akhir dari dukungan | 20 Mei 2027 | 
| Akhir hidup | 19 Mei 2028 | 

## 7.9.0 versi aplikasi
<a name="emr-790-app-versions"></a>

Rilis ini mencakup aplikasi berikut: [https://docs.aws.amazon.com/AmazonCloudWatch/latest/monitoring/Install-CloudWatch-Agent.html](https://docs.aws.amazon.com/AmazonCloudWatch/latest/monitoring/Install-CloudWatch-Agent.html), [https://delta.io/](https://delta.io/), [https://flink.apache.org/](https://flink.apache.org/), [http://hbase.apache.org/](http://hbase.apache.org/), [https://cwiki.apache.org/confluence/display/Hive/HCatalog](https://cwiki.apache.org/confluence/display/Hive/HCatalog), [http://hive.apache.org/](http://hive.apache.org/), [https://hudi.apache.org](https://hudi.apache.org), [http://gethue.com/](http://gethue.com/), [https://iceberg.apache.org/](https://iceberg.apache.org/), [https://jupyter-enterprise-gateway.readthedocs.io/en/latest/](https://jupyter-enterprise-gateway.readthedocs.io/en/latest/), [https://jupyterhub.readthedocs.io/en/latest/#](https://jupyterhub.readthedocs.io/en/latest/#), [https://livy.incubator.apache.org/](https://livy.incubator.apache.org/), [http://oozie.apache.org/](http://oozie.apache.org/), [https://phoenix.apache.org/](https://phoenix.apache.org/), [http://pig.apache.org/](http://pig.apache.org/), [https://prestodb.io/](https://prestodb.io/), [https://spark.apache.org/docs/latest/](https://spark.apache.org/docs/latest/), [https://www.tensorflow.org/](https://www.tensorflow.org/), [https://tez.apache.org/](https://tez.apache.org/), [https://trino.io/](https://trino.io/), [https://zeppelin.incubator.apache.org/](https://zeppelin.incubator.apache.org/), dan [https://zookeeper.apache.org](https://zookeeper.apache.org).

Tabel di bawah ini mencantumkan versi aplikasi yang tersedia dalam rilis Amazon EMR ini dan versi aplikasi dalam tiga rilis EMR Amazon sebelumnya (bila berlaku).

Untuk riwayat lengkap versi aplikasi untuk setiap rilis Amazon EMR, lihat topik berikut:
+ [Versi aplikasi di Amazon EMR 7.x rilis](emr-release-app-versions-7.x.md)
+ [Versi aplikasi di Amazon EMR 6.x rilis](emr-release-app-versions-6.x.md)
+ [Versi aplikasi di Amazon EMR 5.x rilis](emr-release-app-versions-5.x.md)
+ [Versi aplikasi di Amazon EMR 4.x rilis](emr-release-app-versions-4.x.md)


**Informasi versi aplikasi**  

|  | emr-7.9.0 | emr-7.8.0 | emr-7.7.0 | emr-7.6.0 | 
| --- | --- | --- | --- | --- | 
| AWS SDK for Java | 2.31.16, 1.12.782 | 2.29.52, 1.12.780 | 2.29.44, 1.12.780 | 2.29.25, 1.12.779 | 
| Python | 3.9, 3.11 | 3.9, 3.11 | 3.9, 3.11 | 3.9, 3.11 | 
| Skala | 2.12.18 | 2.12.18 | 2.12.18 | 2.12.18 | 
| AmazonCloudWatchAgent | 1.300032.2-amzn-0 | 1.300032.2-amzn-0 | 1.300032.2-amzn-0 | 1.300032.2-amzn-0 | 
| Delta | 3.3.0-amzn-1 | 3.3.0-amzn-0 | 3.2.1-amzn-2 | Versi 3.2.1-amzn-1 | 
| Flink | 1.20.0-amzn-3 | 1.20.0-amzn-2 | 1.20.0-amzn-1 | 1.20.0-amzn-0 | 
| Ganglia |  -  |  -  |  -  |  -  | 
| HBase | 2.6.2-amzn-0 | 2.6.1-amzn-2 | 2.6.1-amzn-1 | 2.6.1-amzn-0 | 
| HCatalog | 3.1.3-amzn-18 | 3.1.3-amzn-17 | 3.1.3-amzn-16 | 3.1.3-amzn-15 | 
| Hadoop | 3.4.1-amzn-1 | 3.4.1-amzn-0 | 3.4.0-amzn-3 | 3.4.0-amzn-2 | 
| Hive | 3.1.3-amzn-18 | 3.1.3-amzn-17 | 3.1.3-amzn-16 | 3.1.3-amzn-15 | 
| Hudi | 0.15.0-amzn-6 | 0.15.0-amzn-5 | 0.15.0-amzn-4 | 0.15.0-amzn-3 | 
| Hue | 4.11.0 | 4.11.0 | 4.11.0 | 4.11.0 | 
| Iceberg | 1.7.1-amzn-2 | 1.7.1-amzn-1 | 1.7.1-amzn-0 | 1.6.1-amzn-2 | 
| JupyterEnterpriseGateway | 2.6.0 | 2.6.0 | 2.6.0 | 2.6.0 | 
| JupyterHub | 1.5.0 | 1.5.0 | 1.5.0 | 1.5.0 | 
| Livy | 0.8.0-inkubasi | 0.8.0-inkubasi | 0.8.0-inkubasi | 0.8.0-inkubasi | 
| MXNet |  -  |  -  |  -  |  -  | 
| Mahout |  -  |  -  |  -  |  -  | 
| Oozie | 5.2.1 | 5.2.1 | 5.2.1 | 5.2.1 | 
| Phoenix | 5.2.1 | 5.2.1 | 5.2.1 | 5.2.0 | 
| Pig | 0.17.0 | 0.17.0 | 0.17.0 | 0.17.0 | 
| Presto | 0,27-amzn-3 | 0,287-amzn-2 | 0,287-amzn-1 | 0,287-amzn-1 | 
| Spark | 3.5.5-amzn-0 | 3.5.4-amzn-0 | 3.5.3-amzn-1 | 3.5.3-amzn-0 | 
| Sqoop |  -  |  -  |  -  |  -  | 
| TensorFlow | 2.16.1 | 2.16.1 | 2.16.1 | 2.16.1 | 
| Tez | 0.10.2-amzn-16 | 0.10.2-amzn-15 | 0.10.2-amzn-14 | 0.10.2-amzn-13 | 
| Trino (PrestoSQL) | 467-amzn-2 | 467-amzn-1 | 467-amzn-0 | 457-amzn-0 | 
| Zeppelin | 0.11.1 | 0.11.1 | 0.11.1 | 0.11.1 | 
| ZooKeeper | 3.9.3-amzn-1 | 3.9.3-amzn-0 | 3.9.2-amzn-1 | 3.9.2-amzn-0 | 

# 7.9.0 kerentanan dan eksposur umum
<a name="790-common-vulnerabilities-exposures"></a>

Tabel berikut mencantumkan semua CVEs yang tidak memengaruhi kluster EMR yang berjalan pada konfigurasi yang direkomendasikan Amazon EMR 7.9.0. Amazon EMR bergantung pada sumber terbuka hulu untuk ketersediaan perbaikan dan akan memberikan versi stabil terbaru sebagai bagian dari komponen Core Engine dalam waktu 90 hari setelah Amazon EMR memverifikasi perbaikan.

Tabel ini diperbarui pada 12 Mei 2025.


| ID CVE | Kepelikan | URL detail CVE | 
| --- | --- | --- | 
|  CVE-2015-1832  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2015-1832)-2015-1832  | 
|  CVE-2016-5018  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2016-5018)-2016-5018  | 
|  CVE-2017-15095  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2017-15095)-2017-15095  | 
|  CVE-2017-17485  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2017-17485)-2017-17485  | 
|  CVE-2017-7525  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2017-7525)-2017-7525  | 
|  CVE-2018-11307  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-11307)-2018-11307  | 
|  CVE-2018-11307  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-11307)-2018-11307  | 
|  CVE-2018-14718  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-14718)-2018-14718  | 
|  CVE-2018-14718  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-14718)-2018-14718  | 
|  CVE-2018-14719  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE-2018-14719](https://nvd.nist.gov/vuln/detail/CVE-2018-14719)  | 
|  CVE-2018-14719  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE-2018-14719](https://nvd.nist.gov/vuln/detail/CVE-2018-14719)  | 
|  CVE-2018-14720  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-14720)-2018-14720  | 
|  CVE-2018-14720  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-14720)-2018-14720  | 
|  CVE-2018-14721  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-14721)-2018-14721  | 
|  CVE-2018-14721  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-14721)-2018-14721  | 
|  CVE-2018-19360  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-19360)-2018-19360  | 
|  CVE-2018-19360  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-19360)-2018-19360  | 
|  CVE-2018-19361  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-19361)-2018-19361  | 
|  CVE-2018-19361  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-19361)-2018-19361  | 
|  CVE-2018-19362  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-19362)-2018-19362  | 
|  CVE-2018-19362  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-19362)-2018-19362  | 
|  CVE-2018-7489  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-7489)-2018-7489  | 
|  CVE-2018-7489  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-7489)-2018-7489  | 
|  CVE-2019-10202  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-10202)-2019-10202  | 
|  CVE-2019-14379  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-14379)-2019-14379  | 
|  CVE-2019-14379  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-14379)-2019-14379  | 
|  CVE-2019-14540  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-14540)-2019-14540  | 
|  CVE-2019-14540  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-14540)-2019-14540  | 
|  CVE-2019-14892  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-14892)-2019-14892  | 
|  CVE-2019-14892  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-14892)-2019-14892  | 
|  CVE-2019-14893  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-14893)-2019-14893  | 
|  CVE-2019-14893  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-14893)-2019-14893  | 
|  CVE-2019-16335  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-16335)-2019-16335  | 
|  CVE-2019-16335  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-16335)-2019-16335  | 
|  CVE-2019-16942  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-16942)-2019-16942  | 
|  CVE-2019-16942  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-16942)-2019-16942  | 
|  CVE-2019-16943  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-16943)-2019-16943  | 
|  CVE-2019-16943  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-16943)-2019-16943  | 
|  CVE-2019-17267  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-17267)-2019-17267  | 
|  CVE-2019-17267  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-17267)-2019-17267  | 
|  CVE-2019-17531  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-17531)-2019-17531  | 
|  CVE-2019-17531  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-17531)-2019-17531  | 
|  CVE-2019-20330  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-20330)-2019-20330  | 
|  CVE-2019-20330  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-20330)-2019-20330  | 
|  CVE-2020-8840  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-8840)-2020-8840  | 
|  CVE-2020-8840  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-8840)-2020-8840  | 
|  CVE-2020-9546  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-9546)-2020-9546  | 
|  CVE-2020-9546  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-9546)-2020-9546  | 
|  CVE-2020-9547  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-9547)-2020-9547  | 
|  CVE-2020-9547  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-9547)-2020-9547  | 
|  CVE-2020-9548  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-9548)-2020-9548  | 
|  CVE-2020-9548  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-9548)-2020-9548  | 
|  CVE-2022-1471  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-1471)-2022-1471  | 
|  CVE-2022-1471  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-1471)-2022-1471  | 
|  CVE-2022-37865  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-37865)-2022-37865  | 
|  CVE-2022-39135  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-39135)-2022-39135  | 
|  CVE-2022-42889  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-42889)-2022-42889  | 
|  CVE-2022-46337  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-46337)-2022-46337  | 
|  CVE-2022-46337  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-46337)-2022-46337  | 
|  CVE-2024-51504  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-51504)-2024-51504  | 
|  CVE-2024-51504  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-51504)-2024-51504  | 
|  CVE-2024-52046  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-52046)-2024-52046  | 
|  CVE-2024-52046  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-52046)-2024-52046  | 
|  CVE-2024-52577  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-52577)-2024-52577  | 
|  CVE-2024-53990  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-53990)-2024-53990  | 
|  CVE-2024-56325  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-56325)-2024-56325  | 
|  CVE-2025-30065  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2025-30065)-2025-30065  | 
|  CVE-2015-5237  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2015-5237)-2015-5237  | 
|  CVE-2015-5237  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2015-5237)-2015-5237  | 
|  CVE-2016-6796  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2016-6796)-2016-6796  | 
|  CVE-2018-1000180  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-1000180)-2018-1000180  | 
|  CVE-2018-12022  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-12022)-2018-12022  | 
|  CVE-2018-12022  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-12022)-2018-12022  | 
|  CVE-2018-12023  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-12023)-2018-12023  | 
|  CVE-2018-12023  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-12023)-2018-12023  | 
|  CVE-2018-5968  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-5968)-2018-5968  | 
|  CVE-2019-0205  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-0205)-2019-0205  | 
|  CVE-2019-0205  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-0205)-2019-0205  | 
|  CVE-2019-10172  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-10172)-2019-10172  | 
|  CVE-2019-12086  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-12086)-2019-12086  | 
|  CVE-2019-12086  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-12086)-2019-12086  | 
|  CVE-2019-14439  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-14439)-2019-14439  | 
|  CVE-2019-14439  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-14439)-2019-14439  | 
|  CVE-2020-10650  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-10650)-2020-10650  | 
|  CVE-2020-10650  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-10650)-2020-10650  | 
|  CVE-2020-10672  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-10672)-2020-10672  | 
|  CVE-2020-10672  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-10672)-2020-10672  | 
|  CVE-2020-10673  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-10673)-2020-10673  | 
|  CVE-2020-10673  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-10673)-2020-10673  | 
|  CVE-2020-10968  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-10968)-2020-10968  | 
|  CVE-2020-10968  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-10968)-2020-10968  | 
|  CVE-2020-10969  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-10969)-2020-10969  | 
|  CVE-2020-10969  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-10969)-2020-10969  | 
|  CVE-2020-11111  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-11111)-2020-11111  | 
|  CVE-2020-11111  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-11111)-2020-11111  | 
|  CVE-2020-11112  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-11112)-2020-11112  | 
|  CVE-2020-11112  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-11112)-2020-11112  | 
|  CVE-2020-11113  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-11113)-2020-11113  | 
|  CVE-2020-11113  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-11113)-2020-11113  | 
|  CVE-2020-11619  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-11619](https://nvd.nist.gov/vuln/detail/CVE-2020-11619)  | 
|  CVE-2020-11619  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-11619](https://nvd.nist.gov/vuln/detail/CVE-2020-11619)  | 
|  CVE-2020-11620  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-11620)-2020-11620  | 
|  CVE-2020-11620  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-11620)-2020-11620  | 
|  CVE-2020-13949  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-13949)-2020-13949  | 
|  CVE-2020-13949  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-13949)-2020-13949  | 
|  CVE-2020-13949  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-13949)-2020-13949  | 
|  CVE-2020-14060  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-14060)-2020-14060  | 
|  CVE-2020-14060  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-14060)-2020-14060  | 
|  CVE-2020-14061  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-14061)-2020-14061  | 
|  CVE-2020-14061  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-14061)-2020-14061  | 
|  CVE-2020-14062  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-14062)-2020-14062  | 
|  CVE-2020-14062  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-14062)-2020-14062  | 
|  CVE-2020-14195  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-14195)-2020-14195  | 
|  CVE-2020-14195  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-14195)-2020-14195  | 
|  CVE-2020-24616  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-24616)-2020-24616  | 
|  CVE-2020-24616  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-24616)-2020-24616  | 
|  CVE-2020-24750  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-24750)-2020-24750  | 
|  CVE-2020-24750  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-24750)-2020-24750  | 
|  CVE-2020-25649  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-25649)-2020-25649  | 
|  CVE-2020-28052  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-28052)-2020-28052  | 
|  CVE-2020-35490  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-35490)-2020-35490  | 
|  CVE-2020-35490  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-35490)-2020-35490  | 
|  CVE-2020-35491  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-35491)-2020-35491  | 
|  CVE-2020-35491  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-35491)-2020-35491  | 
|  CVE-2020-35728  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-35728)-2020-35728  | 
|  CVE-2020-35728  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-35728)-2020-35728  | 
|  CVE-2020-36179  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36179)-2020-36179  | 
|  CVE-2020-36179  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36179)-2020-36179  | 
|  CVE-2020-36180  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36180)-2020-36180  | 
|  CVE-2020-36180  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36180)-2020-36180  | 
|  CVE-2020-36181  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36181)-2020-36181  | 
|  CVE-2020-36181  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36181)-2020-36181  | 
|  CVE-2020-36182  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36182)-2020-36182  | 
|  CVE-2020-36182  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36182)-2020-36182  | 
|  CVE-2020-36183  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36183)-2020-36183  | 
|  CVE-2020-36183  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36183)-2020-36183  | 
|  CVE-2020-36184  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36184)-2020-36184  | 
|  CVE-2020-36184  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36184)-2020-36184  | 
|  CVE-2020-36185  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36185)-2020-36185  | 
|  CVE-2020-36185  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36185)-2020-36185  | 
|  CVE-2020-36186  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36186)-2020-36186  | 
|  CVE-2020-36186  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36186)-2020-36186  | 
|  CVE-2020-36187  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36187)-2020-36187  | 
|  CVE-2020-36187  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36187)-2020-36187  | 
|  CVE-2020-36188  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36188)-2020-36188  | 
|  CVE-2020-36188  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36188)-2020-36188  | 
|  CVE-2020-36189  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36189)-2020-36189  | 
|  CVE-2020-36189  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36189)-2020-36189  | 
|  CVE-2020-36518  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36518)-2020-36518  | 
|  CVE-2020-36518  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36518)-2020-36518  | 
|  CVE-2021-20190  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2021-20190)-2021-20190  | 
|  CVE-2021-20190  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2021-20190)-2021-20190  | 
|  CVE-2021-31684  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2021-31684)-2021-31684  | 
|  CVE-2021-34538  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2021-34538)-2021-34538  | 
|  CVE-2021-34538  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2021-34538)-2021-34538  | 
|  CVE-2021-34538  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2021-34538)-2021-34538  | 
|  CVE-2022-25647  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-25647)-2022-25647  | 
|  CVE-2022-25647  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-25647)-2022-25647  | 
|  CVE-2022-25647  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-25647)-2022-25647  | 
|  CVE-2022-25857  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-25857)-2022-25857  | 
|  CVE-2022-3171  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-3171)-2022-3171  | 
|  CVE-2022-3171  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-3171)-2022-3171  | 
|  CVE-2022-3171  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-3171)-2022-3171  | 
|  CVE-2022-3509  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-3509)-2022-3509  | 
|  CVE-2022-3509  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-3509)-2022-3509  | 
|  CVE-2022-3509  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-3509)-2022-3509  | 
|  CVE-2022-3510  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-3510)-2022-3510  | 
|  CVE-2022-3510  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-3510)-2022-3510  | 
|  CVE-2022-3510  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-3510)-2022-3510  | 
|  CVE-2022-36364  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-36364)-2022-36364  | 
|  CVE-2022-37866  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-37866)-2022-37866  | 
|  CVE-2022-40149  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-40149)-2022-40149  | 
|  CVE-2022-40149  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-40149)-2022-40149  | 
|  CVE-2022-40150  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-40150)-2022-40150  | 
|  CVE-2022-40150  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-40150)-2022-40150  | 
|  CVE-2022-42003  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-42003)-2022-42003  | 
|  CVE-2022-42003  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-42003)-2022-42003  | 
|  CVE-2022-42003  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-42003)-2022-42003  | 
|  CVE-2022-42003  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-42003)-2022-42003  | 
|  CVE-2022-42003  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-42003)-2022-42003  | 
|  CVE-2022-42004  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-42004)-2022-42004  | 
|  CVE-2022-42004  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-42004)-2022-42004  | 
|  CVE-2022-42004  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-42004)-2022-42004  | 
|  CVE-2022-42004  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-42004)-2022-42004  | 
|  CVE-2022-45685  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-45685)-2022-45685  | 
|  CVE-2022-45685  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-45685)-2022-45685  | 
|  CVE-2022-45693  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-45693)-2022-45693  | 
|  CVE-2022-45693  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-45693)-2022-45693  | 
|  CVE-2022-46751  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-46751)-2022-46751  | 
|  CVE-2022-46751  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-46751)-2022-46751  | 
|  CVE-2023-1370  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-1370)-2023-1370  | 
|  CVE-2023-1436  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-1436)-2023-1436  | 
|  CVE-2023-1436  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-1436)-2023-1436  | 
|  CVE-2023-2976  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-2976)-2023-2976  | 
|  CVE-2023-2976  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-2976)-2023-2976  | 
|  CVE-2023-2976  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-2976)-2023-2976  | 
|  CVE-2023-2976  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-2976)-2023-2976  | 
|  CVE-2023-2976  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-2976)-2023-2976  | 
|  CVE-2023-2976  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-2976)-2023-2976  | 
|  CVE-2023-2976  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-2976)-2023-2976  | 
|  CVE-2023-2976  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-2976)-2023-2976  | 
|  CVE-2023-2976  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-2976)-2023-2976  | 
|  CVE-2023-2976  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-2976)-2023-2976  | 
|  CVE-2023-3635  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-3635)-2023-3635  | 
|  CVE-2023-39410  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-39410)-2023-39410  | 
|  CVE-2023-5072  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-5072)-2023-5072  | 
|  CVE-2023-6378  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-6378)-2023-6378  | 
|  CVE-2023-6378  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-6378)-2023-6378  | 
|  CVE-2023-6481  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-6481)-2023-6481  | 
|  CVE-2023-6481  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-6481)-2023-6481  | 
|  CVE-2024-13009  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-13009)-2024-13009  | 
|  CVE-2024-13009  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-13009)-2024-13009  | 
|  CVE-2024-29131  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-29131)-2024-29131  | 
|  CVE-2024-29857  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-29857)-2024-29857  | 
|  CVE-2024-29857  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-29857)-2024-29857  | 
|  CVE-2024-29857  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-29857)-2024-29857  | 
|  CVE-2024-30172  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-30172)-2024-30172  | 
|  CVE-2024-30172  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-30172)-2024-30172  | 
|  CVE-2024-34447  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-34447)-2024-34447  | 
|  CVE-2024-34447  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-34447)-2024-34447  | 
|  CVE-2024-36114  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-36114)-2024-36114  | 
|  CVE-2024-36114  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-36114)-2024-36114  | 
|  CVE-2024-47561  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-47561)-2024-47561  | 
|  CVE-2024-57699  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-57699)-2024-57699  | 
|  CVE-2024-7254  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-7254)-2024-7254  | 
|  CVE-2024-7254  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-7254)-2024-7254  | 
|  CVE-2024-7254  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-7254)-2024-7254  | 
|  CVE-2024-7254  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-7254)-2024-7254  | 
|  CVE-2024-7254  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-7254)-2024-7254  | 
|  CVE-2024-7254  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-7254)-2024-7254  | 
|  CVE-2025-1948  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2025-1948)-2025-1948  | 
|  CVE-2025-1948  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2025-1948)-2025-1948  | 
|  CVE-2025-24789  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2025-24789)-2025-24789  | 
|  CVE-2025-24970  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2025-24970)-2025-24970  | 
|  CVE-2025-24970  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2025-24970)-2025-24970  | 
|  CVE-2025-24970  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2025-24970)-2025-24970  | 
|  CVE-2025-27553  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2025-27553)-2025-27553  | 
|  CVE-2025-27820  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2025-27820)-2025-27820  | 
|  CVE-2025-27820  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2025-27820)-2025-27820  | 
|  CVE-2025-46762  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2025-46762)-2025-46762  | 
|  CVE-2012-5783  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2012-5783)-2012-5783  | 
|  CVE-2012-6153  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2012-6153)-2012-6153  | 
|  CVE-2018-10237  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-10237)-2018-10237  | 
|  CVE-2018-10237  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-10237)-2018-10237  | 
|  CVE-2018-10237  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-10237)-2018-10237  | 
|  CVE-2018-10237  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-10237)-2018-10237  | 
|  CVE-2018-10237  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-10237)-2018-10237  | 
|  CVE-2018-11798  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-11798)-2018-11798  | 
|  CVE-2018-1313  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-1313)-2018-1313  | 
|  CVE-2019-12384  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-12384)-2019-12384  | 
|  CVE-2019-12384  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-12384)-2019-12384  | 
|  CVE-2019-12814  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-12814)-2019-12814  | 
|  CVE-2019-12814  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-12814)-2019-12814  | 
|  CVE-2020-13955  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-13955)-2020-13955  | 
|  CVE-2020-13956  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-13956)-2020-13956  | 
|  CVE-2020-15250  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-15250)-2020-15250  | 
|  CVE-2020-15250  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-15250)-2020-15250  | 
|  CVE-2020-15522  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-15522)-2020-15522  | 
|  CVE-2020-15522  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-15522)-2020-15522  | 
|  CVE-2020-17521  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-17521)-2020-17521  | 
|  CVE-2020-17521  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-17521)-2020-17521  | 
|  CVE-2020-1945  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-1945](https://nvd.nist.gov/vuln/detail/CVE-2020-1945)  | 
|  CVE-2020-26939  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-26939)-2020-26939  | 
|  CVE-2020-26939  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-26939)-2020-26939  | 
|  CVE-2021-22569  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2021-22569)-2021-22569  | 
|  CVE-2021-22569  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2021-22569)-2021-22569  | 
|  CVE-2021-22569  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2021-22569)-2021-22569  | 
|  CVE-2021-22570  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2021-22570)-2021-22570  | 
|  CVE-2021-22570  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2021-22570)-2021-22570  | 
|  CVE-2021-27568  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2021-27568)-2021-27568  | 
|  CVE-2021-28170  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2021-28170)-2021-28170  | 
|  CVE-2021-29425  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2021-29425)-2021-29425  | 
|  CVE-2021-36373  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2021-36373)-2021-36373  | 
|  CVE-2021-36374  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2021-36374)-2021-36374  | 
|  CVE-2022-38749  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-38749)-2022-38749  | 
|  CVE-2022-38750  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-38750)-2022-38750  | 
|  CVE-2022-38751  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-38751)-2022-38751  | 
|  CVE-2022-38752  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-38752)-2022-38752  | 
|  CVE-2022-41854  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-41854)-2022-41854  | 
|  CVE-2023-0833  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-0833)-2023-0833  | 
|  CVE-2023-33201  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-33201)-2023-33201  | 
|  CVE-2023-33201  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-33201)-2023-33201  | 
|  CVE-2023-33201  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-33201)-2023-33201  | 
|  CVE-2023-33202  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-33202)-2023-33202  | 
|  CVE-2023-33202  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-33202)-2023-33202  | 
|  CVE-2023-33202  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-33202)-2023-33202  | 
|  CVE-2023-42503  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-42503)-2023-42503  | 
|  CVE-2023-51074  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-51074)-2023-51074  | 
|  CVE-2024-12798  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-12798)-2024-12798  | 
|  CVE-2024-12798  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-12798)-2024-12798  | 
|  CVE-2024-12798  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-12798)-2024-12798  | 
|  CVE-2024-12798  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-12798)-2024-12798  | 
|  CVE-2024-12798  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-12798)-2024-12798  | 
|  CVE-2024-12798  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-12798)-2024-12798  | 
|  CVE-2024-12798  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-12798)-2024-12798  | 
|  CVE-2024-23944  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-23944)-2024-23944  | 
|  CVE-2024-23945  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-23945)-2024-23945  | 
|  CVE-2024-23945  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-23945)-2024-23945  | 
|  CVE-2024-23953  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-23953)-2024-23953  | 
|  CVE-2024-23953  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-23953)-2024-23953  | 
|  CVE-2024-25710  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-25710)-2024-25710  | 
|  CVE-2024-25710  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-25710)-2024-25710  | 
|  CVE-2024-26308  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-26308)-2024-26308  | 
|  CVE-2024-26308  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-26308)-2024-26308  | 
|  CVE-2024-29025  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-29025)-2024-29025  | 
|  CVE-2024-29133  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-29133)-2024-29133  | 
|  CVE-2024-29869  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-29869)-2024-29869  | 
|  CVE-2024-29869  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-29869)-2024-29869  | 
|  CVE-2024-30171  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-30171)-2024-30171  | 
|  CVE-2024-30171  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-30171)-2024-30171  | 
|  CVE-2024-30171  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-30171)-2024-30171  | 
|  CVE-2024-31141  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-31141)-2024-31141  | 
|  CVE-2024-43382  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-43382)-2024-43382  | 
|  CVE-2024-47535  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-47535)-2024-47535  | 
|  CVE-2024-47535  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-47535)-2024-47535  | 
|  CVE-2024-47535  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-47535)-2024-47535  | 
|  CVE-2024-47554  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-47554)-2024-47554  | 
|  CVE-2024-47554  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-47554)-2024-47554  | 
|  CVE-2024-47554  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-47554)-2024-47554  | 
|  CVE-2024-47554  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-47554)-2024-47554  | 
|  CVE-2024-52980  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-52980)-2024-52980  | 
|  CVE-2024-56128  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-56128)-2024-56128  | 
|  CVE-2024-6763  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-6763)-2024-6763  | 
|  CVE-2024-6763  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-6763)-2024-6763  | 
|  CVE-2024-6763  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-6763)-2024-6763  | 
|  CVE-2024-6763  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-6763)-2024-6763  | 
|  CVE-2024-6763  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-6763)-2024-6763  | 
|  CVE-2024-8184  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-8184)-2024-8184  | 
|  CVE-2024-9823  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-9823)-2024-9823  | 
|  CVE-2025-24790  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2025-24790)-2025-24790  | 
|  CVE-2025-25193  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2025-25193)-2025-25193  | 
|  CVE-2025-25193  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2025-25193)-2025-25193  | 
|  CVE-2025-25193  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2025-25193)-2025-25193  | 
|  CVE-2025-25193  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2025-25193)-2025-25193  | 
|  CVE-2025-30474  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2025-30474)-2025-30474  | 
|  CVE-2025-3588  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2025-3588)-2025-3588  | 
|  CVE-2025-46551  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2025-46551)-2025-46551  | 
|  CVE-2020-8908  |  RENDAH  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-8908)-2020-8908  | 
|  CVE-2020-8908  |  RENDAH  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-8908)-2020-8908  | 
|  CVE-2020-8908  |  RENDAH  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-8908)-2020-8908  | 
|  CVE-2020-8908  |  RENDAH  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-8908)-2020-8908  | 
|  CVE-2020-8908  |  RENDAH  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-8908)-2020-8908  | 
|  CVE-2020-8908  |  RENDAH  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-8908)-2020-8908  | 
|  CVE-2020-8908  |  RENDAH  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-8908)-2020-8908  | 
|  CVE-2020-8908  |  RENDAH  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-8908)-2020-8908  | 
|  CVE-2020-8908  |  RENDAH  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-8908)-2020-8908  | 
|  CVE-2020-8908  |  RENDAH  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-8908)-2020-8908  | 
|  CVE-2024-12801  |  RENDAH  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-12801)-2024-12801  | 
|  CVE-2024-12801  |  RENDAH  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-12801)-2024-12801  | 
|  CVE-2024-12801  |  RENDAH  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-12801)-2024-12801  | 
|  CVE-2024-12801  |  RENDAH  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-12801)-2024-12801  | 
|  CVE-2025-27496  |  RENDAH  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2025-27496)-2025-27496  | 
|  CVE-2025-46392  |  TIDAK DIPERTARUHAN  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2025-46392)-2025-46392  | 

## Catatan rilis 7.9.0
<a name="emr-790-relnotes"></a>

Catatan rilis berikut mencakup informasi untuk Amazon EMR rilis 7.9.0.

**Fitur baru**
+ **Upgrade aplikasi** —Amazon EMR 7.9.0 application upgrades include AWS SDK for Java 2.31.16/1.12.782, Delta 3.3.0-amzn-1, Hadoop 3.4.1, Hudi 0.15.0-amzn-6, Iceberg 1.7.1-amzn-2, Spark 3.5.5, and Zookeeper 3.9.3.
+ **Dukungan CM-CMK untuk Persistent App UI** — Fitur ini memperluas enkripsi SSE yang diterapkan ke log yang dikelola dalam bucket layanan EMR untuk menghormati Customer Managed Custom Master Key (CM-CMK). Fitur ini memungkinkan pelanggan untuk mengelola aksesibilitas log setelah cluster mereka berakhir.

**Masalah yang diketahui**
+ Ketika opsi logging untuk EMR pada EC2 dinonaktifkan, log tidak tersedia setelah cluster berakhir dan aplikasi persisten tidak UIs akan berisi log apa pun.
+ **Enkripsi KMS menggunakan SecretAgent komponen EMR-EC2** — Ada kesalahan yang terjadi ketika enkripsi KMS saat istirahat diaktifkan untuk cluster yang mendukung Lake Formation di EMR versi 7.8 dan 7.9. Pekerjaan yang mendukung Lake Formation akan gagal dengan a. *NoSuchMethodError* Ada dua solusi yang tersedia:
  + Nonaktifkan sementara enkripsi KMS saat istirahat untuk cluster yang terpengaruh.
  + Hubungi AWS Support untuk meminta artefak Bootstrap Action jika enkripsi KMS harus dipertahankan.
**catatan**  
**Perbaikan permanen** - Pada Agustus 2025 pembaruan untuk mengatasi masalah di atas telah diterapkan ke semua wilayah. Tidak perlu menonaktifkan enkripsi KMS saat istirahat.
+ **Mengunggah log langkah** — Beberapa cluster mungkin tidak dapat mengunggah log langkah ke bucket S3 Anda karena kondisi balapan. Hubungi tim AWS dukungan jika Anda mengalami masalah ini.
+  **HBase pembuatan tabel di katalog Hive with Glue** - Dari EMR-7.3.0 hingga EMR-7.10.0, ada bug karena integrasi Hive Iceberg, yang menyebabkan HBase pembuatan tabel di Hive gagal saat Glue Data Catalog digunakan sebagai metastore. Silakan hubungi tim AWS dukungan jika Anda mengalami masalah ini.
+  **Tez UI** - Dari EMR-7.3 ke EMR-7.10, ada bug di mana mengakses UI Tez melalui UI Web Manajer Sumber Daya YARN gagal saat enkripsi dalam transit diaktifkan. Ini terjadi karena proxy YARN mencoba menggunakan protokol HTTP sementara Tez UI memerlukan HTTPS. Harap ubah `tez.tez-ui.history-url.base` konfigurasi `tez-site` dari `http` ke `https` untuk menyelesaikan masalah ini.

**Perubahan, penyempurnaan, dan masalah yang diselesaikan**
+  *Dimulai dengan Spark 3.3.1 (didukung dalam EMR versi 6.10 dan yang lebih baru), semua pelaksana dalam host dekomisioning diatur ke yang baru, yang disebut status DECOMMISSIONING. `ExecutorState`* Pelaksana yang dinonaktifkan tidak dapat digunakan oleh Yarn untuk mengalokasikan tugas dan dengan demikian akan meminta pelaksana baru, jika diperlukan, untuk tugas yang sedang dijalankan. Jadi, jika Anda menonaktifkan Spark DRA saat menggunakan EMR Managed Scaling, EMR Auto Scaling, atau mekanisme penskalaan khusus apa pun pada cluster EMR-EC2, maka Yarn dapat meminta pelaksana maksimum yang diizinkan untuk setiap pekerjaan. Untuk menghindari masalah ini, biarkan `spark.dynamicAllocation.enabled` properti disetel ke `TRUE` (yang merupakan default) saat Anda menggunakan kombinasi fitur di atas. Selain itu, Anda juga dapat mengatur batasan pelaksana minimum dan maksimum dengan menetapkan nilai untuk `spark.dynamicAllocation.maxExecutors` dan `spark.dynamicAllocation.minExecutors` properti untuk pekerjaan Spark Anda, untuk membatasi jumlah pelaksana yang dialokasikan selama eksekusi pekerjaan. 
+ *Oozie penghentian* - Karena OSS Oozie telah masuk ke mode loteng, Apache Oozie akan dihapus dari Amazon EMR rilis 8.x seri. Oozie masih akan dimasukkan sebagai bagian dari seri 7.x. Kami menyarankan Anda menggunakan MWAA sebagai alternatif untuk Oozie. Pelanggan dapat merujuk ke [oozie-to-airflow-emr](https://github.com/dgghosalaws/oozie-to-airflow-emr)utilitas untuk GitHub memigrasikan alur kerja Oozie yang ada ke MWAA.
+ *Pengepakan tempat sampah kontainer YARN* - Dimulai dengan Amazon EMR versi 7.9.0, kebijakan pengepakan tempat sampah kontainer sekarang tersedia untuk penjadwal kapasitas YARN, yang dibangun di atas kebijakan penempatan multi-node YARN.
+  *hudi-cli.sh* - Skrip **hudi-cli.sh** telah usang dalam rilis EMR 7.9.0 dan yang lebih tinggi. **Amazon EMR rilis 7.9.0 dan yang lebih tinggi menggunakan.jar. hudi-cli-bundle** 
+ *Cluster EMR pada AMI yang mendukung FIPS AL2023 —* [Mulai dari EMR 7.9, pelanggan dapat meluncurkan cluster EMR pada AMI yang mendukung FIPS. AL2023 ](https://docs.aws.amazon.com/linux/al2023/ug/fips-mode.html) Perubahan ini memperbarui tanda tangan digital EMR dan algoritma hash untuk memastikan semua paket EMR mematuhi kebijakan kriptografi yang direkomendasikan untuk FIPS 140-3. Catatan: Ini tidak mencakup status sertifikasi FIPS EMR AL2023 atau - lihat FAQ FIPS [AL2023 untuk informasi terbaru tentang status validasi FIPS](https://aws.amazon.com/linux/amazon-linux-2023/faqs/) 140-3.
+  *Latensi langkah* - Rilis ini menyelesaikan masalah di mana latensi langkah meningkat saat menggunakan enkripsi dalam transit tanpa secara eksplisit memilih aplikasi Hadoop untuk instalasi. 
+  *Peluncuran cluster dengan volume terenkripsi EBS* - Rilis ini memperbaiki masalah di mana panggilan KMS pada volume terenkripsi EBS dapat menyebabkan peluncuran cluster EMR gagal. 
+     
[\[See the AWS documentation website for more details\]](http://docs.aws.amazon.com/id_id/emr/latest/ReleaseGuide/emr-790-release.html)

## 7.9.0 versi Java default
<a name="emr-790-jdk"></a>

Amazon EMR merilis 7.9 dan lebih tinggi dikirimkan dengan Amazon Corretto 17 (dibangun di atas OpenJDK) secara default untuk aplikasi yang mendukung Corretto 17 (JDK 17), dengan pengecualian Apache Livy.

Tabel berikut menunjukkan versi Java default untuk aplikasi di Amazon EMR 7.9.0. Jika Anda ingin mengubah JVM default pada cluster Anda, ikuti instruksi [Konfigurasikan aplikasi untuk menggunakan Java Virtual Machine tertentu](configuring-java8.md) untuk setiap aplikasi yang berjalan di cluster. Anda hanya dapat menggunakan satu versi runtime Java untuk sebuah cluster. Amazon EMR tidak mendukung menjalankan node atau aplikasi yang berbeda pada versi runtime yang berbeda pada cluster yang sama.


| Aplikasi | Versi Java/Amazon Corretto (defaultnya tebal) | 
| --- | --- | 
| kuala | 17, 11, 8 | 
| Flink | 17, 11, 8 | 
| HBase | 17, 11, 8 | 
| HCatalog | 17, 11, 8 | 
| Hadoop | 17, 11, 8 | 
| Hive | 17, 11, 8 | 
| Hudi | 17, 11, 8 | 
| Gunung es | 17, 11 | 
| Livy | 17, 11, 8 | 
| Oozie | 17, 11, 8 | 
| Phoenix | 17, 11, 8 | 
| PrestoDB | 8 | 
| Spark | 17, 11, 8 | 
| Spark RAPIDS | 17, 11, 8 | 
| Tez | 17, 11, 8 | 
| Trino | 21, 17 | 
| Zeppelin | 17, 11, 8 | 
| Pig | 17, 11, 8 | 
| Zookeeper | 17, 11, 8 | 

## 7.9.0 versi komponen
<a name="emr-790-components"></a>

Komponen yang diinstal oleh Amazon EMR dengan rilis ini tercantum di bawah ini. Beberapa komponen diinstal sebagai bagian dari paket aplikasi big data. Sedangkan komponen lainnya bersifak unik untuk Amazon EMR dan diinstal untuk proses sistem dan fitur. Ini biasanya dimulai dengan `emr` atau `aws`. Paket aplikasi big data dalam rilis Amazon EMR terbaru biasanya versi terbaru yang ditemukan di komunitas. Kami menyediakan rilis komunitas di Amazon EMR secepat mungkin.

Beberapa komponen yang ada di Amazon EMR berbeda dari versi komunitas. Komponen ini mempunyai label versi dalam bentuk `CommunityVersion-amzn-EmrVersion`. `EmrVersion` dimulai dari 0. Misalnya, jika komponen komunitas open source bernama `myapp-component` dengan versi 2.2 telah dimodifikasi tiga kali untuk dimasukkan dalam rilis EMR Amazon yang berbeda, versi rilisnya terdaftar sebagai. `2.2-amzn-2`


| Komponen | Versi | Deskripsi | 
| --- | --- | --- | 
| adot-java-agent | 1.31.0 | Agen Java yang mengumpulkan metrik dari daemon aplikasi. | 
| delta | 3.3.0-amzn-1 | Danau Delta adalah format tabel terbuka untuk kumpulan data analitik yang sangat besar | 
| emr-amazon-cloudwatch-agent | 1.300032.2-amzn-0 | Aplikasi yang mengumpulkan metrik tingkat sistem internal dan metrik aplikasi khusus dari instans Amazon EC2. | 
| emr-ddb | 5.7.0 | Konektor Amazon DynamoDB untuk aplikasi ekosistem Hadoop. | 
| emr-goodies | 3.18.0 | Perpustakaan kenyamanan ekstra untuk ekosistem Hadoop. | 
| emr-kinesis | 3.22.0 | Konektor Amazon Kinesis untuk aplikasi ekosistem Hadoop. | 
| emr-notebook-env | 1.18.0 | Conda env untuk emr notebook yang mencakup gateway jupyter korporasi | 
| emr-s3-dist-cp | 2.39.0 | Aplikasi salinan terdistribusi yang dioptimalkan untuk Amazon S3. | 
| emr-s3-select | 2.18.0 | EMR S3Select Connector | 
| emr-wal-cli | 1.3.4 | Cli digunakan untuk daftar emrwal/penghapusan. | 
| emrfs | 2.70.0 | Konektor Amazon S3 untuk aplikasi ekosistem Hadoop. | 
| flink-client | 1.20.0-amzn-3 | Skrip dan aplikasi klien baris perintah Apache Flink. | 
| flink-jobmanager-config | 1.20.0-amzn-3 | Mengelola sumber daya pada node EMR untuk Apache Flink. JobManager | 
| hadoop-client | 3.4.1-amzn-1 | Klien baris perintah Hadoop seperti 'hdfs', 'Hadoop', atau 'yarn'. | 
| hadoop-hdfs-datanode | 3.4.1-amzn-1 | Layanan tingkat simpul HDFS untuk menyimpan blok. | 
| hadoop-hdfs-library | 3.4.1-amzn-1 | Klien dan perpustakaan baris perintah HDFS | 
| hadoop-hdfs-namenode | 3.4.1-amzn-1 | Layanan HDFS untuk melacak nama file dan lokasi blok. | 
| hadoop-hdfs-journalnode | 3.4.1-amzn-1 | Layanan HDFS untuk mengelola jurnal filesystem Hadoop pada klaster HA. | 
| hadoop-httpfs-server | 3.4.1-amzn-1 | Titik akhir HTTP untuk operasi HDFS. | 
| hadoop-kms-server | 3.4.1-amzn-1 | Server manajemen kunci kriptografi berdasarkan API Hadoop. KeyProvider  | 
| hadoop-mapred | 3.4.1-amzn-1 | MapReduce pustaka mesin eksekusi untuk menjalankan MapReduce aplikasi. | 
| hadoop-yarn-nodemanager | 3.4.1-amzn-1 | Layanan YARN untuk mengelola kontainer pada simpul individu. | 
| hadoop-yarn-resourcemanager | 3.4.1-amzn-1 | Layanan YARN untuk mengalokasikan dan mengelola sumber daya klaster dan aplikasi terdistribusi. | 
| hadoop-yarn-timeline-server | 3.4.1-amzn-1 | Layanan untuk mengambil informasi terkini dan historis untuk aplikasi YARN. | 
| hbase-hmaster | 2.6.2-amzn-0 | Layanan untuk HBase cluster yang bertanggung jawab untuk koordinasi Daerah dan pelaksanaan perintah administratif. | 
| hbase-region-server | 2.6.2-amzn-0 | Layanan untuk melayani satu atau lebih HBase wilayah. | 
| hbase-client | 2.6.2-amzn-0 | HBase klien baris perintah. | 
| hbase-rest-server | 2.6.2-amzn-0 | Layanan menyediakan titik akhir RESTful HTTP untuk HBase. | 
| hbase-thrift-server | 2.6.2-amzn-0 | Layanan menyediakan titik akhir Thrift ke. HBase | 
| hbase-operator-tools | 2.6.2-amzn-0 | Alat perbaikan untuk HBase cluster Apache. | 
| hcatalog-client | 3.1.3-amzn-18 | Klien baris perintah 'hcat' untuk memanipulasi hcatalog-server. | 
| hcatalog-server | 3.1.3-amzn-18 | Penyediaan layanan HCatalog, tabel dan lapisan manajemen penyimpanan untuk aplikasi terdistribusi. | 
| hcatalog-webhcat-server | 3.1.3-amzn-18 | Titik akhir HTTP menyediakan antarmuka REST ke HCatalog. | 
| hive-client | 3.1.3-amzn-18 | Klien baris perintah Hive. | 
| hive-hbase | 3.1.3-amzn-18 | Klien Hive-hbase. | 
| hive-metastore-server | 3.1.3-amzn-18 | Layanan untuk mengakses metastore Hive, repositori semantik yang menyimpan metadata untuk SQL pada operasi Hadoop. | 
| hive-server2 | 3.1.3-amzn-18 | Layanan untuk menerima kueri Hive sebagai permintaan web. | 
| hudi | 0.15.0-amzn-6 | Kerangka pemrosesan tambahan untuk memberi daya pada pipa data pada latensi rendah dan efisiensi tinggi. | 
| hudi-presto | 0.15.0-amzn-6 | Perpustakaan paket untuk menjalankan Presto dengan Hudi. | 
| hudi-trino | 0.15.0-amzn-6 | Perpustakaan bundel untuk menjalankan Trino dengan Hudi. | 
| hudi-spark | 0.15.0-amzn-6 | Perpustakaan paket untuk menjalankan Spark dengan Hudi. | 
| hue-server | 4.11.0 | Aplikasi web untuk menganalisis data menggunakan aplikasi ekosistem Hadoop | 
| iceberg | 1.7.1-amzn-2 | Apache Iceberg adalah format tabel terbuka untuk kumpulan data analitik besar | 
| jupyterhub | 1.5.0 | Server multi-pengguna untuk notebook Jupyter | 
| livy-server | 0.8.0-inkubasi | Antarmuka REST untuk berinteraksi dengan Apache Spark | 
| nginx | 1.12.1 | nginx [engine x] adalah server HTTP dan server proksi balik | 
| mariadb-server | 5.5.68\$1 | Server basis data MariaDB. | 
| nvidia-cuda | 12.3.0 | Driver Nvidia dan kit alat Cuda | 
| oozie-client | 5.2.1 | Klien baris perintah Oozie. | 
| oozie-server | 5.2.1 | Layanan untuk menerima permintaan alur kerja Oozie. | 
| opencv | 4.7.0 | Perpustakaan Visi Komputer Sumber Terbuka. | 
| phoenix-library | 5.2.1 | Perpustakaan phoenix untuk server dan klien | 
| phoenix-connectors | 6.0.0 | Konektor Apache Phoenix untuk Spark-3 | 
| phoenix-query-server | 6.0.0 | Sebuah server ringan yang menyediakan akses JDBC serta Protocol Buffers dan akses format JSON ke API Avatica  | 
| presto-coordinator | 0,27-amzn-3 | Layanan untuk menerima kueri dan mengelola eksekusi kueri antara presto-worker. | 
| presto-worker | 0,27-amzn-3 | Layanan untuk mengeksekusi potongan kueri. | 
| presto-client | 0,27-amzn-3 | Klien baris perintah Presto yang diinstal pada master klaster HA yang siaga di mana server Presto server tidak dimulai. | 
| trino-coordinator | 467-amzn-2 | Layanan untuk menerima kueri dan mengelola eksekusi kueri di antara trino-workers. | 
| trino-worker | 467-amzn-2 | Layanan untuk mengeksekusi potongan kueri. | 
| trino-client | 467-amzn-2 | Klien baris perintah Trino yang diinstal pada master siaga cluster HA di mana server Trino tidak dimulai. | 
| pig-client | 0.17.0 | Klien baris perintah Pig. | 
| r | 4.3.2 | Proyek R untuk Komputasi Statistik | 
| ranger-kms-server | 2.0.0 | Sistem Pengelolaan Kunci Ranger Apache | 
| spark-client | 3.5.5-amzn-0 | Klien baris perintah Spark. | 
| spark-history-server | 3.5.5-amzn-0 | Web UI untuk melihat log acara untuk seluruh masa pakai aplikasi Spark. | 
| spark-on-yarn | 3.5.5-amzn-0 | Mesin eksekusi dalam memori untuk YARN. | 
| spark-yarn-slave | 3.5.5-amzn-0 | Perpustakaan Apache Spark yang dibutuhkan oleh slave YARN. | 
| spark-rapids | 25.02.1-amzn-0 | Plugin Nvidia Spark RAPIDS yang mempercepat Apache Spark dengan. GPUs | 
| tensorflow | 2.16.1 | TensorFlow pustaka perangkat lunak open source untuk perhitungan numerik kinerja tinggi. | 
| tez-on-yarn | 0.10.2-amzn-16 | Aplikasi dan perpustakaan tez YARN. | 
| tez-on-worker | 0.10.2-amzn-16 | Aplikasi dan pustaka YARN tez untuk node pekerja. | 
| zeppelin-server | 0.11.1 | Notebook berbasis web yang memungkinkan analisis data interaktif. | 
| zookeeper-server | 3.9.3-amzn-1 | Layanan terpusat untuk menjaga informasi konfigurasi, penamaan, yang menyediakan sinkronisasi terdistribusi, dan menyediakan layanan grup. | 
| zookeeper-client | 3.9.3-amzn-1 | ZooKeeper klien baris perintah. | 

## 7.9.0 klasifikasi konfigurasi
<a name="emr-790-class"></a>

Klasifikasi konfigurasi memungkinkan Anda menyesuaikan aplikasi. Ini sering kali bersesuaian dengan file XML konfigurasi untuk aplikasi, seperti `hive-site.xml`. Untuk informasi selengkapnya, lihat [Konfigurasikan aplikasi](emr-configure-apps.md).

Tindakan konfigurasi ulang terjadi ketika Anda menentukan konfigurasi untuk grup instans di klaster yang sedang berjalan. Amazon EMR hanya memulai tindakan konfigurasi ulang untuk klasifikasi yang Anda modifikasi. Untuk informasi selengkapnya, lihat [Lakukan konfigurasi ulang pada grup instans di klaster yang sedang berjalan](emr-configure-apps-running-cluster.md).


**klasifikasi emr-7.9.0**  

| Klasifikasi | Deskripsi | Tindakan Konfigurasi Ulang | 
| --- | --- | --- | 
| capacity-scheduler | Ubah nilai dalam file capacity-scheduler.xml Hadoop. | Restarts the ResourceManager service. | 
| container-executor | Ubah nilai dalam file container-executor.cfg Hadoop YARN ini. | Not available. | 
| container-log4j | Ubah nilai dalam file container-log4j.properties Hadoop YARN. | Not available. | 
| core-site | Ubah nilai dalam file core-site.xml Hadoop. | Restarts the Hadoop HDFS services Namenode, SecondaryNamenode, Datanode, ZKFC, and Journalnode. Restarts the Hadoop YARN services ResourceManager, NodeManager, ProxyServer, and TimelineServer. Additionally restarts Hadoop KMS, Ranger KMS, HiveServer2, Hive MetaStore, Hadoop Httpfs, and MapReduce-HistoryServer. | 
| docker-conf | Ubah pengaturan terkait docker. | Not available. | 
| emrfs-site | Ubah pengaturan EMRFS. | Restarts the Hadoop HDFS services Namenode, SecondaryNamenode, Datanode, ZKFC, and Journalnode. Restarts the Hadoop YARN services ResourceManager, NodeManager, ProxyServer, and TimelineServer. Additionally restarts HBaseRegionserver, HBaseMaster, HBaseThrift, HBaseRest, HiveServer2, Hive MetaStore, Hadoop Httpfs, and MapReduce-HistoryServer. | 
| flink-conf | Ubah pengaturan flink-conf.yaml. | Restarts Flink history server. | 
| flink-log4j | Ubah pengaturan log4j.properties Flink. | Restarts Flink history server. | 
| flink-log4j-session | Ubah pengaturan Flink log4j-session.properties untuk sesi. Kubernetes/Yarn  | Restarts Flink history server. | 
| flink-log4j-cli | Ubah pengaturan log4j-cli.properties Flink. | Restarts Flink history server. | 
| hadoop-env | Ubah nilai dalam lingkungan Hadoop untuk semua komponen Hadoop. | Restarts the Hadoop HDFS services Namenode, SecondaryNamenode, Datanode, ZKFC, and Journalnode. Restarts the Hadoop YARN services ResourceManager, NodeManager, ProxyServer, and TimelineServer. Additionally restarts PhoenixQueryserver, HiveServer2, Hive MetaStore, and MapReduce-HistoryServer. | 
| hadoop-log4j | Ubah nilai dalam file log4j.properties Hadoop ini. | Restarts the Hadoop HDFS services SecondaryNamenode, Datanode, and Journalnode. Restarts the Hadoop YARN services ResourceManager, NodeManager, ProxyServer, and TimelineServer. Additionally restarts Hadoop KMS, Hadoop Httpfs, and MapReduce-HistoryServer. | 
| hadoop-ssl-server | Ubah konfigurasi server ssl hadoop | Not available. | 
| hadoop-ssl-client | Ubah konfigurasi klien ssl hadoop | Not available. | 
| hbase | Pengaturan Amazon EMR-curated untuk Apache. HBase | Custom EMR specific property. Sets emrfs-site and hbase-site configs. See those for their associated restarts. | 
| hbase-env | Ubah nilai HBase di lingkungan. | Restarts the HBase services RegionServer, HBaseMaster, ThriftServer, RestServer. | 
| hbase-log4j2 | Ubah nilai dalam file HBase hbase-log4j2.properties. | Restarts the HBase services RegionServer, HBaseMaster, ThriftServer, RestServer. | 
| hbase-metrics | Ubah nilai dalam file HBase hadoop-metrics2-hbase.properties. | Restarts the HBase services RegionServer, HBaseMaster, ThriftServer, RestServer. | 
| hbase-policy | Ubah nilai dalam HBase file hbase-policy.xml. | Not available. | 
| hbase-site | Ubah nilai dalam HBase file hbase-site.xml. | Restarts the HBase services RegionServer, HBaseMaster, ThriftServer, RestServer. Additionally restarts Phoenix QueryServer. | 
| hdfs-encryption-zones | Konfigurasikan zona enkripsi HDFS. | This classification should not be reconfigured. | 
| hdfs-env | Ubah nilai dalam lingkungan HDFS. | Restarts Hadoop HDFS services Namenode, Datanode, and ZKFC. | 
| hdfs-site | Ubah nilai dalam hdfs-site.xml HDFS. | Restarts the Hadoop HDFS services Namenode, SecondaryNamenode, Datanode, ZKFC, and Journalnode. Additionally restarts Hadoop Httpfs. | 
| hcatalog-env | Ubah nilai HCatalog di lingkungan. | Restarts Hive HCatalog Server. | 
| hcatalog-server-jndi | Ubah nilai di HCatalog jndi.properties. | Restarts Hive HCatalog Server. | 
| hcatalog-server-proto-hive-site | Ubah nilai HCatalog proto-hive-site dalam.xml's. | Restarts Hive HCatalog Server. | 
| hcatalog-webhcat-env | Ubah nilai di lingkungan HCatalog WebHCat. | Restarts Hive WebHCat server. | 
| hcatalog-webhcat-log4j2 | Ubah nilai di HCat log4j2.properties HCatalog Web. | Restarts Hive WebHCat server. | 
| hcatalog-webhcat-site | Ubah nilai dalam file webhcat-site.xml HCatalog WebHCat. | Restarts Hive WebHCat server. | 
| hive | Pengaturan dikurasi Amazon EMR untuk Apache Hive. | Sets configurations to launch Hive LLAP service. | 
| hive-beeline-log4j2 | Ubah nilai dalam file beeline-log4j2.properties Hive. | Not available. | 
| hive-parquet-logging | Ubah nilai dalam file parquet-logging.properties Hive. | Not available. | 
| hive-env | Ubah nilai dalam lingkungan Hive. | Restarts HiveServer2, HiveMetastore, and Hive HCatalog-Server. Runs Hive schemaTool CLI commands to verify hive-metastore. | 
| hive-exec-log4j2 | Ubah nilai dalam file hive-exec-log 4j2.properties Hive. | Not available. | 
| hive-llap-daemon-log4j2 | Ubah nilai dalam file llap-daemon-log 4j2.properties Hive. | Not available. | 
| hive-log4j2 | Ubah nilai dalam file hive-log4j2.properties Hive. | Not available. | 
| hive-site | Ubah nilai dalam file hive-site.xml Hive | Restarts HiveServer2, HiveMetastore, and Hive HCatalog-Server. Runs Hive schemaTool CLI commands to verify hive-metastore. Also restarts Oozie and Zeppelin. | 
| hiveserver2-site | Ubah nilai dalam file hiveserver2-site.xml Hive Server2 | Not available. | 
| hue-ini | Ubah nilai dalam file ini Hue | Restarts Hue. Also activates Hue config override CLI commands to pick up new configurations. | 
| httpfs-env | Ubah nilai di lingkungan HTTPFS. | Restarts Hadoop Httpfs service. | 
| httpfs-site | Ubah nilai dalam file httpfs-site.xml Hadoop. | Restarts Hadoop Httpfs service. | 
| hadoop-kms-acls | Ubah nilai dalam file kms-acls.xml Hadoop. | Not available. | 
| hadoop-kms-env | Ubah nilai dalam lingkungan Hadoop KMS. | Restarts Hadoop-KMS service. | 
| hadoop-kms-java-home | Ubah rumah java KMS Hadoop | Not available. | 
| hadoop-kms-log4j | Ubah nilai dalam file kms-log4j.properties Hadoop. | Not available. | 
| hadoop-kms-site | Ubah nilai dalam file kms-site.xml Hadoop. | Restarts Hadoop-KMS and Ranger-KMS service. | 
| hudi-env | Ubah nilai di lingkungan Hudi. | Not available. | 
| hudi-defaults | Ubah nilai dalam file hudi-defaults.conf Hudi. | Not available. | 
| iceberg-defaults | Ubah nilai dalam file iceberg-defaults.conf Iceberg. | Not available. | 
| delta-defaults | Ubah nilai dalam file delta-defaults.conf Delta. | Not available. | 
| jupyter-notebook-conf | Ubah nilai dalam file jupyter\$1notebook\$1config.py Jupyter Notebook. | Not available. | 
| jupyter-hub-conf | Ubah nilai dalam JupyterHubs file jupyterhub\$1config.py. | Not available. | 
| jupyter-s3-conf | Konfigurasikan persistensi Jupyter Notebook S3. | Not available. | 
| jupyter-sparkmagic-conf | Ubah nilai dalam file config.json Sparkmagic. | Not available. | 
| livy-conf | Ubah nilai dalam file livy.conf Livy. | Restarts Livy Server. | 
| livy-env | Ubah nilai di lingkungan Livy. | Restarts Livy Server. | 
| livy-log4j2 | Ubah pengaturan Livy log4j2.properties. | Restarts Livy Server. | 
| mapred-env | Ubah nilai di lingkungan MapReduce aplikasi. | Restarts Hadoop MapReduce-HistoryServer. | 
| mapred-site | Ubah nilai dalam file mapred-site.xml MapReduce aplikasi. | Restarts Hadoop MapReduce-HistoryServer. | 
| oozie-env | Ubah nilai di lingkungan Oozie. | Restarts Oozie. | 
| oozie-log4j | Ubah nilai dalam file oozie-log4j.properties Oozie. | Restarts Oozie. | 
| oozie-site | Ubah nilai dalam file oozie-site.xml Oozie. | Restarts Oozie. | 
| phoenix-hbase-metrics | Ubah nilai dalam file hadoop-metrics2-hbase.properties Phoenix. | Not available. | 
| phoenix-hbase-site | Ubah nilai dalam file hbase-site.xml Phoenix. | Not available. | 
| phoenix-log4j2 | Ubah nilai dalam file log4j2.properties Phoenix. | Restarts Phoenix-QueryServer. | 
| phoenix-metrics | Ubah nilai dalam file hadoop-metrics2-phoenix.properties Phoenix. | Not available. | 
| pig-env | Ubah nilai di lingkungan Pig. | Not available. | 
| pig-properties | Ubah nilai dalam file pig.properties Pig. | Restarts Oozie. | 
| pig-log4j | Ubah nilai dalam file log4j.properties Pig. | Not available. | 
| presto-log | Ubah nilai dalam file log.properties Presto. | Restarts Presto-Server (for PrestoDB) | 
| presto-config | Ubah nilai dalam file config.properties Presto. | Restarts Presto-Server (for PrestoDB) | 
| presto-password-authenticator | Ubah nilai dalam file password-authenticator.properties Presto. | Not available. | 
| presto-env | Ubah nilai dalam file presto-env.sh Presto. | Restarts Presto-Server (for PrestoDB) | 
| presto-node | Ubah nilai dalam file node.properties Presto. | Not available. | 
| presto-connector-blackhole | Ubah nilai dalam file blackhole.properties Presto. | Not available. | 
| presto-connector-cassandra | Ubah nilai dalam file cassandra.properties Presto. | Not available. | 
| presto-connector-hive | Ubah nilai dalam file hive.properties Presto. | Restarts Presto-Server (for PrestoDB) | 
| presto-connector-jmx | Ubah nilai dalam file jmx.properties Presto. | Not available. | 
| presto-connector-kafka | Ubah nilai dalam file kafka.properties Presto. | Not available. | 
| presto-connector-lakeformation | Ubah nilai dalam file lakeformation.properties Presto. | Restarts Presto-Server (for PrestoDB) | 
| presto-connector-localfile | Ubah nilai dalam file localfile.properties Presto. | Not available. | 
| presto-connector-memory | Ubah nilai dalam file memory.properties Presto. | Not available. | 
| presto-connector-mongodb | Ubah nilai dalam file mongodb.properties Presto. | Not available. | 
| presto-connector-mysql | Ubah nilai dalam file mysql.properties Presto. | Not available. | 
| presto-connector-postgresql | Ubah nilai dalam file postgresql.properties Presto. | Not available. | 
| presto-connector-raptor | Ubah nilai dalam file raptor.properties Presto. | Not available. | 
| presto-connector-redis | Ubah nilai dalam file redis.properties Presto. | Not available. | 
| presto-connector-redshift | Ubah nilai dalam file redshift.properties Presto. | Not available. | 
| presto-connector-tpch | Ubah nilai dalam file tpch.properties Presto. | Not available. | 
| presto-connector-tpcds | Ubah nilai dalam file tpcds.properties Presto. | Not available. | 
| trino-log | Ubah nilai dalam file log.properties Trino. | Restarts Trino-Server (for Trino) | 
| trino-config | Ubah nilai dalam file config.properties Trino. | Restarts Trino-Server (for Trino) | 
| trino-password-authenticator | Ubah nilai dalam file password-authenticator.properties Trino. | Restarts Trino-Server (for Trino) | 
| trino-env | Ubah nilai dalam file trino-env.sh Trino. | Restarts Trino-Server (for Trino) | 
| trino-node | Ubah nilai dalam file node.properties Trino. | Not available. | 
| trino-connector-blackhole | Ubah nilai dalam file blackhole.properties Trino. | Not available. | 
| trino-connector-cassandra | Ubah nilai dalam file cassandra.properties Trino. | Not available. | 
| trino-connector-delta | Ubah nilai dalam file delta.properties Trino. | Restarts Trino-Server (for Trino) | 
| trino-connector-hive | Ubah nilai dalam file hive.properties Trino. | Restarts Trino-Server (for Trino) | 
| trino-exchange-manager | Ubah nilai dalam file exchange-manager.properties Trino. | Restarts Trino-Server (for Trino) | 
| trino-connector-iceberg | Ubah nilai dalam file iceberg.properties Trino. | Restarts Trino-Server (for Trino) | 
| trino-connector-hudi | Ubah nilai dalam file hudi.properties Trino. | Restarts Trino-Server (for Trino) | 
| trino-connector-jmx | Ubah nilai dalam file jmx.properties Trino. | Not available. | 
| trino-connector-kafka | Ubah nilai dalam file kafka.properties Trino. | Not available. | 
| trino-connector-localfile | Ubah nilai dalam file localfile.properties Trino. | Not available. | 
| trino-connector-memory | Ubah nilai dalam file memory.properties Trino. | Not available. | 
| trino-connector-mongodb | Ubah nilai dalam file mongodb.properties Trino. | Not available. | 
| trino-connector-mysql | Ubah nilai dalam file mysql.properties Trino. | Not available. | 
| trino-connector-postgresql | Ubah nilai dalam file postgresql.properties Trino. | Not available. | 
| trino-connector-raptor | Ubah nilai dalam file raptor.properties Trino. | Not available. | 
| trino-connector-redis | Ubah nilai dalam file redis.properties Trino. | Not available. | 
| trino-connector-redshift | Ubah nilai dalam file redshift.properties Trino. | Not available. | 
| trino-connector-tpch | Ubah nilai dalam file tpch.properties Trino. | Not available. | 
| trino-connector-tpcds | Ubah nilai dalam file tpcds.properties Trino. | Not available. | 
| ranger-kms-dbks-site | Ubah nilai dalam file dbks-site.xml Ranger KMS. | Restarts Ranger KMS Server. | 
| ranger-kms-site | Ubah nilai dalam ranger-kms-site file.xml. dari Ranger KMS. | Restarts Ranger KMS Server. | 
| ranger-kms-env | Ubah nilai di lingkungan Ranger KMS. | Restarts Ranger KMS Server. | 
| ranger-kms-logback | Ubah nilai dalam file kms-logback.xml dari Ranger KMS. | Not available. | 
| ranger-kms-db-ca | Ubah nilai untuk file CA pada S3 untuk koneksi MySQL SSL dengan Ranger KMS. | Not available. | 
| spark | Pengaturan terkurasi Amazon EMR untuk Apache Spark. | This property modifies spark-defaults. See actions there. | 
| spark-defaults | Ubah nilai dalam file spark-defaults.conf Spark. | Restarts Spark history server and Spark thrift server. | 
| spark-env | Ubah nilai di lingkungan Spark. | Restarts Spark history server and Spark thrift server. | 
| spark-hive-site | Ubah nilai dalam file hive-site.xml Spark | Not available. | 
| spark-log4j2 | Ubah nilai dalam file log4j2.properties Spark. | Restarts Spark history server and Spark thrift server. | 
| spark-metrics | Ubah nilai dalam file metrics.properties Spark. | Restarts Spark history server and Spark thrift server. | 
| tez-site | Ubah nilai dalam file tez-site.xml Tez. | Restart Oozie and HiveServer2. | 
| yarn-env | Ubah nilai di lingkungan YARN. | Restarts the Hadoop YARN services ResourceManager, NodeManager, ProxyServer, and TimelineServer. Additionally restarts MapReduce-HistoryServer. | 
| yarn-site | Ubah nilai dalam file yarn-site.xml YARN. | Restarts the Hadoop YARN services ResourceManager, NodeManager, ProxyServer, and TimelineServer. Additionally restarts Livy Server and MapReduce-HistoryServer. | 
| zeppelin-env | Ubah nilai di lingkungan Zeppelin. | Restarts Zeppelin. | 
| zeppelin-site | Ubah pengaturan konfigurasi di zeppelin-site.xml. | Restarts Zeppelin. | 
| zookeeper-config | Ubah nilai dalam ZooKeeper file zoo.cfg. | Restarts Zookeeper server. | 
| zookeeper-logback | Ubah nilai dalam ZooKeeper file logback.xml. | Restarts Zookeeper server. | 
| emr-metrics | Ubah pengaturan metrik emr untuk simpul ini. | Restarts the CloudWatchAgent service. | 

## 7.9.0 perubahan log
<a name="790-changelog"></a>


**Ubah log untuk catatan rilis dan rilis 7.9.0**  

| Date | Peristiwa | Deskripsi | 
| --- | --- | --- | 
| 2025-05-19 | Publikasi Docs | Amazon EMR 7.9.0 catatan rilis pertama kali diterbitkan | 
| 2025-05-19 | Penerapan selesai | [Amazon EMR 7.9.0 sepenuhnya diterapkan ke semua Wilayah yang didukung](https://aws.amazon.com/about-aws/global-infrastructure/regional-product-services/) | 
| 2025-05-19 | Rilis terbatas awal | Amazon EMR 7.9.0 pertama kali dikerahkan ke Wilayah komersial awal | 

# Amazon EMR rilis 7.8.0
<a name="emr-780-release"></a>

## 7.8.0 siklus hidup yang didukung
<a name="emr-780-supported-lifecycle"></a>

Tabel berikut menjelaskan tanggal siklus hidup yang didukung untuk rilis Amazon EMR 7.8.0.


| Fase Support | Date | 
| --- | --- | 
| Tanggal rilis awal | 7 Maret 2025 | 
| Dukungan standar sampai | 6 Maret 2027 | 
| Akhir dari dukungan | 7 Maret 2027 | 
| Akhir hidup | 7 Maret 2028 | 

## 7.8.0 versi aplikasi
<a name="emr-780-app-versions"></a>

Rilis ini mencakup aplikasi berikut: [https://docs.aws.amazon.com/AmazonCloudWatch/latest/monitoring/Install-CloudWatch-Agent.html](https://docs.aws.amazon.com/AmazonCloudWatch/latest/monitoring/Install-CloudWatch-Agent.html), [https://delta.io/](https://delta.io/), [https://flink.apache.org/](https://flink.apache.org/), [http://hbase.apache.org/](http://hbase.apache.org/), [https://cwiki.apache.org/confluence/display/Hive/HCatalog](https://cwiki.apache.org/confluence/display/Hive/HCatalog), [http://hive.apache.org/](http://hive.apache.org/), [https://hudi.apache.org](https://hudi.apache.org), [http://gethue.com/](http://gethue.com/), [https://iceberg.apache.org/](https://iceberg.apache.org/), [https://jupyter-enterprise-gateway.readthedocs.io/en/latest/](https://jupyter-enterprise-gateway.readthedocs.io/en/latest/), [https://jupyterhub.readthedocs.io/en/latest/#](https://jupyterhub.readthedocs.io/en/latest/#), [https://livy.incubator.apache.org/](https://livy.incubator.apache.org/), [http://oozie.apache.org/](http://oozie.apache.org/), [https://phoenix.apache.org/](https://phoenix.apache.org/), [http://pig.apache.org/](http://pig.apache.org/), [https://prestodb.io/](https://prestodb.io/), [https://spark.apache.org/docs/latest/](https://spark.apache.org/docs/latest/), [https://www.tensorflow.org/](https://www.tensorflow.org/), [https://tez.apache.org/](https://tez.apache.org/), [https://trino.io/](https://trino.io/), [https://zeppelin.incubator.apache.org/](https://zeppelin.incubator.apache.org/), dan [https://zookeeper.apache.org](https://zookeeper.apache.org).

Tabel di bawah ini mencantumkan versi aplikasi yang tersedia dalam rilis Amazon EMR ini dan versi aplikasi dalam tiga rilis EMR Amazon sebelumnya (bila berlaku).

Untuk riwayat lengkap versi aplikasi untuk setiap rilis Amazon EMR, lihat topik berikut:
+ [Versi aplikasi di Amazon EMR 7.x rilis](emr-release-app-versions-7.x.md)
+ [Versi aplikasi di Amazon EMR 6.x rilis](emr-release-app-versions-6.x.md)
+ [Versi aplikasi di Amazon EMR 5.x rilis](emr-release-app-versions-5.x.md)
+ [Versi aplikasi di Amazon EMR 4.x rilis](emr-release-app-versions-4.x.md)


**Informasi versi aplikasi**  

|  | emr-7.8.0 | emr-7.7.0 | emr-7.6.0 | emr-7.5.0 | 
| --- | --- | --- | --- | --- | 
| AWS SDK for Java | 2.29.52, 1.12.780 | 2.29.44, 1.12.780 | 2.29.25, 1.12.779 | 2.28.8, 1.12.772 | 
| Python | 3.9, 3.11 | 3.9, 3.11 | 3.9, 3.11 | 3.9, 3.11 | 
| Skala | 2.12.18 | 2.12.18 | 2.12.18 | 2.12.18 | 
| AmazonCloudWatchAgent | 1.300032.2-amzn-0 | 1.300032.2-amzn-0 | 1.300032.2-amzn-0 | 1.300032.2-amzn-0 | 
| Delta | 3.3.0-amzn-0 | 3.2.1-amzn-2 | Versi 3.2.1-amzn-1 | 3.2.1-amzn-0 | 
| Flink | 1.20.0-amzn-2 | 1.20.0-amzn-1 | 1.20.0-amzn-0 | 1.19.1-amzn-1 | 
| Ganglia |  -  |  -  |  -  |  -  | 
| HBase | 2.6.1-amzn-2 | 2.6.1-amzn-1 | 2.6.1-amzn-0 | 2.5.10-amzn-0 | 
| HCatalog | 3.1.3-amzn-17 | 3.1.3-amzn-16 | 3.1.3-amzn-15 | 3.1.3-amzn-14 | 
| Hadoop | 3.4.1-amzn-0 | 3.4.0-amzn-3 | 3.4.0-amzn-2 | 3.4.0-amzn-1 | 
| Hive | 3.1.3-amzn-17 | 3.1.3-amzn-16 | 3.1.3-amzn-15 | 3.1.3-amzn-14 | 
| Hudi | 0.15.0-amzn-5 | 0.15.0-amzn-4 | 0.15.0-amzn-3 | 0.15.0-amzn-2 | 
| Hue | 4.11.0 | 4.11.0 | 4.11.0 | 4.11.0 | 
| Iceberg | 1.7.1-amzn-1 | 1.7.1-amzn-0 | 1.6.1-amzn-2 | 1.6.1-amzn-1 | 
| JupyterEnterpriseGateway | 2.6.0 | 2.6.0 | 2.6.0 | 2.6.0 | 
| JupyterHub | 1.5.0 | 1.5.0 | 1.5.0 | 1.5.0 | 
| Livy | 0.8.0-inkubasi | 0.8.0-inkubasi | 0.8.0-inkubasi | 0.8.0-inkubasi | 
| MXNet |  -  |  -  |  -  |  -  | 
| Mahout |  -  |  -  |  -  |  -  | 
| Oozie | 5.2.1 | 5.2.1 | 5.2.1 | 5.2.1 | 
| Phoenix | 5.2.1 | 5.2.1 | 5.2.0 | 5.2.0 | 
| Pig | 0.17.0 | 0.17.0 | 0.17.0 | 0.17.0 | 
| Presto | 0,287-amzn-2 | 0,287-amzn-1 | 0,287-amzn-1 | 0,287-amzn-0 | 
| Spark | 3.5.4-amzn-0 | 3.5.3-amzn-1 | 3.5.3-amzn-0 | 3.5.2-amzn-1 | 
| Sqoop |  -  |  -  |  -  |  -  | 
| TensorFlow | 2.16.1 | 2.16.1 | 2.16.1 | 2.16.1 | 
| Tez | 0.10.2-amzn-15 | 0.10.2-amzn-14 | 0.10.2-amzn-13 | 0.10.2-amzn-12 | 
| Trino (PrestoSQL) | 467-amzn-1 | 467-amzn-0 | 457-amzn-0 | 446-amzn-0 | 
| Zeppelin | 0.11.1 | 0.11.1 | 0.11.1 | 0.11.1 | 
| ZooKeeper | 3.9.3-amzn-0 | 3.9.2-amzn-1 | 3.9.2-amzn-0 | 3.9.2-amzn-0 | 

# 7.8.0 rincian komponen rilis
<a name="emr-780-release-components-details"></a>

Lihat tabel berikut untuk informasi selengkapnya tentang paket *Ekstra* di Amazon EMR 7.7.0.


| Aplikasi | Jenis Aplikasi | Paket | Jenis Package | Versi Package | 
| --- | --- | --- | --- | --- | 
|  AmazonCloudWatchAgent  |  Core  |  hadoop-hdfs-journalnode  |  Ekstra  |  3.4.1-amzn-0-1.amzn2023  | 
|  AmazonCloudWatchAgent  |  Core  |  ranger-km  |  Ekstra  |  2.0.0-1.amzn2023  | 
|  AmazonCloudWatchAgent  |  Core  |  s3-dist-cp  |  Ekstra  |  2.38.0-1.amzn2023  | 
|  AmazonCloudWatchAgent  |  Core  |  penjaga kebun binatang  |  Ekstra  |  3.9.3-amzn-0-1.amzn2023  | 
|  AmazonCloudWatchAgent  |  Core  |  zookeper-server  |  Ekstra  |  3.9.3-amzn-0-1.amzn2023  | 
|  Flink  |  Core  |  hadop-client  |  Ekstra  |  3.4.0.amzn.3-1.amzn2023  | 
|  Flink  |  Core  |  hadoop-hdfs  |  Ekstra  |  3.4.1-amzn-0-1.amzn2023  | 
|  Flink  |  Core  |  hadoop-hdfs-datanode  |  Ekstra  |  3.4.1-amzn-0-1.amzn2023  | 
|  Flink  |  Core  |  hadoop-hdfs-journalnode  |  Ekstra  |  3.4.1-amzn-0-1.amzn2023  | 
|  Flink  |  Core  |  hadoop-hdfs-namenode  |  Ekstra  |  3.4.1-amzn-0-1.amzn2023  | 
|  Flink  |  Core  |  hadoop-httpfs  |  Ekstra  |  3.4.1-amzn-0-1.amzn2023  | 
|  Flink  |  Core  |  hadoop-km  |  Ekstra  |  3.4.1-amzn-0-1.amzn2023  | 
|  Flink  |  Core  |  hadoop-mapreduce  |  Ekstra  |  3.4.1-amzn-0-1.amzn2023  | 
|  Flink  |  Core  |  hadoop-mapreduce-historyserver  |  Ekstra  |  3.4.1-amzn-0-1.amzn2023  | 
|  Flink  |  Core  |  hadoop-benang  |  Ekstra  |  3.4.1-amzn-0-1.amzn2023  | 
|  Flink  |  Core  |  hadoop-yarn-nodemanager  |  Ekstra  |  3.4.1-amzn-0-1.amzn2023  | 
|  Flink  |  Core  |  hadoop-yarn-proxyserver  |  Ekstra  |  3.4.1-amzn-0-1.amzn2023  | 
|  Flink  |  Core  |  hadoop-yarn-resourcemanager  |  Ekstra  |  3.4.1-amzn-0-1.amzn2023  | 
|  Flink  |  Core  |  hadoop-yarn-timelineserver  |  Ekstra  |  3.4.1-amzn-0-1.amzn2023  | 
|  Flink  |  Core  |  hudi  |  Ekstra  |  0.15.0-amzn-5-1.amzn2023  | 
|  Flink  |  Core  |  ranger-km  |  Ekstra  |  2.0.0-1.amzn2023  | 
|  Flink  |  Core  |  hadoop  |  Ekstra  |  3.4.1-amzn-0-1.amzn2023  | 
|  HBase  |  Core  |  s3-dist-cp  |  Ekstra  |  2.38.0-1.amzn2023  | 
|  HCatalog  |  Core  |  hadoop-yarn-proxyserver  |  Ekstra  |  3.4.1-amzn-0-1.amzn2023  | 
|  HCatalog  |  Core  |  mariadb-connector-java  |  Ekstra  |    | 
|  Hive  |  Core  |  hadoop-httpfs  |  Ekstra  |  3.4.1-amzn-0-1.amzn2023  | 
|  Hive  |  Core  |  hadoop-yarn-proxyserver  |  Ekstra  |  3.4.1-amzn-0-1.amzn2023  | 
|  Hive  |  Core  |  hive-hbase  |  Ekstra  |  3.1.3-amzn-17-1.amzn2023  | 
|  Hive  |  Core  |  mariadb-connector-java  |  Ekstra  |  3.1.3-amzn-17-1  | 
|  Hive  |  Core  |  s3-dist-cp  |  Ekstra  |  2.38.0-1.amzn2023  | 
|  Phoenix  |  Core  |  s3-dist-cp  |  Ekstra  |  2.38.0-1.amzn2023  | 
|  Spark  |  Core  |  spark-datanucleus  |  Ekstra  |  3.5.3.amzn.1-1.amzn2023  | 
|  Tez  |  Core  |  hadoop-mapreduce  |  Ekstra  |  3.4.1-amzn-0-1.amzn2023  | 
|  Tez  |  Core  |  hadoop-mapreduce-historyserver  |  Ekstra  |  3.4.1-amzn-0-1.amzn2023  | 
|  Tez  |  Core  |  hadoop-yarn-proxyserver  |  Ekstra  |  3.4.1-amzn-0-1.amzn2023  | 
|  Trino  |  Core  |  utilitas besar  |  Ekstra  |  1.2.0-1.amzn2023  | 
|  Trino  |  Core  |  hadop-client  |  Ekstra  |  3.4.1.amzn.0-1.amzn2023  | 
|  Trino  |  Core  |  hadoop-hdfs  |  Ekstra  |  3.4.1.amzn.0-1.amzn2023  | 
|  Trino  |  Core  |  hadoop-hdfs-datanode  |  Ekstra  |  3.4.1.amzn.0-1.amzn2023  | 
|  Trino  |  Core  |  hadoop-hdfs-journalnode  |  Ekstra  |  3.4.1.amzn.0-1.amzn2023  | 
|  Trino  |  Core  |  hadoop-hdfs-namenode  |  Ekstra  |  3.4.1.amzn.0-1.amzn2023  | 
|  Trino  |  Core  |  hadoop-km  |  Ekstra  |  3.4.1.amzn.0-1.amzn2023  | 
|  Trino  |  Core  |  hadoop-mapreduce  |  Ekstra  |  3.4.1.amzn.0-1.amzn2023  | 
|  Trino  |  Core  |  hadoop-mapreduce-historyserver  |  Ekstra  |  3.4.1.amzn.0-1.amzn2023  | 
|  Trino  |  Core  |  hadoop-benang  |  Ekstra  |  3.4.1.amzn.0-1.amzn2023  | 
|  Trino  |  Core  |  hadoop-yarn-nodemanager  |  Ekstra  |  3.4.1.amzn.0-1.amzn2023  | 
|  Trino  |  Core  |  hadoop-yarn-proxyserver  |  Ekstra  |  3.4.1.amzn.0-1.amzn2023  | 
|  Trino  |  Core  |  hadoop-yarn-resourcemanager  |  Ekstra  |  3.4.1.amzn.0-1.amzn2023  | 
|  Trino  |  Core  |  hadoop-yarn-timelineserver  |  Ekstra  |  3.4.1.amzn.0-1.amzn2023  | 
|  Trino  |  Core  |  hive  |  Ekstra  |  3.1.3.amzn.17-1.amzn2023  | 
|  Trino  |  Core  |  hive-hcatalog-server  |  Ekstra  |  3.1.3.amzn.17-1.amzn2023  | 
|  Trino  |  Core  |  mariadb-connector-java  |  Ekstra  |  2.7.2-1  | 
|  Trino  |  Core  |  ranger-km  |  Ekstra  |  2.0.0-1.amzn2023  | 
|  Trino  |  Core  |  penjaga kebun binatang  |  Ekstra  |  3.9.3.amzn.0-1.amzn2023  | 
|  Trino  |  Core  |  zookeper-server  |  Ekstra  |  3.9.3.amzn.0-1.amzn2023  | 
|  Trino  |  Core  |  bigtop-groovy  |  Ekstra  |  2.5.4-1.amzn2023  | 
|  Trino  |  Core  |  bigtop-jsvc  |  Ekstra  |  1.2.4-1.amzn2023  | 
|  Trino  |  Core  |  hadoop  |  Ekstra  |  3.4.1.amzn.0-1.amzn2023  | 
|  Trino  |  Core  |  hadoop-lzo  |  Ekstra  |  0.4.19-1.amzn2023  | 
|  Trino  |  Core  |  hive-hcatalog  |  Ekstra  |  3.1.3.amzn.17-1.amzn2023  | 
|  Trino  |  Core  |  sarang-jdbc  |  Ekstra  |  3.1.3.amzn.17-1.amzn2023  | 
|  Zookeeper  |  Core  |  emrfs  |  Ekstra  |  3.9.3.amzn.0-1.amzn2023  | 
|  Zookeeper  |  Core  |  hadop-client  |  Ekstra  |  3.9.3.amzn.0-1.amzn2023  | 
|  Zookeeper  |  Core  |  hadoop-hdfs  |  Ekstra  |  3.9.3.amzn.0-1.amzn2023  | 
|  Zookeeper  |  Core  |  hadoop-hdfs-datanode  |  Ekstra  |  3.9.3.amzn.0-1.amzn2023  | 
|  Zookeeper  |  Core  |  hadoop-hdfs-journalnode  |  Ekstra  |  3.9.3.amzn.0-1.amzn2023  | 
|  Zookeeper  |  Core  |  hadoop-hdfs-namenode  |  Ekstra  |  3.9.3.amzn.0-1.amzn2023  | 
|  Zookeeper  |  Core  |  hadoop-httpfs  |  Ekstra  |  3.9.3.amzn.0-1.amzn2023  | 
|  Zookeeper  |  Core  |  hadoop-km  |  Ekstra  |  3.9.3.amzn.0-1.amzn2023  | 
|  Zookeeper  |  Core  |  hadoop-mapreduce  |  Ekstra  |  3.4.1.amzn.0-1.amzn2023  | 
|  Zookeeper  |  Core  |  hadoop-mapreduce-historyserver  |  Ekstra  |  3.4.1.amzn.0-1.amzn2023  | 
|  Zookeeper  |  Core  |  hadoop-benang  |  Ekstra  |  3.4.1.amzn.0-1.amzn2023  | 
|  Zookeeper  |  Core  |  hadoop-yarn-nodemanager  |  Ekstra  |  3.4.1.amzn.0-1.amzn2023  | 
|  Zookeeper  |  Core  |  hadoop-yarn-proxyserver  |  Ekstra  |  3.4.1.amzn.0-1.amzn2023  | 
|  Zookeeper  |  Core  |  hadoop-yarn-resourcemanager  |  Ekstra  |  3.4.1.amzn.0-1.amzn2023  | 
|  Zookeeper  |  Core  |  hadoop-yarn-timelineserver  |  Ekstra  |  3.4.1.amzn.0-1.amzn2023  | 
|  Zookeeper  |  Core  |  ranger-km  |  Ekstra  |  2.0.0-1.amzn2023  | 

# 7.8.0 kerentanan dan eksposur umum
<a name="780-common-vulnerabilities-exposures"></a>

Tabel berikut mencantumkan semua CVEs yang tidak memengaruhi kluster EMR yang berjalan pada konfigurasi yang direkomendasikan Amazon EMR 7.8.0. Amazon EMR bergantung pada sumber terbuka hulu untuk ketersediaan perbaikan dan akan memberikan versi stabil terbaru sebagai bagian dari komponen Core Engine dalam waktu 90 hari setelah Amazon EMR memverifikasi perbaikan.

Tabel ini diperbarui pada 6 Maret 2025.


| ID CVE | Kepelikan | URL detail CVE | 
| --- | --- | --- | 
|  CVE-2015-1832  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2015-1832)-2015-1832  | 
|  CVE-2016-5018  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2016-5018)-2016-5018  | 
|  CVE-2017-15095  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2017-15095)-2017-15095  | 
|  CVE-2017-17485  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2017-17485)-2017-17485  | 
|  CVE-2017-7525  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2017-7525)-2017-7525  | 
|  CVE-2018-11307  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-11307)-2018-11307  | 
|  CVE-2018-11307  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-11307)-2018-11307  | 
|  CVE-2018-14718  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-14718)-2018-14718  | 
|  CVE-2018-14718  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-14718)-2018-14718  | 
|  CVE-2018-14719  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE-2018-14719](https://nvd.nist.gov/vuln/detail/CVE-2018-14719)  | 
|  CVE-2018-14719  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE-2018-14719](https://nvd.nist.gov/vuln/detail/CVE-2018-14719)  | 
|  CVE-2018-14720  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-14720)-2018-14720  | 
|  CVE-2018-14720  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-14720)-2018-14720  | 
|  CVE-2018-14721  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-14721)-2018-14721  | 
|  CVE-2018-14721  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-14721)-2018-14721  | 
|  CVE-2018-19360  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-19360)-2018-19360  | 
|  CVE-2018-19360  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-19360)-2018-19360  | 
|  CVE-2018-19361  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-19361)-2018-19361  | 
|  CVE-2018-19361  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-19361)-2018-19361  | 
|  CVE-2018-19362  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-19362)-2018-19362  | 
|  CVE-2018-19362  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-19362)-2018-19362  | 
|  CVE-2018-7489  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-7489)-2018-7489  | 
|  CVE-2018-7489  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-7489)-2018-7489  | 
|  CVE-2019-10202  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-10202)-2019-10202  | 
|  CVE-2019-14379  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-14379)-2019-14379  | 
|  CVE-2019-14379  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-14379)-2019-14379  | 
|  CVE-2019-14540  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-14540)-2019-14540  | 
|  CVE-2019-14540  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-14540)-2019-14540  | 
|  CVE-2019-14892  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-14892)-2019-14892  | 
|  CVE-2019-14892  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-14892)-2019-14892  | 
|  CVE-2019-14893  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-14893)-2019-14893  | 
|  CVE-2019-14893  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-14893)-2019-14893  | 
|  CVE-2019-16335  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-16335)-2019-16335  | 
|  CVE-2019-16335  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-16335)-2019-16335  | 
|  CVE-2019-16942  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-16942)-2019-16942  | 
|  CVE-2019-16942  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-16942)-2019-16942  | 
|  CVE-2019-16943  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-16943)-2019-16943  | 
|  CVE-2019-16943  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-16943)-2019-16943  | 
|  CVE-2019-17267  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-17267)-2019-17267  | 
|  CVE-2019-17267  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-17267)-2019-17267  | 
|  CVE-2019-17531  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-17531)-2019-17531  | 
|  CVE-2019-17531  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-17531)-2019-17531  | 
|  CVE-2019-20330  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-20330)-2019-20330  | 
|  CVE-2019-20330  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-20330)-2019-20330  | 
|  CVE-2020-8840  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-8840)-2020-8840  | 
|  CVE-2020-8840  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-8840)-2020-8840  | 
|  CVE-2020-9546  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-9546)-2020-9546  | 
|  CVE-2020-9546  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-9546)-2020-9546  | 
|  CVE-2020-9547  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-9547)-2020-9547  | 
|  CVE-2020-9547  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-9547)-2020-9547  | 
|  CVE-2020-9548  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-9548)-2020-9548  | 
|  CVE-2020-9548  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-9548)-2020-9548  | 
|  CVE-2022-1471  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-1471)-2022-1471  | 
|  CVE-2022-1471  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-1471)-2022-1471  | 
|  CVE-2022-37865  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-37865)-2022-37865  | 
|  CVE-2022-39135  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-39135)-2022-39135  | 
|  CVE-2022-42889  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-42889)-2022-42889  | 
|  CVE-2022-46337  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-46337)-2022-46337  | 
|  CVE-2022-46337  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-46337)-2022-46337  | 
|  CVE-2024-47561  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-47561)-2024-47561  | 
|  CVE-2024-47561  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-47561)-2024-47561  | 
|  CVE-2024-47561  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-47561)-2024-47561  | 
|  CVE-2024-47561  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-47561)-2024-47561  | 
|  CVE-2024-47561  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-47561)-2024-47561  | 
|  CVE-2024-52046  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-52046)-2024-52046  | 
|  CVE-2024-52046  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-52046)-2024-52046  | 
|  CVE-2024-53990  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-53990)-2024-53990  | 
|  CVE-2024-53990  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-53990)-2024-53990  | 
|  CVE-2015-5237  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2015-5237)-2015-5237  | 
|  CVE-2015-5237  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2015-5237)-2015-5237  | 
|  CVE-2016-6796  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2016-6796)-2016-6796  | 
|  CVE-2018-1000180  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-1000180)-2018-1000180  | 
|  CVE-2018-12022  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-12022)-2018-12022  | 
|  CVE-2018-12022  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-12022)-2018-12022  | 
|  CVE-2018-12023  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-12023)-2018-12023  | 
|  CVE-2018-12023  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-12023)-2018-12023  | 
|  CVE-2018-5968  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-5968)-2018-5968  | 
|  CVE-2019-0205  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-0205)-2019-0205  | 
|  CVE-2019-0205  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-0205)-2019-0205  | 
|  CVE-2019-10172  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-10172)-2019-10172  | 
|  CVE-2019-12086  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-12086)-2019-12086  | 
|  CVE-2019-12086  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-12086)-2019-12086  | 
|  CVE-2019-14439  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-14439)-2019-14439  | 
|  CVE-2019-14439  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-14439)-2019-14439  | 
|  CVE-2020-10650  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-10650)-2020-10650  | 
|  CVE-2020-10650  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-10650)-2020-10650  | 
|  CVE-2020-10672  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-10672)-2020-10672  | 
|  CVE-2020-10672  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-10672)-2020-10672  | 
|  CVE-2020-10673  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-10673)-2020-10673  | 
|  CVE-2020-10673  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-10673)-2020-10673  | 
|  CVE-2020-10968  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-10968)-2020-10968  | 
|  CVE-2020-10968  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-10968)-2020-10968  | 
|  CVE-2020-10969  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-10969)-2020-10969  | 
|  CVE-2020-10969  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-10969)-2020-10969  | 
|  CVE-2020-11111  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-11111)-2020-11111  | 
|  CVE-2020-11111  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-11111)-2020-11111  | 
|  CVE-2020-11112  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-11112)-2020-11112  | 
|  CVE-2020-11112  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-11112)-2020-11112  | 
|  CVE-2020-11113  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-11113)-2020-11113  | 
|  CVE-2020-11113  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-11113)-2020-11113  | 
|  CVE-2020-11619  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-11619](https://nvd.nist.gov/vuln/detail/CVE-2020-11619)  | 
|  CVE-2020-11619  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-11619](https://nvd.nist.gov/vuln/detail/CVE-2020-11619)  | 
|  CVE-2020-11620  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-11620)-2020-11620  | 
|  CVE-2020-11620  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-11620)-2020-11620  | 
|  CVE-2020-13936  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-13936)-2020-13936  | 
|  CVE-2020-13949  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-13949)-2020-13949  | 
|  CVE-2020-13949  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-13949)-2020-13949  | 
|  CVE-2020-13949  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-13949)-2020-13949  | 
|  CVE-2020-14060  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-14060)-2020-14060  | 
|  CVE-2020-14060  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-14060)-2020-14060  | 
|  CVE-2020-14061  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-14061)-2020-14061  | 
|  CVE-2020-14061  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-14061)-2020-14061  | 
|  CVE-2020-14062  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-14062)-2020-14062  | 
|  CVE-2020-14062  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-14062)-2020-14062  | 
|  CVE-2020-14195  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-14195)-2020-14195  | 
|  CVE-2020-14195  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-14195)-2020-14195  | 
|  CVE-2020-24616  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-24616)-2020-24616  | 
|  CVE-2020-24616  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-24616)-2020-24616  | 
|  CVE-2020-24750  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-24750)-2020-24750  | 
|  CVE-2020-24750  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-24750)-2020-24750  | 
|  CVE-2020-25649  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-25649)-2020-25649  | 
|  CVE-2020-28052  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-28052)-2020-28052  | 
|  CVE-2020-35490  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-35490)-2020-35490  | 
|  CVE-2020-35490  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-35490)-2020-35490  | 
|  CVE-2020-35491  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-35491)-2020-35491  | 
|  CVE-2020-35491  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-35491)-2020-35491  | 
|  CVE-2020-35728  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-35728)-2020-35728  | 
|  CVE-2020-35728  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-35728)-2020-35728  | 
|  CVE-2020-36179  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36179)-2020-36179  | 
|  CVE-2020-36179  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36179)-2020-36179  | 
|  CVE-2020-36180  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36180)-2020-36180  | 
|  CVE-2020-36180  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36180)-2020-36180  | 
|  CVE-2020-36181  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36181)-2020-36181  | 
|  CVE-2020-36181  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36181)-2020-36181  | 
|  CVE-2020-36182  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36182)-2020-36182  | 
|  CVE-2020-36182  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36182)-2020-36182  | 
|  CVE-2020-36183  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36183)-2020-36183  | 
|  CVE-2020-36183  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36183)-2020-36183  | 
|  CVE-2020-36184  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36184)-2020-36184  | 
|  CVE-2020-36184  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36184)-2020-36184  | 
|  CVE-2020-36185  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36185)-2020-36185  | 
|  CVE-2020-36185  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36185)-2020-36185  | 
|  CVE-2020-36186  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36186)-2020-36186  | 
|  CVE-2020-36186  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36186)-2020-36186  | 
|  CVE-2020-36187  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36187)-2020-36187  | 
|  CVE-2020-36187  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36187)-2020-36187  | 
|  CVE-2020-36188  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36188)-2020-36188  | 
|  CVE-2020-36188  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36188)-2020-36188  | 
|  CVE-2020-36189  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36189)-2020-36189  | 
|  CVE-2020-36189  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36189)-2020-36189  | 
|  CVE-2020-36518  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36518)-2020-36518  | 
|  CVE-2020-36518  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36518)-2020-36518  | 
|  CVE-2021-20190  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2021-20190)-2021-20190  | 
|  CVE-2021-20190  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2021-20190)-2021-20190  | 
|  CVE-2021-31684  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2021-31684)-2021-31684  | 
|  CVE-2021-34538  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2021-34538)-2021-34538  | 
|  CVE-2021-34538  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2021-34538)-2021-34538  | 
|  CVE-2021-34538  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2021-34538)-2021-34538  | 
|  CVE-2022-25647  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-25647)-2022-25647  | 
|  CVE-2022-25647  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-25647)-2022-25647  | 
|  CVE-2022-25647  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-25647)-2022-25647  | 
|  CVE-2022-25857  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-25857)-2022-25857  | 
|  CVE-2022-3171  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-3171)-2022-3171  | 
|  CVE-2022-3171  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-3171)-2022-3171  | 
|  CVE-2022-3509  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-3509)-2022-3509  | 
|  CVE-2022-3509  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-3509)-2022-3509  | 
|  CVE-2022-3510  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-3510)-2022-3510  | 
|  CVE-2022-3510  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-3510)-2022-3510  | 
|  CVE-2022-36364  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-36364)-2022-36364  | 
|  CVE-2022-37866  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-37866)-2022-37866  | 
|  CVE-2022-40149  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-40149)-2022-40149  | 
|  CVE-2022-40149  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-40149)-2022-40149  | 
|  CVE-2022-40150  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-40150)-2022-40150  | 
|  CVE-2022-40150  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-40150)-2022-40150  | 
|  CVE-2022-42003  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-42003)-2022-42003  | 
|  CVE-2022-42003  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-42003)-2022-42003  | 
|  CVE-2022-42003  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-42003)-2022-42003  | 
|  CVE-2022-42003  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-42003)-2022-42003  | 
|  CVE-2022-42003  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-42003)-2022-42003  | 
|  CVE-2022-42004  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-42004)-2022-42004  | 
|  CVE-2022-42004  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-42004)-2022-42004  | 
|  CVE-2022-42004  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-42004)-2022-42004  | 
|  CVE-2022-42004  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-42004)-2022-42004  | 
|  CVE-2022-45685  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-45685)-2022-45685  | 
|  CVE-2022-45685  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-45685)-2022-45685  | 
|  CVE-2022-45693  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-45693)-2022-45693  | 
|  CVE-2022-45693  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-45693)-2022-45693  | 
|  CVE-2022-46751  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-46751)-2022-46751  | 
|  CVE-2022-46751  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-46751)-2022-46751  | 
|  CVE-2023-1370  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-1370)-2023-1370  | 
|  CVE-2023-1370  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-1370)-2023-1370  | 
|  CVE-2023-1436  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-1436)-2023-1436  | 
|  CVE-2023-1436  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-1436)-2023-1436  | 
|  CVE-2023-20883  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-20883)-2023-20883  | 
|  CVE-2023-25194  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-25194)-2023-25194  | 
|  CVE-2023-2976  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-2976)-2023-2976  | 
|  CVE-2023-2976  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-2976)-2023-2976  | 
|  CVE-2023-2976  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-2976)-2023-2976  | 
|  CVE-2023-2976  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-2976)-2023-2976  | 
|  CVE-2023-2976  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-2976)-2023-2976  | 
|  CVE-2023-2976  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-2976)-2023-2976  | 
|  CVE-2023-2976  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-2976)-2023-2976  | 
|  CVE-2023-2976  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-2976)-2023-2976  | 
|  CVE-2023-2976  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-2976)-2023-2976  | 
|  CVE-2023-2976  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-2976)-2023-2976  | 
|  CVE-2023-34453  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-34453)-2023-34453  | 
|  CVE-2023-34454  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-34454)-2023-34454  | 
|  CVE-2023-34455  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-34455)-2023-34455  | 
|  CVE-2023-3635  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-3635)-2023-3635  | 
|  CVE-2023-3635  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-3635)-2023-3635  | 
|  CVE-2023-39410  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-39410)-2023-39410  | 
|  CVE-2023-39410  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-39410)-2023-39410  | 
|  CVE-2023-39410  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-39410)-2023-39410  | 
|  CVE-2023-39410  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-39410)-2023-39410  | 
|  CVE-2023-43642  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-43642)-2023-43642  | 
|  CVE-2023-5072  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-5072)-2023-5072  | 
|  CVE-2023-6378  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-6378)-2023-6378  | 
|  CVE-2023-6378  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-6378)-2023-6378  | 
|  CVE-2023-6481  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-6481)-2023-6481  | 
|  CVE-2023-6481  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-6481)-2023-6481  | 
|  CVE-2024-7254  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-7254)-2024-7254  | 
|  CVE-2024-7254  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-7254)-2024-7254  | 
|  CVE-2024-7254  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-7254)-2024-7254  | 
|  CVE-2024-7254  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-7254)-2024-7254  | 
|  CVE-2024-7254  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-7254)-2024-7254  | 
|  CVE-2024-7254  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-7254)-2024-7254  | 
|  CVE-2024-7254  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-7254)-2024-7254  | 
|  CVE-2012-5783  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2012-5783)-2012-5783  | 
|  CVE-2012-6153  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2012-6153)-2012-6153  | 
|  CVE-2018-10237  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-10237)-2018-10237  | 
|  CVE-2018-10237  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-10237)-2018-10237  | 
|  CVE-2018-10237  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-10237)-2018-10237  | 
|  CVE-2018-10237  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-10237)-2018-10237  | 
|  CVE-2018-10237  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-10237)-2018-10237  | 
|  CVE-2018-10237  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-10237)-2018-10237  | 
|  CVE-2018-11798  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-11798)-2018-11798  | 
|  CVE-2018-1313  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-1313)-2018-1313  | 
|  CVE-2019-10219  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE-2019-10219](https://nvd.nist.gov/vuln/detail/CVE-2019-10219)  | 
|  CVE-2019-12384  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-12384)-2019-12384  | 
|  CVE-2019-12384  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-12384)-2019-12384  | 
|  CVE-2019-12814  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-12814)-2019-12814  | 
|  CVE-2019-12814  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-12814)-2019-12814  | 
|  CVE-2020-10693  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-10693)-2020-10693  | 
|  CVE-2020-13955  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-13955)-2020-13955  | 
|  CVE-2020-13956  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-13956)-2020-13956  | 
|  CVE-2020-15250  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-15250)-2020-15250  | 
|  CVE-2020-15250  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-15250)-2020-15250  | 
|  CVE-2020-15522  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-15522)-2020-15522  | 
|  CVE-2020-15522  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-15522)-2020-15522  | 
|  CVE-2020-17521  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-17521)-2020-17521  | 
|  CVE-2020-17521  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-17521)-2020-17521  | 
|  CVE-2020-1945  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-1945](https://nvd.nist.gov/vuln/detail/CVE-2020-1945)  | 
|  CVE-2020-26939  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-26939)-2020-26939  | 
|  CVE-2020-26939  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-26939)-2020-26939  | 
|  CVE-2020-29582  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-29582)-2020-29582  | 
|  CVE-2021-22569  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2021-22569)-2021-22569  | 
|  CVE-2021-22569  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2021-22569)-2021-22569  | 
|  CVE-2021-22570  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2021-22570)-2021-22570  | 
|  CVE-2021-22570  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2021-22570)-2021-22570  | 
|  CVE-2021-27568  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2021-27568)-2021-27568  | 
|  CVE-2021-28170  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2021-28170)-2021-28170  | 
|  CVE-2021-28170  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2021-28170)-2021-28170  | 
|  CVE-2021-28170  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2021-28170)-2021-28170  | 
|  CVE-2021-28170  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2021-28170)-2021-28170  | 
|  CVE-2021-29425  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2021-29425)-2021-29425  | 
|  CVE-2021-36373  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2021-36373)-2021-36373  | 
|  CVE-2021-36374  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2021-36374)-2021-36374  | 
|  CVE-2021-38153  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2021-38153)-2021-38153  | 
|  CVE-2022-24329  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE-2022-24329](https://nvd.nist.gov/vuln/detail/CVE-2022-24329)  | 
|  CVE-2022-38749  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-38749)-2022-38749  | 
|  CVE-2022-38750  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-38750)-2022-38750  | 
|  CVE-2022-38751  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-38751)-2022-38751  | 
|  CVE-2022-38752  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-38752)-2022-38752  | 
|  CVE-2022-41854  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-41854)-2022-41854  | 
|  CVE-2023-0833  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-0833)-2023-0833  | 
|  CVE-2023-20863  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-20863)-2023-20863  | 
|  CVE-2023-33201  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-33201)-2023-33201  | 
|  CVE-2023-33201  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-33201)-2023-33201  | 
|  CVE-2023-33201  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-33201)-2023-33201  | 
|  CVE-2023-33201  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-33201)-2023-33201  | 
|  CVE-2023-33201  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-33201)-2023-33201  | 
|  CVE-2023-33202  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-33202)-2023-33202  | 
|  CVE-2023-33202  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-33202)-2023-33202  | 
|  CVE-2023-33202  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-33202)-2023-33202  | 
|  CVE-2023-33202  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-33202)-2023-33202  | 
|  CVE-2023-33202  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-33202)-2023-33202  | 
|  CVE-2023-42503  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-42503)-2023-42503  | 
|  CVE-2023-51074  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-51074)-2023-51074  | 
|  CVE-2023-51074  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-51074)-2023-51074  | 
|  CVE-2024-12798  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-12798)-2024-12798  | 
|  CVE-2024-12798  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-12798)-2024-12798  | 
|  CVE-2024-12798  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-12798)-2024-12798  | 
|  CVE-2024-12798  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-12798)-2024-12798  | 
|  CVE-2024-12798  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-12798)-2024-12798  | 
|  CVE-2024-12798  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-12798)-2024-12798  | 
|  CVE-2024-25710  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-25710)-2024-25710  | 
|  CVE-2024-25710  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-25710)-2024-25710  | 
|  CVE-2024-25710  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-25710)-2024-25710  | 
|  CVE-2024-26308  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-26308)-2024-26308  | 
|  CVE-2024-26308  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-26308)-2024-26308  | 
|  CVE-2024-26308  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-26308)-2024-26308  | 
|  CVE-2024-38820  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-38820)-2024-38820  | 
|  CVE-2024-38820  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-38820)-2024-38820  | 
|  CVE-2024-6763  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-6763)-2024-6763  | 
|  CVE-2024-6763  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-6763)-2024-6763  | 
|  CVE-2024-6763  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-6763)-2024-6763  | 
|  CVE-2024-6763  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-6763)-2024-6763  | 
|  CVE-2024-6763  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-6763)-2024-6763  | 
|  CVE-2024-8184  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-8184)-2024-8184  | 
|  CVE-2020-8908  |  RENDAH  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-8908)-2020-8908  | 
|  CVE-2020-8908  |  RENDAH  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-8908)-2020-8908  | 
|  CVE-2020-8908  |  RENDAH  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-8908)-2020-8908  | 
|  CVE-2020-8908  |  RENDAH  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-8908)-2020-8908  | 
|  CVE-2020-8908  |  RENDAH  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-8908)-2020-8908  | 
|  CVE-2020-8908  |  RENDAH  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-8908)-2020-8908  | 
|  CVE-2020-8908  |  RENDAH  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-8908)-2020-8908  | 
|  CVE-2020-8908  |  RENDAH  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-8908)-2020-8908  | 
|  CVE-2020-8908  |  RENDAH  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-8908)-2020-8908  | 
|  CVE-2020-8908  |  RENDAH  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-8908)-2020-8908  | 
|  CVE-2024-12801  |  RENDAH  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-12801)-2024-12801  | 
|  CVE-2024-12801  |  RENDAH  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-12801)-2024-12801  | 
|  CVE-2024-12801  |  RENDAH  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-12801)-2024-12801  | 
|  CVE-2024-12801  |  RENDAH  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-12801)-2024-12801  | 
|  GHSA-CHFM-68VV-PVW5  |  RENDAH  |  [https://nvd.nist. gov/vuln/detail/GHSA-chfm-68vv-pvw5](https://nvd.nist.gov/vuln/detail/GHSA-chfm-68vv-pvw5)  | 
|  CVE-2024-23454  |  TIDAK DIUJICOBAKAN  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-23454)-2024-23454  | 
|  CVE-2024-23944  |  TIDAK DIUJICOBAKAN  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-23944)-2024-23944  | 
|  CVE-2024-23945  |  TIDAK DIUJICOBAKAN  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-23945)-2024-23945  | 
|  CVE-2024-23945  |  TIDAK DIUJICOBAKAN  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-23945)-2024-23945  | 
|  CVE-2024-23953  |  TIDAK DIUJICOBAKAN  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-23953)-2024-23953  | 
|  CVE-2024-23953  |  TIDAK DIUJICOBAKAN  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-23953)-2024-23953  | 
|  CVE-2024-27137  |  TIDAK DIUJICOBAKAN  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-27137)-2024-27137  | 
|  CVE-2024-29025  |  TIDAK DIUJICOBAKAN  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-29025)-2024-29025  | 
|  CVE-2024-29131  |  TIDAK DIUJICOBAKAN  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-29131)-2024-29131  | 
|  CVE-2024-29133  |  TIDAK DIUJICOBAKAN  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-29133)-2024-29133  | 
|  CVE-2024-29857  |  TIDAK DIUJICOBAKAN  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-29857)-2024-29857  | 
|  CVE-2024-29857  |  TIDAK DIUJICOBAKAN  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-29857)-2024-29857  | 
|  CVE-2024-29857  |  TIDAK DIUJICOBAKAN  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-29857)-2024-29857  | 
|  CVE-2024-29857  |  TIDAK DIUJICOBAKAN  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-29857)-2024-29857  | 
|  CVE-2024-29869  |  TIDAK DIUJICOBAKAN  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-29869)-2024-29869  | 
|  CVE-2024-29869  |  TIDAK DIUJICOBAKAN  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-29869)-2024-29869  | 
|  CVE-2024-30171  |  TIDAK DIUJICOBAKAN  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-30171)-2024-30171  | 
|  CVE-2024-30171  |  TIDAK DIUJICOBAKAN  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-30171)-2024-30171  | 
|  CVE-2024-30171  |  TIDAK DIUJICOBAKAN  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-30171)-2024-30171  | 
|  CVE-2024-30171  |  TIDAK DIUJICOBAKAN  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-30171)-2024-30171  | 
|  CVE-2024-30172  |  TIDAK DIUJICOBAKAN  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-30172)-2024-30172  | 
|  CVE-2024-30172  |  TIDAK DIUJICOBAKAN  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-30172)-2024-30172  | 
|  CVE-2024-31141  |  TIDAK DIUJICOBAKAN  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-31141)-2024-31141  | 
|  CVE-2024-31141  |  TIDAK DIUJICOBAKAN  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-31141)-2024-31141  | 
|  CVE-2024-34447  |  TIDAK DIUJICOBAKAN  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-34447)-2024-34447  | 
|  CVE-2024-34447  |  TIDAK DIUJICOBAKAN  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-34447)-2024-34447  | 
|  CVE-2024-36114  |  TIDAK DIUJICOBAKAN  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-36114)-2024-36114  | 
|  CVE-2024-36114  |  TIDAK DIUJICOBAKAN  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-36114)-2024-36114  | 
|  CVE-2024-36114  |  TIDAK DIUJICOBAKAN  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-36114)-2024-36114  | 
|  CVE-2024-36114  |  TIDAK DIUJICOBAKAN  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-36114)-2024-36114  | 
|  CVE-2024-38808  |  TIDAK DIUJICOBAKAN  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-38808)-2024-38808  | 
|  CVE-2024-47535  |  TIDAK DIUJICOBAKAN  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-47535)-2024-47535  | 
|  CVE-2024-47535  |  TIDAK DIUJICOBAKAN  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-47535)-2024-47535  | 
|  CVE-2024-47535  |  TIDAK DIUJICOBAKAN  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-47535)-2024-47535  | 
|  CVE-2024-47554  |  TIDAK DIUJICOBAKAN  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-47554)-2024-47554  | 
|  CVE-2024-47554  |  TIDAK DIUJICOBAKAN  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-47554)-2024-47554  | 
|  CVE-2024-47554  |  TIDAK DIUJICOBAKAN  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-47554)-2024-47554  | 
|  CVE-2024-47554  |  TIDAK DIUJICOBAKAN  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-47554)-2024-47554  | 
|  CVE-2024-51504  |  TIDAK DIUJICOBAKAN  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-51504)-2024-51504  | 
|  CVE-2024-51504  |  TIDAK DIUJICOBAKAN  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-51504)-2024-51504  | 
|  CVE-2024-56128  |  TIDAK DIUJICOBAKAN  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-56128)-2024-56128  | 
|  CVE-2024-56128  |  TIDAK DIUJICOBAKAN  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-56128)-2024-56128  | 
|  CVE-2024-57699  |  TIDAK DIUJICOBAKAN  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-57699)-2024-57699  | 
|  CVE-2024-9823  |  TIDAK DIUJICOBAKAN  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-9823)-2024-9823  | 
|  CVE-2025-23015  |  TIDAK DIUJICOBAKAN  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2025-23015)-2025-23015  | 
|  CVE-2025-24860  |  TIDAK DIUJICOBAKAN  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2025-24860)-2025-24860  | 
|  CVE-2025-24970  |  TIDAK DIUJICOBAKAN  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2025-24970)-2025-24970  | 
|  CVE-2025-24970  |  TIDAK DIUJICOBAKAN  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2025-24970)-2025-24970  | 
|  CVE-2025-24970  |  TIDAK DIUJICOBAKAN  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2025-24970)-2025-24970  | 
|  CVE-2025-24970  |  TIDAK DIUJICOBAKAN  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2025-24970)-2025-24970  | 
|  CVE-2025-25193  |  TIDAK DIUJICOBAKAN  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2025-25193)-2025-25193  | 
|  CVE-2025-25193  |  TIDAK DIUJICOBAKAN  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2025-25193)-2025-25193  | 
|  CVE-2025-25193  |  TIDAK DIUJICOBAKAN  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2025-25193)-2025-25193  | 
|  CVE-2025-25193  |  TIDAK DIUJICOBAKAN  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2025-25193)-2025-25193  | 
|  CVE-2025-25193  |  TIDAK DIUJICOBAKAN  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2025-25193)-2025-25193  | 

## Catatan rilis 7.8.0
<a name="emr-780-relnotes"></a>

Catatan rilis berikut mencakup informasi untuk Amazon EMR rilis 7.8.0.

**Fitur baru**
+ **Upgrade aplikasi** —Amazon EMR 7.8.0 application upgrades include AWS SDK for Java 2.29.52/1.12.780, Delta 3.3.0-amzn-0, Hadoop 3.4.1, Hudi 0.15.0-amzn-5, Iceberg 1.7.1-amzn-1, Spark 3.5.4, and Zookeeper 3.9.3.

**Masalah yang diketahui**
+ **Enkripsi KMS menggunakan SecretAgent komponen EMR-EC2** — Ada kesalahan yang terjadi ketika enkripsi KMS saat istirahat diaktifkan untuk cluster yang mendukung Lake Formation di EMR versi 7.8 dan 7.9. Pekerjaan yang mendukung Lake Formation akan gagal dengan a. *NoSuchMethodError* Ada dua solusi yang tersedia:
  + Nonaktifkan sementara enkripsi KMS saat istirahat untuk cluster yang terpengaruh.
  + Hubungi AWS Support untuk meminta artefak Bootstrap Action jika enkripsi KMS harus dipertahankan.
**catatan**  
**Perbaiki pembaruan** - Pada Agustus 2025 pembaruan untuk mengatasi masalah di atas telah diterapkan ke semua wilayah. Tidak perlu menonaktifkan enkripsi KMS saat istirahat.
+  **HBase pembuatan tabel di katalog Hive with Glue** - Dari EMR-7.3.0 hingga EMR-7.10.0, ada bug karena integrasi Hive Iceberg, yang menyebabkan HBase pembuatan tabel di Hive gagal saat Glue Data Catalog digunakan sebagai metastore. Silakan hubungi tim AWS dukungan jika Anda mengalami masalah ini.
+  **Tez UI** - Dari EMR-7.3 ke EMR-7.10, ada bug di mana mengakses UI Tez melalui UI Web Manajer Sumber Daya YARN gagal saat enkripsi dalam transit diaktifkan. Ini terjadi karena proxy YARN mencoba menggunakan protokol HTTP sementara Tez UI memerlukan HTTPS. Harap ubah `tez.tez-ui.history-url.base` konfigurasi `tez-site` dari `http` ke `https` untuk menyelesaikan masalah ini.

**Perubahan, penyempurnaan, dan masalah yang diselesaikan**
+  *Dimulai dengan Spark 3.3.1 (didukung dalam EMR versi 6.10 dan yang lebih baru), semua pelaksana dalam host dekomisioning diatur ke yang baru, yang disebut status DECOMMISSIONING. `ExecutorState`* Pelaksana yang dinonaktifkan tidak dapat digunakan oleh Yarn untuk mengalokasikan tugas dan dengan demikian akan meminta pelaksana baru, jika diperlukan, untuk tugas yang sedang dijalankan. Jadi, jika Anda menonaktifkan Spark DRA saat menggunakan EMR Managed Scaling, EMR Auto Scaling, atau mekanisme penskalaan khusus apa pun pada cluster EMR-EC2, maka Yarn dapat meminta pelaksana maksimum yang diizinkan untuk setiap pekerjaan. Untuk menghindari masalah ini, biarkan `spark.dynamicAllocation.enabled` properti disetel ke `TRUE` (yang merupakan default) saat Anda menggunakan kombinasi fitur di atas. Selain itu, Anda juga dapat mengatur batasan pelaksana minimum dan maksimum dengan menetapkan nilai untuk `spark.dynamicAllocation.maxExecutors` dan `spark.dynamicAllocation.minExecutors` properti untuk pekerjaan Spark Anda, untuk membatasi jumlah pelaksana yang dialokasikan selama eksekusi pekerjaan. 
+     
[\[See the AWS documentation website for more details\]](http://docs.aws.amazon.com/id_id/emr/latest/ReleaseGuide/emr-780-release.html)

## 7.8.0 versi Java default
<a name="emr-780-jdk"></a>

Amazon EMR merilis 7.8 dan lebih tinggi dikirimkan dengan Amazon Corretto 17 (dibangun di atas OpenJDK) secara default untuk aplikasi yang mendukung Corretto 17 (JDK 17), dengan pengecualian Apache Livy.

Tabel berikut menunjukkan versi Java default untuk aplikasi di Amazon EMR 7.8.0. Jika Anda ingin mengubah JVM default pada cluster Anda, ikuti instruksi [Konfigurasikan aplikasi untuk menggunakan Java Virtual Machine tertentu](configuring-java8.md) untuk setiap aplikasi yang berjalan di cluster. Anda hanya dapat menggunakan satu versi runtime Java untuk sebuah cluster. Amazon EMR tidak mendukung menjalankan node atau aplikasi yang berbeda pada versi runtime yang berbeda pada cluster yang sama.


| Aplikasi | Versi Java/Amazon Corretto (defaultnya tebal) | 
| --- | --- | 
| kuala | 17, 11, 8 | 
| Flink | 17, 11, 8 | 
| HBase | 17, 11, 8 | 
| HCatalog | 17, 11, 8 | 
| Hadoop | 17, 11, 8 | 
| Hive | 17, 11, 8 | 
| Hudi | 17, 11, 8 | 
| Gunung es | 17, 11 | 
| Livy | 17, 11, 8 | 
| Oozie | 17, 11, 8 | 
| Phoenix | 17, 11, 8 | 
| PrestoDB | 8 | 
| Spark | 17, 11, 8 | 
| Spark RAPIDS | 17, 11, 8 | 
| Tez | 17, 11, 8 | 
| Trino | 21, 17 | 
| Zeppelin | 17, 11, 8 | 
| Pig | 17, 11, 8 | 
| Zookeeper | 17, 11, 8 | 

## 7.8.0 versi komponen
<a name="emr-780-components"></a>

Komponen yang diinstal oleh Amazon EMR dengan rilis ini tercantum di bawah ini. Beberapa komponen diinstal sebagai bagian dari paket aplikasi big data. Sedangkan komponen lainnya bersifak unik untuk Amazon EMR dan diinstal untuk proses sistem dan fitur. Ini biasanya dimulai dengan `emr` atau `aws`. Paket aplikasi big data dalam rilis Amazon EMR terbaru biasanya versi terbaru yang ditemukan di komunitas. Kami menyediakan rilis komunitas di Amazon EMR secepat mungkin.

Beberapa komponen yang ada di Amazon EMR berbeda dari versi komunitas. Komponen ini mempunyai label versi dalam bentuk `CommunityVersion-amzn-EmrVersion`. `EmrVersion` dimulai dari 0. Misalnya, jika komponen komunitas open source bernama `myapp-component` dengan versi 2.2 telah dimodifikasi tiga kali untuk dimasukkan dalam rilis EMR Amazon yang berbeda, versi rilisnya terdaftar sebagai. `2.2-amzn-2`


| Komponen | Versi | Deskripsi | 
| --- | --- | --- | 
| adot-java-agent | 1.31.0 | Agen Java yang mengumpulkan metrik dari daemon aplikasi. | 
| delta | 3.3.0-amzn-0 | Danau Delta adalah format tabel terbuka untuk kumpulan data analitik yang sangat besar | 
| emr-amazon-cloudwatch-agent | 1.300032.2-amzn-0 | Aplikasi yang mengumpulkan metrik tingkat sistem internal dan metrik aplikasi khusus dari instans Amazon EC2. | 
| emr-ddb | 5.6.0 | Konektor Amazon DynamoDB untuk aplikasi ekosistem Hadoop. | 
| emr-goodies | 3.17.0 | Perpustakaan kenyamanan ekstra untuk ekosistem Hadoop. | 
| emr-kinesis | 3.21.0 | Konektor Amazon Kinesis untuk aplikasi ekosistem Hadoop. | 
| emr-notebook-env | 1.18.0 | Conda env untuk emr notebook yang mencakup gateway jupyter korporasi | 
| emr-s3-dist-cp | 2.38.0 | Aplikasi salinan terdistribusi yang dioptimalkan untuk Amazon S3. | 
| emr-s3-select | 2.17.0 | EMR S3Select Connector | 
| emr-wal-cli | 1.3.3 | Cli digunakan untuk daftar emrwal/penghapusan. | 
| emrfs | 2.69.0 | Konektor Amazon S3 untuk aplikasi ekosistem Hadoop. | 
| flink-client | 1.20.0-amzn-2 | Skrip dan aplikasi klien baris perintah Apache Flink. | 
| flink-jobmanager-config | 1.20.0-amzn-2 | Mengelola sumber daya pada node EMR untuk Apache Flink. JobManager | 
| hadoop-client | 3.4.1-amzn-0 | Klien baris perintah Hadoop seperti 'hdfs', 'Hadoop', atau 'yarn'. | 
| hadoop-hdfs-datanode | 3.4.1-amzn-0 | Layanan tingkat simpul HDFS untuk menyimpan blok. | 
| hadoop-hdfs-library | 3.4.1-amzn-0 | Klien dan perpustakaan baris perintah HDFS | 
| hadoop-hdfs-namenode | 3.4.1-amzn-0 | Layanan HDFS untuk melacak nama file dan lokasi blok. | 
| hadoop-hdfs-journalnode | 3.4.1-amzn-0 | Layanan HDFS untuk mengelola jurnal filesystem Hadoop pada klaster HA. | 
| hadoop-httpfs-server | 3.4.1-amzn-0 | Titik akhir HTTP untuk operasi HDFS. | 
| hadoop-kms-server | 3.4.1-amzn-0 | Server manajemen kunci kriptografi berdasarkan API Hadoop. KeyProvider  | 
| hadoop-mapred | 3.4.1-amzn-0 | MapReduce pustaka mesin eksekusi untuk menjalankan MapReduce aplikasi. | 
| hadoop-yarn-nodemanager | 3.4.1-amzn-0 | Layanan YARN untuk mengelola kontainer pada simpul individu. | 
| hadoop-yarn-resourcemanager | 3.4.1-amzn-0 | Layanan YARN untuk mengalokasikan dan mengelola sumber daya klaster dan aplikasi terdistribusi. | 
| hadoop-yarn-timeline-server | 3.4.1-amzn-0 | Layanan untuk mengambil informasi terkini dan historis untuk aplikasi YARN. | 
| hbase-hmaster | 2.6.1-amzn-2 | Layanan untuk HBase cluster yang bertanggung jawab untuk koordinasi Daerah dan pelaksanaan perintah administratif. | 
| hbase-region-server | 2.6.1-amzn-2 | Layanan untuk melayani satu atau lebih HBase wilayah. | 
| hbase-client | 2.6.1-amzn-2 | HBase klien baris perintah. | 
| hbase-rest-server | 2.6.1-amzn-2 | Layanan menyediakan titik akhir RESTful HTTP untuk HBase. | 
| hbase-thrift-server | 2.6.1-amzn-2 | Layanan menyediakan titik akhir Thrift ke. HBase | 
| hbase-operator-tools | 2.6.1-amzn-2 | Alat perbaikan untuk HBase cluster Apache. | 
| hcatalog-client | 3.1.3-amzn-17 | Klien baris perintah 'hcat' untuk memanipulasi hcatalog-server. | 
| hcatalog-server | 3.1.3-amzn-17 | Penyediaan layanan HCatalog, tabel dan lapisan manajemen penyimpanan untuk aplikasi terdistribusi. | 
| hcatalog-webhcat-server | 3.1.3-amzn-17 | Titik akhir HTTP menyediakan antarmuka REST ke HCatalog. | 
| hive-client | 3.1.3-amzn-17 | Klien baris perintah Hive. | 
| hive-hbase | 3.1.3-amzn-17 | Klien Hive-hbase. | 
| hive-metastore-server | 3.1.3-amzn-17 | Layanan untuk mengakses metastore Hive, repositori semantik yang menyimpan metadata untuk SQL pada operasi Hadoop. | 
| hive-server2 | 3.1.3-amzn-17 | Layanan untuk menerima kueri Hive sebagai permintaan web. | 
| hudi | 0.15.0-amzn-5 | Kerangka pemrosesan tambahan untuk memberi daya pada pipa data pada latensi rendah dan efisiensi tinggi. | 
| hudi-presto | 0.15.0-amzn-5 | Perpustakaan paket untuk menjalankan Presto dengan Hudi. | 
| hudi-trino | 0.15.0-amzn-5 | Perpustakaan bundel untuk menjalankan Trino dengan Hudi. | 
| hudi-spark | 0.15.0-amzn-5 | Perpustakaan paket untuk menjalankan Spark dengan Hudi. | 
| hue-server | 4.11.0 | Aplikasi web untuk menganalisis data menggunakan aplikasi ekosistem Hadoop | 
| iceberg | 1.7.1-amzn-1 | Apache Iceberg adalah format tabel terbuka untuk kumpulan data analitik besar | 
| jupyterhub | 1.5.0 | Server multi-pengguna untuk notebook Jupyter | 
| livy-server | 0.8.0-inkubasi | Antarmuka REST untuk berinteraksi dengan Apache Spark | 
| nginx | 1.12.1 | nginx [engine x] adalah server HTTP dan server proksi balik | 
| mariadb-server | 5.5.68\$1 | Server basis data MariaDB. | 
| nvidia-cuda | 12.3.0 | Driver Nvidia dan kit alat Cuda | 
| oozie-client | 5.2.1 | Klien baris perintah Oozie. | 
| oozie-server | 5.2.1 | Layanan untuk menerima permintaan alur kerja Oozie. | 
| opencv | 4.7.0 | Perpustakaan Visi Komputer Sumber Terbuka. | 
| phoenix-library | 5.2.1 | Perpustakaan phoenix untuk server dan klien | 
| phoenix-connectors | 6.0.0 | Konektor Apache Phoenix untuk Spark-3 | 
| phoenix-query-server | 6.0.0 | Sebuah server ringan yang menyediakan akses JDBC serta Protocol Buffers dan akses format JSON ke API Avatica  | 
| presto-coordinator | 0,287-amzn-2 | Layanan untuk menerima kueri dan mengelola eksekusi kueri antara presto-worker. | 
| presto-worker | 0,287-amzn-2 | Layanan untuk mengeksekusi potongan kueri. | 
| presto-client | 0,287-amzn-2 | Klien baris perintah Presto yang diinstal pada master klaster HA yang siaga di mana server Presto server tidak dimulai. | 
| trino-coordinator | 467-amzn-1 | Layanan untuk menerima kueri dan mengelola eksekusi kueri di antara trino-workers. | 
| trino-worker | 467-amzn-1 | Layanan untuk mengeksekusi potongan kueri. | 
| trino-client | 467-amzn-1 | Klien baris perintah Trino yang diinstal pada master siaga cluster HA di mana server Trino tidak dimulai. | 
| pig-client | 0.17.0 | Klien baris perintah Pig. | 
| r | 4.3.2 | Proyek R untuk Komputasi Statistik | 
| ranger-kms-server | 2.0.0 | Sistem Pengelolaan Kunci Ranger Apache | 
| spark-client | 3.5.4-amzn-0 | Klien baris perintah Spark. | 
| spark-history-server | 3.5.4-amzn-0 | Web UI untuk melihat log acara untuk seluruh masa pakai aplikasi Spark. | 
| spark-on-yarn | 3.5.4-amzn-0 | Mesin eksekusi dalam memori untuk YARN. | 
| spark-yarn-slave | 3.5.4-amzn-0 | Perpustakaan Apache Spark yang dibutuhkan oleh slave YARN. | 
| spark-rapids | 24.12.0-amzn-0 | Plugin Nvidia Spark RAPIDS yang mempercepat Apache Spark dengan. GPUs | 
| tensorflow | 2.16.1 | TensorFlow pustaka perangkat lunak open source untuk perhitungan numerik kinerja tinggi. | 
| tez-on-yarn | 0.10.2-amzn-15 | Aplikasi dan perpustakaan tez YARN. | 
| tez-on-worker | 0.10.2-amzn-15 | Aplikasi dan pustaka YARN tez untuk node pekerja. | 
| zeppelin-server | 0.11.1 | Notebook berbasis web yang memungkinkan analisis data interaktif. | 
| zookeeper-server | 3.9.3-amzn-0 | Layanan terpusat untuk menjaga informasi konfigurasi, penamaan, yang menyediakan sinkronisasi terdistribusi, dan menyediakan layanan grup. | 
| zookeeper-client | 3.9.3-amzn-0 | ZooKeeper klien baris perintah. | 

## 7.8.0 klasifikasi konfigurasi
<a name="emr-780-class"></a>

Klasifikasi konfigurasi memungkinkan Anda menyesuaikan aplikasi. Ini sering kali bersesuaian dengan file XML konfigurasi untuk aplikasi, seperti `hive-site.xml`. Untuk informasi selengkapnya, lihat [Konfigurasikan aplikasi](emr-configure-apps.md).

Tindakan konfigurasi ulang terjadi ketika Anda menentukan konfigurasi untuk grup instans di klaster yang sedang berjalan. Amazon EMR hanya memulai tindakan konfigurasi ulang untuk klasifikasi yang Anda modifikasi. Untuk informasi selengkapnya, lihat [Lakukan konfigurasi ulang pada grup instans di klaster yang sedang berjalan](emr-configure-apps-running-cluster.md).


**klasifikasi emr-7.8.0**  

| Klasifikasi | Deskripsi | Tindakan Konfigurasi Ulang | 
| --- | --- | --- | 
| capacity-scheduler | Ubah nilai dalam file capacity-scheduler.xml Hadoop. | Restarts the ResourceManager service. | 
| container-executor | Ubah nilai dalam file container-executor.cfg Hadoop YARN ini. | Not available. | 
| container-log4j | Ubah nilai dalam file container-log4j.properties Hadoop YARN. | Not available. | 
| core-site | Ubah nilai dalam file core-site.xml Hadoop. | Restarts the Hadoop HDFS services Namenode, SecondaryNamenode, Datanode, ZKFC, and Journalnode. Restarts the Hadoop YARN services ResourceManager, NodeManager, ProxyServer, and TimelineServer. Additionally restarts Hadoop KMS, Ranger KMS, HiveServer2, Hive MetaStore, Hadoop Httpfs, and MapReduce-HistoryServer. | 
| docker-conf | Ubah pengaturan terkait docker. | Not available. | 
| emrfs-site | Ubah pengaturan EMRFS. | Restarts the Hadoop HDFS services Namenode, SecondaryNamenode, Datanode, ZKFC, and Journalnode. Restarts the Hadoop YARN services ResourceManager, NodeManager, ProxyServer, and TimelineServer. Additionally restarts HBaseRegionserver, HBaseMaster, HBaseThrift, HBaseRest, HiveServer2, Hive MetaStore, Hadoop Httpfs, and MapReduce-HistoryServer. | 
| flink-conf | Ubah pengaturan flink-conf.yaml. | Restarts Flink history server. | 
| flink-log4j | Ubah pengaturan log4j.properties Flink. | Restarts Flink history server. | 
| flink-log4j-session | Ubah pengaturan Flink log4j-session.properties untuk sesi. Kubernetes/Yarn  | Restarts Flink history server. | 
| flink-log4j-cli | Ubah pengaturan log4j-cli.properties Flink. | Restarts Flink history server. | 
| hadoop-env | Ubah nilai dalam lingkungan Hadoop untuk semua komponen Hadoop. | Restarts the Hadoop HDFS services Namenode, SecondaryNamenode, Datanode, ZKFC, and Journalnode. Restarts the Hadoop YARN services ResourceManager, NodeManager, ProxyServer, and TimelineServer. Additionally restarts PhoenixQueryserver, HiveServer2, Hive MetaStore, and MapReduce-HistoryServer. | 
| hadoop-log4j | Ubah nilai dalam file log4j.properties Hadoop ini. | Restarts the Hadoop HDFS services SecondaryNamenode, Datanode, and Journalnode. Restarts the Hadoop YARN services ResourceManager, NodeManager, ProxyServer, and TimelineServer. Additionally restarts Hadoop KMS, Hadoop Httpfs, and MapReduce-HistoryServer. | 
| hadoop-ssl-server | Ubah konfigurasi server ssl hadoop | Not available. | 
| hadoop-ssl-client | Ubah konfigurasi klien ssl hadoop | Not available. | 
| hbase | Pengaturan Amazon EMR-curated untuk Apache. HBase | Custom EMR specific property. Sets emrfs-site and hbase-site configs. See those for their associated restarts. | 
| hbase-env | Ubah nilai HBase di lingkungan. | Restarts the HBase services RegionServer, HBaseMaster, ThriftServer, RestServer. | 
| hbase-log4j | Ubah nilai dalam file HBase hbase-log4j.properties. | Restarts the HBase services RegionServer, HBaseMaster, ThriftServer, RestServer. | 
| hbase-metrics | Ubah nilai dalam file HBase hadoop-metrics2-hbase.properties. | Restarts the HBase services RegionServer, HBaseMaster, ThriftServer, RestServer. | 
| hbase-policy | Ubah nilai dalam HBase file hbase-policy.xml. | Not available. | 
| hbase-site | Ubah nilai dalam HBase file hbase-site.xml. | Restarts the HBase services RegionServer, HBaseMaster, ThriftServer, RestServer. Additionally restarts Phoenix QueryServer. | 
| hdfs-encryption-zones | Konfigurasikan zona enkripsi HDFS. | This classification should not be reconfigured. | 
| hdfs-env | Ubah nilai dalam lingkungan HDFS. | Restarts Hadoop HDFS services Namenode, Datanode, and ZKFC. | 
| hdfs-site | Ubah nilai dalam hdfs-site.xml HDFS. | Restarts the Hadoop HDFS services Namenode, SecondaryNamenode, Datanode, ZKFC, and Journalnode. Additionally restarts Hadoop Httpfs. | 
| hcatalog-env | Ubah nilai HCatalog di lingkungan. | Restarts Hive HCatalog Server. | 
| hcatalog-server-jndi | Ubah nilai di HCatalog jndi.properties. | Restarts Hive HCatalog Server. | 
| hcatalog-server-proto-hive-site | Ubah nilai HCatalog proto-hive-site dalam.xml's. | Restarts Hive HCatalog Server. | 
| hcatalog-webhcat-env | Ubah nilai di lingkungan HCatalog WebHCat. | Restarts Hive WebHCat server. | 
| hcatalog-webhcat-log4j2 | Ubah nilai di HCat log4j2.properties HCatalog Web. | Restarts Hive WebHCat server. | 
| hcatalog-webhcat-site | Ubah nilai dalam file webhcat-site.xml HCatalog WebHCat. | Restarts Hive WebHCat server. | 
| hive | Pengaturan dikurasi Amazon EMR untuk Apache Hive. | Sets configurations to launch Hive LLAP service. | 
| hive-beeline-log4j2 | Ubah nilai dalam file beeline-log4j2.properties Hive. | Not available. | 
| hive-parquet-logging | Ubah nilai dalam file parquet-logging.properties Hive. | Not available. | 
| hive-env | Ubah nilai dalam lingkungan Hive. | Restarts HiveServer2, HiveMetastore, and Hive HCatalog-Server. Runs Hive schemaTool CLI commands to verify hive-metastore. | 
| hive-exec-log4j2 | Ubah nilai dalam file hive-exec-log 4j2.properties Hive. | Not available. | 
| hive-llap-daemon-log4j2 | Ubah nilai dalam file llap-daemon-log 4j2.properties Hive. | Not available. | 
| hive-log4j2 | Ubah nilai dalam file hive-log4j2.properties Hive. | Not available. | 
| hive-site | Ubah nilai dalam file hive-site.xml Hive | Restarts HiveServer2, HiveMetastore, and Hive HCatalog-Server. Runs Hive schemaTool CLI commands to verify hive-metastore. Also restarts Oozie and Zeppelin. | 
| hiveserver2-site | Ubah nilai dalam file hiveserver2-site.xml Hive Server2 | Not available. | 
| hue-ini | Ubah nilai dalam file ini Hue | Restarts Hue. Also activates Hue config override CLI commands to pick up new configurations. | 
| httpfs-env | Ubah nilai di lingkungan HTTPFS. | Restarts Hadoop Httpfs service. | 
| httpfs-site | Ubah nilai dalam file httpfs-site.xml Hadoop. | Restarts Hadoop Httpfs service. | 
| hadoop-kms-acls | Ubah nilai dalam file kms-acls.xml Hadoop. | Not available. | 
| hadoop-kms-env | Ubah nilai dalam lingkungan Hadoop KMS. | Restarts Hadoop-KMS service. | 
| hadoop-kms-java-home | Ubah rumah java KMS Hadoop | Not available. | 
| hadoop-kms-log4j | Ubah nilai dalam file kms-log4j.properties Hadoop. | Not available. | 
| hadoop-kms-site | Ubah nilai dalam file kms-site.xml Hadoop. | Restarts Hadoop-KMS and Ranger-KMS service. | 
| hudi-env | Ubah nilai di lingkungan Hudi. | Not available. | 
| hudi-defaults | Ubah nilai dalam file hudi-defaults.conf Hudi. | Not available. | 
| iceberg-defaults | Ubah nilai dalam file iceberg-defaults.conf Iceberg. | Not available. | 
| delta-defaults | Ubah nilai dalam file delta-defaults.conf Delta. | Not available. | 
| jupyter-notebook-conf | Ubah nilai dalam file jupyter\$1notebook\$1config.py Jupyter Notebook. | Not available. | 
| jupyter-hub-conf | Ubah nilai dalam JupyterHubs file jupyterhub\$1config.py. | Not available. | 
| jupyter-s3-conf | Konfigurasikan persistensi Jupyter Notebook S3. | Not available. | 
| jupyter-sparkmagic-conf | Ubah nilai dalam file config.json Sparkmagic. | Not available. | 
| livy-conf | Ubah nilai dalam file livy.conf Livy. | Restarts Livy Server. | 
| livy-env | Ubah nilai di lingkungan Livy. | Restarts Livy Server. | 
| livy-log4j2 | Ubah pengaturan Livy log4j2.properties. | Restarts Livy Server. | 
| mapred-env | Ubah nilai di lingkungan MapReduce aplikasi. | Restarts Hadoop MapReduce-HistoryServer. | 
| mapred-site | Ubah nilai dalam file mapred-site.xml MapReduce aplikasi. | Restarts Hadoop MapReduce-HistoryServer. | 
| oozie-env | Ubah nilai di lingkungan Oozie. | Restarts Oozie. | 
| oozie-log4j | Ubah nilai dalam file oozie-log4j.properties Oozie. | Restarts Oozie. | 
| oozie-site | Ubah nilai dalam file oozie-site.xml Oozie. | Restarts Oozie. | 
| phoenix-hbase-metrics | Ubah nilai dalam file hadoop-metrics2-hbase.properties Phoenix. | Not available. | 
| phoenix-hbase-site | Ubah nilai dalam file hbase-site.xml Phoenix. | Not available. | 
| phoenix-log4j2 | Ubah nilai dalam file log4j2.properties Phoenix. | Restarts Phoenix-QueryServer. | 
| phoenix-metrics | Ubah nilai dalam file hadoop-metrics2-phoenix.properties Phoenix. | Not available. | 
| pig-env | Ubah nilai di lingkungan Pig. | Not available. | 
| pig-properties | Ubah nilai dalam file pig.properties Pig. | Restarts Oozie. | 
| pig-log4j | Ubah nilai dalam file log4j.properties Pig. | Not available. | 
| presto-log | Ubah nilai dalam file log.properties Presto. | Restarts Presto-Server (for PrestoDB) | 
| presto-config | Ubah nilai dalam file config.properties Presto. | Restarts Presto-Server (for PrestoDB) | 
| presto-password-authenticator | Ubah nilai dalam file password-authenticator.properties Presto. | Not available. | 
| presto-env | Ubah nilai dalam file presto-env.sh Presto. | Restarts Presto-Server (for PrestoDB) | 
| presto-node | Ubah nilai dalam file node.properties Presto. | Not available. | 
| presto-connector-blackhole | Ubah nilai dalam file blackhole.properties Presto. | Not available. | 
| presto-connector-cassandra | Ubah nilai dalam file cassandra.properties Presto. | Not available. | 
| presto-connector-hive | Ubah nilai dalam file hive.properties Presto. | Restarts Presto-Server (for PrestoDB) | 
| presto-connector-jmx | Ubah nilai dalam file jmx.properties Presto. | Not available. | 
| presto-connector-kafka | Ubah nilai dalam file kafka.properties Presto. | Not available. | 
| presto-connector-lakeformation | Ubah nilai dalam file lakeformation.properties Presto. | Restarts Presto-Server (for PrestoDB) | 
| presto-connector-localfile | Ubah nilai dalam file localfile.properties Presto. | Not available. | 
| presto-connector-memory | Ubah nilai dalam file memory.properties Presto. | Not available. | 
| presto-connector-mongodb | Ubah nilai dalam file mongodb.properties Presto. | Not available. | 
| presto-connector-mysql | Ubah nilai dalam file mysql.properties Presto. | Not available. | 
| presto-connector-postgresql | Ubah nilai dalam file postgresql.properties Presto. | Not available. | 
| presto-connector-raptor | Ubah nilai dalam file raptor.properties Presto. | Not available. | 
| presto-connector-redis | Ubah nilai dalam file redis.properties Presto. | Not available. | 
| presto-connector-redshift | Ubah nilai dalam file redshift.properties Presto. | Not available. | 
| presto-connector-tpch | Ubah nilai dalam file tpch.properties Presto. | Not available. | 
| presto-connector-tpcds | Ubah nilai dalam file tpcds.properties Presto. | Not available. | 
| trino-log | Ubah nilai dalam file log.properties Trino. | Restarts Trino-Server (for Trino) | 
| trino-config | Ubah nilai dalam file config.properties Trino. | Restarts Trino-Server (for Trino) | 
| trino-password-authenticator | Ubah nilai dalam file password-authenticator.properties Trino. | Restarts Trino-Server (for Trino) | 
| trino-env | Ubah nilai dalam file trino-env.sh Trino. | Restarts Trino-Server (for Trino) | 
| trino-node | Ubah nilai dalam file node.properties Trino. | Not available. | 
| trino-connector-blackhole | Ubah nilai dalam file blackhole.properties Trino. | Not available. | 
| trino-connector-cassandra | Ubah nilai dalam file cassandra.properties Trino. | Not available. | 
| trino-connector-delta | Ubah nilai dalam file delta.properties Trino. | Restarts Trino-Server (for Trino) | 
| trino-connector-hive | Ubah nilai dalam file hive.properties Trino. | Restarts Trino-Server (for Trino) | 
| trino-exchange-manager | Ubah nilai dalam file exchange-manager.properties Trino. | Restarts Trino-Server (for Trino) | 
| trino-connector-iceberg | Ubah nilai dalam file iceberg.properties Trino. | Restarts Trino-Server (for Trino) | 
| trino-connector-hudi | Ubah nilai dalam file hudi.properties Trino. | Restarts Trino-Server (for Trino) | 
| trino-connector-jmx | Ubah nilai dalam file jmx.properties Trino. | Not available. | 
| trino-connector-kafka | Ubah nilai dalam file kafka.properties Trino. | Not available. | 
| trino-connector-localfile | Ubah nilai dalam file localfile.properties Trino. | Not available. | 
| trino-connector-memory | Ubah nilai dalam file memory.properties Trino. | Not available. | 
| trino-connector-mongodb | Ubah nilai dalam file mongodb.properties Trino. | Not available. | 
| trino-connector-mysql | Ubah nilai dalam file mysql.properties Trino. | Not available. | 
| trino-connector-postgresql | Ubah nilai dalam file postgresql.properties Trino. | Not available. | 
| trino-connector-raptor | Ubah nilai dalam file raptor.properties Trino. | Not available. | 
| trino-connector-redis | Ubah nilai dalam file redis.properties Trino. | Not available. | 
| trino-connector-redshift | Ubah nilai dalam file redshift.properties Trino. | Not available. | 
| trino-connector-tpch | Ubah nilai dalam file tpch.properties Trino. | Not available. | 
| trino-connector-tpcds | Ubah nilai dalam file tpcds.properties Trino. | Not available. | 
| ranger-kms-dbks-site | Ubah nilai dalam file dbks-site.xml Ranger KMS. | Restarts Ranger KMS Server. | 
| ranger-kms-site | Ubah nilai dalam ranger-kms-site file.xml. dari Ranger KMS. | Restarts Ranger KMS Server. | 
| ranger-kms-env | Ubah nilai di lingkungan Ranger KMS. | Restarts Ranger KMS Server. | 
| ranger-kms-logback | Ubah nilai dalam file kms-logback.xml dari Ranger KMS. | Not available. | 
| ranger-kms-db-ca | Ubah nilai untuk file CA pada S3 untuk koneksi MySQL SSL dengan Ranger KMS. | Not available. | 
| spark | Pengaturan terkurasi Amazon EMR untuk Apache Spark. | This property modifies spark-defaults. See actions there. | 
| spark-defaults | Ubah nilai dalam file spark-defaults.conf Spark. | Restarts Spark history server and Spark thrift server. | 
| spark-env | Ubah nilai di lingkungan Spark. | Restarts Spark history server and Spark thrift server. | 
| spark-hive-site | Ubah nilai dalam file hive-site.xml Spark | Not available. | 
| spark-log4j2 | Ubah nilai dalam file log4j2.properties Spark. | Restarts Spark history server and Spark thrift server. | 
| spark-metrics | Ubah nilai dalam file metrics.properties Spark. | Restarts Spark history server and Spark thrift server. | 
| tez-site | Ubah nilai dalam file tez-site.xml Tez. | Restart Oozie and HiveServer2. | 
| yarn-env | Ubah nilai di lingkungan YARN. | Restarts the Hadoop YARN services ResourceManager, NodeManager, ProxyServer, and TimelineServer. Additionally restarts MapReduce-HistoryServer. | 
| yarn-site | Ubah nilai dalam file yarn-site.xml YARN. | Restarts the Hadoop YARN services ResourceManager, NodeManager, ProxyServer, and TimelineServer. Additionally restarts Livy Server and MapReduce-HistoryServer. | 
| zeppelin-env | Ubah nilai di lingkungan Zeppelin. | Restarts Zeppelin. | 
| zeppelin-site | Ubah pengaturan konfigurasi di zeppelin-site.xml. | Restarts Zeppelin. | 
| zookeeper-config | Ubah nilai dalam ZooKeeper file zoo.cfg. | Restarts Zookeeper server. | 
| zookeeper-logback | Ubah nilai dalam ZooKeeper file logback.xml. | Restarts Zookeeper server. | 
| emr-metrics | Ubah pengaturan metrik emr untuk simpul ini. | Restarts the CloudWatchAgent service. | 

## 7.8.0 perubahan log
<a name="780-changelog"></a>


**Ubah log untuk catatan rilis dan rilis 7.8.0**  

| Date | Peristiwa | Deskripsi | 
| --- | --- | --- | 
| 2025-03-07 | Publikasi Docs | Amazon EMR 7.8.0 catatan rilis pertama kali diterbitkan | 
| 2025-03-06 | Penerapan selesai | [Amazon EMR 7.8.0 sepenuhnya diterapkan ke semua Wilayah yang didukung](https://aws.amazon.com/about-aws/global-infrastructure/regional-product-services/) | 
| 2025-02-28 | Rilis terbatas awal | Amazon EMR 7.8.0 pertama kali dikerahkan ke Wilayah komersial awal | 

# Amazon EMR rilis 7.7.0
<a name="emr-770-release"></a>

## 7.7.0 siklus hidup yang didukung
<a name="emr-770-supported-lifecycle"></a>

Tabel berikut menjelaskan tanggal siklus hidup yang didukung untuk rilis Amazon EMR 7.7.0.


| Fase Support | Date | 
| --- | --- | 
| Tanggal rilis awal | Februari 6, 2025 | 
| Dukungan standar sampai | Februari 5, 2027 | 
| Akhir dari dukungan | Februari 6, 2027 | 
| Akhir hidup | Februari 6, 2028 | 

## 7.7.0 versi aplikasi
<a name="emr-770-app-versions"></a>

Rilis ini mencakup aplikasi berikut: [https://docs.aws.amazon.com/AmazonCloudWatch/latest/monitoring/Install-CloudWatch-Agent.html](https://docs.aws.amazon.com/AmazonCloudWatch/latest/monitoring/Install-CloudWatch-Agent.html), [https://delta.io/](https://delta.io/), [https://flink.apache.org/](https://flink.apache.org/), [http://hbase.apache.org/](http://hbase.apache.org/), [https://cwiki.apache.org/confluence/display/Hive/HCatalog](https://cwiki.apache.org/confluence/display/Hive/HCatalog), [http://hive.apache.org/](http://hive.apache.org/), [https://hudi.apache.org](https://hudi.apache.org), [http://gethue.com/](http://gethue.com/), [https://iceberg.apache.org/](https://iceberg.apache.org/), [https://jupyter-enterprise-gateway.readthedocs.io/en/latest/](https://jupyter-enterprise-gateway.readthedocs.io/en/latest/), [https://jupyterhub.readthedocs.io/en/latest/#](https://jupyterhub.readthedocs.io/en/latest/#), [https://livy.incubator.apache.org/](https://livy.incubator.apache.org/), [http://oozie.apache.org/](http://oozie.apache.org/), [https://phoenix.apache.org/](https://phoenix.apache.org/), [http://pig.apache.org/](http://pig.apache.org/), [https://prestodb.io/](https://prestodb.io/), [https://spark.apache.org/docs/latest/](https://spark.apache.org/docs/latest/), [https://www.tensorflow.org/](https://www.tensorflow.org/), [https://tez.apache.org/](https://tez.apache.org/), [https://trino.io/](https://trino.io/), [https://zeppelin.incubator.apache.org/](https://zeppelin.incubator.apache.org/), dan [https://zookeeper.apache.org](https://zookeeper.apache.org).

Tabel di bawah ini mencantumkan versi aplikasi yang tersedia dalam rilis Amazon EMR ini dan versi aplikasi dalam tiga rilis EMR Amazon sebelumnya (bila berlaku).

Untuk riwayat lengkap versi aplikasi untuk setiap rilis Amazon EMR, lihat topik berikut:
+ [Versi aplikasi di Amazon EMR 7.x rilis](emr-release-app-versions-7.x.md)
+ [Versi aplikasi di Amazon EMR 6.x rilis](emr-release-app-versions-6.x.md)
+ [Versi aplikasi di Amazon EMR 5.x rilis](emr-release-app-versions-5.x.md)
+ [Versi aplikasi di Amazon EMR 4.x rilis](emr-release-app-versions-4.x.md)


**Informasi versi aplikasi**  

|  | emr-7.7.0 | emr-7.6.0 | emr-7.5.0 | emr-7.4.0 | 
| --- | --- | --- | --- | --- | 
| AWS SDK for Java | 2.29.44, 1.12.780 | 2.29.25, 1.12.779 | 2.28.8, 1.12.772 | 2.28.8, 1.12.772 | 
| Python | 3.9, 3.11 | 3.9, 3.11 | 3.9, 3.11 | 3.9, 3.11 | 
| Skala | 2.12.18 | 2.12.18 | 2.12.18 | 2.12.18 | 
| AmazonCloudWatchAgent | 1.300032.2-amzn-0 | 1.300032.2-amzn-0 | 1.300032.2-amzn-0 | 1.300032.2-amzn-0 | 
| Delta | 3.2.1-amzn-2 | Versi 3.2.1-amzn-1 | 3.2.1-amzn-0 | 3.2.0-amzn-1 | 
| Flink | 1.20.0-amzn-1 | 1.20.0-amzn-0 | 1.19.1-amzn-1 | 1.19.1-amzn-0 | 
| Ganglia |  -  |  -  |  -  |  -  | 
| HBase | 2.6.1-amzn-1 | 2.6.1-amzn-0 | 2.5.10-amzn-0 | 2.5.5-amzn-0 | 
| HCatalog | 3.1.3-amzn-16 | 3.1.3-amzn-15 | 3.1.3-amzn-14 | 3.1.3-amzn-13 | 
| Hadoop | 3.4.0-amzn-3 | 3.4.0-amzn-2 | 3.4.0-amzn-1 | 3.4.0-amzn-0 | 
| Hive | 3.1.3-amzn-16 | 3.1.3-amzn-15 | 3.1.3-amzn-14 | 3.1.3-amzn-13 | 
| Hudi | 0.15.0-amzn-4 | 0.15.0-amzn-3 | 0.15.0-amzn-2 | 0.15.0-amzn-1 | 
| Hue | 4.11.0 | 4.11.0 | 4.11.0 | 4.11.0 | 
| Iceberg | 1.7.1-amzn-0 | 1.6.1-amzn-2 | 1.6.1-amzn-1 | 1.6.1-amzn-0 | 
| JupyterEnterpriseGateway | 2.6.0 | 2.6.0 | 2.6.0 | 2.6.0 | 
| JupyterHub | 1.5.0 | 1.5.0 | 1.5.0 | 1.5.0 | 
| Livy | 0.8.0-inkubasi | 0.8.0-inkubasi | 0.8.0-inkubasi | 0.8.0-inkubasi | 
| MXNet |  -  |  -  |  -  |  -  | 
| Mahout |  -  |  -  |  -  |  -  | 
| Oozie | 5.2.1 | 5.2.1 | 5.2.1 | 5.2.1 | 
| Phoenix | 5.2.1 | 5.2.0 | 5.2.0 | 5.2.0 | 
| Pig | 0.17.0 | 0.17.0 | 0.17.0 | 0.17.0 | 
| Presto | 0,287-amzn-1 | 0,287-amzn-1 | 0,287-amzn-0 | 0,287-amzn-0 | 
| Spark | 3.5.3-amzn-1 | 3.5.3-amzn-0 | 3.5.2-amzn-1 | 3.5.2-amzn-0 | 
| Sqoop |  -  |  -  |  -  | 1.4.7 | 
| TensorFlow | 2.16.1 | 2.16.1 | 2.16.1 | 2.16.1 | 
| Tez | 0.10.2-amzn-14 | 0.10.2-amzn-13 | 0.10.2-amzn-12 | 0.10.2-amzn-11 | 
| Trino (PrestoSQL) | 467-amzn-0 | 457-amzn-0 | 446-amzn-0 | 446-amzn-0 | 
| Zeppelin | 0.11.1 | 0.11.1 | 0.11.1 | 0.11.1 | 
| ZooKeeper | 3.9.2-amzn-1 | 3.9.2-amzn-0 | 3.9.2-amzn-0 | 3.9.2-amzn-0 | 

# 7.7.0 rincian komponen rilis
<a name="emr-770-release-components-details"></a>

Lihat tabel berikut untuk informasi selengkapnya tentang paket *Ekstra* di Amazon EMR 7.7.0.


| Aplikasi | Jenis Aplikasi | Paket | Jenis Package | Versi Package | 
| --- | --- | --- | --- | --- | 
|  AmazonCloudWatchAgent  |  Core  |  hadoop-hdfs-journalnode  |  Ekstra  |  3.4.0-amzn-3-1.amzn2023  | 
|  AmazonCloudWatchAgent  |  Core  |  ranger-km  |  Ekstra  |  2.0.0-1.amzn2023  | 
|  AmazonCloudWatchAgent  |  Core  |  s3-dist-cp  |  Ekstra  |  2.37.0-1.amzn2023  | 
|  AmazonCloudWatchAgent  |  Core  |  penjaga kebun binatang  |  Ekstra  |  3.9.2.amzn.1-1.amzn2023  | 
|  AmazonCloudWatchAgent  |  Core  |  zookeper-server  |  Ekstra  |  3.9.2.amzn.1-1.amzn2023  | 
|  Flink  |  Core  |  hadop-client  |  Ekstra  |  3.4.0.amzn.3-1.amzn2023  | 
|  Flink  |  Core  |  hadoop-hdfs  |  Ekstra  |  3.4.0.amzn.3-1.amzn2023  | 
|  Flink  |  Core  |  hadoop-hdfs-datanode  |  Ekstra  |  3.4.0.amzn.3-1.amzn2023  | 
|  Flink  |  Core  |  hadoop-hdfs-journalnode  |  Ekstra  |  3.4.0.amzn.3-1.amzn2023  | 
|  Flink  |  Core  |  hadoop-hdfs-namenode  |  Ekstra  |  3.4.0.amzn.3-1.amzn2023  | 
|  Flink  |  Core  |  hadoop-httpfs  |  Ekstra  |  3.4.0.amzn.3-1.amzn2023  | 
|  Flink  |  Core  |  hadoop-km  |  Ekstra  |  3.4.0.amzn.3-1.amzn2023  | 
|  Flink  |  Core  |  hadoop-mapreduce  |  Ekstra  |  3.4.0.amzn.3-1.amzn2023  | 
|  Flink  |  Core  |  hadoop-mapreduce-historyserver  |  Ekstra  |  3.4.0.amzn.3-1.amzn2023  | 
|  Flink  |  Core  |  hadoop-benang  |  Ekstra  |  3.4.0.amzn.3-1.amzn2023  | 
|  Flink  |  Core  |  hadoop-yarn-nodemanager  |  Ekstra  |  3.4.0.amzn.3-1.amzn2023  | 
|  Flink  |  Core  |  hadoop-yarn-proxyserver  |  Ekstra  |  3.4.0.amzn.3-1.amzn2023  | 
|  Flink  |  Core  |  hadoop-yarn-resourcemanager  |  Ekstra  |  3.4.0.amzn.3-1.amzn2023  | 
|  Flink  |  Core  |  hadoop-yarn-timelineserver  |  Ekstra  |  3.4.0.amzn.3-1.amzn2023  | 
|  Flink  |  Core  |  hudi  |  Ekstra  |  0.15.0.amzn.4-1.amzn2023  | 
|  Flink  |  Core  |  ranger-km  |  Ekstra  |  2.0.0-1.amzn2023  | 
|  Flink  |  Core  |  hadoop  |  Ekstra  |  3.4.0.amzn.3-1.amzn2023  | 
|  HBase  |  Core  |  s3-dist-cp  |  Ekstra  |  2.37.0-1.amzn2023  | 
|  HCatalog  |  Core  |  hadoop-yarn-proxyserver  |  Ekstra  |  3.4.0.amzn.3-1.amzn2023  | 
|  HCatalog  |  Core  |  mariadb-connector-java  |  Ekstra  |    | 
|  Hive  |  Core  |  hadoop-httpfs  |  Ekstra  |  3.4.0.amzn.3-1.amzn2023  | 
|  Hive  |  Core  |  hadoop-yarn-proxyserver  |  Ekstra  |  3.4.0.amzn.3-1.amzn2023  | 
|  Hive  |  Core  |  hive-hbase  |  Ekstra  |  3.1.3.amzn.16-1.amzn2023  | 
|  Hive  |  Core  |  mariadb-connector-java  |  Ekstra  |  2.7.2-1  | 
|  Hive  |  Core  |  s3-dist-cp  |  Ekstra  |  2.37.0-1.amzn2023  | 
|  Phoenix  |  Core  |  s3-dist-cp  |  Ekstra  |  2.37.0-1.amzn2023  | 
|  Spark  |  Core  |  spark-datanucleus  |  Ekstra  |  3.5.3.amzn.1-1.amzn2023  | 
|  Tez  |  Core  |  hadoop-mapreduce  |  Ekstra  |  3.4.0.amzn.3-1.amzn2023  | 
|  Tez  |  Core  |  hadoop-mapreduce-historyserver  |  Ekstra  |  3.4.0.amzn.3-1.amzn2023  | 
|  Tez  |  Core  |  hadoop-yarn-proxyserver  |  Ekstra  |  3.4.0.amzn.3-1.amzn2023  | 
|  Trino  |  Core  |  utilitas besar  |  Ekstra  |  1.2.0-1.amzn2023  | 
|  Trino  |  Core  |  hadop-client  |  Ekstra  |  3.4.0.amzn.3-1.amzn2023  | 
|  Trino  |  Core  |  hadoop-hdfs  |  Ekstra  |  3.4.0.amzn.3-1.amzn2023  | 
|  Trino  |  Core  |  hadoop-hdfs-datanode  |  Ekstra  |  3.4.0.amzn.3-1.amzn2023  | 
|  Trino  |  Core  |  hadoop-hdfs-journalnode  |  Ekstra  |  3.4.0.amzn.3-1.amzn2023  | 
|  Trino  |  Core  |  hadoop-hdfs-namenode  |  Ekstra  |  3.4.0.amzn.3-1.amzn2023  | 
|  Trino  |  Core  |  hadoop-km  |  Ekstra  |  3.4.0.amzn.3-1.amzn2023  | 
|  Trino  |  Core  |  hadoop-mapreduce  |  Ekstra  |  3.4.0.amzn.3-1.amzn2023  | 
|  Trino  |  Core  |  hadoop-mapreduce-historyserver  |  Ekstra  |  3.4.0.amzn.3-1.amzn2023  | 
|  Trino  |  Core  |  hadoop-benang  |  Ekstra  |  3.4.0.amzn.3-1.amzn2023  | 
|  Trino  |  Core  |  hadoop-yarn-nodemanager  |  Ekstra  |  3.4.0.amzn.3-1.amzn2023  | 
|  Trino  |  Core  |  hadoop-yarn-proxyserver  |  Ekstra  |  3.4.0.amzn.3-1.amzn2023  | 
|  Trino  |  Core  |  hadoop-yarn-resourcemanager  |  Ekstra  |  3.4.0.amzn.3-1.amzn2023  | 
|  Trino  |  Core  |  hadoop-yarn-timelineserver  |  Ekstra  |  3.4.0.amzn.3-1.amzn2023  | 
|  Trino  |  Core  |  hive  |  Ekstra  |  3.1.3.amzn.16-1.amzn2023  | 
|  Trino  |  Core  |  hive-hcatalog-server  |  Ekstra  |  3.1.3.amzn.16-1.amzn2023  | 
|  Trino  |  Core  |  mariadb-connector-java  |  Ekstra  |  2.7.2-1  | 
|  Trino  |  Core  |  ranger-km  |  Ekstra  |  2.0.0-1.amzn2023  | 
|  Trino  |  Core  |  penjaga kebun binatang  |  Ekstra  |  3.9.2.amzn.1-1.amzn2023  | 
|  Trino  |  Core  |  zookeper-server  |  Ekstra  |  3.9.2.amzn.1-1.amzn2023  | 
|  Trino  |  Core  |  bigtop-groovy  |  Ekstra  |  2.5.4-1.amzn2023  | 
|  Trino  |  Core  |  bigtop-jsvc  |  Ekstra  |  1.2.4-1.amzn2023  | 
|  Trino  |  Core  |  hadoop  |  Ekstra  |  3.4.0.amzn.3-1.amzn2023  | 
|  Trino  |  Core  |  hadoop-lzo  |  Ekstra  |  0.4.19-1.amzn2023  | 
|  Trino  |  Core  |  hive-hcatalog  |  Ekstra  |  3.1.3.amzn.16-1.amzn2023  | 
|  Trino  |  Core  |  sarang-jdbc  |  Ekstra  |  3.1.3.amzn.16-1.amzn2023  | 
|  Zookeeper  |  Core  |  emrfs  |  Ekstra  |  3.9.2.amzn.1-1.amzn2023  | 
|  Zookeeper  |  Core  |  hadop-client  |  Ekstra  |  3.9.2.amzn.1-1.amzn2023  | 
|  Zookeeper  |  Core  |  hadoop-hdfs  |  Ekstra  |  3.9.2.amzn.1-1.amzn2023  | 
|  Zookeeper  |  Core  |  hadoop-hdfs-datanode  |  Ekstra  |  3.9.2.amzn.1-1.amzn2023  | 
|  Zookeeper  |  Core  |  hadoop-hdfs-journalnode  |  Ekstra  |  3.9.2.amzn.1-1.amzn2023  | 
|  Zookeeper  |  Core  |  hadoop-hdfs-namenode  |  Ekstra  |  3.9.2.amzn.1-1.amzn2023  | 
|  Zookeeper  |  Core  |  hadoop-httpfs  |  Ekstra  |  3.9.2.amzn.1-1.amzn2023  | 
|  Zookeeper  |  Core  |  hadoop-km  |  Ekstra  |  3.9.2.amzn.1-1.amzn2023  | 
|  Zookeeper  |  Core  |  hadoop-mapreduce  |  Ekstra  |  3.4.0.amzn.3-1.amzn2023  | 
|  Zookeeper  |  Core  |  hadoop-mapreduce-historyserver  |  Ekstra  |  3.4.0.amzn.3-1.amzn2023  | 
|  Zookeeper  |  Core  |  hadoop-benang  |  Ekstra  |  3.4.0.amzn.3-1.amzn2023  | 
|  Zookeeper  |  Core  |  hadoop-yarn-nodemanager  |  Ekstra  |  3.4.0.amzn.3-1.amzn2023  | 
|  Zookeeper  |  Core  |  hadoop-yarn-proxyserver  |  Ekstra  |  3.4.0.amzn.3-1.amzn2023  | 
|  Zookeeper  |  Core  |  hadoop-yarn-resourcemanager  |  Ekstra  |  3.4.0.amzn.3-1.amzn2023  | 
|  Zookeeper  |  Core  |  hadoop-yarn-timelineserver  |  Ekstra  |  3.4.0.amzn.3-1.amzn2023  | 
|  Zookeeper  |  Core  |  ranger-km  |  Ekstra  |  2.0.0-1.amzn2023  | 

# 7.7.0 kerentanan dan eksposur umum
<a name="770-common-vulnerabilities-exposures"></a>

Tabel berikut mencantumkan semua CVEs yang tidak memengaruhi kluster EMR yang berjalan pada konfigurasi Amazon EMR 7.7.0 yang direkomendasikan. Amazon EMR bergantung pada sumber terbuka hulu untuk ketersediaan perbaikan dan akan memberikan versi stabil terbaru sebagai bagian dari komponen Core Engine dalam waktu 90 hari setelah Amazon EMR memverifikasi perbaikan.

Tabel ini diperbarui pada 4 Februari 2025.


| ID CVE | Kepelikan | URL detail CVE | 
| --- | --- | --- | 
|  CVE-2015-1832  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2015-1832)-2015-1832  | 
|  CVE-2016-5018  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2016-5018)-2016-5018  | 
|  CVE-2017-15095  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2017-15095)-2017-15095  | 
|  CVE-2017-17485  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2017-17485)-2017-17485  | 
|  CVE-2017-7525  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2017-7525)-2017-7525  | 
|  CVE-2018-11307  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-11307)-2018-11307  | 
|  CVE-2018-11307  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-11307)-2018-11307  | 
|  CVE-2018-14718  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-14718)-2018-14718  | 
|  CVE-2018-14718  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-14718)-2018-14718  | 
|  CVE-2018-14719  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE-2018-14719](https://nvd.nist.gov/vuln/detail/CVE-2018-14719)  | 
|  CVE-2018-14719  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE-2018-14719](https://nvd.nist.gov/vuln/detail/CVE-2018-14719)  | 
|  CVE-2018-14720  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-14720)-2018-14720  | 
|  CVE-2018-14720  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-14720)-2018-14720  | 
|  CVE-2018-14721  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-14721)-2018-14721  | 
|  CVE-2018-14721  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-14721)-2018-14721  | 
|  CVE-2018-19360  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-19360)-2018-19360  | 
|  CVE-2018-19360  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-19360)-2018-19360  | 
|  CVE-2018-19361  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-19361)-2018-19361  | 
|  CVE-2018-19361  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-19361)-2018-19361  | 
|  CVE-2018-19362  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-19362)-2018-19362  | 
|  CVE-2018-19362  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-19362)-2018-19362  | 
|  CVE-2018-7489  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-7489)-2018-7489  | 
|  CVE-2018-7489  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-7489)-2018-7489  | 
|  CVE-2019-10202  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-10202)-2019-10202  | 
|  CVE-2019-14379  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-14379)-2019-14379  | 
|  CVE-2019-14379  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-14379)-2019-14379  | 
|  CVE-2019-14540  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-14540)-2019-14540  | 
|  CVE-2019-14540  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-14540)-2019-14540  | 
|  CVE-2019-14892  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-14892)-2019-14892  | 
|  CVE-2019-14892  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-14892)-2019-14892  | 
|  CVE-2019-14893  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-14893)-2019-14893  | 
|  CVE-2019-14893  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-14893)-2019-14893  | 
|  CVE-2019-16335  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-16335)-2019-16335  | 
|  CVE-2019-16335  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-16335)-2019-16335  | 
|  CVE-2019-16942  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-16942)-2019-16942  | 
|  CVE-2019-16942  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-16942)-2019-16942  | 
|  CVE-2019-16943  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-16943)-2019-16943  | 
|  CVE-2019-16943  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-16943)-2019-16943  | 
|  CVE-2019-17267  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-17267)-2019-17267  | 
|  CVE-2019-17267  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-17267)-2019-17267  | 
|  CVE-2019-17531  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-17531)-2019-17531  | 
|  CVE-2019-17531  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-17531)-2019-17531  | 
|  CVE-2019-20330  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-20330)-2019-20330  | 
|  CVE-2019-20330  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-20330)-2019-20330  | 
|  CVE-2020-8840  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-8840)-2020-8840  | 
|  CVE-2020-8840  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-8840)-2020-8840  | 
|  CVE-2020-9546  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-9546)-2020-9546  | 
|  CVE-2020-9546  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-9546)-2020-9546  | 
|  CVE-2020-9547  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-9547)-2020-9547  | 
|  CVE-2020-9547  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-9547)-2020-9547  | 
|  CVE-2020-9548  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-9548)-2020-9548  | 
|  CVE-2020-9548  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-9548)-2020-9548  | 
|  CVE-2022-1471  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-1471)-2022-1471  | 
|  CVE-2022-1471  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-1471)-2022-1471  | 
|  CVE-2022-37865  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-37865)-2022-37865  | 
|  CVE-2022-39135  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-39135)-2022-39135  | 
|  CVE-2022-42889  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-42889)-2022-42889  | 
|  CVE-2022-46337  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-46337)-2022-46337  | 
|  CVE-2022-46337  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-46337)-2022-46337  | 
|  CVE-2023-44981  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-44981)-2023-44981  | 
|  CVE-2024-47561  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-47561)-2024-47561  | 
|  CVE-2024-47561  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-47561)-2024-47561  | 
|  CVE-2024-47561  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-47561)-2024-47561  | 
|  CVE-2024-47561  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-47561)-2024-47561  | 
|  CVE-2024-47561  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-47561)-2024-47561  | 
|  CVE-2024-47561  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-47561)-2024-47561  | 
|  CVE-2024-52046  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-52046)-2024-52046  | 
|  CVE-2024-52046  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-52046)-2024-52046  | 
|  CVE-2024-53990  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-53990)-2024-53990  | 
|  CVE-2024-53990  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-53990)-2024-53990  | 
|  CVE-2012-0881  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2012-0881)-2012-0881  | 
|  CVE-2013-4002  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2013-4002)-2013-4002  | 
|  CVE-2015-5237  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2015-5237)-2015-5237  | 
|  CVE-2015-5237  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2015-5237)-2015-5237  | 
|  CVE-2016-6796  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2016-6796)-2016-6796  | 
|  CVE-2018-1000180  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-1000180)-2018-1000180  | 
|  CVE-2018-12022  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-12022)-2018-12022  | 
|  CVE-2018-12022  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-12022)-2018-12022  | 
|  CVE-2018-12023  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-12023)-2018-12023  | 
|  CVE-2018-12023  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-12023)-2018-12023  | 
|  CVE-2018-5968  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-5968)-2018-5968  | 
|  CVE-2019-0205  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-0205)-2019-0205  | 
|  CVE-2019-0205  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-0205)-2019-0205  | 
|  CVE-2019-10172  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-10172)-2019-10172  | 
|  CVE-2019-12086  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-12086)-2019-12086  | 
|  CVE-2019-12086  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-12086)-2019-12086  | 
|  CVE-2019-14439  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-14439)-2019-14439  | 
|  CVE-2019-14439  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-14439)-2019-14439  | 
|  CVE-2020-10650  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-10650)-2020-10650  | 
|  CVE-2020-10650  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-10650)-2020-10650  | 
|  CVE-2020-10672  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-10672)-2020-10672  | 
|  CVE-2020-10672  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-10672)-2020-10672  | 
|  CVE-2020-10673  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-10673)-2020-10673  | 
|  CVE-2020-10673  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-10673)-2020-10673  | 
|  CVE-2020-10968  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-10968)-2020-10968  | 
|  CVE-2020-10968  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-10968)-2020-10968  | 
|  CVE-2020-10969  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-10969)-2020-10969  | 
|  CVE-2020-10969  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-10969)-2020-10969  | 
|  CVE-2020-11111  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-11111)-2020-11111  | 
|  CVE-2020-11111  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-11111)-2020-11111  | 
|  CVE-2020-11112  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-11112)-2020-11112  | 
|  CVE-2020-11112  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-11112)-2020-11112  | 
|  CVE-2020-11113  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-11113)-2020-11113  | 
|  CVE-2020-11113  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-11113)-2020-11113  | 
|  CVE-2020-11619  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-11619](https://nvd.nist.gov/vuln/detail/CVE-2020-11619)  | 
|  CVE-2020-11619  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-11619](https://nvd.nist.gov/vuln/detail/CVE-2020-11619)  | 
|  CVE-2020-11620  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-11620)-2020-11620  | 
|  CVE-2020-11620  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-11620)-2020-11620  | 
|  CVE-2020-13936  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-13936)-2020-13936  | 
|  CVE-2020-13949  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-13949)-2020-13949  | 
|  CVE-2020-13949  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-13949)-2020-13949  | 
|  CVE-2020-13949  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-13949)-2020-13949  | 
|  CVE-2020-14060  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-14060)-2020-14060  | 
|  CVE-2020-14060  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-14060)-2020-14060  | 
|  CVE-2020-14061  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-14061)-2020-14061  | 
|  CVE-2020-14061  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-14061)-2020-14061  | 
|  CVE-2020-14062  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-14062)-2020-14062  | 
|  CVE-2020-14062  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-14062)-2020-14062  | 
|  CVE-2020-14195  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-14195)-2020-14195  | 
|  CVE-2020-14195  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-14195)-2020-14195  | 
|  CVE-2020-24616  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-24616)-2020-24616  | 
|  CVE-2020-24616  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-24616)-2020-24616  | 
|  CVE-2020-24750  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-24750)-2020-24750  | 
|  CVE-2020-24750  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-24750)-2020-24750  | 
|  CVE-2020-25649  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-25649)-2020-25649  | 
|  CVE-2020-28052  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-28052)-2020-28052  | 
|  CVE-2020-35490  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-35490)-2020-35490  | 
|  CVE-2020-35490  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-35490)-2020-35490  | 
|  CVE-2020-35491  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-35491)-2020-35491  | 
|  CVE-2020-35491  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-35491)-2020-35491  | 
|  CVE-2020-35728  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-35728)-2020-35728  | 
|  CVE-2020-35728  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-35728)-2020-35728  | 
|  CVE-2020-36179  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36179)-2020-36179  | 
|  CVE-2020-36179  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36179)-2020-36179  | 
|  CVE-2020-36180  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36180)-2020-36180  | 
|  CVE-2020-36180  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36180)-2020-36180  | 
|  CVE-2020-36181  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36181)-2020-36181  | 
|  CVE-2020-36181  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36181)-2020-36181  | 
|  CVE-2020-36182  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36182)-2020-36182  | 
|  CVE-2020-36182  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36182)-2020-36182  | 
|  CVE-2020-36183  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36183)-2020-36183  | 
|  CVE-2020-36183  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36183)-2020-36183  | 
|  CVE-2020-36184  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36184)-2020-36184  | 
|  CVE-2020-36184  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36184)-2020-36184  | 
|  CVE-2020-36185  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36185)-2020-36185  | 
|  CVE-2020-36185  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36185)-2020-36185  | 
|  CVE-2020-36186  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36186)-2020-36186  | 
|  CVE-2020-36186  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36186)-2020-36186  | 
|  CVE-2020-36187  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36187)-2020-36187  | 
|  CVE-2020-36187  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36187)-2020-36187  | 
|  CVE-2020-36188  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36188)-2020-36188  | 
|  CVE-2020-36188  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36188)-2020-36188  | 
|  CVE-2020-36189  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36189)-2020-36189  | 
|  CVE-2020-36189  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36189)-2020-36189  | 
|  CVE-2020-36518  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36518)-2020-36518  | 
|  CVE-2020-36518  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36518)-2020-36518  | 
|  CVE-2021-20190  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2021-20190)-2021-20190  | 
|  CVE-2021-20190  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2021-20190)-2021-20190  | 
|  CVE-2021-31684  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2021-31684)-2021-31684  | 
|  CVE-2021-31684  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2021-31684)-2021-31684  | 
|  CVE-2021-34538  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2021-34538)-2021-34538  | 
|  CVE-2021-34538  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2021-34538)-2021-34538  | 
|  CVE-2021-34538  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2021-34538)-2021-34538  | 
|  CVE-2021-43859  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2021-43859)-2021-43859  | 
|  CVE-2022-1415  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-1415)-2022-1415  | 
|  CVE-2022-1415  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-1415)-2022-1415  | 
|  CVE-2022-25647  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-25647)-2022-25647  | 
|  CVE-2022-25647  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-25647)-2022-25647  | 
|  CVE-2022-25647  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-25647)-2022-25647  | 
|  CVE-2022-25857  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-25857)-2022-25857  | 
|  CVE-2022-3171  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-3171)-2022-3171  | 
|  CVE-2022-3171  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-3171)-2022-3171  | 
|  CVE-2022-3171  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-3171)-2022-3171  | 
|  CVE-2022-3171  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-3171)-2022-3171  | 
|  CVE-2022-3509  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-3509)-2022-3509  | 
|  CVE-2022-3509  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-3509)-2022-3509  | 
|  CVE-2022-3509  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-3509)-2022-3509  | 
|  CVE-2022-3509  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-3509)-2022-3509  | 
|  CVE-2022-3510  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-3510)-2022-3510  | 
|  CVE-2022-3510  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-3510)-2022-3510  | 
|  CVE-2022-3510  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-3510)-2022-3510  | 
|  CVE-2022-3510  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-3510)-2022-3510  | 
|  CVE-2022-36364  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-36364)-2022-36364  | 
|  CVE-2022-37866  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-37866)-2022-37866  | 
|  CVE-2022-40149  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-40149)-2022-40149  | 
|  CVE-2022-40149  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-40149)-2022-40149  | 
|  CVE-2022-40149  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-40149)-2022-40149  | 
|  CVE-2022-40150  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-40150)-2022-40150  | 
|  CVE-2022-40150  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-40150)-2022-40150  | 
|  CVE-2022-40150  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-40150)-2022-40150  | 
|  CVE-2022-40151  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-40151)-2022-40151  | 
|  CVE-2022-40152  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-40152)-2022-40152  | 
|  CVE-2022-41966  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-41966)-2022-41966  | 
|  CVE-2022-42003  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-42003)-2022-42003  | 
|  CVE-2022-42003  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-42003)-2022-42003  | 
|  CVE-2022-42003  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-42003)-2022-42003  | 
|  CVE-2022-42003  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-42003)-2022-42003  | 
|  CVE-2022-42003  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-42003)-2022-42003  | 
|  CVE-2022-42003  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-42003)-2022-42003  | 
|  CVE-2022-42004  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-42004)-2022-42004  | 
|  CVE-2022-42004  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-42004)-2022-42004  | 
|  CVE-2022-42004  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-42004)-2022-42004  | 
|  CVE-2022-42004  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-42004)-2022-42004  | 
|  CVE-2022-42004  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-42004)-2022-42004  | 
|  CVE-2022-45685  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-45685)-2022-45685  | 
|  CVE-2022-45685  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-45685)-2022-45685  | 
|  CVE-2022-45685  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-45685)-2022-45685  | 
|  CVE-2022-45688  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-45688)-2022-45688  | 
|  CVE-2022-45693  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-45693)-2022-45693  | 
|  CVE-2022-45693  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-45693)-2022-45693  | 
|  CVE-2022-45693  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-45693)-2022-45693  | 
|  CVE-2022-46751  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-46751)-2022-46751  | 
|  CVE-2022-46751  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-46751)-2022-46751  | 
|  CVE-2023-1370  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-1370)-2023-1370  | 
|  CVE-2023-1370  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-1370)-2023-1370  | 
|  CVE-2023-1370  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-1370)-2023-1370  | 
|  CVE-2023-1436  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-1436)-2023-1436  | 
|  CVE-2023-1436  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-1436)-2023-1436  | 
|  CVE-2023-1436  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-1436)-2023-1436  | 
|  CVE-2023-20883  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-20883)-2023-20883  | 
|  CVE-2023-25194  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-25194)-2023-25194  | 
|  CVE-2023-25194  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-25194)-2023-25194  | 
|  CVE-2023-2976  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-2976)-2023-2976  | 
|  CVE-2023-2976  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-2976)-2023-2976  | 
|  CVE-2023-2976  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-2976)-2023-2976  | 
|  CVE-2023-2976  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-2976)-2023-2976  | 
|  CVE-2023-2976  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-2976)-2023-2976  | 
|  CVE-2023-2976  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-2976)-2023-2976  | 
|  CVE-2023-2976  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-2976)-2023-2976  | 
|  CVE-2023-2976  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-2976)-2023-2976  | 
|  CVE-2023-2976  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-2976)-2023-2976  | 
|  CVE-2023-2976  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-2976)-2023-2976  | 
|  CVE-2023-2976  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-2976)-2023-2976  | 
|  CVE-2023-2976  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-2976)-2023-2976  | 
|  CVE-2023-34453  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-34453)-2023-34453  | 
|  CVE-2023-34454  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-34454)-2023-34454  | 
|  CVE-2023-34455  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-34455)-2023-34455  | 
|  CVE-2023-3635  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-3635)-2023-3635  | 
|  CVE-2023-3635  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-3635)-2023-3635  | 
|  CVE-2023-36478  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-36478)-2023-36478  | 
|  CVE-2023-39410  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-39410)-2023-39410  | 
|  CVE-2023-39410  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-39410)-2023-39410  | 
|  CVE-2023-39410  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-39410)-2023-39410  | 
|  CVE-2023-39410  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-39410)-2023-39410  | 
|  CVE-2023-39410  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-39410)-2023-39410  | 
|  CVE-2023-43642  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-43642)-2023-43642  | 
|  CVE-2023-50387  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-50387)-2023-50387  | 
|  CVE-2023-5072  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-5072)-2023-5072  | 
|  CVE-2023-5072  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-5072)-2023-5072  | 
|  CVE-2023-52428  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-52428)-2023-52428  | 
|  CVE-2023-6378  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-6378)-2023-6378  | 
|  CVE-2023-6378  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-6378)-2023-6378  | 
|  CVE-2023-6481  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-6481)-2023-6481  | 
|  CVE-2023-6481  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-6481)-2023-6481  | 
|  CVE-2024-21634  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-21634)-2024-21634  | 
|  CVE-2024-35178  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-35178)-2024-35178  | 
|  CVE-2024-7254  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-7254)-2024-7254  | 
|  CVE-2024-7254  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-7254)-2024-7254  | 
|  CVE-2024-7254  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-7254)-2024-7254  | 
|  CVE-2024-7254  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-7254)-2024-7254  | 
|  CVE-2024-7254  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-7254)-2024-7254  | 
|  CVE-2024-7254  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-7254)-2024-7254  | 
|  CVE-2024-7254  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-7254)-2024-7254  | 
|  CVE-2024-7254  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-7254)-2024-7254  | 
|  CVE-2024-7254  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-7254)-2024-7254  | 
|  CVE-2009-2625  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2009-2625)-2009-2625  | 
|  CVE-2012-5783  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2012-5783)-2012-5783  | 
|  CVE-2012-6153  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2012-6153)-2012-6153  | 
|  CVE-2017-10355  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2017-10355)-2017-10355  | 
|  CVE-2018-10237  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-10237)-2018-10237  | 
|  CVE-2018-10237  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-10237)-2018-10237  | 
|  CVE-2018-10237  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-10237)-2018-10237  | 
|  CVE-2018-10237  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-10237)-2018-10237  | 
|  CVE-2018-10237  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-10237)-2018-10237  | 
|  CVE-2018-10237  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-10237)-2018-10237  | 
|  CVE-2018-11798  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-11798)-2018-11798  | 
|  CVE-2018-1313  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-1313)-2018-1313  | 
|  CVE-2018-2799  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-2799)-2018-2799  | 
|  CVE-2019-10219  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE-2019-10219](https://nvd.nist.gov/vuln/detail/CVE-2019-10219)  | 
|  CVE-2019-12384  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-12384)-2019-12384  | 
|  CVE-2019-12384  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-12384)-2019-12384  | 
|  CVE-2019-12814  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-12814)-2019-12814  | 
|  CVE-2019-12814  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-12814)-2019-12814  | 
|  CVE-2020-10693  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-10693)-2020-10693  | 
|  CVE-2020-13955  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-13955)-2020-13955  | 
|  CVE-2020-13956  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-13956)-2020-13956  | 
|  CVE-2020-13956  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-13956)-2020-13956  | 
|  CVE-2020-14338  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-14338)-2020-14338  | 
|  CVE-2020-15250  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-15250)-2020-15250  | 
|  CVE-2020-15250  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-15250)-2020-15250  | 
|  CVE-2020-15522  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-15522)-2020-15522  | 
|  CVE-2020-15522  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-15522)-2020-15522  | 
|  CVE-2020-17521  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-17521)-2020-17521  | 
|  CVE-2020-17521  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-17521)-2020-17521  | 
|  CVE-2020-1945  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-1945](https://nvd.nist.gov/vuln/detail/CVE-2020-1945)  | 
|  CVE-2020-26939  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-26939)-2020-26939  | 
|  CVE-2020-26939  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-26939)-2020-26939  | 
|  CVE-2020-29582  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-29582)-2020-29582  | 
|  CVE-2021-21290  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2021-21290)-2021-21290  | 
|  CVE-2021-22569  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2021-22569)-2021-22569  | 
|  CVE-2021-22569  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2021-22569)-2021-22569  | 
|  CVE-2021-22569  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2021-22569)-2021-22569  | 
|  CVE-2021-22569  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2021-22569)-2021-22569  | 
|  CVE-2021-22570  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2021-22570)-2021-22570  | 
|  CVE-2021-22570  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2021-22570)-2021-22570  | 
|  CVE-2021-22570  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2021-22570)-2021-22570  | 
|  CVE-2021-27568  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2021-27568)-2021-27568  | 
|  CVE-2021-28170  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2021-28170)-2021-28170  | 
|  CVE-2021-28170  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2021-28170)-2021-28170  | 
|  CVE-2021-28170  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2021-28170)-2021-28170  | 
|  CVE-2021-28170  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2021-28170)-2021-28170  | 
|  CVE-2021-29425  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2021-29425)-2021-29425  | 
|  CVE-2021-29425  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2021-29425)-2021-29425  | 
|  CVE-2021-36373  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2021-36373)-2021-36373  | 
|  CVE-2021-36374  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2021-36374)-2021-36374  | 
|  CVE-2021-37533  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2021-37533)-2021-37533  | 
|  CVE-2021-38153  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2021-38153)-2021-38153  | 
|  CVE-2022-23437  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-23437)-2022-23437  | 
|  CVE-2022-24329  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE-2022-24329](https://nvd.nist.gov/vuln/detail/CVE-2022-24329)  | 
|  CVE-2022-38749  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-38749)-2022-38749  | 
|  CVE-2022-38750  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-38750)-2022-38750  | 
|  CVE-2022-38751  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-38751)-2022-38751  | 
|  CVE-2022-38752  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-38752)-2022-38752  | 
|  CVE-2022-41854  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-41854)-2022-41854  | 
|  CVE-2023-0833  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-0833)-2023-0833  | 
|  CVE-2023-20863  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-20863)-2023-20863  | 
|  CVE-2023-26048  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-26048)-2023-26048  | 
|  CVE-2023-26049  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-26049)-2023-26049  | 
|  CVE-2023-33201  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-33201)-2023-33201  | 
|  CVE-2023-33201  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-33201)-2023-33201  | 
|  CVE-2023-33201  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-33201)-2023-33201  | 
|  CVE-2023-33201  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-33201)-2023-33201  | 
|  CVE-2023-33201  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-33201)-2023-33201  | 
|  CVE-2023-33202  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-33202)-2023-33202  | 
|  CVE-2023-33202  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-33202)-2023-33202  | 
|  CVE-2023-33202  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-33202)-2023-33202  | 
|  CVE-2023-33202  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-33202)-2023-33202  | 
|  CVE-2023-33202  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-33202)-2023-33202  | 
|  CVE-2023-39968  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-39968)-2023-39968  | 
|  CVE-2023-40167  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-40167)-2023-40167  | 
|  CVE-2023-40170  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-40170)-2023-40170  | 
|  CVE-2023-42503  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-42503)-2023-42503  | 
|  CVE-2023-49080  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-49080)-2023-49080  | 
|  CVE-2023-51074  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-51074)-2023-51074  | 
|  CVE-2023-51074  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-51074)-2023-51074  | 
|  CVE-2024-12798  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-12798)-2024-12798  | 
|  CVE-2024-12798  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-12798)-2024-12798  | 
|  CVE-2024-12798  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-12798)-2024-12798  | 
|  CVE-2024-12798  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-12798)-2024-12798  | 
|  CVE-2024-12798  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-12798)-2024-12798  | 
|  CVE-2024-12798  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-12798)-2024-12798  | 
|  CVE-2024-12798  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-12798)-2024-12798  | 
|  CVE-2024-25710  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-25710)-2024-25710  | 
|  CVE-2024-25710  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-25710)-2024-25710  | 
|  CVE-2024-25710  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-25710)-2024-25710  | 
|  CVE-2024-25710  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-25710)-2024-25710  | 
|  CVE-2024-26308  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-26308)-2024-26308  | 
|  CVE-2024-26308  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-26308)-2024-26308  | 
|  CVE-2024-26308  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-26308)-2024-26308  | 
|  CVE-2024-26308  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-26308)-2024-26308  | 
|  CVE-2024-38820  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-38820)-2024-38820  | 
|  CVE-2024-38820  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-38820)-2024-38820  | 
|  CVE-2024-43805  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-43805)-2024-43805  | 
|  CVE-2024-6763  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-6763)-2024-6763  | 
|  CVE-2024-6763  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-6763)-2024-6763  | 
|  CVE-2024-6763  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-6763)-2024-6763  | 
|  CVE-2024-6763  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-6763)-2024-6763  | 
|  CVE-2024-6763  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-6763)-2024-6763  | 
|  CVE-2024-6763  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-6763)-2024-6763  | 
|  CVE-2024-8184  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-8184)-2024-8184  | 
|  CVE-2024-8184  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-8184)-2024-8184  | 
|  CVE-2020-8908  |  RENDAH  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-8908)-2020-8908  | 
|  CVE-2020-8908  |  RENDAH  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-8908)-2020-8908  | 
|  CVE-2020-8908  |  RENDAH  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-8908)-2020-8908  | 
|  CVE-2020-8908  |  RENDAH  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-8908)-2020-8908  | 
|  CVE-2020-8908  |  RENDAH  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-8908)-2020-8908  | 
|  CVE-2020-8908  |  RENDAH  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-8908)-2020-8908  | 
|  CVE-2020-8908  |  RENDAH  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-8908)-2020-8908  | 
|  CVE-2020-8908  |  RENDAH  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-8908)-2020-8908  | 
|  CVE-2020-8908  |  RENDAH  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-8908)-2020-8908  | 
|  CVE-2020-8908  |  RENDAH  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-8908)-2020-8908  | 
|  CVE-2020-8908  |  RENDAH  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-8908)-2020-8908  | 
|  CVE-2020-8908  |  RENDAH  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-8908)-2020-8908  | 
|  CVE-2022-2047  |  RENDAH  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-2047)-2022-2047  | 
|  CVE-2024-12801  |  RENDAH  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-12801)-2024-12801  | 
|  CVE-2024-12801  |  RENDAH  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-12801)-2024-12801  | 
|  CVE-2024-12801  |  RENDAH  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-12801)-2024-12801  | 
|  CVE-2024-12801  |  RENDAH  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-12801)-2024-12801  | 
|  GHSA-58QW-P7QM-5RVH  |  RENDAH  |  [https://nvd.nist. gov/vuln/detail/GHSA-58qw-p7qm-5rvh](https://nvd.nist.gov/vuln/detail/GHSA-58qw-p7qm-5rvh)  | 
|  GHSA-CHFM-68VV-PVW5  |  RENDAH  |  [https://nvd.nist. gov/vuln/detail/GHSA-chfm-68vv-pvw5](https://nvd.nist.gov/vuln/detail/GHSA-chfm-68vv-pvw5)  | 
|  CVE-2023-50868  |  TIDAK DIUJICOBAKAN  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-50868)-2023-50868  | 
|  CVE-2024-23454  |  TIDAK DIUJICOBAKAN  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-23454)-2024-23454  | 
|  CVE-2024-23454  |  TIDAK DIUJICOBAKAN  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-23454)-2024-23454  | 
|  CVE-2024-23944  |  TIDAK DIUJICOBAKAN  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-23944)-2024-23944  | 
|  CVE-2024-23944  |  TIDAK DIUJICOBAKAN  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-23944)-2024-23944  | 
|  CVE-2024-23944  |  TIDAK DIUJICOBAKAN  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-23944)-2024-23944  | 
|  CVE-2024-23945  |  TIDAK DIUJICOBAKAN  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-23945)-2024-23945  | 
|  CVE-2024-23953  |  TIDAK DIUJICOBAKAN  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-23953)-2024-23953  | 
|  CVE-2024-25638  |  TIDAK DIUJICOBAKAN  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-25638)-2024-25638  | 
|  CVE-2024-27137  |  TIDAK DIUJICOBAKAN  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-27137)-2024-27137  | 
|  CVE-2024-29025  |  TIDAK DIUJICOBAKAN  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-29025)-2024-29025  | 
|  CVE-2024-29131  |  TIDAK DIUJICOBAKAN  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-29131)-2024-29131  | 
|  CVE-2024-29131  |  TIDAK DIUJICOBAKAN  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-29131)-2024-29131  | 
|  CVE-2024-29133  |  TIDAK DIUJICOBAKAN  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-29133)-2024-29133  | 
|  CVE-2024-29133  |  TIDAK DIUJICOBAKAN  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-29133)-2024-29133  | 
|  CVE-2024-29857  |  TIDAK DIUJICOBAKAN  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-29857)-2024-29857  | 
|  CVE-2024-29857  |  TIDAK DIUJICOBAKAN  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-29857)-2024-29857  | 
|  CVE-2024-29857  |  TIDAK DIUJICOBAKAN  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-29857)-2024-29857  | 
|  CVE-2024-29857  |  TIDAK DIUJICOBAKAN  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-29857)-2024-29857  | 
|  CVE-2024-29869  |  TIDAK DIUJICOBAKAN  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-29869)-2024-29869  | 
|  CVE-2024-30171  |  TIDAK DIUJICOBAKAN  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-30171)-2024-30171  | 
|  CVE-2024-30171  |  TIDAK DIUJICOBAKAN  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-30171)-2024-30171  | 
|  CVE-2024-30171  |  TIDAK DIUJICOBAKAN  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-30171)-2024-30171  | 
|  CVE-2024-30171  |  TIDAK DIUJICOBAKAN  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-30171)-2024-30171  | 
|  CVE-2024-30172  |  TIDAK DIUJICOBAKAN  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-30172)-2024-30172  | 
|  CVE-2024-30172  |  TIDAK DIUJICOBAKAN  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-30172)-2024-30172  | 
|  CVE-2024-31141  |  TIDAK DIUJICOBAKAN  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-31141)-2024-31141  | 
|  CVE-2024-31141  |  TIDAK DIUJICOBAKAN  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-31141)-2024-31141  | 
|  CVE-2024-34447  |  TIDAK DIUJICOBAKAN  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-34447)-2024-34447  | 
|  CVE-2024-34447  |  TIDAK DIUJICOBAKAN  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-34447)-2024-34447  | 
|  CVE-2024-36114  |  TIDAK DIUJICOBAKAN  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-36114)-2024-36114  | 
|  CVE-2024-36114  |  TIDAK DIUJICOBAKAN  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-36114)-2024-36114  | 
|  CVE-2024-36114  |  TIDAK DIUJICOBAKAN  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-36114)-2024-36114  | 
|  CVE-2024-36114  |  TIDAK DIUJICOBAKAN  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-36114)-2024-36114  | 
|  CVE-2024-38808  |  TIDAK DIUJICOBAKAN  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-38808)-2024-38808  | 
|  CVE-2024-43382  |  TIDAK DIUJICOBAKAN  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-43382)-2024-43382  | 
|  CVE-2024-47072  |  TIDAK DIUJICOBAKAN  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-47072)-2024-47072  | 
|  CVE-2024-47535  |  TIDAK DIUJICOBAKAN  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-47535)-2024-47535  | 
|  CVE-2024-47535  |  TIDAK DIUJICOBAKAN  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-47535)-2024-47535  | 
|  CVE-2024-47535  |  TIDAK DIUJICOBAKAN  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-47535)-2024-47535  | 
|  CVE-2024-47535  |  TIDAK DIUJICOBAKAN  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-47535)-2024-47535  | 
|  CVE-2024-47554  |  TIDAK DIUJICOBAKAN  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-47554)-2024-47554  | 
|  CVE-2024-47554  |  TIDAK DIUJICOBAKAN  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-47554)-2024-47554  | 
|  CVE-2024-47554  |  TIDAK DIUJICOBAKAN  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-47554)-2024-47554  | 
|  CVE-2024-47554  |  TIDAK DIUJICOBAKAN  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-47554)-2024-47554  | 
|  CVE-2024-47554  |  TIDAK DIUJICOBAKAN  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-47554)-2024-47554  | 
|  CVE-2024-47554  |  TIDAK DIUJICOBAKAN  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-47554)-2024-47554  | 
|  CVE-2024-51504  |  TIDAK DIUJICOBAKAN  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-51504)-2024-51504  | 
|  CVE-2024-51504  |  TIDAK DIUJICOBAKAN  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-51504)-2024-51504  | 
|  CVE-2024-51504  |  TIDAK DIUJICOBAKAN  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-51504)-2024-51504  | 
|  CVE-2024-56128  |  TIDAK DIUJICOBAKAN  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-56128)-2024-56128  | 
|  CVE-2024-56128  |  TIDAK DIUJICOBAKAN  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-56128)-2024-56128  | 
|  CVE-2024-9823  |  TIDAK DIUJICOBAKAN  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-9823)-2024-9823  | 
|  CVE-2025-23015  |  TIDAK DIUJICOBAKAN  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2025-23015)-2025-23015  | 
|  CVE-2025-24789  |  TIDAK DIUJICOBAKAN  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2025-24789)-2025-24789  | 
|  CVE-2025-24790  |  TIDAK DIUJICOBAKAN  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2025-24790)-2025-24790  | 
|  CVE-2025-24860  |  TIDAK DIUJICOBAKAN  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2025-24860)-2025-24860  | 

## Catatan rilis 7.7.0
<a name="emr-770-relnotes"></a>

Catatan rilis berikut mencakup informasi untuk Amazon EMR rilis 7.7.0.

**Fitur baru**
+ **Upgrade aplikasi** —Amazon EMR 7.7.0 application upgrades include Delta 3.2.1-amzn-2, Hudi 0.15.0-amzn-4, Iceberg 1.7.1-amzn-0, and Trino 467.

**Masalah yang diketahui**
+  **HBase pembuatan tabel di katalog Hive with Glue** - Dari EMR-7.3.0 hingga EMR-7.10.0, ada bug karena integrasi Hive Iceberg, yang menyebabkan HBase pembuatan tabel di Hive gagal saat Glue Data Catalog digunakan sebagai metastore. Silakan hubungi tim AWS dukungan jika Anda mengalami masalah ini.
+  **Tez UI** - Dari EMR-7.3 ke EMR-7.10, ada bug di mana mengakses UI Tez melalui UI Web Manajer Sumber Daya YARN gagal saat enkripsi dalam transit diaktifkan. Ini terjadi karena proxy YARN mencoba menggunakan protokol HTTP sementara Tez UI memerlukan HTTPS. Harap ubah `tez.tez-ui.history-url.base` konfigurasi `tez-site` dari `http` ke `https` untuk menyelesaikan masalah ini.

**Perubahan, penyempurnaan, dan masalah yang diselesaikan**
+  *Dimulai dengan Spark 3.3.1 (didukung dalam EMR versi 6.10 dan yang lebih baru), semua pelaksana dalam host dekomisioning diatur ke yang baru, yang disebut status DECOMMISSIONING. `ExecutorState`* Pelaksana yang dinonaktifkan tidak dapat digunakan oleh Yarn untuk mengalokasikan tugas dan dengan demikian akan meminta pelaksana baru, jika diperlukan, untuk tugas yang sedang dijalankan. Jadi, jika Anda menonaktifkan Spark DRA saat menggunakan EMR Managed Scaling, EMR Auto Scaling, atau mekanisme penskalaan khusus apa pun pada cluster EMR-EC2, maka Yarn dapat meminta pelaksana maksimum yang diizinkan untuk setiap pekerjaan. Untuk menghindari masalah ini, biarkan `spark.dynamicAllocation.enabled` properti disetel ke `TRUE` (yang merupakan default) saat Anda menggunakan kombinasi fitur di atas. Selain itu, Anda juga dapat mengatur batasan pelaksana minimum dan maksimum dengan menetapkan nilai untuk `spark.dynamicAllocation.maxExecutors` dan `spark.dynamicAllocation.minExecutors` properti untuk pekerjaan Spark Anda, untuk membatasi jumlah pelaksana yang dialokasikan selama eksekusi pekerjaan. 
+ Versi Iceberg yang digunakan pada EMR 7.7.0 tidak lagi mendukung Java 8. Selain itu, Iceberg dikecualikan dari gambar Java 8 berikut: `emr-7.7.0-java8-latest` dan. `emr-7.7.0-spark-rapids-java8-latest`
+ Lake Formation untuk FGAC dengan Amazon EMR di EKS — Dengan Amazon EMR rilis 7.7 dan lebih tinggi, Anda dapat memanfaatkan AWS Lake Formation untuk menerapkan kontrol akses berbutir halus pada tabel Katalog Data yang didukung oleh Amazon S3. Kemampuan ini memungkinkan Anda mengonfigurasi tabel, baris, kolom, dan kontrol akses tingkat sel untuk kueri baca dalam EMR Amazon Amazon Anda di EKS Spark Jobs. Untuk informasi selengkapnya, lihat [Menggunakan Amazon Amazon EMR di EKS dengan AWS Lake Formation untuk kontrol akses berbutir halus](https://docs.aws.amazon.com/emr/latest/EMR-on-EKS-DevelopmentGuide/security_iam_fgac-lf.html).
+     
[\[See the AWS documentation website for more details\]](http://docs.aws.amazon.com/id_id/emr/latest/ReleaseGuide/emr-770-release.html)

## 7.7.0 versi Java default
<a name="emr-770-jdk"></a>

Amazon EMR merilis 7.7 dan lebih tinggi dikirimkan dengan Amazon Corretto 17 (dibangun di atas OpenJDK) secara default untuk aplikasi yang mendukung Corretto 17 (JDK 17), dengan pengecualian Apache Livy.

Tabel berikut menunjukkan versi Java default untuk aplikasi di Amazon EMR 7.7.0. Jika Anda ingin mengubah JVM default pada cluster Anda, ikuti instruksi [Konfigurasikan aplikasi untuk menggunakan Java Virtual Machine tertentu](configuring-java8.md) untuk setiap aplikasi yang berjalan di cluster. Anda hanya dapat menggunakan satu versi runtime Java untuk sebuah cluster. Amazon EMR tidak mendukung menjalankan node atau aplikasi yang berbeda pada versi runtime yang berbeda pada cluster yang sama.


| Aplikasi | Versi Java/Amazon Corretto (defaultnya tebal) | 
| --- | --- | 
| kuala | 17, 11, 8 | 
| Flink | 17, 11, 8 | 
| HBase | 17, 11, 8 | 
| HCatalog | 17, 11, 8 | 
| Hadoop | 17, 11, 8 | 
| Hive | 17, 11, 8 | 
| Hudi | 17, 11, 8 | 
| Gunung es | 17, 11 | 
| Livy | 17, 11, 8 | 
| Oozie | 17, 11, 8 | 
| Phoenix | 17, 11, 8 | 
| PrestoDB | 8 | 
| Spark | 17, 11, 8 | 
| Spark RAPIDS | 17, 11, 8 | 
| Tez | 17, 11, 8 | 
| Trino | 21, 17 | 
| Zeppelin | 17, 11, 8 | 
| Pig | 17, 11, 8 | 
| Zookeeper | 17, 11, 8 | 

## 7.7.0 versi komponen
<a name="emr-770-components"></a>

Komponen yang diinstal oleh Amazon EMR dengan rilis ini tercantum di bawah ini. Beberapa komponen diinstal sebagai bagian dari paket aplikasi big data. Sedangkan komponen lainnya bersifak unik untuk Amazon EMR dan diinstal untuk proses sistem dan fitur. Ini biasanya dimulai dengan `emr` atau `aws`. Paket aplikasi big data dalam rilis Amazon EMR terbaru biasanya versi terbaru yang ditemukan di komunitas. Kami menyediakan rilis komunitas di Amazon EMR secepat mungkin.

Beberapa komponen yang ada di Amazon EMR berbeda dari versi komunitas. Komponen ini mempunyai label versi dalam bentuk `CommunityVersion-amzn-EmrVersion`. `EmrVersion` dimulai dari 0. Misalnya, jika komponen komunitas open source bernama `myapp-component` dengan versi 2.2 telah dimodifikasi tiga kali untuk dimasukkan dalam rilis EMR Amazon yang berbeda, versi rilisnya terdaftar sebagai. `2.2-amzn-2`


| Komponen | Versi | Deskripsi | 
| --- | --- | --- | 
| adot-java-agent | 1.31.0 | Agen Java yang mengumpulkan metrik dari daemon aplikasi. | 
| delta | 3.2.1-amzn-2 | Danau Delta adalah format tabel terbuka untuk kumpulan data analitik yang sangat besar | 
| emr-amazon-cloudwatch-agent | 1.300032.2-amzn-0 | Aplikasi yang mengumpulkan metrik tingkat sistem internal dan metrik aplikasi khusus dari instans Amazon EC2. | 
| emr-ddb | 5.6.0 | Konektor Amazon DynamoDB untuk aplikasi ekosistem Hadoop. | 
| emr-goodies | 3.16.0 | Perpustakaan kenyamanan ekstra untuk ekosistem Hadoop. | 
| emr-kinesis | 3.20.0 | Konektor Amazon Kinesis untuk aplikasi ekosistem Hadoop. | 
| emr-notebook-env | 1.18.0 | Conda env untuk emr notebook yang mencakup gateway jupyter korporasi | 
| emr-s3-dist-cp | 2.37.0 | Aplikasi salinan terdistribusi yang dioptimalkan untuk Amazon S3. | 
| emr-s3-select | 2.16.0 | EMR S3Select Connector | 
| emr-wal-cli | 1.3.2 | Cli digunakan untuk daftar emrwal/penghapusan. | 
| emrfs | 2.68.0 | Konektor Amazon S3 untuk aplikasi ekosistem Hadoop. | 
| flink-client | 1.20.0-amzn-1 | Skrip dan aplikasi klien baris perintah Apache Flink. | 
| flink-jobmanager-config | 1.20.0-amzn-1 | Mengelola sumber daya pada node EMR untuk Apache Flink. JobManager | 
| hadoop-client | 3.4.0-amzn-3 | Klien baris perintah Hadoop seperti 'hdfs', 'Hadoop', atau 'yarn'. | 
| hadoop-hdfs-datanode | 3.4.0-amzn-3 | Layanan tingkat simpul HDFS untuk menyimpan blok. | 
| hadoop-hdfs-library | 3.4.0-amzn-3 | Klien dan perpustakaan baris perintah HDFS | 
| hadoop-hdfs-namenode | 3.4.0-amzn-3 | Layanan HDFS untuk melacak nama file dan lokasi blok. | 
| hadoop-hdfs-journalnode | 3.4.0-amzn-3 | Layanan HDFS untuk mengelola jurnal filesystem Hadoop pada klaster HA. | 
| hadoop-httpfs-server | 3.4.0-amzn-3 | Titik akhir HTTP untuk operasi HDFS. | 
| hadoop-kms-server | 3.4.0-amzn-3 | Server manajemen kunci kriptografi berdasarkan API Hadoop. KeyProvider  | 
| hadoop-mapred | 3.4.0-amzn-3 | MapReduce pustaka mesin eksekusi untuk menjalankan MapReduce aplikasi. | 
| hadoop-yarn-nodemanager | 3.4.0-amzn-3 | Layanan YARN untuk mengelola kontainer pada simpul individu. | 
| hadoop-yarn-resourcemanager | 3.4.0-amzn-3 | Layanan YARN untuk mengalokasikan dan mengelola sumber daya klaster dan aplikasi terdistribusi. | 
| hadoop-yarn-timeline-server | 3.4.0-amzn-3 | Layanan untuk mengambil informasi terkini dan historis untuk aplikasi YARN. | 
| hbase-hmaster | 2.6.1-amzn-1 | Layanan untuk HBase cluster yang bertanggung jawab untuk koordinasi Daerah dan pelaksanaan perintah administratif. | 
| hbase-region-server | 2.6.1-amzn-1 | Layanan untuk melayani satu atau lebih HBase wilayah. | 
| hbase-client | 2.6.1-amzn-1 | HBase klien baris perintah. | 
| hbase-rest-server | 2.6.1-amzn-1 | Layanan menyediakan titik akhir RESTful HTTP untuk HBase. | 
| hbase-thrift-server | 2.6.1-amzn-1 | Layanan menyediakan titik akhir Thrift ke. HBase | 
| hbase-operator-tools | 2.6.1-amzn-1 | Alat perbaikan untuk HBase cluster Apache. | 
| hcatalog-client | 3.1.3-amzn-16 | Klien baris perintah 'hcat' untuk memanipulasi hcatalog-server. | 
| hcatalog-server | 3.1.3-amzn-16 | Penyediaan layanan HCatalog, tabel dan lapisan manajemen penyimpanan untuk aplikasi terdistribusi. | 
| hcatalog-webhcat-server | 3.1.3-amzn-16 | Titik akhir HTTP menyediakan antarmuka REST ke HCatalog. | 
| hive-client | 3.1.3-amzn-16 | Klien baris perintah Hive. | 
| hive-hbase | 3.1.3-amzn-16 | Klien Hive-hbase. | 
| hive-metastore-server | 3.1.3-amzn-16 | Layanan untuk mengakses metastore Hive, repositori semantik yang menyimpan metadata untuk SQL pada operasi Hadoop. | 
| hive-server2 | 3.1.3-amzn-16 | Layanan untuk menerima kueri Hive sebagai permintaan web. | 
| hudi | 0.15.0-amzn-4 | Kerangka pemrosesan tambahan untuk memberi daya pada pipa data pada latensi rendah dan efisiensi tinggi. | 
| hudi-presto | 0.15.0-amzn-4 | Perpustakaan paket untuk menjalankan Presto dengan Hudi. | 
| hudi-trino | 0.15.0-amzn-4 | Perpustakaan bundel untuk menjalankan Trino dengan Hudi. | 
| hudi-spark | 0.15.0-amzn-4 | Perpustakaan paket untuk menjalankan Spark dengan Hudi. | 
| hue-server | 4.11.0 | Aplikasi web untuk menganalisis data menggunakan aplikasi ekosistem Hadoop | 
| iceberg | 1.7.1-amzn-0 | Apache Iceberg adalah format tabel terbuka untuk kumpulan data analitik besar | 
| jupyterhub | 1.5.0 | Server multi-pengguna untuk notebook Jupyter | 
| livy-server | 0.8.0-inkubasi | Antarmuka REST untuk berinteraksi dengan Apache Spark | 
| nginx | 1.12.1 | nginx [engine x] adalah server HTTP dan server proksi balik | 
| mariadb-server | 5.5.68\$1 | Server basis data MariaDB. | 
| nvidia-cuda | 12.3.0 | Driver Nvidia dan kit alat Cuda | 
| oozie-client | 5.2.1 | Klien baris perintah Oozie. | 
| oozie-server | 5.2.1 | Layanan untuk menerima permintaan alur kerja Oozie. | 
| opencv | 4.7.0 | Perpustakaan Visi Komputer Sumber Terbuka. | 
| phoenix-library | 5.2.1 | Perpustakaan phoenix untuk server dan klien | 
| phoenix-connectors | 6.0.0 | Konektor Apache Phoenix untuk Spark-3 | 
| phoenix-query-server | 6.0.0 | Sebuah server ringan yang menyediakan akses JDBC serta Protocol Buffers dan akses format JSON ke API Avatica  | 
| presto-coordinator | 0,287-amzn-1 | Layanan untuk menerima kueri dan mengelola eksekusi kueri antara presto-worker. | 
| presto-worker | 0,287-amzn-1 | Layanan untuk mengeksekusi potongan kueri. | 
| presto-client | 0,287-amzn-1 | Klien baris perintah Presto yang diinstal pada master klaster HA yang siaga di mana server Presto server tidak dimulai. | 
| trino-coordinator | 467-amzn-0 | Layanan untuk menerima kueri dan mengelola eksekusi kueri di antara trino-workers. | 
| trino-worker | 467-amzn-0 | Layanan untuk mengeksekusi potongan kueri. | 
| trino-client | 467-amzn-0 | Klien baris perintah Trino yang diinstal pada master siaga cluster HA di mana server Trino tidak dimulai. | 
| pig-client | 0.17.0 | Klien baris perintah Pig. | 
| r | 4.3.2 | Proyek R untuk Komputasi Statistik | 
| ranger-kms-server | 2.0.0 | Sistem Pengelolaan Kunci Ranger Apache | 
| spark-client | 3.5.3-amzn-1 | Klien baris perintah Spark. | 
| spark-history-server | 3.5.3-amzn-1 | Web UI untuk melihat log acara untuk seluruh masa pakai aplikasi Spark. | 
| spark-on-yarn | 3.5.3-amzn-1 | Mesin eksekusi dalam memori untuk YARN. | 
| spark-yarn-slave | 3.5.3-amzn-1 | Perpustakaan Apache Spark yang dibutuhkan oleh slave YARN. | 
| spark-rapids | 24.10.1-amzn-1 | Plugin Nvidia Spark RAPIDS yang mempercepat Apache Spark dengan. GPUs | 
| tensorflow | 2.16.1 | TensorFlow pustaka perangkat lunak open source untuk perhitungan numerik kinerja tinggi. | 
| tez-on-yarn | 0.10.2-amzn-14 | Aplikasi dan perpustakaan tez YARN. | 
| tez-on-worker | 0.10.2-amzn-14 | Aplikasi dan pustaka YARN tez untuk node pekerja. | 
| zeppelin-server | 0.11.1 | Notebook berbasis web yang memungkinkan analisis data interaktif. | 
| zookeeper-server | 3.9.2-amzn-1 | Layanan terpusat untuk menjaga informasi konfigurasi, penamaan, yang menyediakan sinkronisasi terdistribusi, dan menyediakan layanan grup. | 
| zookeeper-client | 3.9.2-amzn-1 | ZooKeeper klien baris perintah. | 

## 7.7.0 klasifikasi konfigurasi
<a name="emr-770-class"></a>

Klasifikasi konfigurasi memungkinkan Anda menyesuaikan aplikasi. Ini sering kali bersesuaian dengan file XML konfigurasi untuk aplikasi, seperti `hive-site.xml`. Untuk informasi selengkapnya, lihat [Konfigurasikan aplikasi](emr-configure-apps.md).

Tindakan konfigurasi ulang terjadi ketika Anda menentukan konfigurasi untuk grup instans di klaster yang sedang berjalan. Amazon EMR hanya memulai tindakan konfigurasi ulang untuk klasifikasi yang Anda modifikasi. Untuk informasi selengkapnya, lihat [Lakukan konfigurasi ulang pada grup instans di klaster yang sedang berjalan](emr-configure-apps-running-cluster.md).


**klasifikasi emr-7.7.0**  

| Klasifikasi | Deskripsi | Tindakan Konfigurasi Ulang | 
| --- | --- | --- | 
| capacity-scheduler | Ubah nilai dalam file capacity-scheduler.xml Hadoop. | Restarts the ResourceManager service. | 
| container-executor | Ubah nilai dalam file container-executor.cfg Hadoop YARN ini. | Not available. | 
| container-log4j | Ubah nilai dalam file container-log4j.properties Hadoop YARN. | Not available. | 
| core-site | Ubah nilai dalam file core-site.xml Hadoop. | Restarts the Hadoop HDFS services Namenode, SecondaryNamenode, Datanode, ZKFC, and Journalnode. Restarts the Hadoop YARN services ResourceManager, NodeManager, ProxyServer, and TimelineServer. Additionally restarts Hadoop KMS, Ranger KMS, HiveServer2, Hive MetaStore, Hadoop Httpfs, and MapReduce-HistoryServer. | 
| docker-conf | Ubah pengaturan terkait docker. | Not available. | 
| emrfs-site | Ubah pengaturan EMRFS. | Restarts the Hadoop HDFS services Namenode, SecondaryNamenode, Datanode, ZKFC, and Journalnode. Restarts the Hadoop YARN services ResourceManager, NodeManager, ProxyServer, and TimelineServer. Additionally restarts HBaseRegionserver, HBaseMaster, HBaseThrift, HBaseRest, HiveServer2, Hive MetaStore, Hadoop Httpfs, and MapReduce-HistoryServer. | 
| flink-conf | Ubah pengaturan flink-conf.yaml. | Restarts Flink history server. | 
| flink-log4j | Ubah pengaturan log4j.properties Flink. | Restarts Flink history server. | 
| flink-log4j-session | Ubah pengaturan Flink log4j-session.properties untuk sesi. Kubernetes/Yarn  | Restarts Flink history server. | 
| flink-log4j-cli | Ubah pengaturan log4j-cli.properties Flink. | Restarts Flink history server. | 
| hadoop-env | Ubah nilai dalam lingkungan Hadoop untuk semua komponen Hadoop. | Restarts the Hadoop HDFS services Namenode, SecondaryNamenode, Datanode, ZKFC, and Journalnode. Restarts the Hadoop YARN services ResourceManager, NodeManager, ProxyServer, and TimelineServer. Additionally restarts PhoenixQueryserver, HiveServer2, Hive MetaStore, and MapReduce-HistoryServer. | 
| hadoop-log4j | Ubah nilai dalam file log4j.properties Hadoop ini. | Restarts the Hadoop HDFS services SecondaryNamenode, Datanode, and Journalnode. Restarts the Hadoop YARN services ResourceManager, NodeManager, ProxyServer, and TimelineServer. Additionally restarts Hadoop KMS, Hadoop Httpfs, and MapReduce-HistoryServer. | 
| hadoop-ssl-server | Ubah konfigurasi server ssl hadoop | Not available. | 
| hadoop-ssl-client | Ubah konfigurasi klien ssl hadoop | Not available. | 
| hbase | Pengaturan Amazon EMR-curated untuk Apache. HBase | Custom EMR specific property. Sets emrfs-site and hbase-site configs. See those for their associated restarts. | 
| hbase-env | Ubah nilai HBase di lingkungan. | Restarts the HBase services RegionServer, HBaseMaster, ThriftServer, RestServer. | 
| hbase-log4j | Ubah nilai dalam file HBase hbase-log4j.properties. | Restarts the HBase services RegionServer, HBaseMaster, ThriftServer, RestServer. | 
| hbase-metrics | Ubah nilai dalam file HBase hadoop-metrics2-hbase.properties. | Restarts the HBase services RegionServer, HBaseMaster, ThriftServer, RestServer. | 
| hbase-policy | Ubah nilai dalam HBase file hbase-policy.xml. | Not available. | 
| hbase-site | Ubah nilai dalam HBase file hbase-site.xml. | Restarts the HBase services RegionServer, HBaseMaster, ThriftServer, RestServer. Additionally restarts Phoenix QueryServer. | 
| hdfs-encryption-zones | Konfigurasikan zona enkripsi HDFS. | This classification should not be reconfigured. | 
| hdfs-env | Ubah nilai dalam lingkungan HDFS. | Restarts Hadoop HDFS services Namenode, Datanode, and ZKFC. | 
| hdfs-site | Ubah nilai dalam hdfs-site.xml HDFS. | Restarts the Hadoop HDFS services Namenode, SecondaryNamenode, Datanode, ZKFC, and Journalnode. Additionally restarts Hadoop Httpfs. | 
| hcatalog-env | Ubah nilai HCatalog di lingkungan. | Restarts Hive HCatalog Server. | 
| hcatalog-server-jndi | Ubah nilai di HCatalog jndi.properties. | Restarts Hive HCatalog Server. | 
| hcatalog-server-proto-hive-site | Ubah nilai HCatalog proto-hive-site dalam.xml's. | Restarts Hive HCatalog Server. | 
| hcatalog-webhcat-env | Ubah nilai di lingkungan HCatalog WebHCat. | Restarts Hive WebHCat server. | 
| hcatalog-webhcat-log4j2 | Ubah nilai di HCat log4j2.properties HCatalog Web. | Restarts Hive WebHCat server. | 
| hcatalog-webhcat-site | Ubah nilai dalam file webhcat-site.xml HCatalog WebHCat. | Restarts Hive WebHCat server. | 
| hive | Pengaturan dikurasi Amazon EMR untuk Apache Hive. | Sets configurations to launch Hive LLAP service. | 
| hive-beeline-log4j2 | Ubah nilai dalam file beeline-log4j2.properties Hive. | Not available. | 
| hive-parquet-logging | Ubah nilai dalam file parquet-logging.properties Hive. | Not available. | 
| hive-env | Ubah nilai dalam lingkungan Hive. | Restarts HiveServer2, HiveMetastore, and Hive HCatalog-Server. Runs Hive schemaTool CLI commands to verify hive-metastore. | 
| hive-exec-log4j2 | Ubah nilai dalam file hive-exec-log 4j2.properties Hive. | Not available. | 
| hive-llap-daemon-log4j2 | Ubah nilai dalam file llap-daemon-log 4j2.properties Hive. | Not available. | 
| hive-log4j2 | Ubah nilai dalam file hive-log4j2.properties Hive. | Not available. | 
| hive-site | Ubah nilai dalam file hive-site.xml Hive | Restarts HiveServer2, HiveMetastore, and Hive HCatalog-Server. Runs Hive schemaTool CLI commands to verify hive-metastore. Also restarts Oozie and Zeppelin. | 
| hiveserver2-site | Ubah nilai dalam file hiveserver2-site.xml Hive Server2 | Not available. | 
| hue-ini | Ubah nilai dalam file ini Hue | Restarts Hue. Also activates Hue config override CLI commands to pick up new configurations. | 
| httpfs-env | Ubah nilai di lingkungan HTTPFS. | Restarts Hadoop Httpfs service. | 
| httpfs-site | Ubah nilai dalam file httpfs-site.xml Hadoop. | Restarts Hadoop Httpfs service. | 
| hadoop-kms-acls | Ubah nilai dalam file kms-acls.xml Hadoop. | Not available. | 
| hadoop-kms-env | Ubah nilai dalam lingkungan Hadoop KMS. | Restarts Hadoop-KMS service. | 
| hadoop-kms-java-home | Ubah rumah java KMS Hadoop | Not available. | 
| hadoop-kms-log4j | Ubah nilai dalam file kms-log4j.properties Hadoop. | Not available. | 
| hadoop-kms-site | Ubah nilai dalam file kms-site.xml Hadoop. | Restarts Hadoop-KMS and Ranger-KMS service. | 
| hudi-env | Ubah nilai di lingkungan Hudi. | Not available. | 
| hudi-defaults | Ubah nilai dalam file hudi-defaults.conf Hudi. | Not available. | 
| iceberg-defaults | Ubah nilai dalam file iceberg-defaults.conf Iceberg. | Not available. | 
| delta-defaults | Ubah nilai dalam file delta-defaults.conf Delta. | Not available. | 
| jupyter-notebook-conf | Ubah nilai dalam file jupyter\$1notebook\$1config.py Jupyter Notebook. | Not available. | 
| jupyter-hub-conf | Ubah nilai dalam JupyterHubs file jupyterhub\$1config.py. | Not available. | 
| jupyter-s3-conf | Konfigurasikan persistensi Jupyter Notebook S3. | Not available. | 
| jupyter-sparkmagic-conf | Ubah nilai dalam file config.json Sparkmagic. | Not available. | 
| livy-conf | Ubah nilai dalam file livy.conf Livy. | Restarts Livy Server. | 
| livy-env | Ubah nilai di lingkungan Livy. | Restarts Livy Server. | 
| livy-log4j2 | Ubah pengaturan Livy log4j2.properties. | Restarts Livy Server. | 
| mapred-env | Ubah nilai di lingkungan MapReduce aplikasi. | Restarts Hadoop MapReduce-HistoryServer. | 
| mapred-site | Ubah nilai dalam file mapred-site.xml MapReduce aplikasi. | Restarts Hadoop MapReduce-HistoryServer. | 
| oozie-env | Ubah nilai di lingkungan Oozie. | Restarts Oozie. | 
| oozie-log4j | Ubah nilai dalam file oozie-log4j.properties Oozie. | Restarts Oozie. | 
| oozie-site | Ubah nilai dalam file oozie-site.xml Oozie. | Restarts Oozie. | 
| phoenix-hbase-metrics | Ubah nilai dalam file hadoop-metrics2-hbase.properties Phoenix. | Not available. | 
| phoenix-hbase-site | Ubah nilai dalam file hbase-site.xml Phoenix. | Not available. | 
| phoenix-log4j2 | Ubah nilai dalam file log4j2.properties Phoenix. | Restarts Phoenix-QueryServer. | 
| phoenix-metrics | Ubah nilai dalam file hadoop-metrics2-phoenix.properties Phoenix. | Not available. | 
| pig-env | Ubah nilai di lingkungan Pig. | Not available. | 
| pig-properties | Ubah nilai dalam file pig.properties Pig. | Restarts Oozie. | 
| pig-log4j | Ubah nilai dalam file log4j.properties Pig. | Not available. | 
| presto-log | Ubah nilai dalam file log.properties Presto. | Restarts Presto-Server (for PrestoDB) | 
| presto-config | Ubah nilai dalam file config.properties Presto. | Restarts Presto-Server (for PrestoDB) | 
| presto-password-authenticator | Ubah nilai dalam file password-authenticator.properties Presto. | Not available. | 
| presto-env | Ubah nilai dalam file presto-env.sh Presto. | Restarts Presto-Server (for PrestoDB) | 
| presto-node | Ubah nilai dalam file node.properties Presto. | Not available. | 
| presto-connector-blackhole | Ubah nilai dalam file blackhole.properties Presto. | Not available. | 
| presto-connector-cassandra | Ubah nilai dalam file cassandra.properties Presto. | Not available. | 
| presto-connector-hive | Ubah nilai dalam file hive.properties Presto. | Restarts Presto-Server (for PrestoDB) | 
| presto-connector-jmx | Ubah nilai dalam file jmx.properties Presto. | Not available. | 
| presto-connector-kafka | Ubah nilai dalam file kafka.properties Presto. | Not available. | 
| presto-connector-lakeformation | Ubah nilai dalam file lakeformation.properties Presto. | Restarts Presto-Server (for PrestoDB) | 
| presto-connector-localfile | Ubah nilai dalam file localfile.properties Presto. | Not available. | 
| presto-connector-memory | Ubah nilai dalam file memory.properties Presto. | Not available. | 
| presto-connector-mongodb | Ubah nilai dalam file mongodb.properties Presto. | Not available. | 
| presto-connector-mysql | Ubah nilai dalam file mysql.properties Presto. | Not available. | 
| presto-connector-postgresql | Ubah nilai dalam file postgresql.properties Presto. | Not available. | 
| presto-connector-raptor | Ubah nilai dalam file raptor.properties Presto. | Not available. | 
| presto-connector-redis | Ubah nilai dalam file redis.properties Presto. | Not available. | 
| presto-connector-redshift | Ubah nilai dalam file redshift.properties Presto. | Not available. | 
| presto-connector-tpch | Ubah nilai dalam file tpch.properties Presto. | Not available. | 
| presto-connector-tpcds | Ubah nilai dalam file tpcds.properties Presto. | Not available. | 
| trino-log | Ubah nilai dalam file log.properties Trino. | Restarts Trino-Server (for Trino) | 
| trino-config | Ubah nilai dalam file config.properties Trino. | Restarts Trino-Server (for Trino) | 
| trino-password-authenticator | Ubah nilai dalam file password-authenticator.properties Trino. | Restarts Trino-Server (for Trino) | 
| trino-env | Ubah nilai dalam file trino-env.sh Trino. | Restarts Trino-Server (for Trino) | 
| trino-node | Ubah nilai dalam file node.properties Trino. | Not available. | 
| trino-connector-blackhole | Ubah nilai dalam file blackhole.properties Trino. | Not available. | 
| trino-connector-cassandra | Ubah nilai dalam file cassandra.properties Trino. | Not available. | 
| trino-connector-delta | Ubah nilai dalam file delta.properties Trino. | Restarts Trino-Server (for Trino) | 
| trino-connector-hive | Ubah nilai dalam file hive.properties Trino. | Restarts Trino-Server (for Trino) | 
| trino-exchange-manager | Ubah nilai dalam file exchange-manager.properties Trino. | Restarts Trino-Server (for Trino) | 
| trino-connector-iceberg | Ubah nilai dalam file iceberg.properties Trino. | Restarts Trino-Server (for Trino) | 
| trino-connector-hudi | Ubah nilai dalam file hudi.properties Trino. | Restarts Trino-Server (for Trino) | 
| trino-connector-jmx | Ubah nilai dalam file jmx.properties Trino. | Not available. | 
| trino-connector-kafka | Ubah nilai dalam file kafka.properties Trino. | Not available. | 
| trino-connector-localfile | Ubah nilai dalam file localfile.properties Trino. | Not available. | 
| trino-connector-memory | Ubah nilai dalam file memory.properties Trino. | Not available. | 
| trino-connector-mongodb | Ubah nilai dalam file mongodb.properties Trino. | Not available. | 
| trino-connector-mysql | Ubah nilai dalam file mysql.properties Trino. | Not available. | 
| trino-connector-postgresql | Ubah nilai dalam file postgresql.properties Trino. | Not available. | 
| trino-connector-raptor | Ubah nilai dalam file raptor.properties Trino. | Not available. | 
| trino-connector-redis | Ubah nilai dalam file redis.properties Trino. | Not available. | 
| trino-connector-redshift | Ubah nilai dalam file redshift.properties Trino. | Not available. | 
| trino-connector-tpch | Ubah nilai dalam file tpch.properties Trino. | Not available. | 
| trino-connector-tpcds | Ubah nilai dalam file tpcds.properties Trino. | Not available. | 
| ranger-kms-dbks-site | Ubah nilai dalam file dbks-site.xml Ranger KMS. | Restarts Ranger KMS Server. | 
| ranger-kms-site | Ubah nilai dalam ranger-kms-site file.xml. dari Ranger KMS. | Restarts Ranger KMS Server. | 
| ranger-kms-env | Ubah nilai di lingkungan Ranger KMS. | Restarts Ranger KMS Server. | 
| ranger-kms-logback | Ubah nilai dalam file kms-logback.xml dari Ranger KMS. | Not available. | 
| ranger-kms-db-ca | Ubah nilai untuk file CA pada S3 untuk koneksi MySQL SSL dengan Ranger KMS. | Not available. | 
| spark | Pengaturan terkurasi Amazon EMR untuk Apache Spark. | This property modifies spark-defaults. See actions there. | 
| spark-defaults | Ubah nilai dalam file spark-defaults.conf Spark. | Restarts Spark history server and Spark thrift server. | 
| spark-env | Ubah nilai di lingkungan Spark. | Restarts Spark history server and Spark thrift server. | 
| spark-hive-site | Ubah nilai dalam file hive-site.xml Spark | Not available. | 
| spark-log4j2 | Ubah nilai dalam file log4j2.properties Spark. | Restarts Spark history server and Spark thrift server. | 
| spark-metrics | Ubah nilai dalam file metrics.properties Spark. | Restarts Spark history server and Spark thrift server. | 
| tez-site | Ubah nilai dalam file tez-site.xml Tez. | Restart Oozie and HiveServer2. | 
| yarn-env | Ubah nilai di lingkungan YARN. | Restarts the Hadoop YARN services ResourceManager, NodeManager, ProxyServer, and TimelineServer. Additionally restarts MapReduce-HistoryServer. | 
| yarn-site | Ubah nilai dalam file yarn-site.xml YARN. | Restarts the Hadoop YARN services ResourceManager, NodeManager, ProxyServer, and TimelineServer. Additionally restarts Livy Server and MapReduce-HistoryServer. | 
| zeppelin-env | Ubah nilai di lingkungan Zeppelin. | Restarts Zeppelin. | 
| zeppelin-site | Ubah pengaturan konfigurasi di zeppelin-site.xml. | Restarts Zeppelin. | 
| zookeeper-config | Ubah nilai dalam ZooKeeper file zoo.cfg. | Restarts Zookeeper server. | 
| zookeeper-logback | Ubah nilai dalam ZooKeeper file logback.xml. | Restarts Zookeeper server. | 
| emr-metrics | Ubah pengaturan metrik emr untuk simpul ini. | Restarts the CloudWatchAgent service. | 

## 7.7.0 perubahan log
<a name="770-changelog"></a>


**Ubah log untuk catatan rilis dan rilis 7.7.0**  

| Date | Peristiwa | Deskripsi | 
| --- | --- | --- | 
| 2025-02-07 | Publikasi Docs | Amazon EMR 7.7.0 catatan rilis pertama kali diterbitkan | 
| 2025-02-06 | Penerapan selesai | [Amazon EMR 7.7.0 sepenuhnya diterapkan ke semua Wilayah yang didukung](https://aws.amazon.com/about-aws/global-infrastructure/regional-product-services/) | 
| 2025-01-30 | Rilis terbatas awal | Amazon EMR 7.7.0 pertama kali dikerahkan ke Wilayah komersial awal | 

# Amazon EMR rilis 7.6.0
<a name="emr-760-release"></a>

## 7.6.0 siklus hidup yang didukung
<a name="emr-760-supported-lifecycle"></a>

Tabel berikut menjelaskan tanggal siklus hidup yang didukung untuk rilis Amazon EMR 7.6.0.


| Fase Support | Date | 
| --- | --- | 
| Tanggal rilis awal | Januari 10, 2025 | 
| Dukungan standar sampai | Januari 09, 2027 | 
| Akhir dari dukungan | Januari 10, 2027 | 
| Akhir hidup | Januari 10, 2028 | 

## 7.6.0 versi aplikasi
<a name="emr-760-app-versions"></a>

Rilis ini mencakup aplikasi berikut: [https://docs.aws.amazon.com/AmazonCloudWatch/latest/monitoring/Install-CloudWatch-Agent.html](https://docs.aws.amazon.com/AmazonCloudWatch/latest/monitoring/Install-CloudWatch-Agent.html), [https://delta.io/](https://delta.io/), [https://flink.apache.org/](https://flink.apache.org/), [http://hbase.apache.org/](http://hbase.apache.org/), [https://cwiki.apache.org/confluence/display/Hive/HCatalog](https://cwiki.apache.org/confluence/display/Hive/HCatalog), [http://hive.apache.org/](http://hive.apache.org/), [https://hudi.apache.org](https://hudi.apache.org), [http://gethue.com/](http://gethue.com/), [https://iceberg.apache.org/](https://iceberg.apache.org/), [https://jupyter-enterprise-gateway.readthedocs.io/en/latest/](https://jupyter-enterprise-gateway.readthedocs.io/en/latest/), [https://jupyterhub.readthedocs.io/en/latest/#](https://jupyterhub.readthedocs.io/en/latest/#), [https://livy.incubator.apache.org/](https://livy.incubator.apache.org/), [http://oozie.apache.org/](http://oozie.apache.org/), [https://phoenix.apache.org/](https://phoenix.apache.org/), [http://pig.apache.org/](http://pig.apache.org/), [https://prestodb.io/](https://prestodb.io/), [https://spark.apache.org/docs/latest/](https://spark.apache.org/docs/latest/), [https://www.tensorflow.org/](https://www.tensorflow.org/), [https://tez.apache.org/](https://tez.apache.org/), [https://trino.io/](https://trino.io/), [https://zeppelin.incubator.apache.org/](https://zeppelin.incubator.apache.org/), dan [https://zookeeper.apache.org](https://zookeeper.apache.org).

Tabel di bawah ini mencantumkan versi aplikasi yang tersedia dalam rilis Amazon EMR ini dan versi aplikasi dalam tiga rilis EMR Amazon sebelumnya (bila berlaku).

Untuk riwayat lengkap versi aplikasi untuk setiap rilis Amazon EMR, lihat topik berikut:
+ [Versi aplikasi di Amazon EMR 7.x rilis](emr-release-app-versions-7.x.md)
+ [Versi aplikasi di Amazon EMR 6.x rilis](emr-release-app-versions-6.x.md)
+ [Versi aplikasi di Amazon EMR 5.x rilis](emr-release-app-versions-5.x.md)
+ [Versi aplikasi di Amazon EMR 4.x rilis](emr-release-app-versions-4.x.md)


**Informasi versi aplikasi**  

|  | emr-7.6.0 | emr-7.5.0 | emr-7.4.0 | emr-7.3.0 | 
| --- | --- | --- | --- | --- | 
| AWS SDK for Java | 2.29.25, 1.12.779 | 2.28.8, 1.12.772 | 2.28.8, 1.12.772 | 2.25.70, 1.12.747 | 
| Python | 3.9, 3.11 | 3.9, 3.11 | 3.9, 3.11 | 3.9, 3.11 | 
| Skala | 2.12.18 | 2.12.18 | 2.12.18 | 2.12.18 | 
| AmazonCloudWatchAgent | 1.300032.2-amzn-0 | 1.300032.2-amzn-0 | 1.300032.2-amzn-0 | 1.300032.2-amzn-0 | 
| Delta | Versi 3.2.1-amzn-1 | 3.2.1-amzn-0 | 3.2.0-amzn-1 | 3.2.0-amzn-0 | 
| Flink | 1.20.0-amzn-0 | 1.19.1-amzn-1 | 1.19.1-amzn-0 | 1.18.1-amzn-2 | 
| Ganglia |  -  |  -  |  -  |  -  | 
| HBase | 2.6.1-amzn-0 | 2.5.10-amzn-0 | 2.5.5-amzn-0 | 2.4.17-amzn-7 | 
| HCatalog | 3.1.3-amzn-15 | 3.1.3-amzn-14 | 3.1.3-amzn-13 | 3.1.3-amzn-12 | 
| Hadoop | 3.4.0-amzn-2 | 3.4.0-amzn-1 | 3.4.0-amzn-0 | 3.3.6-amzn-5 | 
| Hive | 3.1.3-amzn-15 | 3.1.3-amzn-14 | 3.1.3-amzn-13 | 3.1.3-amzn-12 | 
| Hudi | 0.15.0-amzn-3 | 0.15.0-amzn-2 | 0.15.0-amzn-1 | 0.15.0-amzn-0 | 
| Hue | 4.11.0 | 4.11.0 | 4.11.0 | 4.11.0 | 
| Iceberg | 1.6.1-amzn-2 | 1.6.1-amzn-1 | 1.6.1-amzn-0 | 1.5.2-amzn-0 | 
| JupyterEnterpriseGateway | 2.6.0 | 2.6.0 | 2.6.0 | 2.6.0 | 
| JupyterHub | 1.5.0 | 1.5.0 | 1.5.0 | 1.5.0 | 
| Livy | 0.8.0-inkubasi | 0.8.0-inkubasi | 0.8.0-inkubasi | 0.8.0-inkubasi | 
| MXNet |  -  |  -  |  -  |  -  | 
| Mahout |  -  |  -  |  -  |  -  | 
| Oozie | 5.2.1 | 5.2.1 | 5.2.1 | 5.2.1 | 
| Phoenix | 5.2.0 | 5.2.0 | 5.2.0 | 5.1.3 | 
| Pig | 0.17.0 | 0.17.0 | 0.17.0 | 0.17.0 | 
| Presto | 0,287-amzn-1 | 0,287-amzn-0 | 0,287-amzn-0 | 0.285-amzn-1 | 
| Spark | 3.5.3-amzn-0 | 3.5.2-amzn-1 | 3.5.2-amzn-0 | 3.5.1-amzn-1 | 
| Sqoop |  -  |  -  | 1.4.7 | 1.4.7 | 
| TensorFlow | 2.16.1 | 2.16.1 | 2.16.1 | 2.16.1 | 
| Tez | 0.10.2-amzn-13 | 0.10.2-amzn-12 | 0.10.2-amzn-11 | 0.10.2-amzn-10 | 
| Trino (PrestoSQL) | 457-amzn-0 | 446-amzn-0 | 446-amzn-0 | 442-amzn-0 | 
| Zeppelin | 0.11.1 | 0.11.1 | 0.11.1 | 0.11.1 | 
| ZooKeeper | 3.9.2-amzn-0 | 3.9.2-amzn-0 | 3.9.2-amzn-0 | 3.9.1-amzn-1 | 

# Rincian komponen rilis 7.6.0
<a name="emr-760-release-components-details"></a>

Lihat tabel berikut untuk informasi selengkapnya tentang paket *Ekstra* di Amazon EMR 7.6.0.


| Aplikasi | Jenis Aplikasi | Paket | Jenis Package | Versi Package | 
| --- | --- | --- | --- | --- | 
|  AmazonCloudWatchAgent  |  Core  |  hadoop-hdfs-journalnode  |  Ekstra  |  3.4.0.amzn.2-1.amzn2023  | 
|  AmazonCloudWatchAgent  |  Core  |  ranger-km  |  Ekstra  |  2.0.0-1.amzn2023  | 
|  AmazonCloudWatchAgent  |  Core  |  s3-dist-cp  |  Ekstra  |  2.36.0-1.amzn2023  | 
|  AmazonCloudWatchAgent  |  Core  |  penjaga kebun binatang  |  Ekstra  |  3.9.2.amzn.0-1.amzn2023  | 
|  AmazonCloudWatchAgent  |  Core  |  zookeper-server  |  Ekstra  |  3.9.2.amzn.0-1.amzn2023  | 
|  Flink  |  Core  |  hadop-client  |  Ekstra  |  3.4.0.amzn.2-1.amzn2023  | 
|  Flink  |  Core  |  hadoop-hdfs  |  Ekstra  |  3.4.0.amzn.2-1.amzn2023  | 
|  Flink  |  Core  |  hadoop-hdfs-datanode  |  Ekstra  |  3.4.0.amzn.2-1.amzn2023  | 
|  Flink  |  Core  |  hadoop-hdfs-journalnode  |  Ekstra  |  3.4.0.amzn.2-1.amzn2023  | 
|  Flink  |  Core  |  hadoop-hdfs-namenode  |  Ekstra  |  3.4.0.amzn.2-1.amzn2023  | 
|  Flink  |  Core  |  hadoop-httpfs  |  Ekstra  |  3.4.0.amzn.2-1.amzn2023  | 
|  Flink  |  Core  |  hadoop-km  |  Ekstra  |  3.4.0.amzn.2-1.amzn2023  | 
|  Flink  |  Core  |  hadoop-mapreduce  |  Ekstra  |  3.4.0.amzn.2-1.amzn2023  | 
|  Flink  |  Core  |  hadoop-mapreduce-historyserver  |  Ekstra  |  3.4.0.amzn.2-1.amzn2023  | 
|  Flink  |  Core  |  hadoop-benang  |  Ekstra  |  3.4.0.amzn.2-1.amzn2023  | 
|  Flink  |  Core  |  hadoop-yarn-nodemanager  |  Ekstra  |  3.4.0.amzn.2-1.amzn2023  | 
|  Flink  |  Core  |  hadoop-yarn-proxyserver  |  Ekstra  |  3.4.0.amzn.2-1.amzn2023  | 
|  Flink  |  Core  |  hadoop-yarn-resourcemanager  |  Ekstra  |  3.4.0.amzn.2-1.amzn2023  | 
|  Flink  |  Core  |  hadoop-yarn-timelineserver  |  Ekstra  |  3.4.0.amzn.2-1.amzn2023  | 
|  Flink  |  Core  |  hudi  |  Ekstra  |  0.15.0.amzn.3-1.amzn2023  | 
|  Flink  |  Core  |  ranger-km  |  Ekstra  |  2.0.0-1.amzn2023  | 
|  Flink  |  Core  |  hadoop  |  Ekstra  |  3.4.0.amzn.2-1.amzn2023  | 
|  HBase  |  Core  |  s3-dist-cp  |  Ekstra  |  2.36.0-1.amzn2023  | 
|  HCatalog  |  Core  |  hadoop-yarn-proxyserver  |  Ekstra  |  3.4.0.amzn.2-1.amzn2023  | 
|  HCatalog  |  Core  |  mariadb-connector-java  |  Ekstra  |    | 
|  Hive  |  Core  |  hadoop-httpfs  |  Ekstra  |  3.4.0.amzn.2-1.amzn2023  | 
|  Hive  |  Core  |  hadoop-yarn-proxyserver  |  Ekstra  |  3.4.0.amzn.2-1.amzn2023  | 
|  Hive  |  Core  |  hive-hbase  |  Ekstra  |  3.1.3.amzn.15-1.amzn2023  | 
|  Hive  |  Core  |  mariadb-connector-java  |  Ekstra  |  2.7.2-1  | 
|  Hive  |  Core  |  s3-dist-cp  |  Ekstra  |  2.36.0-1.amzn2023  | 
|  Phoenix  |  Core  |  s3-dist-cp  |  Ekstra  |  2.36.0-1.amzn2023  | 
|  Spark  |  Core  |  spark-datanucleus  |  Ekstra  |  3.5.1.amzn.0-1.amzn2023  | 
|  Tez  |  Core  |  hadoop-mapreduce  |  Ekstra  |  3.4.0.amzn.2-1.amzn2023  | 
|  Tez  |  Core  |  hadoop-mapreduce-historyserver  |  Ekstra  |  3.4.0.amzn.2-1.amzn2023  | 
|  Tez  |  Core  |  hadoop-yarn-proxyserver  |  Ekstra  |  3.4.0.amzn.2-1.amzn2023  | 
|  Trino  |  Core  |  utilitas besar  |  Ekstra  |  1.2.0-1.amzn2023  | 
|  Trino  |  Core  |  hadop-client  |  Ekstra  |  3.4.0.amzn.2-1.amzn2023  | 
|  Trino  |  Core  |  hadoop-hdfs  |  Ekstra  |  3.4.0.amzn.2-1.amzn2023  | 
|  Trino  |  Core  |  hadoop-hdfs-datanode  |  Ekstra  |  3.4.0.amzn.2-1.amzn2023  | 
|  Trino  |  Core  |  hadoop-hdfs-journalnode  |  Ekstra  |  3.4.0.amzn.2-1.amzn2023  | 
|  Trino  |  Core  |  hadoop-hdfs-namenode  |  Ekstra  |  3.4.0.amzn.2-1.amzn2023  | 
|  Trino  |  Core  |  hadoop-km  |  Ekstra  |  3.4.0.amzn.2-1.amzn2023  | 
|  Trino  |  Core  |  hadoop-mapreduce  |  Ekstra  |  3.4.0.amzn.2-1.amzn2023  | 
|  Trino  |  Core  |  hadoop-mapreduce-historyserver  |  Ekstra  |  3.4.0.amzn.2-1.amzn2023  | 
|  Trino  |  Core  |  hadoop-benang  |  Ekstra  |  3.4.0.amzn.2-1.amzn2023  | 
|  Trino  |  Core  |  hadoop-yarn-nodemanager  |  Ekstra  |  3.4.0.amzn.2-1.amzn2023  | 
|  Trino  |  Core  |  hadoop-yarn-proxyserver  |  Ekstra  |  3.4.0.amzn.2-1.amzn2023  | 
|  Trino  |  Core  |  hadoop-yarn-resourcemanager  |  Ekstra  |  3.4.0.amzn.2-1.amzn2023  | 
|  Trino  |  Core  |  hadoop-yarn-timelineserver  |  Ekstra  |  3.4.0.amzn.2-1.amzn2023  | 
|  Trino  |  Core  |  hive  |  Ekstra  |  3.1.3.amzn.12-1.amzn2023  | 
|  Trino  |  Core  |  hive-hcatalog-server  |  Ekstra  |  3.1.3.amzn.12-1.amzn2023  | 
|  Trino  |  Core  |  mariadb-connector-java  |  Ekstra  |  2.7.2-1  | 
|  Trino  |  Core  |  ranger-km  |  Ekstra  |  2.0.0-1.amzn2023  | 
|  Trino  |  Core  |  penjaga kebun binatang  |  Ekstra  |  3.9.2.amzn.0-1.amzn2023  | 
|  Trino  |  Core  |  zookeper-server  |  Ekstra  |  3.9.2.amzn.0-1.amzn2023  | 
|  Trino  |  Core  |  bigtop-groovy  |  Ekstra  |  2.5.4-1.amzn2023  | 
|  Trino  |  Core  |  bigtop-jsvc  |  Ekstra  |  1.2.4-1.amzn2023  | 
|  Trino  |  Core  |  hadoop  |  Ekstra  |  3.4.0.amzn.2-1.amzn2023  | 
|  Trino  |  Core  |  hadoop-lzo  |  Ekstra  |  0.4.19-1.amzn2023  | 
|  Trino  |  Core  |  hive-hcatalog  |  Ekstra  |  3.1.3.amzn.15-1.amzn2023  | 
|  Trino  |  Core  |  sarang-jdbc  |  Ekstra  |  3.1.3.amzn.12-1.amzn2023  | 
|  Zookeeper  |  Core  |  emrfs  |  Ekstra  |  3.9.2.amzn.0-1.amzn2023  | 
|  Zookeeper  |  Core  |  hadop-client  |  Ekstra  |  3.9.2.amzn.0-1.amzn2023  | 
|  Zookeeper  |  Core  |  hadoop-hdfs  |  Ekstra  |  3.9.2.amzn.0-1.amzn2023  | 
|  Zookeeper  |  Core  |  hadoop-hdfs-datanode  |  Ekstra  |  3.9.2.amzn.0-1.amzn2023  | 
|  Zookeeper  |  Core  |  hadoop-hdfs-journalnode  |  Ekstra  |  3.9.2.amzn.0-1.amzn2023  | 
|  Zookeeper  |  Core  |  hadoop-hdfs-namenode  |  Ekstra  |  3.9.2.amzn.0-1.amzn2023  | 
|  Zookeeper  |  Core  |  hadoop-httpfs  |  Ekstra  |  3.9.2.amzn.0-1.amzn2023  | 
|  Zookeeper  |  Core  |  hadoop-km  |  Ekstra  |  3.9.2.amzn.0-1.amzn2023  | 
|  Zookeeper  |  Core  |  hadoop-mapreduce  |  Ekstra  |  3.4.0.amzn.2-1.amzn2023  | 
|  Zookeeper  |  Core  |  hadoop-mapreduce-historyserver  |  Ekstra  |  3.4.0.amzn.2-1.amzn2023  | 
|  Zookeeper  |  Core  |  hadoop-benang  |  Ekstra  |  3.4.0.amzn.2-1.amzn2023  | 
|  Zookeeper  |  Core  |  hadoop-yarn-nodemanager  |  Ekstra  |  3.4.0.amzn.2-1.amzn2023  | 
|  Zookeeper  |  Core  |  hadoop-yarn-proxyserver  |  Ekstra  |  3.4.0.amzn.2-1.amzn2023  | 
|  Zookeeper  |  Core  |  hadoop-yarn-resourcemanager  |  Ekstra  |  3.4.0.amzn.2-1.amzn2023  | 
|  Zookeeper  |  Core  |  hadoop-yarn-timelineserver  |  Ekstra  |  3.4.0.amzn.2-1.amzn2023  | 
|  Zookeeper  |  Core  |  ranger-km  |  Ekstra  |  2.0.0-1.amzn2023  | 

# 7.6.0 kerentanan dan eksposur umum
<a name="760-common-vulnerabilities-exposures"></a>

Tabel berikut mencantumkan semua CVEs yang tidak memengaruhi kluster EMR yang berjalan pada konfigurasi Amazon EMR 7.6.0 yang direkomendasikan. Amazon EMR bergantung pada sumber terbuka hulu untuk ketersediaan perbaikan dan akan memberikan versi stabil terbaru sebagai bagian dari komponen Core Engine dalam waktu 90 hari setelah Amazon EMR memverifikasi perbaikan.

Tabel ini diperbarui pada 9 Januari 2025.


| ID CVE | Kepelikan | URL detail CVE | 
| --- | --- | --- | 
|  CVE-2013-7285  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2013-7285)-2013-7285  | 
|  CVE-2015-1832  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2015-1832)-2015-1832  | 
|  CVE-2016-5018  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2016-5018)-2016-5018  | 
|  CVE-2017-15095  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2017-15095)-2017-15095  | 
|  CVE-2017-17485  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2017-17485)-2017-17485  | 
|  CVE-2017-7525  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2017-7525)-2017-7525  | 
|  CVE-2018-11307  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-11307)-2018-11307  | 
|  CVE-2018-14718  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-14718)-2018-14718  | 
|  CVE-2018-14719  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE-2018-14719](https://nvd.nist.gov/vuln/detail/CVE-2018-14719)  | 
|  CVE-2018-14720  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-14720)-2018-14720  | 
|  CVE-2018-14721  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-14721)-2018-14721  | 
|  CVE-2018-19360  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-19360)-2018-19360  | 
|  CVE-2018-19361  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-19361)-2018-19361  | 
|  CVE-2018-19362  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-19362)-2018-19362  | 
|  CVE-2018-7489  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-7489)-2018-7489  | 
|  CVE-2019-10173  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-10173)-2019-10173  | 
|  CVE-2019-10202  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-10202)-2019-10202  | 
|  CVE-2019-14379  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-14379)-2019-14379  | 
|  CVE-2019-14540  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-14540)-2019-14540  | 
|  CVE-2019-14892  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-14892)-2019-14892  | 
|  CVE-2019-14893  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-14893)-2019-14893  | 
|  CVE-2019-16335  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-16335)-2019-16335  | 
|  CVE-2019-16942  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-16942)-2019-16942  | 
|  CVE-2019-16943  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-16943)-2019-16943  | 
|  CVE-2019-17267  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-17267)-2019-17267  | 
|  CVE-2019-17531  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-17531)-2019-17531  | 
|  CVE-2019-20330  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-20330)-2019-20330  | 
|  CVE-2019-20444  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-20444)-2019-20444  | 
|  CVE-2019-20445  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-20445)-2019-20445  | 
|  CVE-2020-8840  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-8840)-2020-8840  | 
|  CVE-2020-9546  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-9546)-2020-9546  | 
|  CVE-2020-9547  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-9547)-2020-9547  | 
|  CVE-2020-9548  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-9548)-2020-9548  | 
|  CVE-2021-21342  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2021-21342)-2021-21342  | 
|  CVE-2021-21344  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2021-21344)-2021-21344  | 
|  CVE-2021-21345  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2021-21345)-2021-21345  | 
|  CVE-2021-21346  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2021-21346)-2021-21346  | 
|  CVE-2021-21347  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2021-21347)-2021-21347  | 
|  CVE-2021-21350  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2021-21350)-2021-21350  | 
|  CVE-2021-21351  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2021-21351)-2021-21351  | 
|  CVE-2021-41411  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2021-41411)-2021-41411  | 
|  CVE-2022-1471  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-1471)-2022-1471  | 
|  CVE-2022-37865  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-37865)-2022-37865  | 
|  CVE-2022-39135  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-39135)-2022-39135  | 
|  CVE-2022-42889  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-42889)-2022-42889  | 
|  CVE-2022-46337  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-46337)-2022-46337  | 
|  CVE-2024-47561  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-47561)-2024-47561  | 
|  CVE-2024-52046  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-52046)-2024-52046  | 
|  CVE-2024-53990  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-53990)-2024-53990  | 
|  CVE-2012-0881  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2012-0881)-2012-0881  | 
|  CVE-2013-4002  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2013-4002)-2013-4002  | 
|  CVE-2014-8125  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2014-8125)-2014-8125  | 
|  CVE-2015-5237  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2015-5237)-2015-5237  | 
|  CVE-2016-3674  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2016-3674)-2016-3674  | 
|  CVE-2016-6796  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2016-6796)-2016-6796  | 
|  CVE-2017-7957  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2017-7957)-2017-7957  | 
|  CVE-2018-1000180  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-1000180)-2018-1000180  | 
|  CVE-2018-12022  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-12022)-2018-12022  | 
|  CVE-2018-12023  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-12023)-2018-12023  | 
|  CVE-2018-5968  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-5968)-2018-5968  | 
|  CVE-2019-0205  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-0205)-2019-0205  | 
|  CVE-2019-10172  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-10172)-2019-10172  | 
|  CVE-2019-12086  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-12086)-2019-12086  | 
|  CVE-2019-14439  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-14439)-2019-14439  | 
|  CVE-2020-10650  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-10650)-2020-10650  | 
|  CVE-2020-10672  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-10672)-2020-10672  | 
|  CVE-2020-10673  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-10673)-2020-10673  | 
|  CVE-2020-10968  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-10968)-2020-10968  | 
|  CVE-2020-10969  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-10969)-2020-10969  | 
|  CVE-2020-11111  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-11111)-2020-11111  | 
|  CVE-2020-11112  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-11112)-2020-11112  | 
|  CVE-2020-11113  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-11113)-2020-11113  | 
|  CVE-2020-11619  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-11619](https://nvd.nist.gov/vuln/detail/CVE-2020-11619)  | 
|  CVE-2020-11620  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-11620)-2020-11620  | 
|  CVE-2020-13936  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-13936)-2020-13936  | 
|  CVE-2020-13949  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-13949)-2020-13949  | 
|  CVE-2020-14060  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-14060)-2020-14060  | 
|  CVE-2020-14061  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-14061)-2020-14061  | 
|  CVE-2020-14062  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-14062)-2020-14062  | 
|  CVE-2020-14195  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-14195)-2020-14195  | 
|  CVE-2020-24616  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-24616)-2020-24616  | 
|  CVE-2020-24750  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-24750)-2020-24750  | 
|  CVE-2020-25649  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-25649)-2020-25649  | 
|  CVE-2020-26217  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-26217)-2020-26217  | 
|  CVE-2020-26258  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-26258)-2020-26258  | 
|  CVE-2020-28052  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-28052)-2020-28052  | 
|  CVE-2020-35490  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-35490)-2020-35490  | 
|  CVE-2020-35491  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-35491)-2020-35491  | 
|  CVE-2020-35728  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-35728)-2020-35728  | 
|  CVE-2020-36179  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36179)-2020-36179  | 
|  CVE-2020-36180  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36180)-2020-36180  | 
|  CVE-2020-36181  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36181)-2020-36181  | 
|  CVE-2020-36182  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36182)-2020-36182  | 
|  CVE-2020-36183  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36183)-2020-36183  | 
|  CVE-2020-36184  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36184)-2020-36184  | 
|  CVE-2020-36185  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36185)-2020-36185  | 
|  CVE-2020-36186  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36186)-2020-36186  | 
|  CVE-2020-36187  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36187)-2020-36187  | 
|  CVE-2020-36188  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36188)-2020-36188  | 
|  CVE-2020-36189  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36189)-2020-36189  | 
|  CVE-2020-36518  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36518)-2020-36518  | 
|  CVE-2021-20190  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2021-20190)-2021-20190  | 
|  CVE-2021-21341  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2021-21341)-2021-21341  | 
|  CVE-2021-21343  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2021-21343)-2021-21343  | 
|  CVE-2021-21348  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2021-21348)-2021-21348  | 
|  CVE-2021-21349  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2021-21349)-2021-21349  | 
|  CVE-2021-29505  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2021-29505)-2021-29505  | 
|  CVE-2021-31684  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2021-31684)-2021-31684  | 
|  CVE-2021-34538  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2021-34538)-2021-34538  | 
|  CVE-2021-37136  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2021-37136)-2021-37136  | 
|  CVE-2021-39139  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2021-39139)-2021-39139  | 
|  CVE-2021-39141  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2021-39141)-2021-39141  | 
|  CVE-2021-39144  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2021-39144)-2021-39144  | 
|  CVE-2021-39145  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2021-39145)-2021-39145  | 
|  CVE-2021-39146  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2021-39146)-2021-39146  | 
|  CVE-2021-39147  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2021-39147)-2021-39147  | 
|  CVE-2021-39148  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2021-39148)-2021-39148  | 
|  CVE-2021-39149  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2021-39149)-2021-39149  | 
|  CVE-2021-39150  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2021-39150)-2021-39150  | 
|  CVE-2021-39151  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2021-39151)-2021-39151  | 
|  CVE-2021-39152  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2021-39152)-2021-39152  | 
|  CVE-2021-39153  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2021-39153)-2021-39153  | 
|  CVE-2021-39154  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2021-39154)-2021-39154  | 
|  CVE-2021-43859  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2021-43859)-2021-43859  | 
|  CVE-2022-1415  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-1415)-2022-1415  | 
|  CVE-2022-25647  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-25647)-2022-25647  | 
|  CVE-2022-25857  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-25857)-2022-25857  | 
|  CVE-2022-3171  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-3171)-2022-3171  | 
|  CVE-2022-3509  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-3509)-2022-3509  | 
|  CVE-2022-3510  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-3510)-2022-3510  | 
|  CVE-2022-36364  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-36364)-2022-36364  | 
|  CVE-2022-37866  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-37866)-2022-37866  | 
|  CVE-2022-40149  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-40149)-2022-40149  | 
|  CVE-2022-40150  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-40150)-2022-40150  | 
|  CVE-2022-40151  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-40151)-2022-40151  | 
|  CVE-2022-40152  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-40152)-2022-40152  | 
|  CVE-2022-41966  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-41966)-2022-41966  | 
|  CVE-2022-42003  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-42003)-2022-42003  | 
|  CVE-2022-42004  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-42004)-2022-42004  | 
|  CVE-2022-45685  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-45685)-2022-45685  | 
|  CVE-2022-45688  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-45688)-2022-45688  | 
|  CVE-2022-45693  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-45693)-2022-45693  | 
|  CVE-2022-46751  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-46751)-2022-46751  | 
|  CVE-2023-1370  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-1370)-2023-1370  | 
|  CVE-2023-1436  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-1436)-2023-1436  | 
|  CVE-2023-20883  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-20883)-2023-20883  | 
|  CVE-2023-25194  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-25194)-2023-25194  | 
|  CVE-2023-2976  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-2976)-2023-2976  | 
|  CVE-2023-34453  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-34453)-2023-34453  | 
|  CVE-2023-34454  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-34454)-2023-34454  | 
|  CVE-2023-34455  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-34455)-2023-34455  | 
|  CVE-2023-3635  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-3635)-2023-3635  | 
|  CVE-2023-39410  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-39410)-2023-39410  | 
|  CVE-2023-43642  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-43642)-2023-43642  | 
|  CVE-2023-44487  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-44487)-2023-44487  | 
|  CVE-2023-50387  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-50387)-2023-50387  | 
|  CVE-2023-5072  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-5072)-2023-5072  | 
|  CVE-2023-52428  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-52428)-2023-52428  | 
|  CVE-2023-6378  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-6378)-2023-6378  | 
|  CVE-2023-6481  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-6481)-2023-6481  | 
|  CVE-2024-21634  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-21634)-2024-21634  | 
|  CVE-2024-7254  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-7254)-2024-7254  | 
|  CVE-2009-2625  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2009-2625)-2009-2625  | 
|  CVE-2012-5783  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2012-5783)-2012-5783  | 
|  CVE-2012-6153  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2012-6153)-2012-6153  | 
|  CVE-2017-10355  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2017-10355)-2017-10355  | 
|  CVE-2018-10237  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-10237)-2018-10237  | 
|  CVE-2018-11798  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-11798)-2018-11798  | 
|  CVE-2018-1313  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-1313)-2018-1313  | 
|  CVE-2018-2799  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-2799)-2018-2799  | 
|  CVE-2019-10219  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE-2019-10219](https://nvd.nist.gov/vuln/detail/CVE-2019-10219)  | 
|  CVE-2019-12384  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-12384)-2019-12384  | 
|  CVE-2019-12814  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-12814)-2019-12814  | 
|  CVE-2020-10693  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-10693)-2020-10693  | 
|  CVE-2020-13955  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-13955)-2020-13955  | 
|  CVE-2020-13956  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-13956)-2020-13956  | 
|  CVE-2020-14338  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-14338)-2020-14338  | 
|  CVE-2020-15250  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-15250)-2020-15250  | 
|  CVE-2020-15522  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-15522)-2020-15522  | 
|  CVE-2020-17521  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-17521)-2020-17521  | 
|  CVE-2020-1945  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-1945](https://nvd.nist.gov/vuln/detail/CVE-2020-1945)  | 
|  CVE-2020-26939  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-26939)-2020-26939  | 
|  CVE-2020-29582  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-29582)-2020-29582  | 
|  CVE-2021-21290  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2021-21290)-2021-21290  | 
|  CVE-2021-21295  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2021-21295)-2021-21295  | 
|  CVE-2021-22569  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2021-22569)-2021-22569  | 
|  CVE-2021-22570  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2021-22570)-2021-22570  | 
|  CVE-2021-27568  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2021-27568)-2021-27568  | 
|  CVE-2021-28170  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2021-28170)-2021-28170  | 
|  CVE-2021-29425  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2021-29425)-2021-29425  | 
|  CVE-2021-36373  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2021-36373)-2021-36373  | 
|  CVE-2021-36374  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2021-36374)-2021-36374  | 
|  CVE-2021-37533  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2021-37533)-2021-37533  | 
|  CVE-2021-38153  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2021-38153)-2021-38153  | 
|  CVE-2022-23437  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-23437)-2022-23437  | 
|  CVE-2022-24329  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE-2022-24329](https://nvd.nist.gov/vuln/detail/CVE-2022-24329)  | 
|  CVE-2022-38749  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-38749)-2022-38749  | 
|  CVE-2022-38750  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-38750)-2022-38750  | 
|  CVE-2022-38751  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-38751)-2022-38751  | 
|  CVE-2022-38752  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-38752)-2022-38752  | 
|  CVE-2022-41854  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-41854)-2022-41854  | 
|  CVE-2023-0833  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-0833)-2023-0833  | 
|  CVE-2023-20863  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-20863)-2023-20863  | 
|  CVE-2023-26049  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-26049)-2023-26049  | 
|  CVE-2023-33201  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-33201)-2023-33201  | 
|  CVE-2023-33202  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-33202)-2023-33202  | 
|  CVE-2023-34462  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-34462)-2023-34462  | 
|  CVE-2023-42503  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-42503)-2023-42503  | 
|  CVE-2023-51074  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-51074)-2023-51074  | 
|  CVE-2024-12798  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-12798)-2024-12798  | 
|  CVE-2024-25710  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-25710)-2024-25710  | 
|  CVE-2024-26308  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-26308)-2024-26308  | 
|  CVE-2024-38820  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-38820)-2024-38820  | 
|  CVE-2024-6763  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-6763)-2024-6763  | 
|  CVE-2024-8184  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-8184)-2024-8184  | 
|  CVE-2020-8908  |  RENDAH  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-8908)-2020-8908  | 
|  CVE-2024-12801  |  RENDAH  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-12801)-2024-12801  | 
|  CVE-2023-50868  |  TIDAK DIUJICOBAKAN  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-50868)-2023-50868  | 
|  CVE-2024-23454  |  TIDAK DIUJICOBAKAN  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-23454)-2024-23454  | 
|  CVE-2024-23944  |  TIDAK DIUJICOBAKAN  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-23944)-2024-23944  | 
|  CVE-2024-23945  |  TIDAK DIUJICOBAKAN  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-23945)-2024-23945  | 
|  CVE-2024-25638  |  TIDAK DIUJICOBAKAN  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-25638)-2024-25638  | 
|  CVE-2024-29025  |  TIDAK DIUJICOBAKAN  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-29025)-2024-29025  | 
|  CVE-2024-29131  |  TIDAK DIUJICOBAKAN  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-29131)-2024-29131  | 
|  CVE-2024-29133  |  TIDAK DIUJICOBAKAN  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-29133)-2024-29133  | 
|  CVE-2024-29857  |  TIDAK DIUJICOBAKAN  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-29857)-2024-29857  | 
|  CVE-2024-30171  |  TIDAK DIUJICOBAKAN  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-30171)-2024-30171  | 
|  CVE-2024-31141  |  TIDAK DIUJICOBAKAN  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-31141)-2024-31141  | 
|  CVE-2024-36114  |  TIDAK DIUJICOBAKAN  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-36114)-2024-36114  | 
|  CVE-2024-38808  |  TIDAK DIUJICOBAKAN  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-38808)-2024-38808  | 
|  CVE-2024-43382  |  TIDAK DIUJICOBAKAN  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-43382)-2024-43382  | 
|  CVE-2024-47072  |  TIDAK DIUJICOBAKAN  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-47072)-2024-47072  | 
|  CVE-2024-47535  |  TIDAK DIUJICOBAKAN  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-47535)-2024-47535  | 
|  CVE-2024-47554  |  TIDAK DIUJICOBAKAN  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-47554)-2024-47554  | 
|  CVE-2024-51504  |  TIDAK DIUJICOBAKAN  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-51504)-2024-51504  | 
|  CVE-2024-56128  |  TIDAK DIUJICOBAKAN  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-56128)-2024-56128  | 
|  CVE-2024-9823  |  TIDAK DIUJICOBAKAN  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-9823)-2024-9823  | 

## Catatan rilis 7.6.0
<a name="emr-760-relnotes"></a>

Catatan rilis berikut mencakup informasi untuk Amazon EMR rilis 7.6.0.

**Fitur baru**
+ **Upgrade aplikasi** —Amazon EMR 7.6.0 application upgrades include HBase 2.6.1, Flink 1.20.0, Spark 3.5.3, and Trino 457.

**Masalah yang diketahui**
+ **Saat penskalaan terkelola diaktifkan, YARN ResourceManager (RM) mengalami masalah kebuntuan kritis, menyebabkannya menjadi tidak responsif, saat beralih dari status DECOMMISSIONING ke **DECOMMISSIONED** dengan operasi simultan.** Ini terjadi terutama di lingkungan cluster besar. Ketika itu terjadi, baik transisi keadaan simpul dan transisi keadaan aplikasi gagal diproses, secara efektif melumpuhkan fungsionalitas inti dari. ResourceManager Sebagai solusinya, restart RM JVM menggunakan perintah berikut pada node utama:

  ```
  sudo systemctl restart hadoop-yarn-resourcemanager
  ```
+ Ketika cluster EMR dimulai dengan penjadwal YARN selain `CapacityScheduler` atau `FairScheduler` (misalnya, Penjadwal FIFO), metrik tidak didorong ke`YARNMemoryAvailablePercentage`. CloudWatch Masalah ini berdampak pada penurunan skala dalam klaster yang diaktifkan penskalaan terkelola. Ini mungkin juga memengaruhi penskalaan terkelola khusus jika bergantung pada `YARNMemoryAvailablePercentage` metrik. Sebagai solusinya, gunakan atau. `CapacityScheduler` `FairScheduler`
+  **HBase pembuatan tabel di katalog Hive with Glue** - Dari EMR-7.3.0 hingga EMR-7.10.0, ada bug karena integrasi Hive Iceberg, yang menyebabkan HBase pembuatan tabel di Hive gagal saat Glue Data Catalog digunakan sebagai metastore. Silakan hubungi tim AWS dukungan jika Anda mengalami masalah ini.
+  **Tez UI** - Dari EMR-7.3 ke EMR-7.10, ada bug di mana mengakses UI Tez melalui UI Web Manajer Sumber Daya YARN gagal saat enkripsi dalam transit diaktifkan. Ini terjadi karena proxy YARN mencoba menggunakan protokol HTTP sementara Tez UI memerlukan HTTPS. Harap ubah `tez.tez-ui.history-url.base` konfigurasi `tez-site` dari `http` ke `https` untuk menyelesaikan masalah ini.

**Perubahan, penyempurnaan, dan masalah yang diselesaikan**
+ Dimulai dengan EMR 7.6.0, proses pembatalan langkah sekarang memastikan bahwa semua aplikasi Hadoop YARN yang dibuat oleh langkah dihentikan ketika langkah itu dibatalkan. Ini memberikan pembersihan yang lebih andal untuk aplikasi seperti pekerjaan Spark yang berjalan dalam mode cluster.
+  *Dimulai dengan Spark 3.3.1 (didukung dalam EMR versi 6.10 dan yang lebih baru), semua pelaksana dalam host dekomisioning diatur ke yang baru, yang disebut status DECOMMISSIONING. `ExecutorState`* Pelaksana yang dinonaktifkan tidak dapat digunakan oleh Yarn untuk mengalokasikan tugas dan dengan demikian akan meminta pelaksana baru, jika diperlukan, untuk tugas yang sedang dijalankan. Jadi, jika Anda menonaktifkan Spark DRA saat menggunakan EMR Managed Scaling, EMR Auto Scaling, atau mekanisme penskalaan khusus apa pun pada cluster EMR-EC2, maka Yarn dapat meminta pelaksana maksimum yang diizinkan untuk setiap pekerjaan. Untuk menghindari masalah ini, biarkan `spark.dynamicAllocation.enabled` properti disetel ke `TRUE` (yang merupakan default) saat Anda menggunakan kombinasi fitur di atas. Selain itu, Anda juga dapat mengatur batasan pelaksana minimum dan maksimum dengan menetapkan nilai untuk `spark.dynamicAllocation.maxExecutors` dan `spark.dynamicAllocation.minExecutors` properti untuk pekerjaan Spark Anda, untuk membatasi jumlah pelaksana yang dialokasikan selama eksekusi pekerjaan. 
+ CloudWatch agen didukung pada Runtime Role Clusters untuk EMR 7.6 dan di atasnya. Untuk informasi selengkapnya, lihat [ CloudWatch Agen Amazon](https://docs.aws.amazon.com/emr/latest/ReleaseGuide/emr-AmazonCloudWatchAgent.html).
+ Dimulai dengan rilis Amazon Elastic Map Reduce (EMR) versi 7.6.0, konektor sistem file S3A sekarang mendukung enkripsi sisi klien Amazon S3.
+ Dimulai dengan EMR 7.6.0, TLS didukung pada dan titik akhir. HMaster RegionServer Untuk informasi selengkapnya, lihat tabel berikut mengenai dukungan TLS dengan HBase: [HBase](https://docs.aws.amazon.com/emr/latest/ManagementGuide/emr-encryption-support-matrix.html#emr-encryption-support-matrix-hbase).
+     
[\[See the AWS documentation website for more details\]](http://docs.aws.amazon.com/id_id/emr/latest/ReleaseGuide/emr-760-release.html)

## 7.6.0 versi Java default
<a name="emr-760-jdk"></a>

Amazon EMR merilis 7.6 dan lebih tinggi dikirimkan dengan Amazon Corretto 17 (dibangun di atas OpenJDK) secara default untuk aplikasi yang mendukung Corretto 17 (JDK 17), dengan pengecualian Apache Livy.

Tabel berikut menunjukkan versi Java default untuk aplikasi di Amazon EMR 7.6.0. Jika Anda ingin mengubah JVM default pada cluster Anda, ikuti instruksi [Konfigurasikan aplikasi untuk menggunakan Java Virtual Machine tertentu](configuring-java8.md) untuk setiap aplikasi yang berjalan di cluster. Anda hanya dapat menggunakan satu versi runtime Java untuk sebuah cluster. Amazon EMR tidak mendukung menjalankan node atau aplikasi yang berbeda pada versi runtime yang berbeda pada cluster yang sama.


| Aplikasi | Versi Java/Amazon Corretto (defaultnya tebal) | 
| --- | --- | 
| kuala | 17, 11, 8 | 
| Flink | 17, 11, 8 | 
| HBase | 17, 11, 8 | 
| HCatalog | 17, 11, 8 | 
| Hadoop | 17, 11, 8 | 
| Hive | 17, 11, 8 | 
| Hudi | 17, 11, 8 | 
| Gunung es | 17, 11, 8 | 
| Livy | 17, 11, 8 | 
| Oozie | 17, 11, 8 | 
| Phoenix | 17, 11, 8 | 
| PrestoDB | 8 | 
| Spark | 17, 11, 8 | 
| Spark RAPIDS | 17, 11, 8 | 
| Tez | 17, 11, 8 | 
| Trino | 21, 17 | 
| Zeppelin | 17, 11, 8 | 
| Pig | 17, 11, 8 | 
| Zookeeper | 17, 11, 8 | 

## 7.6.0 versi komponen
<a name="emr-760-components"></a>

Komponen yang diinstal oleh Amazon EMR dengan rilis ini tercantum di bawah ini. Beberapa komponen diinstal sebagai bagian dari paket aplikasi big data. Sedangkan komponen lainnya bersifak unik untuk Amazon EMR dan diinstal untuk proses sistem dan fitur. Ini biasanya dimulai dengan `emr` atau `aws`. Paket aplikasi big data dalam rilis Amazon EMR terbaru biasanya versi terbaru yang ditemukan di komunitas. Kami menyediakan rilis komunitas di Amazon EMR secepat mungkin.

Beberapa komponen yang ada di Amazon EMR berbeda dari versi komunitas. Komponen ini mempunyai label versi dalam bentuk `CommunityVersion-amzn-EmrVersion`. `EmrVersion` dimulai dari 0. Misalnya, jika komponen komunitas open source bernama `myapp-component` dengan versi 2.2 telah dimodifikasi tiga kali untuk dimasukkan dalam rilis EMR Amazon yang berbeda, versi rilisnya terdaftar sebagai. `2.2-amzn-2`


| Komponen | Versi | Deskripsi | 
| --- | --- | --- | 
| adot-java-agent | 1.31.0 | Agen Java yang mengumpulkan metrik dari daemon aplikasi. | 
| delta | Versi 3.2.1-amzn-1 | Danau Delta adalah format tabel terbuka untuk kumpulan data analitik yang sangat besar | 
| emr-amazon-cloudwatch-agent | 1.300032.2-amzn-0 | Aplikasi yang mengumpulkan metrik tingkat sistem internal dan metrik aplikasi khusus dari instans Amazon EC2. | 
| emr-ddb | 5.6.0 | Konektor Amazon DynamoDB untuk aplikasi ekosistem Hadoop. | 
| emr-goodies | 3.15.0 | Perpustakaan kenyamanan ekstra untuk ekosistem Hadoop. | 
| emr-kinesis | 3.19.0 | Konektor Amazon Kinesis untuk aplikasi ekosistem Hadoop. | 
| emr-notebook-env | 1.18.0 | Conda env untuk emr notebook yang mencakup gateway jupyter korporasi | 
| emr-s3-dist-cp | 2.36.0 | Aplikasi salinan terdistribusi yang dioptimalkan untuk Amazon S3. | 
| emr-s3-select | 2.15.0 | EMR S3Select Connector | 
| emr-wal-cli | 1.3.1 | Cli digunakan untuk daftar emrwal/penghapusan. | 
| emrfs | 2.67.0 | Konektor Amazon S3 untuk aplikasi ekosistem Hadoop. | 
| flink-client | 1.20.0-amzn-0 | Skrip dan aplikasi klien baris perintah Apache Flink. | 
| flink-jobmanager-config | 1.20.0-amzn-0 | Mengelola sumber daya pada node EMR untuk Apache Flink. JobManager | 
| hadoop-client | 3.4.0-amzn-2 | Klien baris perintah Hadoop seperti 'hdfs', 'Hadoop', atau 'yarn'. | 
| hadoop-hdfs-datanode | 3.4.0-amzn-2 | Layanan tingkat simpul HDFS untuk menyimpan blok. | 
| hadoop-hdfs-library | 3.4.0-amzn-2 | Klien dan perpustakaan baris perintah HDFS | 
| hadoop-hdfs-namenode | 3.4.0-amzn-2 | Layanan HDFS untuk melacak nama file dan lokasi blok. | 
| hadoop-hdfs-journalnode | 3.4.0-amzn-2 | Layanan HDFS untuk mengelola jurnal filesystem Hadoop pada klaster HA. | 
| hadoop-httpfs-server | 3.4.0-amzn-2 | Titik akhir HTTP untuk operasi HDFS. | 
| hadoop-kms-server | 3.4.0-amzn-2 | Server manajemen kunci kriptografi berdasarkan API Hadoop. KeyProvider  | 
| hadoop-mapred | 3.4.0-amzn-2 | MapReduce pustaka mesin eksekusi untuk menjalankan MapReduce aplikasi. | 
| hadoop-yarn-nodemanager | 3.4.0-amzn-2 | Layanan YARN untuk mengelola kontainer pada simpul individu. | 
| hadoop-yarn-resourcemanager | 3.4.0-amzn-2 | Layanan YARN untuk mengalokasikan dan mengelola sumber daya klaster dan aplikasi terdistribusi. | 
| hadoop-yarn-timeline-server | 3.4.0-amzn-2 | Layanan untuk mengambil informasi terkini dan historis untuk aplikasi YARN. | 
| hbase-hmaster | 2.6.1-amzn-0 | Layanan untuk HBase cluster yang bertanggung jawab untuk koordinasi Daerah dan pelaksanaan perintah administratif. | 
| hbase-region-server | 2.6.1-amzn-0 | Layanan untuk melayani satu atau lebih HBase wilayah. | 
| hbase-client | 2.6.1-amzn-0 | HBase klien baris perintah. | 
| hbase-rest-server | 2.6.1-amzn-0 | Layanan menyediakan titik akhir RESTful HTTP untuk HBase. | 
| hbase-thrift-server | 2.6.1-amzn-0 | Layanan menyediakan titik akhir Thrift ke. HBase | 
| hbase-operator-tools | 2.6.1-amzn-0 | Alat perbaikan untuk HBase cluster Apache. | 
| hcatalog-client | 3.1.3-amzn-15 | Klien baris perintah 'hcat' untuk memanipulasi hcatalog-server. | 
| hcatalog-server | 3.1.3-amzn-15 | Penyediaan layanan HCatalog, tabel dan lapisan manajemen penyimpanan untuk aplikasi terdistribusi. | 
| hcatalog-webhcat-server | 3.1.3-amzn-15 | Titik akhir HTTP menyediakan antarmuka REST ke HCatalog. | 
| hive-client | 3.1.3-amzn-15 | Klien baris perintah Hive. | 
| hive-hbase | 3.1.3-amzn-15 | Klien Hive-hbase. | 
| hive-metastore-server | 3.1.3-amzn-15 | Layanan untuk mengakses metastore Hive, repositori semantik yang menyimpan metadata untuk SQL pada operasi Hadoop. | 
| hive-server2 | 3.1.3-amzn-15 | Layanan untuk menerima kueri Hive sebagai permintaan web. | 
| hudi | 0.15.0-amzn-3 | Kerangka pemrosesan tambahan untuk memberi daya pada pipa data pada latensi rendah dan efisiensi tinggi. | 
| hudi-presto | 0.15.0-amzn-3 | Perpustakaan paket untuk menjalankan Presto dengan Hudi. | 
| hudi-trino | 0.15.0-amzn-3 | Perpustakaan bundel untuk menjalankan Trino dengan Hudi. | 
| hudi-spark | 0.15.0-amzn-3 | Perpustakaan paket untuk menjalankan Spark dengan Hudi. | 
| hue-server | 4.11.0 | Aplikasi web untuk menganalisis data menggunakan aplikasi ekosistem Hadoop | 
| iceberg | 1.6.1-amzn-2 | Apache Iceberg adalah format tabel terbuka untuk kumpulan data analitik besar | 
| jupyterhub | 1.5.0 | Server multi-pengguna untuk notebook Jupyter | 
| livy-server | 0.8.0-inkubasi | Antarmuka REST untuk berinteraksi dengan Apache Spark | 
| nginx | 1.12.1 | nginx [engine x] adalah server HTTP dan server proksi balik | 
| mariadb-server | 5.5.68\$1 | Server basis data MariaDB. | 
| nvidia-cuda | 12.3.0 | Driver Nvidia dan kit alat Cuda | 
| oozie-client | 5.2.1 | Klien baris perintah Oozie. | 
| oozie-server | 5.2.1 | Layanan untuk menerima permintaan alur kerja Oozie. | 
| opencv | 4.7.0 | Perpustakaan Visi Komputer Sumber Terbuka. | 
| phoenix-library | 5.2.0 | Perpustakaan phoenix untuk server dan klien | 
| phoenix-connectors | 6.0.0 | Konektor Apache Phoenix untuk Spark-3 | 
| phoenix-query-server | 6.0.0 | Sebuah server ringan yang menyediakan akses JDBC serta Protocol Buffers dan akses format JSON ke API Avatica  | 
| presto-coordinator | 0,287-amzn-1 | Layanan untuk menerima kueri dan mengelola eksekusi kueri antara presto-worker. | 
| presto-worker | 0,287-amzn-1 | Layanan untuk mengeksekusi potongan kueri. | 
| presto-client | 0,287-amzn-1 | Klien baris perintah Presto yang diinstal pada master klaster HA yang siaga di mana server Presto server tidak dimulai. | 
| trino-coordinator | 457-amzn-0 | Layanan untuk menerima kueri dan mengelola eksekusi kueri di antara trino-workers. | 
| trino-worker | 457-amzn-0 | Layanan untuk mengeksekusi potongan kueri. | 
| trino-client | 457-amzn-0 | Klien baris perintah Trino yang diinstal pada master siaga cluster HA di mana server Trino tidak dimulai. | 
| pig-client | 0.17.0 | Klien baris perintah Pig. | 
| r | 4.3.2 | Proyek R untuk Komputasi Statistik | 
| ranger-kms-server | 2.0.0 | Sistem Pengelolaan Kunci Ranger Apache | 
| spark-client | 3.5.3-amzn-0 | Klien baris perintah Spark. | 
| spark-history-server | 3.5.3-amzn-0 | Web UI untuk melihat log acara untuk seluruh masa pakai aplikasi Spark. | 
| spark-on-yarn | 3.5.3-amzn-0 | Mesin eksekusi dalam memori untuk YARN. | 
| spark-yarn-slave | 3.5.3-amzn-0 | Perpustakaan Apache Spark yang dibutuhkan oleh slave YARN. | 
| spark-rapids | 24.10.1-amzn-0 | Plugin Nvidia Spark RAPIDS yang mempercepat Apache Spark dengan. GPUs | 
| tensorflow | 2.16.1 | TensorFlow pustaka perangkat lunak open source untuk perhitungan numerik kinerja tinggi. | 
| tez-on-yarn | 0.10.2-amzn-13 | Aplikasi dan perpustakaan tez YARN. | 
| tez-on-worker | 0.10.2-amzn-13 | Aplikasi dan pustaka YARN tez untuk node pekerja. | 
| zeppelin-server | 0.11.1 | Notebook berbasis web yang memungkinkan analisis data interaktif. | 
| zookeeper-server | 3.9.2-amzn-0 | Layanan terpusat untuk menjaga informasi konfigurasi, penamaan, yang menyediakan sinkronisasi terdistribusi, dan menyediakan layanan grup. | 
| zookeeper-client | 3.9.2-amzn-0 | ZooKeeper klien baris perintah. | 

## 7.6.0 klasifikasi konfigurasi
<a name="emr-760-class"></a>

Klasifikasi konfigurasi memungkinkan Anda menyesuaikan aplikasi. Ini sering kali bersesuaian dengan file XML konfigurasi untuk aplikasi, seperti `hive-site.xml`. Untuk informasi selengkapnya, lihat [Konfigurasikan aplikasi](emr-configure-apps.md).

Tindakan konfigurasi ulang terjadi ketika Anda menentukan konfigurasi untuk grup instans di klaster yang sedang berjalan. Amazon EMR hanya memulai tindakan konfigurasi ulang untuk klasifikasi yang Anda modifikasi. Untuk informasi selengkapnya, lihat [Lakukan konfigurasi ulang pada grup instans di klaster yang sedang berjalan](emr-configure-apps-running-cluster.md).


**klasifikasi emr-7.6.0**  

| Klasifikasi | Deskripsi | Tindakan Konfigurasi Ulang | 
| --- | --- | --- | 
| capacity-scheduler | Ubah nilai dalam file capacity-scheduler.xml Hadoop. | Restarts the ResourceManager service. | 
| container-executor | Ubah nilai dalam file container-executor.cfg Hadoop YARN ini. | Not available. | 
| container-log4j | Ubah nilai dalam file container-log4j.properties Hadoop YARN. | Not available. | 
| core-site | Ubah nilai dalam file core-site.xml Hadoop. | Restarts the Hadoop HDFS services Namenode, SecondaryNamenode, Datanode, ZKFC, and Journalnode. Restarts the Hadoop YARN services ResourceManager, NodeManager, ProxyServer, and TimelineServer. Additionally restarts Hadoop KMS, Ranger KMS, HiveServer2, Hive MetaStore, Hadoop Httpfs, and MapReduce-HistoryServer. | 
| docker-conf | Ubah pengaturan terkait docker. | Not available. | 
| emrfs-site | Ubah pengaturan EMRFS. | Restarts the Hadoop HDFS services Namenode, SecondaryNamenode, Datanode, ZKFC, and Journalnode. Restarts the Hadoop YARN services ResourceManager, NodeManager, ProxyServer, and TimelineServer. Additionally restarts HBaseRegionserver, HBaseMaster, HBaseThrift, HBaseRest, HiveServer2, Hive MetaStore, Hadoop Httpfs, and MapReduce-HistoryServer. | 
| flink-conf | Ubah pengaturan flink-conf.yaml. | Restarts Flink history server. | 
| flink-log4j | Ubah pengaturan log4j.properties Flink. | Restarts Flink history server. | 
| flink-log4j-session | Ubah pengaturan Flink log4j-session.properties untuk sesi. Kubernetes/Yarn  | Restarts Flink history server. | 
| flink-log4j-cli | Ubah pengaturan log4j-cli.properties Flink. | Restarts Flink history server. | 
| hadoop-env | Ubah nilai dalam lingkungan Hadoop untuk semua komponen Hadoop. | Restarts the Hadoop HDFS services Namenode, SecondaryNamenode, Datanode, ZKFC, and Journalnode. Restarts the Hadoop YARN services ResourceManager, NodeManager, ProxyServer, and TimelineServer. Additionally restarts PhoenixQueryserver, HiveServer2, Hive MetaStore, and MapReduce-HistoryServer. | 
| hadoop-log4j | Ubah nilai dalam file log4j.properties Hadoop ini. | Restarts the Hadoop HDFS services SecondaryNamenode, Datanode, and Journalnode. Restarts the Hadoop YARN services ResourceManager, NodeManager, ProxyServer, and TimelineServer. Additionally restarts Hadoop KMS, Hadoop Httpfs, and MapReduce-HistoryServer. | 
| hadoop-ssl-server | Ubah konfigurasi server ssl hadoop | Not available. | 
| hadoop-ssl-client | Ubah konfigurasi klien ssl hadoop | Not available. | 
| hbase | Pengaturan Amazon EMR-curated untuk Apache. HBase | Custom EMR specific property. Sets emrfs-site and hbase-site configs. See those for their associated restarts. | 
| hbase-env | Ubah nilai HBase di lingkungan. | Restarts the HBase services RegionServer, HBaseMaster, ThriftServer, RestServer. | 
| hbase-log4j | Ubah nilai dalam file HBase hbase-log4j.properties. | Restarts the HBase services RegionServer, HBaseMaster, ThriftServer, RestServer. | 
| hbase-metrics | Ubah nilai dalam file HBase hadoop-metrics2-hbase.properties. | Restarts the HBase services RegionServer, HBaseMaster, ThriftServer, RestServer. | 
| hbase-policy | Ubah nilai dalam HBase file hbase-policy.xml. | Not available. | 
| hbase-site | Ubah nilai dalam HBase file hbase-site.xml. | Restarts the HBase services RegionServer, HBaseMaster, ThriftServer, RestServer. Additionally restarts Phoenix QueryServer. | 
| hdfs-encryption-zones | Konfigurasikan zona enkripsi HDFS. | This classification should not be reconfigured. | 
| hdfs-env | Ubah nilai dalam lingkungan HDFS. | Restarts Hadoop HDFS services Namenode, Datanode, and ZKFC. | 
| hdfs-site | Ubah nilai dalam hdfs-site.xml HDFS. | Restarts the Hadoop HDFS services Namenode, SecondaryNamenode, Datanode, ZKFC, and Journalnode. Additionally restarts Hadoop Httpfs. | 
| hcatalog-env | Ubah nilai HCatalog di lingkungan. | Restarts Hive HCatalog Server. | 
| hcatalog-server-jndi | Ubah nilai di HCatalog jndi.properties. | Restarts Hive HCatalog Server. | 
| hcatalog-server-proto-hive-site | Ubah nilai HCatalog proto-hive-site dalam.xml's. | Restarts Hive HCatalog Server. | 
| hcatalog-webhcat-env | Ubah nilai di lingkungan HCatalog WebHCat. | Restarts Hive WebHCat server. | 
| hcatalog-webhcat-log4j2 | Ubah nilai di HCat log4j2.properties HCatalog Web. | Restarts Hive WebHCat server. | 
| hcatalog-webhcat-site | Ubah nilai dalam file webhcat-site.xml HCatalog WebHCat. | Restarts Hive WebHCat server. | 
| hive | Pengaturan dikurasi Amazon EMR untuk Apache Hive. | Sets configurations to launch Hive LLAP service. | 
| hive-beeline-log4j2 | Ubah nilai dalam file beeline-log4j2.properties Hive. | Not available. | 
| hive-parquet-logging | Ubah nilai dalam file parquet-logging.properties Hive. | Not available. | 
| hive-env | Ubah nilai dalam lingkungan Hive. | Restarts HiveServer2, HiveMetastore, and Hive HCatalog-Server. Runs Hive schemaTool CLI commands to verify hive-metastore. | 
| hive-exec-log4j2 | Ubah nilai dalam file hive-exec-log 4j2.properties Hive. | Not available. | 
| hive-llap-daemon-log4j2 | Ubah nilai dalam file llap-daemon-log 4j2.properties Hive. | Not available. | 
| hive-log4j2 | Ubah nilai dalam file hive-log4j2.properties Hive. | Not available. | 
| hive-site | Ubah nilai dalam file hive-site.xml Hive | Restarts HiveServer2, HiveMetastore, and Hive HCatalog-Server. Runs Hive schemaTool CLI commands to verify hive-metastore. Also restarts Oozie and Zeppelin. | 
| hiveserver2-site | Ubah nilai dalam file hiveserver2-site.xml Hive Server2 | Not available. | 
| hue-ini | Ubah nilai dalam file ini Hue | Restarts Hue. Also activates Hue config override CLI commands to pick up new configurations. | 
| httpfs-env | Ubah nilai di lingkungan HTTPFS. | Restarts Hadoop Httpfs service. | 
| httpfs-site | Ubah nilai dalam file httpfs-site.xml Hadoop. | Restarts Hadoop Httpfs service. | 
| hadoop-kms-acls | Ubah nilai dalam file kms-acls.xml Hadoop. | Not available. | 
| hadoop-kms-env | Ubah nilai dalam lingkungan Hadoop KMS. | Restarts Hadoop-KMS service. | 
| hadoop-kms-java-home | Ubah rumah java KMS Hadoop | Not available. | 
| hadoop-kms-log4j | Ubah nilai dalam file kms-log4j.properties Hadoop. | Not available. | 
| hadoop-kms-site | Ubah nilai dalam file kms-site.xml Hadoop. | Restarts Hadoop-KMS and Ranger-KMS service. | 
| hudi-env | Ubah nilai di lingkungan Hudi. | Not available. | 
| hudi-defaults | Ubah nilai dalam file hudi-defaults.conf Hudi. | Not available. | 
| iceberg-defaults | Ubah nilai dalam file iceberg-defaults.conf Iceberg. | Not available. | 
| delta-defaults | Ubah nilai dalam file delta-defaults.conf Delta. | Not available. | 
| jupyter-notebook-conf | Ubah nilai dalam file jupyter\$1notebook\$1config.py Jupyter Notebook. | Not available. | 
| jupyter-hub-conf | Ubah nilai dalam JupyterHubs file jupyterhub\$1config.py. | Not available. | 
| jupyter-s3-conf | Konfigurasikan persistensi Jupyter Notebook S3. | Not available. | 
| jupyter-sparkmagic-conf | Ubah nilai dalam file config.json Sparkmagic. | Not available. | 
| livy-conf | Ubah nilai dalam file livy.conf Livy. | Restarts Livy Server. | 
| livy-env | Ubah nilai di lingkungan Livy. | Restarts Livy Server. | 
| livy-log4j2 | Ubah pengaturan Livy log4j2.properties. | Restarts Livy Server. | 
| mapred-env | Ubah nilai di lingkungan MapReduce aplikasi. | Restarts Hadoop MapReduce-HistoryServer. | 
| mapred-site | Ubah nilai dalam file mapred-site.xml MapReduce aplikasi. | Restarts Hadoop MapReduce-HistoryServer. | 
| oozie-env | Ubah nilai di lingkungan Oozie. | Restarts Oozie. | 
| oozie-log4j | Ubah nilai dalam file oozie-log4j.properties Oozie. | Restarts Oozie. | 
| oozie-site | Ubah nilai dalam file oozie-site.xml Oozie. | Restarts Oozie. | 
| phoenix-hbase-metrics | Ubah nilai dalam file hadoop-metrics2-hbase.properties Phoenix. | Not available. | 
| phoenix-hbase-site | Ubah nilai dalam file hbase-site.xml Phoenix. | Not available. | 
| phoenix-log4j2 | Ubah nilai dalam file log4j2.properties Phoenix. | Restarts Phoenix-QueryServer. | 
| phoenix-metrics | Ubah nilai dalam file hadoop-metrics2-phoenix.properties Phoenix. | Not available. | 
| pig-env | Ubah nilai di lingkungan Pig. | Not available. | 
| pig-properties | Ubah nilai dalam file pig.properties Pig. | Restarts Oozie. | 
| pig-log4j | Ubah nilai dalam file log4j.properties Pig. | Not available. | 
| presto-log | Ubah nilai dalam file log.properties Presto. | Restarts Presto-Server (for PrestoDB) | 
| presto-config | Ubah nilai dalam file config.properties Presto. | Restarts Presto-Server (for PrestoDB) | 
| presto-password-authenticator | Ubah nilai dalam file password-authenticator.properties Presto. | Not available. | 
| presto-env | Ubah nilai dalam file presto-env.sh Presto. | Restarts Presto-Server (for PrestoDB) | 
| presto-node | Ubah nilai dalam file node.properties Presto. | Not available. | 
| presto-connector-blackhole | Ubah nilai dalam file blackhole.properties Presto. | Not available. | 
| presto-connector-cassandra | Ubah nilai dalam file cassandra.properties Presto. | Not available. | 
| presto-connector-hive | Ubah nilai dalam file hive.properties Presto. | Restarts Presto-Server (for PrestoDB) | 
| presto-connector-jmx | Ubah nilai dalam file jmx.properties Presto. | Not available. | 
| presto-connector-kafka | Ubah nilai dalam file kafka.properties Presto. | Not available. | 
| presto-connector-lakeformation | Ubah nilai dalam file lakeformation.properties Presto. | Restarts Presto-Server (for PrestoDB) | 
| presto-connector-localfile | Ubah nilai dalam file localfile.properties Presto. | Not available. | 
| presto-connector-memory | Ubah nilai dalam file memory.properties Presto. | Not available. | 
| presto-connector-mongodb | Ubah nilai dalam file mongodb.properties Presto. | Not available. | 
| presto-connector-mysql | Ubah nilai dalam file mysql.properties Presto. | Not available. | 
| presto-connector-postgresql | Ubah nilai dalam file postgresql.properties Presto. | Not available. | 
| presto-connector-raptor | Ubah nilai dalam file raptor.properties Presto. | Not available. | 
| presto-connector-redis | Ubah nilai dalam file redis.properties Presto. | Not available. | 
| presto-connector-redshift | Ubah nilai dalam file redshift.properties Presto. | Not available. | 
| presto-connector-tpch | Ubah nilai dalam file tpch.properties Presto. | Not available. | 
| presto-connector-tpcds | Ubah nilai dalam file tpcds.properties Presto. | Not available. | 
| trino-log | Ubah nilai dalam file log.properties Trino. | Restarts Trino-Server (for Trino) | 
| trino-config | Ubah nilai dalam file config.properties Trino. | Restarts Trino-Server (for Trino) | 
| trino-password-authenticator | Ubah nilai dalam file password-authenticator.properties Trino. | Restarts Trino-Server (for Trino) | 
| trino-env | Ubah nilai dalam file trino-env.sh Trino. | Restarts Trino-Server (for Trino) | 
| trino-node | Ubah nilai dalam file node.properties Trino. | Not available. | 
| trino-connector-blackhole | Ubah nilai dalam file blackhole.properties Trino. | Not available. | 
| trino-connector-cassandra | Ubah nilai dalam file cassandra.properties Trino. | Not available. | 
| trino-connector-delta | Ubah nilai dalam file delta.properties Trino. | Restarts Trino-Server (for Trino) | 
| trino-connector-hive | Ubah nilai dalam file hive.properties Trino. | Restarts Trino-Server (for Trino) | 
| trino-exchange-manager | Ubah nilai dalam file exchange-manager.properties Trino. | Restarts Trino-Server (for Trino) | 
| trino-connector-iceberg | Ubah nilai dalam file iceberg.properties Trino. | Restarts Trino-Server (for Trino) | 
| trino-connector-hudi | Ubah nilai dalam file hudi.properties Trino. | Restarts Trino-Server (for Trino) | 
| trino-connector-jmx | Ubah nilai dalam file jmx.properties Trino. | Not available. | 
| trino-connector-kafka | Ubah nilai dalam file kafka.properties Trino. | Not available. | 
| trino-connector-localfile | Ubah nilai dalam file localfile.properties Trino. | Not available. | 
| trino-connector-memory | Ubah nilai dalam file memory.properties Trino. | Not available. | 
| trino-connector-mongodb | Ubah nilai dalam file mongodb.properties Trino. | Not available. | 
| trino-connector-mysql | Ubah nilai dalam file mysql.properties Trino. | Not available. | 
| trino-connector-postgresql | Ubah nilai dalam file postgresql.properties Trino. | Not available. | 
| trino-connector-raptor | Ubah nilai dalam file raptor.properties Trino. | Not available. | 
| trino-connector-redis | Ubah nilai dalam file redis.properties Trino. | Not available. | 
| trino-connector-redshift | Ubah nilai dalam file redshift.properties Trino. | Not available. | 
| trino-connector-tpch | Ubah nilai dalam file tpch.properties Trino. | Not available. | 
| trino-connector-tpcds | Ubah nilai dalam file tpcds.properties Trino. | Not available. | 
| ranger-kms-dbks-site | Ubah nilai dalam file dbks-site.xml Ranger KMS. | Restarts Ranger KMS Server. | 
| ranger-kms-site | Ubah nilai dalam ranger-kms-site file.xml. dari Ranger KMS. | Restarts Ranger KMS Server. | 
| ranger-kms-env | Ubah nilai di lingkungan Ranger KMS. | Restarts Ranger KMS Server. | 
| ranger-kms-logback | Ubah nilai dalam file kms-logback.xml dari Ranger KMS. | Not available. | 
| ranger-kms-db-ca | Ubah nilai untuk file CA pada S3 untuk koneksi MySQL SSL dengan Ranger KMS. | Not available. | 
| spark | Pengaturan terkurasi Amazon EMR untuk Apache Spark. | This property modifies spark-defaults. See actions there. | 
| spark-defaults | Ubah nilai dalam file spark-defaults.conf Spark. | Restarts Spark history server and Spark thrift server. | 
| spark-env | Ubah nilai di lingkungan Spark. | Restarts Spark history server and Spark thrift server. | 
| spark-hive-site | Ubah nilai dalam file hive-site.xml Spark | Not available. | 
| spark-log4j2 | Ubah nilai dalam file log4j2.properties Spark. | Restarts Spark history server and Spark thrift server. | 
| spark-metrics | Ubah nilai dalam file metrics.properties Spark. | Restarts Spark history server and Spark thrift server. | 
| tez-site | Ubah nilai dalam file tez-site.xml Tez. | Restart Oozie and HiveServer2. | 
| yarn-env | Ubah nilai di lingkungan YARN. | Restarts the Hadoop YARN services ResourceManager, NodeManager, ProxyServer, and TimelineServer. Additionally restarts MapReduce-HistoryServer. | 
| yarn-site | Ubah nilai dalam file yarn-site.xml YARN. | Restarts the Hadoop YARN services ResourceManager, NodeManager, ProxyServer, and TimelineServer. Additionally restarts Livy Server and MapReduce-HistoryServer. | 
| zeppelin-env | Ubah nilai di lingkungan Zeppelin. | Restarts Zeppelin. | 
| zeppelin-site | Ubah pengaturan konfigurasi di zeppelin-site.xml. | Restarts Zeppelin. | 
| zookeeper-config | Ubah nilai dalam ZooKeeper file zoo.cfg. | Restarts Zookeeper server. | 
| zookeeper-logback | Ubah nilai dalam ZooKeeper file logback.xml. | Restarts Zookeeper server. | 
| emr-metrics | Ubah pengaturan metrik emr untuk simpul ini. | Restarts the CloudWatchAgent service. | 

## 7.6.0 perubahan log
<a name="760-changelog"></a>


**Ubah log untuk catatan rilis dan rilis 7.6.0**  

| Date | Peristiwa | Deskripsi | 
| --- | --- | --- | 
| 2025-01-13 | Publikasi Docs | Amazon EMR 7.6.0 catatan rilis pertama kali diterbitkan | 
| 2025-01-10 | Penerapan selesai | [Amazon EMR 7.6.0 sepenuhnya diterapkan ke semua Wilayah yang didukung](https://aws.amazon.com/about-aws/global-infrastructure/regional-product-services/) | 
| 2025-12-26 | Rilis awal | Amazon EMR 7.6.0 pertama kali dikerahkan ke Wilayah komersial awal | 

# Amazon EMR rilis 7.5.0
<a name="emr-750-release"></a>

## 7.5.0 siklus hidup yang didukung
<a name="emr-750-supported-lifecycle"></a>

Tabel berikut menjelaskan tanggal siklus hidup yang didukung untuk rilis Amazon EMR 7.5.0.


| Fase Support | Date | 
| --- | --- | 
| Tanggal rilis awal | November 21, 2024 | 
| Dukungan standar sampai | November 20, 2026 | 
| Akhir dari dukungan | November 21, 2026 | 
| Akhir hidup | November 21, 2027 | 

## 7.5.0 versi aplikasi
<a name="emr-750-app-versions"></a>

Rilis ini mencakup aplikasi berikut: [https://docs.aws.amazon.com/AmazonCloudWatch/latest/monitoring/Install-CloudWatch-Agent.html](https://docs.aws.amazon.com/AmazonCloudWatch/latest/monitoring/Install-CloudWatch-Agent.html), [https://delta.io/](https://delta.io/), [https://flink.apache.org/](https://flink.apache.org/), [http://hbase.apache.org/](http://hbase.apache.org/), [https://cwiki.apache.org/confluence/display/Hive/HCatalog](https://cwiki.apache.org/confluence/display/Hive/HCatalog), [http://hive.apache.org/](http://hive.apache.org/), [https://hudi.apache.org](https://hudi.apache.org), [http://gethue.com/](http://gethue.com/), [https://iceberg.apache.org/](https://iceberg.apache.org/), [https://jupyter-enterprise-gateway.readthedocs.io/en/latest/](https://jupyter-enterprise-gateway.readthedocs.io/en/latest/), [https://jupyterhub.readthedocs.io/en/latest/#](https://jupyterhub.readthedocs.io/en/latest/#), [https://livy.incubator.apache.org/](https://livy.incubator.apache.org/), [http://oozie.apache.org/](http://oozie.apache.org/), [https://phoenix.apache.org/](https://phoenix.apache.org/), [http://pig.apache.org/](http://pig.apache.org/), [https://prestodb.io/](https://prestodb.io/), [https://spark.apache.org/docs/latest/](https://spark.apache.org/docs/latest/), [https://www.tensorflow.org/](https://www.tensorflow.org/), [https://tez.apache.org/](https://tez.apache.org/), [https://trino.io/](https://trino.io/), [https://zeppelin.incubator.apache.org/](https://zeppelin.incubator.apache.org/), dan [https://zookeeper.apache.org](https://zookeeper.apache.org).

Tabel di bawah ini mencantumkan versi aplikasi yang tersedia dalam rilis Amazon EMR ini dan versi aplikasi dalam tiga rilis EMR Amazon sebelumnya (bila berlaku).

Untuk riwayat lengkap versi aplikasi untuk setiap rilis Amazon EMR, lihat topik berikut:
+ [Versi aplikasi di Amazon EMR 7.x rilis](emr-release-app-versions-7.x.md)
+ [Versi aplikasi di Amazon EMR 6.x rilis](emr-release-app-versions-6.x.md)
+ [Versi aplikasi di Amazon EMR 5.x rilis](emr-release-app-versions-5.x.md)
+ [Versi aplikasi di Amazon EMR 4.x rilis](emr-release-app-versions-4.x.md)


**Informasi versi aplikasi**  

|  | emr-7.5.0 | emr-7.4.0 | emr-7.3.0 | emr-7.2.0 | 
| --- | --- | --- | --- | --- | 
| AWS SDK for Java | 2.28.8, 1.12.772 | 2.28.8, 1.12.772 | 2.25.70, 1.12.747 | 2.23.18, 1.12.705 | 
| Python | 3.9, 3.11 | 3.9, 3.11 | 3.9, 3.11 | 3.9, 3.11 | 
| Skala | 2.12.18 | 2.12.18 | 2.12.18 | 2.12.17 | 
| AmazonCloudWatchAgent | 1.300032.2-amzn-0 | 1.300032.2-amzn-0 | 1.300032.2-amzn-0 | 1.300032.2-amzn-0 | 
| Delta | 3.2.1-amzn-0 | 3.2.0-amzn-1 | 3.2.0-amzn-0 | 3.1.0 | 
| Flink | 1.19.1-amzn-1 | 1.19.1-amzn-0 | 1.18.1-amzn-2 | 1.18.1-amzn-1 | 
| Ganglia |  -  |  -  |  -  |  -  | 
| HBase | 2.5.10-amzn-0 | 2.5.5-amzn-0 | 2.4.17-amzn-7 | 2.4.17-amzn-6 | 
| HCatalog | 3.1.3-amzn-14 | 3.1.3-amzn-13 | 3.1.3-amzn-12 | 3.1.3-amzn-11 | 
| Hadoop | 3.4.0-amzn-1 | 3.4.0-amzn-0 | 3.3.6-amzn-5 | 3.3.6-amzn-4 | 
| Hive | 3.1.3-amzn-14 | 3.1.3-amzn-13 | 3.1.3-amzn-12 | 3.1.3-amzn-11 | 
| Hudi | 0.15.0-amzn-2 | 0.15.0-amzn-1 | 0.15.0-amzn-0 | 0.14.1-amzn-1 | 
| Hue | 4.11.0 | 4.11.0 | 4.11.0 | 4.11.0 | 
| Iceberg | 1.6.1-amzn-1 | 1.6.1-amzn-0 | 1.5.2-amzn-0 | 1.5.0-amzn-0 | 
| JupyterEnterpriseGateway | 2.6.0 | 2.6.0 | 2.6.0 | 2.6.0 | 
| JupyterHub | 1.5.0 | 1.5.0 | 1.5.0 | 1.5.0 | 
| Livy | 0.8.0-inkubasi | 0.8.0-inkubasi | 0.8.0-inkubasi | 0.8.0-inkubasi | 
| MXNet |  -  |  -  |  -  | 1.9.1 | 
| Mahout |  -  |  -  |  -  |  -  | 
| Oozie | 5.2.1 | 5.2.1 | 5.2.1 | 5.2.1 | 
| Phoenix | 5.2.0 | 5.2.0 | 5.1.3 | 5.1.3 | 
| Pig | 0.17.0 | 0.17.0 | 0.17.0 | 0.17.0 | 
| Presto | 0,287-amzn-0 | 0,287-amzn-0 | 0.285-amzn-1 | 0,285-amzn-0 | 
| Spark | 3.5.2-amzn-1 | 3.5.2-amzn-0 | 3.5.1-amzn-1 | 3.5.1-amzn-0 | 
| Sqoop |  -  | 1.4.7 | 1.4.7 | 1.4.7 | 
| TensorFlow | 2.16.1 | 2.16.1 | 2.16.1 | 2.11.0 | 
| Tez | 0.10.2-amzn-12 | 0.10.2-amzn-11 | 0.10.2-amzn-10 | 0.10.2-amzn-9 | 
| Trino (PrestoSQL) | 446-amzn-0 | 446-amzn-0 | 442-amzn-0 | 436-amzn-0 | 
| Zeppelin | 0.11.1 | 0.11.1 | 0.11.1 | 0.10.1 | 
| ZooKeeper | 3.9.2-amzn-0 | 3.9.2-amzn-0 | 3.9.1-amzn-1 | 3.9.1-amzn-1 | 

# Rincian komponen rilis 7.5.0
<a name="emr-750-release-components-details"></a>

Lihat tabel berikut untuk informasi selengkapnya tentang paket *Ekstra* di Amazon EMR 7.5.0.


| Aplikasi | Jenis Aplikasi | Paket | Jenis Package | Versi Package | 
| --- | --- | --- | --- | --- | 
|  AmazonCloudWatchAgent  |  Core  |  hadoop-hdfs-journalnode  |  Ekstra  |  3.3.6.amzn.5-1.amzn2023  | 
|  AmazonCloudWatchAgent  |  Core  |  ranger-km  |  Ekstra  |  2.0.0-1.amzn2023  | 
|  AmazonCloudWatchAgent  |  Core  |  s3-dist-cp  |  Ekstra  |  2.33.0-1.amzn2023  | 
|  AmazonCloudWatchAgent  |  Core  |  penjaga kebun binatang  |  Ekstra  |  3.9.1.amzn.1-1.amzn2023  | 
|  AmazonCloudWatchAgent  |  Core  |  zookeper-server  |  Ekstra  |  3.9.1.amzn.1-1.amzn2023  | 
|  Flink  |  Core  |  hadop-client  |  Ekstra  |  3.3.6.amzn.5-1.amzn2023  | 
|  Flink  |  Core  |  hadoop-hdfs  |  Ekstra  |  3.3.6.amzn.5-1.amzn2023  | 
|  Flink  |  Core  |  hadoop-hdfs-datanode  |  Ekstra  |  3.3.6.amzn.5-1.amzn2023  | 
|  Flink  |  Core  |  hadoop-hdfs-journalnode  |  Ekstra  |  3.3.6.amzn.5-1.amzn2023  | 
|  Flink  |  Core  |  hadoop-hdfs-namenode  |  Ekstra  |  3.3.6.amzn.5-1.amzn2023  | 
|  Flink  |  Core  |  hadoop-httpfs  |  Ekstra  |  3.3.6.amzn.5-1.amzn2023  | 
|  Flink  |  Core  |  hadoop-km  |  Ekstra  |  3.3.6.amzn.5-1.amzn2023  | 
|  Flink  |  Core  |  hadoop-mapreduce  |  Ekstra  |  3.3.6.amzn.5-1.amzn2023  | 
|  Flink  |  Core  |  hadoop-mapreduce-historyserver  |  Ekstra  |  3.3.6.amzn.5-1.amzn2023  | 
|  Flink  |  Core  |  hadoop-benang  |  Ekstra  |  3.3.6.amzn.5-1.amzn2023  | 
|  Flink  |  Core  |  hadoop-yarn-nodemanager  |  Ekstra  |  3.3.6.amzn.5-1.amzn2023  | 
|  Flink  |  Core  |  hadoop-yarn-proxyserver  |  Ekstra  |  3.3.6.amzn.5-1.amzn2023  | 
|  Flink  |  Core  |  hadoop-yarn-resourcemanager  |  Ekstra  |  3.3.6.amzn.5-1.amzn2023  | 
|  Flink  |  Core  |  hadoop-yarn-timelineserver  |  Ekstra  |  3.3.6.amzn.5-1.amzn2023  | 
|  Flink  |  Core  |  hudi  |  Ekstra  |  0.15.0.amzn.0-1.amzn2023  | 
|  Flink  |  Core  |  ranger-km  |  Ekstra  |  2.0.0-1.amzn2023  | 
|  Flink  |  Core  |  hadoop  |  Ekstra  |  3.3.6.amzn.5-1.amzn2023  | 
|  HBase  |  Core  |  s3-dist-cp  |  Ekstra  |  2.33.0-1.amzn2023  | 
|  HCatalog  |  Core  |  hadoop-yarn-proxyserver  |  Ekstra  |  3.3.6.amzn.5-1.amzn2023  | 
|  HCatalog  |  Core  |  mariadb-connector-java  |  Ekstra  |    | 
|  Hive  |  Core  |  hadoop-httpfs  |  Ekstra  |  3.3.6.amzn.5-1.amzn2023  | 
|  Hive  |  Core  |  hadoop-yarn-proxyserver  |  Ekstra  |  3.3.6.amzn.5-1.amzn2023  | 
|  Hive  |  Core  |  hive-hbase  |  Ekstra  |  3.1.3.amzn.12-1.amzn2023  | 
|  Hive  |  Core  |  mariadb-connector-java  |  Ekstra  |  2.7.2-1  | 
|  Hive  |  Core  |  s3-dist-cp  |  Ekstra  |  2.33.0-1.amzn2023  | 
|  Phoenix  |  Core  |  s3-dist-cp  |  Ekstra  |  2.33.0-1.amzn2023  | 
|  Spark  |  Core  |  spark-datanucleus  |  Ekstra  |  3.5.1.amzn.0-1.amzn2023  | 
|  Tez  |  Core  |  hadoop-mapreduce  |  Ekstra  |  3.3.6.amzn.5-1.amzn2023  | 
|  Tez  |  Core  |  hadoop-mapreduce-historyserver  |  Ekstra  |  3.3.6.amzn.5-1.amzn2023  | 
|  Tez  |  Core  |  hadoop-yarn-proxyserver  |  Ekstra  |  3.3.6.amzn.5-1.amzn2023  | 
|  Trino  |  Core  |  utilitas besar  |  Ekstra  |  1.2.0-1.amzn2023  | 
|  Trino  |  Core  |  hadop-client  |  Ekstra  |  3.3.6.amzn.5-1.amzn2023  | 
|  Trino  |  Core  |  hadoop-hdfs  |  Ekstra  |  3.3.6.amzn.5-1.amzn2023  | 
|  Trino  |  Core  |  hadoop-hdfs-datanode  |  Ekstra  |  3.3.6.amzn.5-1.amzn2023  | 
|  Trino  |  Core  |  hadoop-hdfs-journalnode  |  Ekstra  |  3.3.6.amzn.5-1.amzn2023  | 
|  Trino  |  Core  |  hadoop-hdfs-namenode  |  Ekstra  |  3.3.6.amzn.5-1.amzn2023  | 
|  Trino  |  Core  |  hadoop-km  |  Ekstra  |  3.3.6.amzn.5-1.amzn2023  | 
|  Trino  |  Core  |  hadoop-mapreduce  |  Ekstra  |  3.3.6.amzn.5-1.amzn2023  | 
|  Trino  |  Core  |  hadoop-mapreduce-historyserver  |  Ekstra  |  3.3.6.amzn.5-1.amzn2023  | 
|  Trino  |  Core  |  hadoop-benang  |  Ekstra  |  3.3.6.amzn.5-1.amzn2023  | 
|  Trino  |  Core  |  hadoop-yarn-nodemanager  |  Ekstra  |  3.3.6.amzn.5-1.amzn2023  | 
|  Trino  |  Core  |  hadoop-yarn-proxyserver  |  Ekstra  |  3.3.6.amzn.5-1.amzn2023  | 
|  Trino  |  Core  |  hadoop-yarn-resourcemanager  |  Ekstra  |  3.3.6.amzn.5-1.amzn2023  | 
|  Trino  |  Core  |  hadoop-yarn-timelineserver  |  Ekstra  |  3.3.6.amzn.5-1.amzn2023  | 
|  Trino  |  Core  |  hive  |  Ekstra  |  3.1.3.amzn.12-1.amzn2023  | 
|  Trino  |  Core  |  hive-hcatalog-server  |  Ekstra  |  3.1.3.amzn.12-1.amzn2023  | 
|  Trino  |  Core  |  mariadb-connector-java  |  Ekstra  |  2.7.2-1  | 
|  Trino  |  Core  |  ranger-km  |  Ekstra  |  2.0.0-1.amzn2023  | 
|  Trino  |  Core  |  penjaga kebun binatang  |  Ekstra  |  3.9.1.amzn.1-1.amzn2023  | 
|  Trino  |  Core  |  zookeper-server  |  Ekstra  |  3.9.1.amzn.1-1.amzn2023  | 
|  Trino  |  Core  |  bigtop-groovy  |  Ekstra  |  2.5.4-1.amzn2023  | 
|  Trino  |  Core  |  bigtop-jsvc  |  Ekstra  |  1.2.4-1.amzn2023  | 
|  Trino  |  Core  |  hadoop  |  Ekstra  |  3.3.6.amzn.5-1.amzn2023  | 
|  Trino  |  Core  |  hadoop-lzo  |  Ekstra  |  0.4.19-1.amzn2023  | 
|  Trino  |  Core  |  hive-hcatalog  |  Ekstra  |  3.1.3.amzn.12-1.amzn2023  | 
|  Trino  |  Core  |  sarang-jdbc  |  Ekstra  |  3.1.3.amzn.12-1.amzn2023  | 
|  Zookeeper  |  Core  |  emrfs  |  Ekstra  |  2.64.0-1.amzn2023  | 
|  Zookeeper  |  Core  |  hadop-client  |  Ekstra  |  3.3.6.amzn.5-1.amzn2023  | 
|  Zookeeper  |  Core  |  hadoop-hdfs  |  Ekstra  |  3.3.6.amzn.5-1.amzn2023  | 
|  Zookeeper  |  Core  |  hadoop-hdfs-datanode  |  Ekstra  |  3.3.6.amzn.5-1.amzn2023  | 
|  Zookeeper  |  Core  |  hadoop-hdfs-journalnode  |  Ekstra  |  3.3.6.amzn.5-1.amzn2023  | 
|  Zookeeper  |  Core  |  hadoop-hdfs-namenode  |  Ekstra  |  3.3.6.amzn.5-1.amzn2023  | 
|  Zookeeper  |  Core  |  hadoop-httpfs  |  Ekstra  |  3.3.6.amzn.5-1.amzn2023  | 
|  Zookeeper  |  Core  |  hadoop-km  |  Ekstra  |  3.3.6.amzn.5-1.amzn2023  | 
|  Zookeeper  |  Core  |  hadoop-mapreduce  |  Ekstra  |  3.3.6.amzn.5-1.amzn2023  | 
|  Zookeeper  |  Core  |  hadoop-mapreduce-historyserver  |  Ekstra  |  3.3.6.amzn.5-1.amzn2023  | 
|  Zookeeper  |  Core  |  hadoop-benang  |  Ekstra  |  3.3.6.amzn.5-1.amzn2023  | 
|  Zookeeper  |  Core  |  hadoop-yarn-nodemanager  |  Ekstra  |  3.3.6.amzn.5-1.amzn2023  | 
|  Zookeeper  |  Core  |  hadoop-yarn-proxyserver  |  Ekstra  |  3.3.6.amzn.5-1.amzn2023  | 
|  Zookeeper  |  Core  |  hadoop-yarn-resourcemanager  |  Ekstra  |  3.3.6.amzn.5-1.amzn2023  | 
|  Zookeeper  |  Core  |  hadoop-yarn-timelineserver  |  Ekstra  |  3.3.6.amzn.5-1.amzn2023  | 
|  Zookeeper  |  Core  |  ranger-km  |  Ekstra  |  2.0.0-1.amzn2023  | 

# 7.5.0 kerentanan dan eksposur umum
<a name="750-common-vulnerabilities-exposures"></a>

Tabel berikut mencantumkan semua CVEs yang tidak memengaruhi kluster EMR yang berjalan pada konfigurasi Amazon EMR 7.5.0 yang direkomendasikan. Amazon EMR bergantung pada sumber terbuka hulu untuk ketersediaan perbaikan dan akan memberikan versi stabil terbaru sebagai bagian dari komponen Core Engine dalam waktu 90 hari setelah Amazon EMR memverifikasi perbaikan.

Tabel ini diperbarui pada 23 November 2021.


| ID CVE | Kepelikan | URL detail CVE | 
| --- | --- | --- | 
|  CVE-2013-4002  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2013-4002)-2013-4002  | 
|  CVE-2015-1832  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2015-1832)-2015-1832  | 
|  CVE-2018-12022  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-12022)-2018-12022  | 
|  CVE-2018-14718  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-14718)-2018-14718  | 
|  CVE-2019-12384  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-12384)-2019-12384  | 
|  CVE-2019-14379  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-14379)-2019-14379  | 
|  CVE-2019-14439  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-14439)-2019-14439  | 
|  CVE-2020-10672  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-10672)-2020-10672  | 
|  CVE-2020-10673  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-10673)-2020-10673  | 
|  CVE-2020-11112  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-11112)-2020-11112  | 
|  CVE-2020-13949  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-13949)-2020-13949  | 
|  CVE-2020-14195  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-14195)-2020-14195  | 
|  CVE-2020-17521  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-17521)-2020-17521  | 
|  CVE-2020-24616  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-24616)-2020-24616  | 
|  CVE-2020-24750  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-24750)-2020-24750  | 
|  CVE-2020-25649  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-25649)-2020-25649  | 
|  CVE-2020-36183  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36183)-2020-36183  | 
|  CVE-2020-36186  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36186)-2020-36186  | 
|  CVE-2020-36188  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36188)-2020-36188  | 
|  CVE-2020-36189  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36189)-2020-36189  | 
|  CVE-2020-8908  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-8908)-2020-8908  | 
|  CVE-2021-37137  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2021-37137)-2021-37137  | 
|  CVE-2021-38153  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2021-38153)-2021-38153  | 
|  CVE-2022-25857  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-25857)-2022-25857  | 
|  CVE-2022-3509  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-3509)-2022-3509  | 
|  CVE-2022-37866  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-37866)-2022-37866  | 
|  CVE-2022-41966  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-41966)-2022-41966  | 
|  CVE-2022-45688  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-45688)-2022-45688  | 
|  CVE-2023-34455  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-34455)-2023-34455  | 
|  CVE-2023-3635  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-3635)-2023-3635  | 
|  CVE-2023-38647  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-38647)-2023-38647  | 
|  CVE-2023-40167  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-40167)-2023-40167  | 
|  CVE-2023-43642  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-43642)-2023-43642  | 
|  CVE-2023-44981  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-44981)-2023-44981  | 
|  CVE-2023-50387  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-50387)-2023-50387  | 
|  CVE-2024-23454  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-23454)-2024-23454  | 
|  CVE-2024-29025  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-29025)-2024-29025  | 
|  CVE-2024-36124  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-36124)-2024-36124  | 
|  CVE-2024-8184  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-8184)-2024-8184  | 
|  CVE-2012-0881  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2012-0881)-2012-0881  | 
|  CVE-2012-5783  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2012-5783)-2012-5783  | 
|  CVE-2015-5237  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2015-5237)-2015-5237  | 
|  CVE-2016-5018  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2016-5018)-2016-5018  | 
|  CVE-2016-6796  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2016-6796)-2016-6796  | 
|  CVE-2017-15095  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2017-15095)-2017-15095  | 
|  CVE-2018-1000180  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-1000180)-2018-1000180  | 
|  CVE-2018-10054  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-10054)-2018-10054  | 
|  CVE-2018-10237  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-10237)-2018-10237  | 
|  CVE-2018-11798  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-11798)-2018-11798  | 
|  CVE-2018-12023  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-12023)-2018-12023  | 
|  CVE-2018-14721  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-14721)-2018-14721  | 
|  CVE-2018-19361  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-19361)-2018-19361  | 
|  CVE-2018-5968  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-5968)-2018-5968  | 
|  CVE-2018-7489  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-7489)-2018-7489  | 
|  CVE-2019-0205  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-0205)-2019-0205  | 
|  CVE-2019-12086  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-12086)-2019-12086  | 
|  CVE-2019-12814  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-12814)-2019-12814  | 
|  CVE-2019-14540  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-14540)-2019-14540  | 
|  CVE-2019-14892  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-14892)-2019-14892  | 
|  CVE-2019-14893  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-14893)-2019-14893  | 
|  CVE-2019-16869  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-16869)-2019-16869  | 
|  CVE-2019-16942  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-16942)-2019-16942  | 
|  CVE-2019-17267  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-17267)-2019-17267  | 
|  CVE-2019-17531  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-17531)-2019-17531  | 
|  CVE-2019-20330  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-20330)-2019-20330  | 
|  CVE-2019-20444  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-20444)-2019-20444  | 
|  CVE-2019-20445  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-20445)-2019-20445  | 
|  CVE-2020-10969  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-10969)-2020-10969  | 
|  CVE-2020-11111  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-11111)-2020-11111  | 
|  CVE-2020-11619  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-11619](https://nvd.nist.gov/vuln/detail/CVE-2020-11619)  | 
|  CVE-2020-11620  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-11620)-2020-11620  | 
|  CVE-2020-13955  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-13955)-2020-13955  | 
|  CVE-2020-13956  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-13956)-2020-13956  | 
|  CVE-2020-14060  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-14060)-2020-14060  | 
|  CVE-2020-14061  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-14061)-2020-14061  | 
|  CVE-2020-15250  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-15250)-2020-15250  | 
|  CVE-2020-26939  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-26939)-2020-26939  | 
|  CVE-2020-35491  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-35491)-2020-35491  | 
|  CVE-2020-35728  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-35728)-2020-35728  | 
|  CVE-2020-36179  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36179)-2020-36179  | 
|  CVE-2020-36181  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36181)-2020-36181  | 
|  CVE-2020-36182  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36182)-2020-36182  | 
|  CVE-2020-36184  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36184)-2020-36184  | 
|  CVE-2020-36185  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36185)-2020-36185  | 
|  CVE-2020-36187  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36187)-2020-36187  | 
|  CVE-2020-36518  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36518)-2020-36518  | 
|  CVE-2020-8840  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-8840)-2020-8840  | 
|  CVE-2020-9546  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-9546)-2020-9546  | 
|  CVE-2020-9547  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-9547)-2020-9547  | 
|  CVE-2020-9548  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-9548)-2020-9548  | 
|  CVE-2021-20190  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2021-20190)-2021-20190  | 
|  CVE-2021-21290  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2021-21290)-2021-21290  | 
|  CVE-2021-22569  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2021-22569)-2021-22569  | 
|  CVE-2021-28170  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2021-28170)-2021-28170  | 
|  CVE-2021-29425  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2021-29425)-2021-29425  | 
|  CVE-2021-31684  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2021-31684)-2021-31684  | 
|  CVE-2021-34538  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2021-34538)-2021-34538  | 
|  CVE-2021-36374  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2021-36374)-2021-36374  | 
|  CVE-2021-37533  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2021-37533)-2021-37533  | 
|  CVE-2021-43859  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2021-43859)-2021-43859  | 
|  CVE-2022-1415  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-1415)-2022-1415  | 
|  CVE-2022-1471  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-1471)-2022-1471  | 
|  CVE-2022-3171  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-3171)-2022-3171  | 
|  CVE-2022-3510  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-3510)-2022-3510  | 
|  CVE-2022-36364  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-36364)-2022-36364  | 
|  CVE-2022-37865  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-37865)-2022-37865  | 
|  CVE-2022-38749  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-38749)-2022-38749  | 
|  CVE-2022-38751  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-38751)-2022-38751  | 
|  CVE-2022-40150  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-40150)-2022-40150  | 
|  CVE-2022-40151  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-40151)-2022-40151  | 
|  CVE-2022-40152  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-40152)-2022-40152  | 
|  CVE-2022-41854  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-41854)-2022-41854  | 
|  CVE-2022-42003  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-42003)-2022-42003  | 
|  CVE-2022-42889  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-42889)-2022-42889  | 
|  CVE-2022-45685  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-45685)-2022-45685  | 
|  CVE-2022-45693  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-45693)-2022-45693  | 
|  CVE-2022-46337  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-46337)-2022-46337  | 
|  CVE-2023-0833  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-0833)-2023-0833  | 
|  CVE-2023-1370  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-1370)-2023-1370  | 
|  CVE-2023-1436  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-1436)-2023-1436  | 
|  CVE-2023-20863  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-20863)-2023-20863  | 
|  CVE-2023-25194  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-25194)-2023-25194  | 
|  CVE-2023-33201  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-33201)-2023-33201  | 
|  CVE-2023-33202  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-33202)-2023-33202  | 
|  CVE-2023-34453  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-34453)-2023-34453  | 
|  CVE-2023-34454  |  tinggi  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-34454)-2023-34454  | 
|  CVE-2023-39410  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-39410)-2023-39410  | 
|  CVE-2023-42503  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-42503)-2023-42503  | 
|  CVE-2023-5072  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-5072)-2023-5072  | 
|  CVE-2023-50868  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-50868)-2023-50868  | 
|  CVE-2023-52428  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-52428)-2023-52428  | 
|  CVE-2023-6378  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-6378)-2023-6378  | 
|  CVE-2023-6481  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-6481)-2023-6481  | 
|  CVE-2024-21634  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-21634)-2024-21634  | 
|  CVE-2024-23944  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-23944)-2024-23944  | 
|  CVE-2024-29131  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-29131)-2024-29131  | 
|  CVE-2024-30171  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-30171)-2024-30171  | 
|  CVE-2024-30172  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-30172)-2024-30172  | 
|  CVE-2024-34447  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-34447)-2024-34447  | 
|  CVE-2024-35255  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-35255)-2024-35255  | 
|  CVE-2024-36114  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-36114)-2024-36114  | 
|  CVE-2024-38808  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-38808)-2024-38808  | 
|  CVE-2024-39676  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-39676)-2024-39676  | 
|  CVE-2024-51504  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-51504)-2024-51504  | 
|  CVE-2024-7254  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-7254)-2024-7254  | 
|  CVE-2017-17485  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2017-17485)-2017-17485  | 
|  CVE-2018-14719  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE-2018-14719](https://nvd.nist.gov/vuln/detail/CVE-2018-14719)  | 
|  CVE-2018-14720  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-14720)-2018-14720  | 
|  CVE-2018-19362  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-19362)-2018-19362  | 
|  CVE-2020-10650  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-10650)-2020-10650  | 
|  CVE-2020-10968  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-10968)-2020-10968  | 
|  CVE-2020-13936  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-13936)-2020-13936  | 
|  CVE-2020-14062  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-14062)-2020-14062  | 
|  CVE-2020-15522  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-15522)-2020-15522  | 
|  CVE-2020-1945  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-1945](https://nvd.nist.gov/vuln/detail/CVE-2020-1945)  | 
|  CVE-2020-28052  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-28052)-2020-28052  | 
|  CVE-2020-35490  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-35490)-2020-35490  | 
|  CVE-2021-36373  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2021-36373)-2021-36373  | 
|  CVE-2022-25647  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-25647)-2022-25647  | 
|  CVE-2022-38750  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-38750)-2022-38750  | 
|  CVE-2022-38752  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-38752)-2022-38752  | 
|  CVE-2022-42004  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-42004)-2022-42004  | 
|  CVE-2022-46751  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-46751)-2022-46751  | 
|  CVE-2023-20883  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-20883)-2023-20883  | 
|  CVE-2023-26048  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-26048)-2023-26048  | 
|  CVE-2023-2976  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-2976)-2023-2976  | 
|  CVE-2023-36478  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-36478)-2023-36478  | 
|  CVE-2023-51074  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-51074)-2023-51074  | 
|  CVE-2024-25638  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-25638)-2024-25638  | 
|  CVE-2024-25710  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-25710)-2024-25710  | 
|  CVE-2024-26308  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-26308)-2024-26308  | 
|  CVE-2024-29133  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-29133)-2024-29133  | 
|  CVE-2024-47554  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-47554)-2024-47554  | 
|  CVE-2024-47561  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-47561)-2024-47561  | 
|  CVE-2024-6763  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-6763)-2024-6763  | 
|  CVE-2012-6153  |  RENDAH  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2012-6153)-2012-6153  | 
|  CVE-2020-11113  |  RENDAH  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-11113)-2020-11113  | 
|  CVE-2021-22570  |  RENDAH  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2021-22570)-2021-22570  | 
|  CVE-2021-27568  |  RENDAH  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2021-27568)-2021-27568  | 
|  CVE-2024-29857  |  RENDAH  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-29857)-2024-29857  | 
|  CVE-2017-7525  |  TIDAK DIUJICOBAKAN  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2017-7525)-2017-7525  | 
|  CVE-2018-11307  |  TIDAK DIUJICOBAKAN  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-11307)-2018-11307  | 
|  CVE-2018-1313  |  TIDAK DIUJICOBAKAN  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-1313)-2018-1313  | 
|  CVE-2018-19360  |  TIDAK DIUJICOBAKAN  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-19360)-2018-19360  | 
|  CVE-2019-16335  |  TIDAK DIUJICOBAKAN  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-16335)-2019-16335  | 
|  CVE-2019-16943  |  TIDAK DIUJICOBAKAN  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-16943)-2019-16943  | 
|  CVE-2020-36180  |  TIDAK DIUJICOBAKAN  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36180)-2020-36180  | 
|  CVE-2021-37136  |  TIDAK DIUJICOBAKAN  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2021-37136)-2021-37136  | 
|  CVE-2022-24329  |  TIDAK DIUJICOBAKAN  |  [https://nvd.nist. gov/vuln/detail/CVE-2022-24329](https://nvd.nist.gov/vuln/detail/CVE-2022-24329)  | 
|  CVE-2022-39135  |  TIDAK DIUJICOBAKAN  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-39135)-2022-39135  | 
|  CVE-2022-40149  |  TIDAK DIUJICOBAKAN  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-40149)-2022-40149  | 
|  CVE-2023-26049  |  TIDAK DIUJICOBAKAN  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-26049)-2023-26049  | 

## Catatan rilis 7.5.0
<a name="emr-750-relnotes"></a>

Catatan rilis berikut mencakup informasi untuk Amazon EMR rilis 7.5.0.

**Fitur baru**
+ **Upgrade aplikasi** —Amazon EMR 7.5.0 application upgrades include Delta 3.2.1-amzn-0, HBase 2.5.10, Hudi 0.15.0-amzn-2, and Iceberg 1.6.1-amzn-1.
+ EMR write-ahead logs (WAL) mendukung replikasi lintas cluster. Untuk informasi lebih lanjut, lihat Replikasi [lintas cluster EMR WAL](https://docs.aws.amazon.com/emr/latest/ReleaseGuide/emr-hbase-wal-cross-cluster.html).

**Masalah yang diketahui**
+ Apache Sqoop telah dihapus dari Amazon EMR Release 7.5 dan rilis yang lebih baru.
+ **Saat penskalaan terkelola diaktifkan, YARN ResourceManager (RM) mengalami masalah kebuntuan kritis, menyebabkannya menjadi tidak responsif, saat beralih dari status DECOMMISSIONING ke **DECOMMISSIONED** dengan operasi simultan.** Ini terjadi terutama di lingkungan cluster besar. Ketika itu terjadi, baik transisi keadaan simpul dan transisi keadaan aplikasi gagal diproses, secara efektif melumpuhkan fungsionalitas inti dari. ResourceManager Sebagai solusinya, restart RM JVM menggunakan perintah berikut pada node utama:

  ```
  sudo systemctl restart hadoop-yarn-resourcemanager
  ```
+ Ketika cluster EMR dimulai dengan penjadwal YARN selain `CapacityScheduler` atau `FairScheduler` (misalnya, Penjadwal FIFO), metrik tidak didorong ke`YARNMemoryAvailablePercentage`. CloudWatch Masalah ini berdampak pada penurunan skala dalam klaster yang diaktifkan penskalaan terkelola. Ini mungkin juga memengaruhi penskalaan terkelola khusus jika bergantung pada `YARNMemoryAvailablePercentage` metrik. Sebagai solusinya, gunakan atau. `CapacityScheduler` `FairScheduler`
+  **HBase pembuatan tabel di katalog Hive with Glue** - Dari EMR-7.3.0 hingga EMR-7.10.0, ada bug karena integrasi Hive Iceberg, yang menyebabkan HBase pembuatan tabel di Hive gagal saat Glue Data Catalog digunakan sebagai metastore. Silakan hubungi tim AWS dukungan jika Anda mengalami masalah ini.
+  **Tez UI** - Dari EMR-7.3 ke EMR-7.10, ada bug di mana mengakses UI Tez melalui UI Web Manajer Sumber Daya YARN gagal saat enkripsi dalam transit diaktifkan. Ini terjadi karena proxy YARN mencoba menggunakan protokol HTTP sementara Tez UI memerlukan HTTPS. Harap ubah `tez.tez-ui.history-url.base` konfigurasi `tez-site` dari `http` ke `https` untuk menyelesaikan masalah ini.

**Perubahan, penyempurnaan, dan masalah yang diselesaikan**
+  *Dimulai dengan Spark 3.3.1 (didukung dalam EMR versi 6.10 dan yang lebih baru), semua pelaksana dalam host dekomisioning diatur ke yang baru, yang disebut status DECOMMISSIONING. `ExecutorState`* Pelaksana yang dinonaktifkan tidak dapat digunakan oleh Yarn untuk mengalokasikan tugas dan dengan demikian akan meminta pelaksana baru, jika diperlukan, untuk tugas yang sedang dijalankan. Jadi, jika Anda menonaktifkan Spark DRA saat menggunakan EMR Managed Scaling, EMR Auto Scaling, atau mekanisme penskalaan khusus apa pun pada cluster EMR-EC2, maka Yarn dapat meminta pelaksana maksimum yang diizinkan untuk setiap pekerjaan. Untuk menghindari masalah ini, biarkan `spark.dynamicAllocation.enabled` properti disetel ke `TRUE` (yang merupakan default) saat Anda menggunakan kombinasi fitur di atas. Selain itu, Anda juga dapat mengatur batasan pelaksana minimum dan maksimum dengan menetapkan nilai untuk `spark.dynamicAllocation.maxExecutors` dan `spark.dynamicAllocation.minExecutors` properti untuk pekerjaan Spark Anda, untuk membatasi jumlah pelaksana yang dialokasikan selama eksekusi pekerjaan. 
+ Amazon EMR menggunakan build TensorFlow library yang berbeda, bergantung pada jenis instans yang Anda pilih untuk klaster. Amazon EMR juga mendukung TensorFlow klaster dengan tipe instans **aarch64** (instans Graviton) dari EMR-7.5.0 ke atas.

  Daftar tabel berikut dibuat berdasarkan jenis instans untuk EMR-7.5.0:    
[\[See the AWS documentation website for more details\]](http://docs.aws.amazon.com/id_id/emr/latest/ReleaseGuide/emr-750-release.html)
+ Sebuah AWS Lake Formation dengan FGAC (Fine-Grained Access Control) mengaktifkan Amazon EMR cluster sekarang dapat mendukung hingga 256 langkah bersamaan dengan konfigurasi hdfs-site.xml berikut:

  ```
  [
    {
      "Classification": "hdfs-site",
      "Properties": {
        "dfs.datanode.handler.count": "40",
        "dfs.datanode.max.transfer.threads": "16384",
        "dfs.namenode.handler.count": "64",
        "dfs.replication": "1"
      }
    },
    {
      "Classification": "hdfs-env",
      "Configurations": [
        {
          "Classification": "export",
          "Properties": {
            "HADOOP_DATANODE_HEAPSIZE": "5120"
          }
        }
      ],
      "Properties": {}
    }
  ]
  ```
+     
[\[See the AWS documentation website for more details\]](http://docs.aws.amazon.com/id_id/emr/latest/ReleaseGuide/emr-750-release.html)

## 7.5.0 versi Java default
<a name="emr-750-jdk"></a>

Amazon EMR merilis 7.5 dan lebih tinggi dikirimkan dengan Amazon Corretto 17 (dibangun di atas OpenJDK) secara default untuk aplikasi yang mendukung Corretto 17 (JDK 17), dengan pengecualian Apache Livy.

Tabel berikut menunjukkan versi Java default untuk aplikasi di Amazon EMR 7.5.0. Jika Anda ingin mengubah JVM default pada cluster Anda, ikuti instruksi [Konfigurasikan aplikasi untuk menggunakan Java Virtual Machine tertentu](configuring-java8.md) untuk setiap aplikasi yang berjalan di cluster. Anda hanya dapat menggunakan satu versi runtime Java untuk sebuah cluster. Amazon EMR tidak mendukung menjalankan node atau aplikasi yang berbeda pada versi runtime yang berbeda pada cluster yang sama.


| Aplikasi | Versi Java/Amazon Corretto (defaultnya tebal) | 
| --- | --- | 
| kuala | 17, 11, 8 | 
| Flink | 17, 11, 8 | 
| HBase | 17, 11, 8 | 
| HCatalog | 17, 11, 8 | 
| Hadoop | 17, 11, 8 | 
| Hive | 17, 11, 8 | 
| Hudi | 17, 11, 8 | 
| Gunung es | 17, 11, 8 | 
| Livy | 17, 11, 8 | 
| Oozie | 17, 11, 8 | 
| Phoenix | 17, 11, 8 | 
| PrestoDB | 8 | 
| Spark | 17, 11, 8 | 
| Spark RAPIDS | 17, 11, 8 | 
| Tez | 17, 11, 8 | 
| Trino | 21, 17 | 
| Zeppelin | 17, 11, 8 | 
| Pig | 8 | 
| Zookeeper | 17, 11, 8 | 

## 7.5.0 versi komponen
<a name="emr-750-components"></a>

Komponen yang diinstal oleh Amazon EMR dengan rilis ini tercantum di bawah ini. Beberapa komponen diinstal sebagai bagian dari paket aplikasi big data. Sedangkan komponen lainnya bersifak unik untuk Amazon EMR dan diinstal untuk proses sistem dan fitur. Ini biasanya dimulai dengan `emr` atau `aws`. Paket aplikasi big data dalam rilis Amazon EMR terbaru biasanya versi terbaru yang ditemukan di komunitas. Kami menyediakan rilis komunitas di Amazon EMR secepat mungkin.

Beberapa komponen yang ada di Amazon EMR berbeda dari versi komunitas. Komponen ini mempunyai label versi dalam bentuk `CommunityVersion-amzn-EmrVersion`. `EmrVersion` dimulai dari 0. Misalnya, jika komponen komunitas open source bernama `myapp-component` dengan versi 2.2 telah dimodifikasi tiga kali untuk dimasukkan dalam rilis EMR Amazon yang berbeda, versi rilisnya terdaftar sebagai. `2.2-amzn-2`


| Komponen | Versi | Deskripsi | 
| --- | --- | --- | 
| adot-java-agent | 1.31.0 | Agen Java yang mengumpulkan metrik dari daemon aplikasi. | 
| delta | 3.2.1-amzn-0 | Danau Delta adalah format tabel terbuka untuk kumpulan data analitik yang sangat besar | 
| emr-amazon-cloudwatch-agent | 1.300032.2-amzn-0 | Aplikasi yang mengumpulkan metrik tingkat sistem internal dan metrik aplikasi khusus dari instans Amazon EC2. | 
| emr-ddb | 5.6.0 | Konektor Amazon DynamoDB untuk aplikasi ekosistem Hadoop. | 
| emr-goodies | 3.14.0 | Perpustakaan kenyamanan ekstra untuk ekosistem Hadoop. | 
| emr-kinesis | 3.18.0 | Konektor Amazon Kinesis untuk aplikasi ekosistem Hadoop. | 
| emr-notebook-env | 1.16.0 | Conda env untuk emr notebook yang mencakup gateway jupyter korporasi | 
| emr-s3-dist-cp | 2.35.0 | Aplikasi salinan terdistribusi yang dioptimalkan untuk Amazon S3. | 
| emr-s3-select | 2.14.0 | EMR S3Select Connector | 
| emr-wal-cli | 1.3.1 | Cli digunakan untuk daftar emrwal/penghapusan. | 
| emrfs | 2.66.0 | Konektor Amazon S3 untuk aplikasi ekosistem Hadoop. | 
| flink-client | 1.19.1-amzn-1 | Skrip dan aplikasi klien baris perintah Apache Flink. | 
| flink-jobmanager-config | 1.19.1-amzn-1 | Mengelola sumber daya pada node EMR untuk Apache Flink. JobManager | 
| hadoop-client | 3.4.0-amzn-1 | Klien baris perintah Hadoop seperti 'hdfs', 'Hadoop', atau 'yarn'. | 
| hadoop-hdfs-datanode | 3.4.0-amzn-1 | Layanan tingkat simpul HDFS untuk menyimpan blok. | 
| hadoop-hdfs-library | 3.4.0-amzn-1 | Klien dan perpustakaan baris perintah HDFS | 
| hadoop-hdfs-namenode | 3.4.0-amzn-1 | Layanan HDFS untuk melacak nama file dan lokasi blok. | 
| hadoop-hdfs-journalnode | 3.4.0-amzn-1 | Layanan HDFS untuk mengelola jurnal filesystem Hadoop pada klaster HA. | 
| hadoop-httpfs-server | 3.4.0-amzn-1 | Titik akhir HTTP untuk operasi HDFS. | 
| hadoop-kms-server | 3.4.0-amzn-1 | Server manajemen kunci kriptografi berdasarkan API Hadoop. KeyProvider  | 
| hadoop-mapred | 3.4.0-amzn-1 | MapReduce pustaka mesin eksekusi untuk menjalankan MapReduce aplikasi. | 
| hadoop-yarn-nodemanager | 3.4.0-amzn-1 | Layanan YARN untuk mengelola kontainer pada simpul individu. | 
| hadoop-yarn-resourcemanager | 3.4.0-amzn-1 | Layanan YARN untuk mengalokasikan dan mengelola sumber daya klaster dan aplikasi terdistribusi. | 
| hadoop-yarn-timeline-server | 3.4.0-amzn-1 | Layanan untuk mengambil informasi terkini dan historis untuk aplikasi YARN. | 
| hbase-hmaster | 2.5.10-amzn-0 | Layanan untuk HBase cluster yang bertanggung jawab untuk koordinasi Daerah dan pelaksanaan perintah administratif. | 
| hbase-region-server | 2.5.10-amzn-0 | Layanan untuk melayani satu atau lebih HBase wilayah. | 
| hbase-client | 2.5.10-amzn-0 | HBase klien baris perintah. | 
| hbase-rest-server | 2.5.10-amzn-0 | Layanan menyediakan titik akhir RESTful HTTP untuk HBase. | 
| hbase-thrift-server | 2.5.10-amzn-0 | Layanan menyediakan titik akhir Thrift ke. HBase | 
| hbase-operator-tools | 2.5.10-amzn-0 | Alat perbaikan untuk HBase cluster Apache. | 
| hcatalog-client | 3.1.3-amzn-14 | Klien baris perintah 'hcat' untuk memanipulasi hcatalog-server. | 
| hcatalog-server | 3.1.3-amzn-14 | Penyediaan layanan HCatalog, tabel dan lapisan manajemen penyimpanan untuk aplikasi terdistribusi. | 
| hcatalog-webhcat-server | 3.1.3-amzn-14 | Titik akhir HTTP menyediakan antarmuka REST ke HCatalog. | 
| hive-client | 3.1.3-amzn-14 | Klien baris perintah Hive. | 
| hive-hbase | 3.1.3-amzn-14 | Klien Hive-hbase. | 
| hive-metastore-server | 3.1.3-amzn-14 | Layanan untuk mengakses metastore Hive, repositori semantik yang menyimpan metadata untuk SQL pada operasi Hadoop. | 
| hive-server2 | 3.1.3-amzn-14 | Layanan untuk menerima kueri Hive sebagai permintaan web. | 
| hudi | 0.15.0-amzn-2 | Kerangka pemrosesan tambahan untuk memberi daya pada pipa data pada latensi rendah dan efisiensi tinggi. | 
| hudi-presto | 0.15.0-amzn-2 | Perpustakaan paket untuk menjalankan Presto dengan Hudi. | 
| hudi-trino | 0.15.0-amzn-2 | Perpustakaan bundel untuk menjalankan Trino dengan Hudi. | 
| hudi-spark | 0.15.0-amzn-2 | Perpustakaan paket untuk menjalankan Spark dengan Hudi. | 
| hue-server | 4.11.0 | Aplikasi web untuk menganalisis data menggunakan aplikasi ekosistem Hadoop | 
| iceberg | 1.6.1-amzn-1 | Apache Iceberg adalah format tabel terbuka untuk kumpulan data analitik besar | 
| jupyterhub | 1.5.0 | Server multi-pengguna untuk notebook Jupyter | 
| livy-server | 0.8.0-inkubasi | Antarmuka REST untuk berinteraksi dengan Apache Spark | 
| nginx | 1.12.1 | nginx [engine x] adalah server HTTP dan server proksi balik | 
| mariadb-server | 5.5.68\$1 | Server basis data MariaDB. | 
| nvidia-cuda | 12.3.0 | Driver Nvidia dan kit alat Cuda | 
| oozie-client | 5.2.1 | Klien baris perintah Oozie. | 
| oozie-server | 5.2.1 | Layanan untuk menerima permintaan alur kerja Oozie. | 
| opencv | 4.7.0 | Perpustakaan Visi Komputer Sumber Terbuka. | 
| phoenix-library | 5.2.0 | Perpustakaan phoenix untuk server dan klien | 
| phoenix-connectors | 6.0.0 | Konektor Apache Phoenix untuk Spark-3 | 
| phoenix-query-server | 6.0.0 | Sebuah server ringan yang menyediakan akses JDBC serta Protocol Buffers dan akses format JSON ke API Avatica  | 
| presto-coordinator | 0,287-amzn-0 | Layanan untuk menerima kueri dan mengelola eksekusi kueri antara presto-worker. | 
| presto-worker | 0,287-amzn-0 | Layanan untuk mengeksekusi potongan kueri. | 
| presto-client | 0,287-amzn-0 | Klien baris perintah Presto yang diinstal pada master klaster HA yang siaga di mana server Presto server tidak dimulai. | 
| trino-coordinator | 446-amzn-0 | Layanan untuk menerima kueri dan mengelola eksekusi kueri di antara trino-workers. | 
| trino-worker | 446-amzn-0 | Layanan untuk mengeksekusi potongan kueri. | 
| trino-client | 446-amzn-0 | Klien baris perintah Trino yang diinstal pada master siaga cluster HA di mana server Trino tidak dimulai. | 
| pig-client | 0.17.0 | Klien baris perintah Pig. | 
| r | 4.3.2 | Proyek R untuk Komputasi Statistik | 
| ranger-kms-server | 2.0.0 | Sistem Pengelolaan Kunci Ranger Apache | 
| spark-client | 3.5.2-amzn-1 | Klien baris perintah Spark. | 
| spark-history-server | 3.5.2-amzn-1 | Web UI untuk melihat log acara untuk seluruh masa pakai aplikasi Spark. | 
| spark-on-yarn | 3.5.2-amzn-1 | Mesin eksekusi dalam memori untuk YARN. | 
| spark-yarn-slave | 3.5.2-amzn-1 | Perpustakaan Apache Spark yang dibutuhkan oleh slave YARN. | 
| spark-rapids | 24.08.1-amzn-1 | Plugin Nvidia Spark RAPIDS yang mempercepat Apache Spark dengan. GPUs | 
| tensorflow | 2.16.1 | TensorFlow pustaka perangkat lunak open source untuk perhitungan numerik kinerja tinggi. | 
| tez-on-yarn | 0.10.2-amzn-12 | Aplikasi dan perpustakaan tez YARN. | 
| tez-on-worker | 0.10.2-amzn-12 | Aplikasi dan pustaka YARN tez untuk node pekerja. | 
| zeppelin-server | 0.11.1 | Notebook berbasis web yang memungkinkan analisis data interaktif. | 
| zookeeper-server | 3.9.2-amzn-0 | Layanan terpusat untuk menjaga informasi konfigurasi, penamaan, yang menyediakan sinkronisasi terdistribusi, dan menyediakan layanan grup. | 
| zookeeper-client | 3.9.2-amzn-0 | ZooKeeper klien baris perintah. | 

## 7.5.0 klasifikasi konfigurasi
<a name="emr-750-class"></a>

Klasifikasi konfigurasi memungkinkan Anda menyesuaikan aplikasi. Ini sering kali bersesuaian dengan file XML konfigurasi untuk aplikasi, seperti `hive-site.xml`. Untuk informasi selengkapnya, lihat [Konfigurasikan aplikasi](emr-configure-apps.md).

Tindakan konfigurasi ulang terjadi ketika Anda menentukan konfigurasi untuk grup instans di klaster yang sedang berjalan. Amazon EMR hanya memulai tindakan konfigurasi ulang untuk klasifikasi yang Anda modifikasi. Untuk informasi selengkapnya, lihat [Lakukan konfigurasi ulang pada grup instans di klaster yang sedang berjalan](emr-configure-apps-running-cluster.md).


**klasifikasi emr-7.5.0**  

| Klasifikasi | Deskripsi | Tindakan Konfigurasi Ulang | 
| --- | --- | --- | 
| capacity-scheduler | Ubah nilai dalam file capacity-scheduler.xml Hadoop. | Restarts the ResourceManager service. | 
| container-executor | Ubah nilai dalam file container-executor.cfg Hadoop YARN ini. | Not available. | 
| container-log4j | Ubah nilai dalam file container-log4j.properties Hadoop YARN. | Not available. | 
| core-site | Ubah nilai dalam file core-site.xml Hadoop. | Restarts the Hadoop HDFS services Namenode, SecondaryNamenode, Datanode, ZKFC, and Journalnode. Restarts the Hadoop YARN services ResourceManager, NodeManager, ProxyServer, and TimelineServer. Additionally restarts Hadoop KMS, Ranger KMS, HiveServer2, Hive MetaStore, Hadoop Httpfs, and MapReduce-HistoryServer. | 
| docker-conf | Ubah pengaturan terkait docker. | Not available. | 
| emrfs-site | Ubah pengaturan EMRFS. | Restarts the Hadoop HDFS services Namenode, SecondaryNamenode, Datanode, ZKFC, and Journalnode. Restarts the Hadoop YARN services ResourceManager, NodeManager, ProxyServer, and TimelineServer. Additionally restarts HBaseRegionserver, HBaseMaster, HBaseThrift, HBaseRest, HiveServer2, Hive MetaStore, Hadoop Httpfs, and MapReduce-HistoryServer. | 
| flink-conf | Ubah pengaturan flink-conf.yaml. | Restarts Flink history server. | 
| flink-log4j | Ubah pengaturan log4j.properties Flink. | Restarts Flink history server. | 
| flink-log4j-session | Ubah pengaturan Flink log4j-session.properties untuk sesi. Kubernetes/Yarn  | Restarts Flink history server. | 
| flink-log4j-cli | Ubah pengaturan log4j-cli.properties Flink. | Restarts Flink history server. | 
| hadoop-env | Ubah nilai dalam lingkungan Hadoop untuk semua komponen Hadoop. | Restarts the Hadoop HDFS services Namenode, SecondaryNamenode, Datanode, ZKFC, and Journalnode. Restarts the Hadoop YARN services ResourceManager, NodeManager, ProxyServer, and TimelineServer. Additionally restarts PhoenixQueryserver, HiveServer2, Hive MetaStore, and MapReduce-HistoryServer. | 
| hadoop-log4j | Ubah nilai dalam file log4j.properties Hadoop ini. | Restarts the Hadoop HDFS services SecondaryNamenode, Datanode, and Journalnode. Restarts the Hadoop YARN services ResourceManager, NodeManager, ProxyServer, and TimelineServer. Additionally restarts Hadoop KMS, Hadoop Httpfs, and MapReduce-HistoryServer. | 
| hadoop-ssl-server | Ubah konfigurasi server ssl hadoop | Not available. | 
| hadoop-ssl-client | Ubah konfigurasi klien ssl hadoop | Not available. | 
| hbase | Pengaturan Amazon EMR-curated untuk Apache. HBase | Custom EMR specific property. Sets emrfs-site and hbase-site configs. See those for their associated restarts. | 
| hbase-env | Ubah nilai HBase di lingkungan. | Restarts the HBase services RegionServer, HBaseMaster, ThriftServer, RestServer. | 
| hbase-log4j | Ubah nilai dalam file HBase hbase-log4j.properties. | Restarts the HBase services RegionServer, HBaseMaster, ThriftServer, RestServer. | 
| hbase-metrics | Ubah nilai dalam file HBase hadoop-metrics2-hbase.properties. | Restarts the HBase services RegionServer, HBaseMaster, ThriftServer, RestServer. | 
| hbase-policy | Ubah nilai dalam HBase file hbase-policy.xml. | Not available. | 
| hbase-site | Ubah nilai dalam HBase file hbase-site.xml. | Restarts the HBase services RegionServer, HBaseMaster, ThriftServer, RestServer. Additionally restarts Phoenix QueryServer. | 
| hdfs-encryption-zones | Konfigurasikan zona enkripsi HDFS. | This classification should not be reconfigured. | 
| hdfs-env | Ubah nilai dalam lingkungan HDFS. | Restarts Hadoop HDFS services Namenode, Datanode, and ZKFC. | 
| hdfs-site | Ubah nilai dalam hdfs-site.xml HDFS. | Restarts the Hadoop HDFS services Namenode, SecondaryNamenode, Datanode, ZKFC, and Journalnode. Additionally restarts Hadoop Httpfs. | 
| hcatalog-env | Ubah nilai HCatalog di lingkungan. | Restarts Hive HCatalog Server. | 
| hcatalog-server-jndi | Ubah nilai di HCatalog jndi.properties. | Restarts Hive HCatalog Server. | 
| hcatalog-server-proto-hive-site | Ubah nilai HCatalog proto-hive-site dalam.xml's. | Restarts Hive HCatalog Server. | 
| hcatalog-webhcat-env | Ubah nilai di lingkungan HCatalog WebHCat. | Restarts Hive WebHCat server. | 
| hcatalog-webhcat-log4j2 | Ubah nilai di HCat log4j2.properties HCatalog Web. | Restarts Hive WebHCat server. | 
| hcatalog-webhcat-site | Ubah nilai dalam file webhcat-site.xml HCatalog WebHCat. | Restarts Hive WebHCat server. | 
| hive | Pengaturan dikurasi Amazon EMR untuk Apache Hive. | Sets configurations to launch Hive LLAP service. | 
| hive-beeline-log4j2 | Ubah nilai dalam file beeline-log4j2.properties Hive. | Not available. | 
| hive-parquet-logging | Ubah nilai dalam file parquet-logging.properties Hive. | Not available. | 
| hive-env | Ubah nilai dalam lingkungan Hive. | Restarts HiveServer2, HiveMetastore, and Hive HCatalog-Server. Runs Hive schemaTool CLI commands to verify hive-metastore. | 
| hive-exec-log4j2 | Ubah nilai dalam file hive-exec-log 4j2.properties Hive. | Not available. | 
| hive-llap-daemon-log4j2 | Ubah nilai dalam file llap-daemon-log 4j2.properties Hive. | Not available. | 
| hive-log4j2 | Ubah nilai dalam file hive-log4j2.properties Hive. | Not available. | 
| hive-site | Ubah nilai dalam file hive-site.xml Hive | Restarts HiveServer2, HiveMetastore, and Hive HCatalog-Server. Runs Hive schemaTool CLI commands to verify hive-metastore. Also restarts Oozie and Zeppelin. | 
| hiveserver2-site | Ubah nilai dalam file hiveserver2-site.xml Hive Server2 | Not available. | 
| hue-ini | Ubah nilai dalam file ini Hue | Restarts Hue. Also activates Hue config override CLI commands to pick up new configurations. | 
| httpfs-env | Ubah nilai di lingkungan HTTPFS. | Restarts Hadoop Httpfs service. | 
| httpfs-site | Ubah nilai dalam file httpfs-site.xml Hadoop. | Restarts Hadoop Httpfs service. | 
| hadoop-kms-acls | Ubah nilai dalam file kms-acls.xml Hadoop. | Not available. | 
| hadoop-kms-env | Ubah nilai dalam lingkungan Hadoop KMS. | Restarts Hadoop-KMS service. | 
| hadoop-kms-java-home | Ubah rumah java KMS Hadoop | Not available. | 
| hadoop-kms-log4j | Ubah nilai dalam file kms-log4j.properties Hadoop. | Not available. | 
| hadoop-kms-site | Ubah nilai dalam file kms-site.xml Hadoop. | Restarts Hadoop-KMS and Ranger-KMS service. | 
| hudi-env | Ubah nilai di lingkungan Hudi. | Not available. | 
| hudi-defaults | Ubah nilai dalam file hudi-defaults.conf Hudi. | Not available. | 
| iceberg-defaults | Ubah nilai dalam file iceberg-defaults.conf Iceberg. | Not available. | 
| delta-defaults | Ubah nilai dalam file delta-defaults.conf Delta. | Not available. | 
| jupyter-notebook-conf | Ubah nilai dalam file jupyter\$1notebook\$1config.py Jupyter Notebook. | Not available. | 
| jupyter-hub-conf | Ubah nilai dalam JupyterHubs file jupyterhub\$1config.py. | Not available. | 
| jupyter-s3-conf | Konfigurasikan persistensi Jupyter Notebook S3. | Not available. | 
| jupyter-sparkmagic-conf | Ubah nilai dalam file config.json Sparkmagic. | Not available. | 
| livy-conf | Ubah nilai dalam file livy.conf Livy. | Restarts Livy Server. | 
| livy-env | Ubah nilai di lingkungan Livy. | Restarts Livy Server. | 
| livy-log4j2 | Ubah pengaturan Livy log4j2.properties. | Restarts Livy Server. | 
| mapred-env | Ubah nilai di lingkungan MapReduce aplikasi. | Restarts Hadoop MapReduce-HistoryServer. | 
| mapred-site | Ubah nilai dalam file mapred-site.xml MapReduce aplikasi. | Restarts Hadoop MapReduce-HistoryServer. | 
| oozie-env | Ubah nilai di lingkungan Oozie. | Restarts Oozie. | 
| oozie-log4j | Ubah nilai dalam file oozie-log4j.properties Oozie. | Restarts Oozie. | 
| oozie-site | Ubah nilai dalam file oozie-site.xml Oozie. | Restarts Oozie. | 
| phoenix-hbase-metrics | Ubah nilai dalam file hadoop-metrics2-hbase.properties Phoenix. | Not available. | 
| phoenix-hbase-site | Ubah nilai dalam file hbase-site.xml Phoenix. | Not available. | 
| phoenix-log4j2 | Ubah nilai dalam file log4j2.properties Phoenix. | Restarts Phoenix-QueryServer. | 
| phoenix-metrics | Ubah nilai dalam file hadoop-metrics2-phoenix.properties Phoenix. | Not available. | 
| pig-env | Ubah nilai di lingkungan Pig. | Not available. | 
| pig-properties | Ubah nilai dalam file pig.properties Pig. | Restarts Oozie. | 
| pig-log4j | Ubah nilai dalam file log4j.properties Pig. | Not available. | 
| presto-log | Ubah nilai dalam file log.properties Presto. | Restarts Presto-Server (for PrestoDB) | 
| presto-config | Ubah nilai dalam file config.properties Presto. | Restarts Presto-Server (for PrestoDB) | 
| presto-password-authenticator | Ubah nilai dalam file password-authenticator.properties Presto. | Not available. | 
| presto-env | Ubah nilai dalam file presto-env.sh Presto. | Restarts Presto-Server (for PrestoDB) | 
| presto-node | Ubah nilai dalam file node.properties Presto. | Not available. | 
| presto-connector-blackhole | Ubah nilai dalam file blackhole.properties Presto. | Not available. | 
| presto-connector-cassandra | Ubah nilai dalam file cassandra.properties Presto. | Not available. | 
| presto-connector-hive | Ubah nilai dalam file hive.properties Presto. | Restarts Presto-Server (for PrestoDB) | 
| presto-connector-jmx | Ubah nilai dalam file jmx.properties Presto. | Not available. | 
| presto-connector-kafka | Ubah nilai dalam file kafka.properties Presto. | Not available. | 
| presto-connector-lakeformation | Ubah nilai dalam file lakeformation.properties Presto. | Restarts Presto-Server (for PrestoDB) | 
| presto-connector-localfile | Ubah nilai dalam file localfile.properties Presto. | Not available. | 
| presto-connector-memory | Ubah nilai dalam file memory.properties Presto. | Not available. | 
| presto-connector-mongodb | Ubah nilai dalam file mongodb.properties Presto. | Not available. | 
| presto-connector-mysql | Ubah nilai dalam file mysql.properties Presto. | Not available. | 
| presto-connector-postgresql | Ubah nilai dalam file postgresql.properties Presto. | Not available. | 
| presto-connector-raptor | Ubah nilai dalam file raptor.properties Presto. | Not available. | 
| presto-connector-redis | Ubah nilai dalam file redis.properties Presto. | Not available. | 
| presto-connector-redshift | Ubah nilai dalam file redshift.properties Presto. | Not available. | 
| presto-connector-tpch | Ubah nilai dalam file tpch.properties Presto. | Not available. | 
| presto-connector-tpcds | Ubah nilai dalam file tpcds.properties Presto. | Not available. | 
| trino-log | Ubah nilai dalam file log.properties Trino. | Restarts Trino-Server (for Trino) | 
| trino-config | Ubah nilai dalam file config.properties Trino. | Restarts Trino-Server (for Trino) | 
| trino-password-authenticator | Ubah nilai dalam file password-authenticator.properties Trino. | Restarts Trino-Server (for Trino) | 
| trino-env | Ubah nilai dalam file trino-env.sh Trino. | Restarts Trino-Server (for Trino) | 
| trino-node | Ubah nilai dalam file node.properties Trino. | Not available. | 
| trino-connector-blackhole | Ubah nilai dalam file blackhole.properties Trino. | Not available. | 
| trino-connector-cassandra | Ubah nilai dalam file cassandra.properties Trino. | Not available. | 
| trino-connector-delta | Ubah nilai dalam file delta.properties Trino. | Restarts Trino-Server (for Trino) | 
| trino-connector-hive | Ubah nilai dalam file hive.properties Trino. | Restarts Trino-Server (for Trino) | 
| trino-exchange-manager | Ubah nilai dalam file exchange-manager.properties Trino. | Restarts Trino-Server (for Trino) | 
| trino-connector-iceberg | Ubah nilai dalam file iceberg.properties Trino. | Restarts Trino-Server (for Trino) | 
| trino-connector-hudi | Ubah nilai dalam file hudi.properties Trino. | Restarts Trino-Server (for Trino) | 
| trino-connector-jmx | Ubah nilai dalam file jmx.properties Trino. | Not available. | 
| trino-connector-kafka | Ubah nilai dalam file kafka.properties Trino. | Not available. | 
| trino-connector-localfile | Ubah nilai dalam file localfile.properties Trino. | Not available. | 
| trino-connector-memory | Ubah nilai dalam file memory.properties Trino. | Not available. | 
| trino-connector-mongodb | Ubah nilai dalam file mongodb.properties Trino. | Not available. | 
| trino-connector-mysql | Ubah nilai dalam file mysql.properties Trino. | Not available. | 
| trino-connector-postgresql | Ubah nilai dalam file postgresql.properties Trino. | Not available. | 
| trino-connector-raptor | Ubah nilai dalam file raptor.properties Trino. | Not available. | 
| trino-connector-redis | Ubah nilai dalam file redis.properties Trino. | Not available. | 
| trino-connector-redshift | Ubah nilai dalam file redshift.properties Trino. | Not available. | 
| trino-connector-tpch | Ubah nilai dalam file tpch.properties Trino. | Not available. | 
| trino-connector-tpcds | Ubah nilai dalam file tpcds.properties Trino. | Not available. | 
| ranger-kms-dbks-site | Ubah nilai dalam file dbks-site.xml Ranger KMS. | Restarts Ranger KMS Server. | 
| ranger-kms-site | Ubah nilai dalam ranger-kms-site file.xml. dari Ranger KMS. | Restarts Ranger KMS Server. | 
| ranger-kms-env | Ubah nilai di lingkungan Ranger KMS. | Restarts Ranger KMS Server. | 
| ranger-kms-logback | Ubah nilai dalam file kms-logback.xml dari Ranger KMS. | Not available. | 
| ranger-kms-db-ca | Ubah nilai untuk file CA pada S3 untuk koneksi MySQL SSL dengan Ranger KMS. | Not available. | 
| spark | Pengaturan terkurasi Amazon EMR untuk Apache Spark. | This property modifies spark-defaults. See actions there. | 
| spark-defaults | Ubah nilai dalam file spark-defaults.conf Spark. | Restarts Spark history server and Spark thrift server. | 
| spark-env | Ubah nilai di lingkungan Spark. | Restarts Spark history server and Spark thrift server. | 
| spark-hive-site | Ubah nilai dalam file hive-site.xml Spark | Not available. | 
| spark-log4j2 | Ubah nilai dalam file log4j2.properties Spark. | Restarts Spark history server and Spark thrift server. | 
| spark-metrics | Ubah nilai dalam file metrics.properties Spark. | Restarts Spark history server and Spark thrift server. | 
| tez-site | Ubah nilai dalam file tez-site.xml Tez. | Restart Oozie and HiveServer2. | 
| yarn-env | Ubah nilai di lingkungan YARN. | Restarts the Hadoop YARN services ResourceManager, NodeManager, ProxyServer, and TimelineServer. Additionally restarts MapReduce-HistoryServer. | 
| yarn-site | Ubah nilai dalam file yarn-site.xml YARN. | Restarts the Hadoop YARN services ResourceManager, NodeManager, ProxyServer, and TimelineServer. Additionally restarts Livy Server and MapReduce-HistoryServer. | 
| zeppelin-env | Ubah nilai di lingkungan Zeppelin. | Restarts Zeppelin. | 
| zeppelin-site | Ubah pengaturan konfigurasi di zeppelin-site.xml. | Restarts Zeppelin. | 
| zookeeper-config | Ubah nilai dalam ZooKeeper file zoo.cfg. | Restarts Zookeeper server. | 
| zookeeper-logback | Ubah nilai dalam ZooKeeper file logback.xml. | Restarts Zookeeper server. | 
| emr-metrics | Ubah pengaturan metrik emr untuk simpul ini. | Restarts the CloudWatchAgent service. | 

## 7.5.0 perubahan log
<a name="750-changelog"></a>


**Ubah log untuk catatan rilis dan rilis 7.5.0**  

| Date | Peristiwa | Deskripsi | 
| --- | --- | --- | 
| 2024-11-21 | Publikasi Docs | Amazon EMR 7.5.0 catatan rilis pertama kali diterbitkan | 
| 2024-11-21 | Penerapan selesai | [Amazon EMR 7.5.0 sepenuhnya diterapkan ke semua Wilayah yang didukung](https://aws.amazon.com/about-aws/global-infrastructure/regional-product-services/) | 
| 2024-11-13 | Rilis awal | Amazon EMR 7.5.0 pertama kali dikerahkan ke Wilayah komersial awal | 

# Amazon EMR rilis 7.4.0
<a name="emr-740-release"></a>

## 7.4.0 siklus hidup yang didukung
<a name="emr-740-supported-lifecycle"></a>

Tabel berikut menjelaskan tanggal siklus hidup yang didukung untuk rilis Amazon EMR 7.4.0.


| Fase Support | Date | 
| --- | --- | 
| Tanggal rilis awal | November 13, 2024 | 
| Dukungan standar sampai | November 12, 2026 | 
| Akhir dari dukungan | November 13, 2026 | 
| Akhir hidup | November 13, 2027 | 

## 7.4.0 versi aplikasi
<a name="emr-740-app-versions"></a>

Rilis ini mencakup aplikasi berikut: [https://docs.aws.amazon.com/AmazonCloudWatch/latest/monitoring/Install-CloudWatch-Agent.html](https://docs.aws.amazon.com/AmazonCloudWatch/latest/monitoring/Install-CloudWatch-Agent.html), [https://delta.io/](https://delta.io/), [https://flink.apache.org/](https://flink.apache.org/), [http://hbase.apache.org/](http://hbase.apache.org/), [https://cwiki.apache.org/confluence/display/Hive/HCatalog](https://cwiki.apache.org/confluence/display/Hive/HCatalog), [http://hive.apache.org/](http://hive.apache.org/), [https://hudi.apache.org](https://hudi.apache.org), [http://gethue.com/](http://gethue.com/), [https://iceberg.apache.org/](https://iceberg.apache.org/), [https://jupyter-enterprise-gateway.readthedocs.io/en/latest/](https://jupyter-enterprise-gateway.readthedocs.io/en/latest/), [https://jupyterhub.readthedocs.io/en/latest/#](https://jupyterhub.readthedocs.io/en/latest/#), [https://livy.incubator.apache.org/](https://livy.incubator.apache.org/), [http://oozie.apache.org/](http://oozie.apache.org/), [https://phoenix.apache.org/](https://phoenix.apache.org/), [http://pig.apache.org/](http://pig.apache.org/), [https://prestodb.io/](https://prestodb.io/), [https://spark.apache.org/docs/latest/](https://spark.apache.org/docs/latest/), [http://sqoop.apache.org/](http://sqoop.apache.org/), [https://www.tensorflow.org/](https://www.tensorflow.org/), [https://tez.apache.org/](https://tez.apache.org/), [https://trino.io/](https://trino.io/), [https://zeppelin.incubator.apache.org/](https://zeppelin.incubator.apache.org/), dan [https://zookeeper.apache.org](https://zookeeper.apache.org).

Tabel di bawah ini mencantumkan versi aplikasi yang tersedia dalam rilis Amazon EMR ini dan versi aplikasi dalam tiga rilis EMR Amazon sebelumnya (bila berlaku).

Untuk riwayat lengkap versi aplikasi untuk setiap rilis Amazon EMR, lihat topik berikut:
+ [Versi aplikasi di Amazon EMR 7.x rilis](emr-release-app-versions-7.x.md)
+ [Versi aplikasi di Amazon EMR 6.x rilis](emr-release-app-versions-6.x.md)
+ [Versi aplikasi di Amazon EMR 5.x rilis](emr-release-app-versions-5.x.md)
+ [Versi aplikasi di Amazon EMR 4.x rilis](emr-release-app-versions-4.x.md)


**Informasi versi aplikasi**  

|  | emr-7.4.0 | emr-7.3.0 | emr-7.2.0 | emr-7.1.0 | 
| --- | --- | --- | --- | --- | 
| AWS SDK for Java | 2.28.8, 1.12.772 | 2.25.70, 1.12.747 | 2.23.18, 1.12.705 | 2.23.18, 1.12.656 | 
| Python | 3.9, 3.11 | 3.9, 3.11 | 3.9, 3.11 | 3.9, 3.11 | 
| Skala | 2.12.18 | 2.12.18 | 2.12.17 | 2.12.17 | 
| AmazonCloudWatchAgent | 1.300032.2-amzn-0 | 1.300032.2-amzn-0 | 1.300032.2-amzn-0 | 1.300032.2-amzn-0 | 
| Delta | 3.2.0-amzn-1 | 3.2.0-amzn-0 | 3.1.0 | 3.0.0 | 
| Flink | 1.19.1-amzn-0 | 1.18.1-amzn-2 | 1.18.1-amzn-1 | 1.18.1-amzn-0 | 
| Ganglia |  -  |  -  |  -  |  -  | 
| HBase | 2.5.5-amzn-0 | 2.4.17-amzn-7 | 2.4.17-amzn-6 | 2.4.17-amzn-5 | 
| HCatalog | 3.1.3-amzn-13 | 3.1.3-amzn-12 | 3.1.3-amzn-11 | 3.1.3-amzn-10 | 
| Hadoop | 3.4.0-amzn-0 | 3.3.6-amzn-5 | 3.3.6-amzn-4 | 3.3.6-amzn-3 | 
| Hive | 3.1.3-amzn-13 | 3.1.3-amzn-12 | 3.1.3-amzn-11 | 3.1.3-amzn-10 | 
| Hudi | 0.15.0-amzn-1 | 0.15.0-amzn-0 | 0.14.1-amzn-1 | 0.14.1-amzn-0 | 
| Hue | 4.11.0 | 4.11.0 | 4.11.0 | 4.11.0 | 
| Iceberg | 1.6.1-amzn-0 | 1.5.2-amzn-0 | 1.5.0-amzn-0 | 1.4.3-amzn-0 | 
| JupyterEnterpriseGateway | 2.6.0 | 2.6.0 | 2.6.0 | 2.6.0 | 
| JupyterHub | 1.5.0 | 1.5.0 | 1.5.0 | 1.5.0 | 
| Livy | 0.8.0-inkubasi | 0.8.0-inkubasi | 0.8.0-inkubasi | 0.8.0-inkubasi | 
| MXNet |  -  |  -  | 1.9.1 | 1.9.1 | 
| Mahout |  -  |  -  |  -  |  -  | 
| Oozie | 5.2.1 | 5.2.1 | 5.2.1 | 5.2.1 | 
| Phoenix | 5.2.0 | 5.1.3 | 5.1.3 | 5.1.3 | 
| Pig | 0.17.0 | 0.17.0 | 0.17.0 | 0.17.0 | 
| Presto | 0,287-amzn-0 | 0.285-amzn-1 | 0,285-amzn-0 | 0,284-amzn-0 | 
| Spark | 3.5.2-amzn-0 | 3.5.1-amzn-1 | 3.5.1-amzn-0 | 3.5.0-amzn-1 | 
| Sqoop | 1.4.7 | 1.4.7 | 1.4.7 | 1.4.7 | 
| TensorFlow | 2.16.1 | 2.16.1 | 2.11.0 | 2.11.0 | 
| Tez | 0.10.2-amzn-11 | 0.10.2-amzn-10 | 0.10.2-amzn-9 | 0.10.2-amzn-8 | 
| Trino (PrestoSQL) | 446-amzn-0 | 442-amzn-0 | 436-amzn-0 | 435-amzn-0 | 
| Zeppelin | 0.11.1 | 0.11.1 | 0.10.1 | 0.10.1 | 
| ZooKeeper | 3.9.2-amzn-0 | 3.9.1-amzn-1 | 3.9.1-amzn-1 | 3.9.1-amzn-0 | 

# 7.4.0 rincian komponen rilis
<a name="emr-740-release-components-details"></a>

Lihat tabel berikut untuk informasi selengkapnya tentang paket *Ekstra* di Amazon EMR 7.4.0.


| Aplikasi | Jenis Aplikasi | Paket | Jenis Package | Versi Package | 
| --- | --- | --- | --- | --- | 
|  AmazonCloudWatchAgent  |  Core  |  hadoop-hdfs-journalnode  |  Ekstra  |  3.3.6.amzn.5-1.amzn2023  | 
|  AmazonCloudWatchAgent  |  Core  |  ranger-km  |  Ekstra  |  2.0.0-1.amzn2023  | 
|  AmazonCloudWatchAgent  |  Core  |  s3-dist-cp  |  Ekstra  |  2.33.0-1.amzn2023  | 
|  AmazonCloudWatchAgent  |  Core  |  penjaga kebun binatang  |  Ekstra  |  3.9.1.amzn.1-1.amzn2023  | 
|  AmazonCloudWatchAgent  |  Core  |  zookeper-server  |  Ekstra  |  3.9.1.amzn.1-1.amzn2023  | 
|  Flink  |  Core  |  hadop-client  |  Ekstra  |  3.3.6.amzn.5-1.amzn2023  | 
|  Flink  |  Core  |  hadoop-hdfs  |  Ekstra  |  3.3.6.amzn.5-1.amzn2023  | 
|  Flink  |  Core  |  hadoop-hdfs-datanode  |  Ekstra  |  3.3.6.amzn.5-1.amzn2023  | 
|  Flink  |  Core  |  hadoop-hdfs-journalnode  |  Ekstra  |  3.3.6.amzn.5-1.amzn2023  | 
|  Flink  |  Core  |  hadoop-hdfs-namenode  |  Ekstra  |  3.3.6.amzn.5-1.amzn2023  | 
|  Flink  |  Core  |  hadoop-httpfs  |  Ekstra  |  3.3.6.amzn.5-1.amzn2023  | 
|  Flink  |  Core  |  hadoop-km  |  Ekstra  |  3.3.6.amzn.5-1.amzn2023  | 
|  Flink  |  Core  |  hadoop-mapreduce  |  Ekstra  |  3.3.6.amzn.5-1.amzn2023  | 
|  Flink  |  Core  |  hadoop-mapreduce-historyserver  |  Ekstra  |  3.3.6.amzn.5-1.amzn2023  | 
|  Flink  |  Core  |  hadoop-benang  |  Ekstra  |  3.3.6.amzn.5-1.amzn2023  | 
|  Flink  |  Core  |  hadoop-yarn-nodemanager  |  Ekstra  |  3.3.6.amzn.5-1.amzn2023  | 
|  Flink  |  Core  |  hadoop-yarn-proxyserver  |  Ekstra  |  3.3.6.amzn.5-1.amzn2023  | 
|  Flink  |  Core  |  hadoop-yarn-resourcemanager  |  Ekstra  |  3.3.6.amzn.5-1.amzn2023  | 
|  Flink  |  Core  |  hadoop-yarn-timelineserver  |  Ekstra  |  3.3.6.amzn.5-1.amzn2023  | 
|  Flink  |  Core  |  hudi  |  Ekstra  |  0.15.0.amzn.0-1.amzn2023  | 
|  Flink  |  Core  |  ranger-km  |  Ekstra  |  2.0.0-1.amzn2023  | 
|  Flink  |  Core  |  hadoop  |  Ekstra  |  3.3.6.amzn.5-1.amzn2023  | 
|  HBase  |  Core  |  s3-dist-cp  |  Ekstra  |  2.33.0-1.amzn2023  | 
|  HCatalog  |  Core  |  hadoop-yarn-proxyserver  |  Ekstra  |  3.3.6.amzn.5-1.amzn2023  | 
|  HCatalog  |  Core  |  mariadb-connector-java  |  Ekstra  |    | 
|  Hive  |  Core  |  hadoop-httpfs  |  Ekstra  |  3.3.6.amzn.5-1.amzn2023  | 
|  Hive  |  Core  |  hadoop-yarn-proxyserver  |  Ekstra  |  3.3.6.amzn.5-1.amzn2023  | 
|  Hive  |  Core  |  hive-hbase  |  Ekstra  |  3.1.3.amzn.12-1.amzn2023  | 
|  Hive  |  Core  |  mariadb-connector-java  |  Ekstra  |  2.7.2-1  | 
|  Hive  |  Core  |  s3-dist-cp  |  Ekstra  |  2.33.0-1.amzn2023  | 
|  Phoenix  |  Core  |  s3-dist-cp  |  Ekstra  |  2.33.0-1.amzn2023  | 
|  Spark  |  Core  |  spark-datanucleus  |  Ekstra  |  3.5.1.amzn.0-1.amzn2023  | 
|  Tez  |  Core  |  hadoop-mapreduce  |  Ekstra  |  3.3.6.amzn.5-1.amzn2023  | 
|  Tez  |  Core  |  hadoop-mapreduce-historyserver  |  Ekstra  |  3.3.6.amzn.5-1.amzn2023  | 
|  Tez  |  Core  |  hadoop-yarn-proxyserver  |  Ekstra  |  3.3.6.amzn.5-1.amzn2023  | 
|  Trino  |  Core  |  utilitas besar  |  Ekstra  |  1.2.0-1.amzn2023  | 
|  Trino  |  Core  |  hadop-client  |  Ekstra  |  3.3.6.amzn.5-1.amzn2023  | 
|  Trino  |  Core  |  hadoop-hdfs  |  Ekstra  |  3.3.6.amzn.5-1.amzn2023  | 
|  Trino  |  Core  |  hadoop-hdfs-datanode  |  Ekstra  |  3.3.6.amzn.5-1.amzn2023  | 
|  Trino  |  Core  |  hadoop-hdfs-journalnode  |  Ekstra  |  3.3.6.amzn.5-1.amzn2023  | 
|  Trino  |  Core  |  hadoop-hdfs-namenode  |  Ekstra  |  3.3.6.amzn.5-1.amzn2023  | 
|  Trino  |  Core  |  hadoop-km  |  Ekstra  |  3.3.6.amzn.5-1.amzn2023  | 
|  Trino  |  Core  |  hadoop-mapreduce  |  Ekstra  |  3.3.6.amzn.5-1.amzn2023  | 
|  Trino  |  Core  |  hadoop-mapreduce-historyserver  |  Ekstra  |  3.3.6.amzn.5-1.amzn2023  | 
|  Trino  |  Core  |  hadoop-benang  |  Ekstra  |  3.3.6.amzn.5-1.amzn2023  | 
|  Trino  |  Core  |  hadoop-yarn-nodemanager  |  Ekstra  |  3.3.6.amzn.5-1.amzn2023  | 
|  Trino  |  Core  |  hadoop-yarn-proxyserver  |  Ekstra  |  3.3.6.amzn.5-1.amzn2023  | 
|  Trino  |  Core  |  hadoop-yarn-resourcemanager  |  Ekstra  |  3.3.6.amzn.5-1.amzn2023  | 
|  Trino  |  Core  |  hadoop-yarn-timelineserver  |  Ekstra  |  3.3.6.amzn.5-1.amzn2023  | 
|  Trino  |  Core  |  hive  |  Ekstra  |  3.1.3.amzn.12-1.amzn2023  | 
|  Trino  |  Core  |  hive-hcatalog-server  |  Ekstra  |  3.1.3.amzn.12-1.amzn2023  | 
|  Trino  |  Core  |  mariadb-connector-java  |  Ekstra  |  2.7.2-1  | 
|  Trino  |  Core  |  ranger-km  |  Ekstra  |  2.0.0-1.amzn2023  | 
|  Trino  |  Core  |  penjaga kebun binatang  |  Ekstra  |  3.9.1.amzn.1-1.amzn2023  | 
|  Trino  |  Core  |  zookeper-server  |  Ekstra  |  3.9.1.amzn.1-1.amzn2023  | 
|  Trino  |  Core  |  bigtop-groovy  |  Ekstra  |  2.5.4-1.amzn2023  | 
|  Trino  |  Core  |  bigtop-jsvc  |  Ekstra  |  1.2.4-1.amzn2023  | 
|  Trino  |  Core  |  hadoop  |  Ekstra  |  3.3.6.amzn.5-1.amzn2023  | 
|  Trino  |  Core  |  hadoop-lzo  |  Ekstra  |  0.4.19-1.amzn2023  | 
|  Trino  |  Core  |  hive-hcatalog  |  Ekstra  |  3.1.3.amzn.12-1.amzn2023  | 
|  Trino  |  Core  |  sarang-jdbc  |  Ekstra  |  3.1.3.amzn.12-1.amzn2023  | 
|  Zookeeper  |  Core  |  emrfs  |  Ekstra  |  2.64.0-1.amzn2023  | 
|  Zookeeper  |  Core  |  hadop-client  |  Ekstra  |  3.3.6.amzn.5-1.amzn2023  | 
|  Zookeeper  |  Core  |  hadoop-hdfs  |  Ekstra  |  3.3.6.amzn.5-1.amzn2023  | 
|  Zookeeper  |  Core  |  hadoop-hdfs-datanode  |  Ekstra  |  3.3.6.amzn.5-1.amzn2023  | 
|  Zookeeper  |  Core  |  hadoop-hdfs-journalnode  |  Ekstra  |  3.3.6.amzn.5-1.amzn2023  | 
|  Zookeeper  |  Core  |  hadoop-hdfs-namenode  |  Ekstra  |  3.3.6.amzn.5-1.amzn2023  | 
|  Zookeeper  |  Core  |  hadoop-httpfs  |  Ekstra  |  3.3.6.amzn.5-1.amzn2023  | 
|  Zookeeper  |  Core  |  hadoop-km  |  Ekstra  |  3.3.6.amzn.5-1.amzn2023  | 
|  Zookeeper  |  Core  |  hadoop-mapreduce  |  Ekstra  |  3.3.6.amzn.5-1.amzn2023  | 
|  Zookeeper  |  Core  |  hadoop-mapreduce-historyserver  |  Ekstra  |  3.3.6.amzn.5-1.amzn2023  | 
|  Zookeeper  |  Core  |  hadoop-benang  |  Ekstra  |  3.3.6.amzn.5-1.amzn2023  | 
|  Zookeeper  |  Core  |  hadoop-yarn-nodemanager  |  Ekstra  |  3.3.6.amzn.5-1.amzn2023  | 
|  Zookeeper  |  Core  |  hadoop-yarn-proxyserver  |  Ekstra  |  3.3.6.amzn.5-1.amzn2023  | 
|  Zookeeper  |  Core  |  hadoop-yarn-resourcemanager  |  Ekstra  |  3.3.6.amzn.5-1.amzn2023  | 
|  Zookeeper  |  Core  |  hadoop-yarn-timelineserver  |  Ekstra  |  3.3.6.amzn.5-1.amzn2023  | 
|  Zookeeper  |  Core  |  ranger-km  |  Ekstra  |  2.0.0-1.amzn2023  | 

# 7.4.0 kerentanan dan eksposur umum
<a name="740-common-vulnerabilities-exposures"></a>

Tabel berikut mencantumkan semua CVEs yang tidak memengaruhi kluster EMR yang berjalan pada konfigurasi Amazon EMR 7.4.0 yang direkomendasikan. Amazon EMR bergantung pada sumber terbuka hulu untuk ketersediaan perbaikan dan akan memberikan versi stabil terbaru sebagai bagian dari komponen Core Engine dalam waktu 90 hari setelah Amazon EMR memverifikasi perbaikan.

Tabel ini diperbarui pada 14 November 2024.


| ID CVE | Kepelikan | URL detail CVE | 
| --- | --- | --- | 
|  CVE-2013-4002  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2013-4002)-2013-4002  | 
|  CVE-2015-1832  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2015-1832)-2015-1832  | 
|  CVE-2017-7525  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2017-7525)-2017-7525  | 
|  CVE-2018-11307  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-11307)-2018-11307  | 
|  CVE-2018-12022  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-12022)-2018-12022  | 
|  CVE-2018-14718  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-14718)-2018-14718  | 
|  CVE-2018-19360  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-19360)-2018-19360  | 
|  CVE-2019-12384  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-12384)-2019-12384  | 
|  CVE-2019-14379  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-14379)-2019-14379  | 
|  CVE-2019-14439  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-14439)-2019-14439  | 
|  CVE-2019-16335  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-16335)-2019-16335  | 
|  CVE-2019-16943  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-16943)-2019-16943  | 
|  CVE-2020-10672  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-10672)-2020-10672  | 
|  CVE-2020-10673  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-10673)-2020-10673  | 
|  CVE-2020-11112  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-11112)-2020-11112  | 
|  CVE-2020-13949  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-13949)-2020-13949  | 
|  CVE-2020-14195  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-14195)-2020-14195  | 
|  CVE-2020-17521  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-17521)-2020-17521  | 
|  CVE-2020-24616  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-24616)-2020-24616  | 
|  CVE-2020-24750  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-24750)-2020-24750  | 
|  CVE-2020-25649  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-25649)-2020-25649  | 
|  CVE-2020-36183  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36183)-2020-36183  | 
|  CVE-2020-36186  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36186)-2020-36186  | 
|  CVE-2020-36188  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36188)-2020-36188  | 
|  CVE-2020-36189  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36189)-2020-36189  | 
|  CVE-2020-8908  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-8908)-2020-8908  | 
|  CVE-2021-37137  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2021-37137)-2021-37137  | 
|  CVE-2021-38153  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2021-38153)-2021-38153  | 
|  CVE-2022-25857  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-25857)-2022-25857  | 
|  CVE-2022-3509  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-3509)-2022-3509  | 
|  CVE-2022-37866  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-37866)-2022-37866  | 
|  CVE-2022-39135  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-39135)-2022-39135  | 
|  CVE-2022-41966  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-41966)-2022-41966  | 
|  CVE-2022-45688  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-45688)-2022-45688  | 
|  CVE-2023-34455  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-34455)-2023-34455  | 
|  CVE-2023-3635  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-3635)-2023-3635  | 
|  CVE-2023-38647  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-38647)-2023-38647  | 
|  CVE-2023-40167  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-40167)-2023-40167  | 
|  CVE-2023-43642  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-43642)-2023-43642  | 
|  CVE-2023-44981  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-44981)-2023-44981  | 
|  CVE-2023-50387  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-50387)-2023-50387  | 
|  CVE-2024-23454  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-23454)-2024-23454  | 
|  CVE-2024-29025  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-29025)-2024-29025  | 
|  CVE-2024-36124  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-36124)-2024-36124  | 
|  CVE-2024-8184  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-8184)-2024-8184  | 
|  CVE-2012-0881  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2012-0881)-2012-0881  | 
|  CVE-2012-5783  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2012-5783)-2012-5783  | 
|  CVE-2015-5237  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2015-5237)-2015-5237  | 
|  CVE-2016-5018  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2016-5018)-2016-5018  | 
|  CVE-2016-6796  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2016-6796)-2016-6796  | 
|  CVE-2017-15095  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2017-15095)-2017-15095  | 
|  CVE-2018-1000180  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-1000180)-2018-1000180  | 
|  CVE-2018-10054  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-10054)-2018-10054  | 
|  CVE-2018-10237  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-10237)-2018-10237  | 
|  CVE-2018-11798  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-11798)-2018-11798  | 
|  CVE-2018-12023  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-12023)-2018-12023  | 
|  CVE-2018-14721  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-14721)-2018-14721  | 
|  CVE-2018-19361  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-19361)-2018-19361  | 
|  CVE-2018-5968  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-5968)-2018-5968  | 
|  CVE-2018-7489  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-7489)-2018-7489  | 
|  CVE-2019-0205  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-0205)-2019-0205  | 
|  CVE-2019-12086  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-12086)-2019-12086  | 
|  CVE-2019-12814  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-12814)-2019-12814  | 
|  CVE-2019-14540  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-14540)-2019-14540  | 
|  CVE-2019-14892  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-14892)-2019-14892  | 
|  CVE-2019-14893  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-14893)-2019-14893  | 
|  CVE-2019-16869  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-16869)-2019-16869  | 
|  CVE-2019-16942  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-16942)-2019-16942  | 
|  CVE-2019-17267  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-17267)-2019-17267  | 
|  CVE-2019-17531  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-17531)-2019-17531  | 
|  CVE-2019-20330  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-20330)-2019-20330  | 
|  CVE-2019-20444  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-20444)-2019-20444  | 
|  CVE-2019-20445  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-20445)-2019-20445  | 
|  CVE-2020-10969  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-10969)-2020-10969  | 
|  CVE-2020-11111  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-11111)-2020-11111  | 
|  CVE-2020-11619  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-11619](https://nvd.nist.gov/vuln/detail/CVE-2020-11619)  | 
|  CVE-2020-11620  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-11620)-2020-11620  | 
|  CVE-2020-13955  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-13955)-2020-13955  | 
|  CVE-2020-13956  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-13956)-2020-13956  | 
|  CVE-2020-14060  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-14060)-2020-14060  | 
|  CVE-2020-14061  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-14061)-2020-14061  | 
|  CVE-2020-15250  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-15250)-2020-15250  | 
|  CVE-2020-26939  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-26939)-2020-26939  | 
|  CVE-2020-35491  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-35491)-2020-35491  | 
|  CVE-2020-35728  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-35728)-2020-35728  | 
|  CVE-2020-36179  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36179)-2020-36179  | 
|  CVE-2020-36181  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36181)-2020-36181  | 
|  CVE-2020-36182  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36182)-2020-36182  | 
|  CVE-2020-36184  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36184)-2020-36184  | 
|  CVE-2020-36185  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36185)-2020-36185  | 
|  CVE-2020-36187  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36187)-2020-36187  | 
|  CVE-2020-36518  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36518)-2020-36518  | 
|  CVE-2020-8840  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-8840)-2020-8840  | 
|  CVE-2020-9546  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-9546)-2020-9546  | 
|  CVE-2020-9547  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-9547)-2020-9547  | 
|  CVE-2020-9548  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-9548)-2020-9548  | 
|  CVE-2021-20190  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2021-20190)-2021-20190  | 
|  CVE-2021-21290  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2021-21290)-2021-21290  | 
|  CVE-2021-22569  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2021-22569)-2021-22569  | 
|  CVE-2021-28170  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2021-28170)-2021-28170  | 
|  CVE-2021-29425  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2021-29425)-2021-29425  | 
|  CVE-2021-31684  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2021-31684)-2021-31684  | 
|  CVE-2021-34538  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2021-34538)-2021-34538  | 
|  CVE-2021-36374  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2021-36374)-2021-36374  | 
|  CVE-2021-37533  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2021-37533)-2021-37533  | 
|  CVE-2021-43859  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2021-43859)-2021-43859  | 
|  CVE-2022-1415  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-1415)-2022-1415  | 
|  CVE-2022-1471  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-1471)-2022-1471  | 
|  CVE-2022-3171  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-3171)-2022-3171  | 
|  CVE-2022-3510  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-3510)-2022-3510  | 
|  CVE-2022-36364  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-36364)-2022-36364  | 
|  CVE-2022-37865  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-37865)-2022-37865  | 
|  CVE-2022-38749  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-38749)-2022-38749  | 
|  CVE-2022-38751  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-38751)-2022-38751  | 
|  CVE-2022-40150  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-40150)-2022-40150  | 
|  CVE-2022-40151  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-40151)-2022-40151  | 
|  CVE-2022-40152  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-40152)-2022-40152  | 
|  CVE-2022-41854  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-41854)-2022-41854  | 
|  CVE-2022-42003  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-42003)-2022-42003  | 
|  CVE-2022-42889  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-42889)-2022-42889  | 
|  CVE-2022-45685  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-45685)-2022-45685  | 
|  CVE-2022-45693  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-45693)-2022-45693  | 
|  CVE-2022-46337  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-46337)-2022-46337  | 
|  CVE-2023-0833  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-0833)-2023-0833  | 
|  CVE-2023-1370  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-1370)-2023-1370  | 
|  CVE-2023-1436  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-1436)-2023-1436  | 
|  CVE-2023-20863  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-20863)-2023-20863  | 
|  CVE-2023-25194  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-25194)-2023-25194  | 
|  CVE-2023-33201  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-33201)-2023-33201  | 
|  CVE-2023-33202  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-33202)-2023-33202  | 
|  CVE-2023-34453  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-34453)-2023-34453  | 
|  CVE-2023-34454  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-34454)-2023-34454  | 
|  CVE-2023-39410  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-39410)-2023-39410  | 
|  CVE-2023-42503  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-42503)-2023-42503  | 
|  CVE-2023-5072  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-5072)-2023-5072  | 
|  CVE-2023-50868  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-50868)-2023-50868  | 
|  CVE-2023-52428  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-52428)-2023-52428  | 
|  CVE-2023-6378  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-6378)-2023-6378  | 
|  CVE-2023-6481  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-6481)-2023-6481  | 
|  CVE-2024-21634  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-21634)-2024-21634  | 
|  CVE-2024-23944  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-23944)-2024-23944  | 
|  CVE-2024-29131  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-29131)-2024-29131  | 
|  CVE-2024-30171  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-30171)-2024-30171  | 
|  CVE-2024-30172  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-30172)-2024-30172  | 
|  CVE-2024-34447  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-34447)-2024-34447  | 
|  CVE-2024-35255  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-35255)-2024-35255  | 
|  CVE-2024-36114  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-36114)-2024-36114  | 
|  CVE-2024-38808  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-38808)-2024-38808  | 
|  CVE-2024-39676  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-39676)-2024-39676  | 
|  CVE-2024-51504  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-51504)-2024-51504  | 
|  CVE-2024-7254  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-7254)-2024-7254  | 
|  CVE-2017-17485  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2017-17485)-2017-17485  | 
|  CVE-2018-14719  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE-2018-14719](https://nvd.nist.gov/vuln/detail/CVE-2018-14719)  | 
|  CVE-2018-14720  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-14720)-2018-14720  | 
|  CVE-2018-19362  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-19362)-2018-19362  | 
|  CVE-2020-10650  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-10650)-2020-10650  | 
|  CVE-2020-10968  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-10968)-2020-10968  | 
|  CVE-2020-13936  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-13936)-2020-13936  | 
|  CVE-2020-14062  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-14062)-2020-14062  | 
|  CVE-2020-15522  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-15522)-2020-15522  | 
|  CVE-2020-1945  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-1945](https://nvd.nist.gov/vuln/detail/CVE-2020-1945)  | 
|  CVE-2020-28052  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-28052)-2020-28052  | 
|  CVE-2020-35490  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-35490)-2020-35490  | 
|  CVE-2021-36373  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2021-36373)-2021-36373  | 
|  CVE-2022-25647  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-25647)-2022-25647  | 
|  CVE-2022-38750  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-38750)-2022-38750  | 
|  CVE-2022-38752  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-38752)-2022-38752  | 
|  CVE-2022-42004  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-42004)-2022-42004  | 
|  CVE-2022-46751  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-46751)-2022-46751  | 
|  CVE-2023-20883  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-20883)-2023-20883  | 
|  CVE-2023-26048  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-26048)-2023-26048  | 
|  CVE-2023-2976  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-2976)-2023-2976  | 
|  CVE-2023-36478  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-36478)-2023-36478  | 
|  CVE-2023-51074  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-51074)-2023-51074  | 
|  CVE-2024-25638  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-25638)-2024-25638  | 
|  CVE-2024-25710  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-25710)-2024-25710  | 
|  CVE-2024-26308  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-26308)-2024-26308  | 
|  CVE-2024-29133  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-29133)-2024-29133  | 
|  CVE-2024-47554  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-47554)-2024-47554  | 
|  CVE-2024-47561  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-47561)-2024-47561  | 
|  CVE-2024-6763  |  MEDIUM  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-6763)-2024-6763  | 
|  CVE-2012-6153  |  RENDAH  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2012-6153)-2012-6153  | 
|  CVE-2020-11113  |  RENDAH  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-11113)-2020-11113  | 
|  CVE-2021-22570  |  RENDAH  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2021-22570)-2021-22570  | 
|  CVE-2021-27568  |  RENDAH  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2021-27568)-2021-27568  | 
|  CVE-2024-29857  |  RENDAH  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-29857)-2024-29857  | 
|  CVE-2018-1313  |  TIDAK DIUJICOBAKAN  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-1313)-2018-1313  | 
|  CVE-2020-36180  |  TIDAK DIUJICOBAKAN  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36180)-2020-36180  | 
|  CVE-2021-37136  |  TIDAK DIUJICOBAKAN  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2021-37136)-2021-37136  | 
|  CVE-2022-24329  |  TIDAK DIUJICOBAKAN  |  [https://nvd.nist. gov/vuln/detail/CVE-2022-24329](https://nvd.nist.gov/vuln/detail/CVE-2022-24329)  | 
|  CVE-2022-40149  |  TIDAK DIUJICOBAKAN  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-40149)-2022-40149  | 
|  CVE-2023-26049  |  TIDAK DIUJICOBAKAN  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-26049)-2023-26049  | 

## Catatan rilis 7.4.0
<a name="emr-740-relnotes"></a>

Catatan rilis berikut mencakup informasi untuk Amazon EMR rilis 7.4.0.

**Fitur baru**
+ **Upgrade aplikasi** —Amazon EMR 7.4.0 application upgrades include AWS SDK for Java 2.28.8, Delta 3.2.0-amzn-1, Flink 1.19.1, Hadoop 3.4.0, HBase 2.5.5, Hudi 0.15.0-amzn-1, Iceberg 1.6.1-amzn-0, Phoenix 5.2.0, Presto 0.287, Spark 3.5.2, Trino 446, and Zookeeper 3.9.2.
+ Rilis ini menambahkan 7 titik akhir open-source yang mendukung enkripsi in-transit melalui jaringan. Peningkatan ini mencakup kerangka kerja sumber terbuka seperti Hue, Livy, Zookeeper JupyterEnterpriseGateway, dan Ranger KMS. Jika Anda mengaktifkan enkripsi dalam perjalanan dan ingin terhubung ke titik akhir ini, Anda mungkin harus memodifikasi kode Anda untuk mendukung komunikasi TLS. Anda dapat menonaktifkan TLS untuk salah satu titik akhir ini sesuai kebutuhan. Untuk daftar lengkap titik akhir yang didukung, lihat [Memahami enkripsi dalam perjalanan](https://docs.aws.amazon.com/emr/latest/ManagementGuide/emr-encryption-support-matrix.html).

**Masalah yang diketahui**
+ `yarn.resourcemanager.decommissioning-nodes-watcher.wait-for-shuffle-data`Properti untuk Yarn ResourceManager, yang sebelumnya mendukung penangan shuffle Hive sejak emr-6.11.0, sekarang juga menerapkan penonaktifan anggun ke file yang disajikan oleh layanan shuffle eksternal Spark, saat menjalankan Spark on Yarn di emr-7.4.0.

  Perhatikan bahwa Perilaku default dari layanan shuffle eksternal Spark, saat menjalankan Spark on Yarn, adalah NodeManager agar Yarn menghapus file shuffle aplikasi saat aplikasi dihentikan. Ini mungkin berdampak pada kecepatan penonaktifan node dan pemanfaatan komputasi. Untuk aplikasi yang berjalan lama, pertimbangkan pengaturan `spark.shuffle.service.removeShuffle` `true` untuk menghapus file shuffle yang tidak lagi digunakan, yang memungkinkan penonaktifan node lebih cepat tanpa data acak aktif. 
+  Ketersediaan Amazon S3 Pilih — Amazon S3 Select tidak mendukung kueri lintas wilayah untuk Presto dan Trino. Untuk informasi lebih lanjut tentang fitur spesifik yang tersedia untuk rilis Presto dan Trino, lihat [Presto](https://docs.aws.amazon.com/emr/latest/ReleaseGuide/emr-presto.html) dan Trino.
+ Apache Ranger tidak didukung oleh Amazon EMR Release 7.4.
+ Apache Sqoop tidak kompatibel dengan Apache Hadoop 3.4 karena masalah yang diketahui SQOOP-3485. Amazon EMR Release 7.4 termasuk tetapi tidak mendukung Apache Sqoop. Apache Sqoop akan dihapus dari Amazon EMR Release 7.5 dan rilis yang lebih tinggi.
+ **Saat penskalaan terkelola diaktifkan, YARN ResourceManager (RM) mengalami masalah kebuntuan kritis, menyebabkannya menjadi tidak responsif, saat beralih dari status DECOMMISSIONING ke **DECOMMISSIONED** dengan operasi simultan.** Ini terjadi terutama di lingkungan cluster besar. Ketika itu terjadi, baik transisi keadaan simpul dan transisi keadaan aplikasi gagal diproses, secara efektif melumpuhkan fungsionalitas inti dari. ResourceManager Sebagai solusinya, restart RM JVM menggunakan perintah berikut pada node utama:

  ```
  sudo systemctl restart hadoop-yarn-resourcemanager
  ```
+ Ketika cluster EMR dimulai dengan penjadwal YARN selain `CapacityScheduler` atau `FairScheduler` (misalnya, Penjadwal FIFO), metrik tidak didorong ke`YARNMemoryAvailablePercentage`. CloudWatch Masalah ini berdampak pada penurunan skala dalam klaster yang diaktifkan penskalaan terkelola. Ini mungkin juga memengaruhi penskalaan terkelola khusus jika bergantung pada `YARNMemoryAvailablePercentage` metrik. Sebagai solusinya, gunakan atau. `CapacityScheduler` `FairScheduler`
+  **HBase pembuatan tabel di katalog Hive with Glue** - Dari EMR-7.3.0 hingga EMR-7.10.0, ada bug karena integrasi Hive Iceberg, yang menyebabkan HBase pembuatan tabel di Hive gagal saat Glue Data Catalog digunakan sebagai metastore. Silakan hubungi tim AWS dukungan jika Anda mengalami masalah ini.
+  **Tez UI** - Dari EMR-7.3 ke EMR-7.10, ada bug di mana mengakses UI Tez melalui UI Web Manajer Sumber Daya YARN gagal saat enkripsi dalam transit diaktifkan. Ini terjadi karena proxy YARN mencoba menggunakan protokol HTTP sementara Tez UI memerlukan HTTPS. Harap ubah `tez.tez-ui.history-url.base` konfigurasi `tez-site` dari `http` ke `https` untuk menyelesaikan masalah ini.

**Perubahan, penyempurnaan, dan masalah yang diselesaikan**
+  *Dimulai dengan Spark 3.3.1 (didukung dalam EMR versi 6.10 dan yang lebih baru), semua pelaksana dalam host dekomisioning diatur ke yang baru, yang disebut status DECOMMISSIONING. `ExecutorState`* Pelaksana yang dinonaktifkan tidak dapat digunakan oleh Yarn untuk mengalokasikan tugas dan dengan demikian akan meminta pelaksana baru, jika diperlukan, untuk tugas yang sedang dijalankan. Jadi, jika Anda menonaktifkan Spark DRA saat menggunakan EMR Managed Scaling, EMR Auto Scaling, atau mekanisme penskalaan khusus apa pun pada cluster EMR-EC2, maka Yarn dapat meminta pelaksana maksimum yang diizinkan untuk setiap pekerjaan. Untuk menghindari masalah ini, biarkan `spark.dynamicAllocation.enabled` properti disetel ke `TRUE` (yang merupakan default) saat Anda menggunakan kombinasi fitur di atas. Selain itu, Anda juga dapat mengatur batasan pelaksana minimum dan maksimum dengan menetapkan nilai untuk `spark.dynamicAllocation.maxExecutors` dan `spark.dynamicAllocation.minExecutors` properti untuk pekerjaan Spark Anda, untuk membatasi jumlah pelaksana yang dialokasikan selama eksekusi pekerjaan. 
+ Amazon EMR menggunakan build TensorFlow pustaka yang berbeda tergantung pada jenis instans yang Anda pilih untuk klaster Anda. Amazon EMR juga mendukung TensorFlow cluster dengan tipe instans aarch64 (instans Graviton) dari EMR-7.5.0 ke atas.
+ **Mengoptimalkan Scaling Permintaan S3 untuk Beban Kerja Iceberg** — Untuk pelanggan yang menggunakan Iceberg yang dibundel dengan rilis EMR 34 v7.4, S3 telah memperbarui skema entropi default ke hash basis-2 20 karakter (misalnya 35 01010110100110110010). Skema entropi basis-2 yang baru ini mengurangi rentang karakter dan memungkinkan S3 untuk secara otomatis menskalakan kapasitas permintaan lebih cepat agar sesuai dengan tuntutan beban kerja Iceberg target. Ini juga mengurangi jumlah waktu beban kerja mengamati 503 respons throttle.
+     
[\[See the AWS documentation website for more details\]](http://docs.aws.amazon.com/id_id/emr/latest/ReleaseGuide/emr-740-release.html)

## 7.4.0 versi Java default
<a name="emr-740-jdk"></a>

Amazon EMR merilis 7.4 dan lebih tinggi dikirimkan dengan Amazon Corretto 17 (dibangun di atas OpenJDK) secara default untuk aplikasi yang mendukung Corretto 17 (JDK 17), dengan pengecualian Apache Livy.

Tabel berikut menunjukkan versi Java default untuk aplikasi di Amazon EMR 7.4.0. Jika Anda ingin mengubah JVM default pada cluster Anda, ikuti instruksi [Konfigurasikan aplikasi untuk menggunakan Java Virtual Machine tertentu](configuring-java8.md) untuk setiap aplikasi yang berjalan di cluster. Anda hanya dapat menggunakan satu versi runtime Java untuk sebuah cluster. Amazon EMR tidak mendukung menjalankan node atau aplikasi yang berbeda pada versi runtime yang berbeda pada cluster yang sama.


| Aplikasi | Versi Java/Amazon Corretto (defaultnya tebal) | 
| --- | --- | 
| kuala | 17, 11, 8 | 
| Flink | 17, 11, 8 | 
| HBase | 17, 11, 8 | 
| HCatalog | 17, 11, 8 | 
| Hadoop | 17, 11, 8 | 
| Hive | 17, 11, 8 | 
| Hudi | 17, 11, 8 | 
| Gunung es | 17, 11, 8 | 
| Livy | 17, 11, 8 | 
| Oozie | 17, 11, 8 | 
| Phoenix | 17, 11, 8 | 
| PrestoDB | 8 | 
| Spark | 17, 11, 8 | 
| Spark RAPIDS | 17, 11, 8 | 
| Sqoop | 8 | 
| Tez | 17, 11, 8 | 
| Trino | 21, 17 | 
| Zeppelin | 17, 11, 8 | 
| Pig | 8 | 
| Zookeeper | 8 | 

## 7.4.0 versi komponen
<a name="emr-740-components"></a>

Komponen yang diinstal oleh Amazon EMR dengan rilis ini tercantum di bawah ini. Beberapa komponen diinstal sebagai bagian dari paket aplikasi big data. Sedangkan komponen lainnya bersifak unik untuk Amazon EMR dan diinstal untuk proses sistem dan fitur. Ini biasanya dimulai dengan `emr` atau `aws`. Paket aplikasi big data dalam rilis Amazon EMR terbaru biasanya versi terbaru yang ditemukan di komunitas. Kami menyediakan rilis komunitas di Amazon EMR secepat mungkin.

Beberapa komponen yang ada di Amazon EMR berbeda dari versi komunitas. Komponen ini mempunyai label versi dalam bentuk `CommunityVersion-amzn-EmrVersion`. `EmrVersion` dimulai dari 0. Misalnya, jika komponen komunitas open source bernama `myapp-component` dengan versi 2.2 telah dimodifikasi tiga kali untuk dimasukkan dalam rilis EMR Amazon yang berbeda, versi rilisnya terdaftar sebagai. `2.2-amzn-2`


| Komponen | Versi | Deskripsi | 
| --- | --- | --- | 
| adot-java-agent | 1.31.0 | Agen Java yang mengumpulkan metrik dari daemon aplikasi. | 
| delta | 3.2.0-amzn-1 | Danau Delta adalah format tabel terbuka untuk kumpulan data analitik yang sangat besar | 
| emr-amazon-cloudwatch-agent | 1.300032.2-amzn-0 | Aplikasi yang mengumpulkan metrik tingkat sistem internal dan metrik aplikasi khusus dari instans Amazon EC2. | 
| emr-ddb | 5.6.0 | Konektor Amazon DynamoDB untuk aplikasi ekosistem Hadoop. | 
| emr-goodies | 3.13.0 | Perpustakaan kenyamanan ekstra untuk ekosistem Hadoop. | 
| emr-kinesis | 3.17.0 | Konektor Amazon Kinesis untuk aplikasi ekosistem Hadoop. | 
| emr-notebook-env | 1.17.0 | Conda env untuk emr notebook yang mencakup gateway jupyter korporasi | 
| emr-s3-dist-cp | 2.34.0 | Aplikasi salinan terdistribusi yang dioptimalkan untuk Amazon S3. | 
| emr-s3-select | 2.13.0 | EMR S3Select Connector | 
| emr-wal-cli | 1.3.1 | Cli digunakan untuk daftar emrwal/penghapusan. | 
| emrfs | 2.65.0 | Konektor Amazon S3 untuk aplikasi ekosistem Hadoop. | 
| flink-client | 1.19.1-amzn-0 | Skrip dan aplikasi klien baris perintah Apache Flink. | 
| flink-jobmanager-config | 1.19.1-amzn-0 | Mengelola sumber daya pada node EMR untuk Apache Flink. JobManager | 
| hadoop-client | 3.4.0-amzn-0 | Klien baris perintah Hadoop seperti 'hdfs', 'Hadoop', atau 'yarn'. | 
| hadoop-hdfs-datanode | 3.4.0-amzn-0 | Layanan tingkat simpul HDFS untuk menyimpan blok. | 
| hadoop-hdfs-library | 3.4.0-amzn-0 | Klien dan perpustakaan baris perintah HDFS | 
| hadoop-hdfs-namenode | 3.4.0-amzn-0 | Layanan HDFS untuk melacak nama file dan lokasi blok. | 
| hadoop-hdfs-journalnode | 3.4.0-amzn-0 | Layanan HDFS untuk mengelola jurnal filesystem Hadoop pada klaster HA. | 
| hadoop-httpfs-server | 3.4.0-amzn-0 | Titik akhir HTTP untuk operasi HDFS. | 
| hadoop-kms-server | 3.4.0-amzn-0 | Server manajemen kunci kriptografi berdasarkan API Hadoop. KeyProvider  | 
| hadoop-mapred | 3.4.0-amzn-0 | MapReduce pustaka mesin eksekusi untuk menjalankan MapReduce aplikasi. | 
| hadoop-yarn-nodemanager | 3.4.0-amzn-0 | Layanan YARN untuk mengelola kontainer pada simpul individu. | 
| hadoop-yarn-resourcemanager | 3.4.0-amzn-0 | Layanan YARN untuk mengalokasikan dan mengelola sumber daya klaster dan aplikasi terdistribusi. | 
| hadoop-yarn-timeline-server | 3.4.0-amzn-0 | Layanan untuk mengambil informasi terkini dan historis untuk aplikasi YARN. | 
| hbase-hmaster | 2.5.5-amzn-0 | Layanan untuk HBase cluster yang bertanggung jawab untuk koordinasi Daerah dan pelaksanaan perintah administratif. | 
| hbase-region-server | 2.5.5-amzn-0 | Layanan untuk melayani satu atau lebih HBase wilayah. | 
| hbase-client | 2.5.5-amzn-0 | HBase klien baris perintah. | 
| hbase-rest-server | 2.5.5-amzn-0 | Layanan menyediakan titik akhir RESTful HTTP untuk HBase. | 
| hbase-thrift-server | 2.5.5-amzn-0 | Layanan menyediakan titik akhir Thrift ke. HBase | 
| hbase-operator-tools | 2.5.5-amzn-0 | Alat perbaikan untuk HBase cluster Apache. | 
| hcatalog-client | 3.1.3-amzn-13 | Klien baris perintah 'hcat' untuk memanipulasi hcatalog-server. | 
| hcatalog-server | 3.1.3-amzn-13 | Penyediaan layanan HCatalog, tabel dan lapisan manajemen penyimpanan untuk aplikasi terdistribusi. | 
| hcatalog-webhcat-server | 3.1.3-amzn-13 | Titik akhir HTTP menyediakan antarmuka REST ke HCatalog. | 
| hive-client | 3.1.3-amzn-13 | Klien baris perintah Hive. | 
| hive-hbase | 3.1.3-amzn-13 | Klien Hive-hbase. | 
| hive-metastore-server | 3.1.3-amzn-13 | Layanan untuk mengakses metastore Hive, repositori semantik yang menyimpan metadata untuk SQL pada operasi Hadoop. | 
| hive-server2 | 3.1.3-amzn-13 | Layanan untuk menerima kueri Hive sebagai permintaan web. | 
| hudi | 0.15.0-amzn-1 | Kerangka pemrosesan tambahan untuk memberi daya pada pipa data pada latensi rendah dan efisiensi tinggi. | 
| hudi-presto | 0.15.0-amzn-1 | Perpustakaan paket untuk menjalankan Presto dengan Hudi. | 
| hudi-trino | 0.15.0-amzn-1 | Perpustakaan bundel untuk menjalankan Trino dengan Hudi. | 
| hudi-spark | 0.15.0-amzn-1 | Perpustakaan paket untuk menjalankan Spark dengan Hudi. | 
| hue-server | 4.11.0 | Aplikasi web untuk menganalisis data menggunakan aplikasi ekosistem Hadoop | 
| iceberg | 1.6.1-amzn-0 | Apache Iceberg adalah format tabel terbuka untuk kumpulan data analitik besar | 
| jupyterhub | 1.5.0 | Server multi-pengguna untuk notebook Jupyter | 
| livy-server | 0.8.0-inkubasi | Antarmuka REST untuk berinteraksi dengan Apache Spark | 
| nginx | 1.12.1 | nginx [engine x] adalah server HTTP dan server proksi balik | 
| mariadb-server | 5.5.68\$1 | Server basis data MariaDB. | 
| nvidia-cuda | 12.3.0 | Driver Nvidia dan kit alat Cuda | 
| oozie-client | 5.2.1 | Klien baris perintah Oozie. | 
| oozie-server | 5.2.1 | Layanan untuk menerima permintaan alur kerja Oozie. | 
| opencv | 4.7.0 | Perpustakaan Visi Komputer Sumber Terbuka. | 
| phoenix-library | 5.2.0 | Perpustakaan phoenix untuk server dan klien | 
| phoenix-connectors | 6.0.0 | Konektor Apache Phoenix untuk Spark-3 | 
| phoenix-query-server | 6.0.0 | Sebuah server ringan yang menyediakan akses JDBC serta Protocol Buffers dan akses format JSON ke API Avatica  | 
| presto-coordinator | 0,287-amzn-0 | Layanan untuk menerima kueri dan mengelola eksekusi kueri antara presto-worker. | 
| presto-worker | 0,287-amzn-0 | Layanan untuk mengeksekusi potongan kueri. | 
| presto-client | 0,287-amzn-0 | Klien baris perintah Presto yang diinstal pada master klaster HA yang siaga di mana server Presto server tidak dimulai. | 
| trino-coordinator | 446-amzn-0 | Layanan untuk menerima kueri dan mengelola eksekusi kueri di antara trino-workers. | 
| trino-worker | 446-amzn-0 | Layanan untuk mengeksekusi potongan kueri. | 
| trino-client | 446-amzn-0 | Klien baris perintah Trino yang diinstal pada master siaga cluster HA di mana server Trino tidak dimulai. | 
| pig-client | 0.17.0 | Klien baris perintah Pig. | 
| r | 4.3.2 | Proyek R untuk Komputasi Statistik | 
| ranger-kms-server | 2.0.0 | Sistem Pengelolaan Kunci Ranger Apache | 
| spark-client | 3.5.2-amzn-0 | Klien baris perintah Spark. | 
| spark-history-server | 3.5.2-amzn-0 | Web UI untuk melihat log acara untuk seluruh masa pakai aplikasi Spark. | 
| spark-on-yarn | 3.5.2-amzn-0 | Mesin eksekusi dalam memori untuk YARN. | 
| spark-yarn-slave | 3.5.2-amzn-0 | Perpustakaan Apache Spark yang dibutuhkan oleh slave YARN. | 
| spark-rapids | 24.08.1-amzn-0 | Plugin Nvidia Spark RAPIDS yang mempercepat Apache Spark dengan. GPUs | 
| sqoop-client | 1.4.7 | Klien baris perintah Apache Sqoop. | 
| tensorflow | 2.16.1 | TensorFlow pustaka perangkat lunak open source untuk perhitungan numerik kinerja tinggi. | 
| tez-on-yarn | 0.10.2-amzn-11 | Aplikasi dan perpustakaan tez YARN. | 
| tez-on-worker | 0.10.2-amzn-11 | Aplikasi dan pustaka YARN tez untuk node pekerja. | 
| zeppelin-server | 0.11.1 | Notebook berbasis web yang memungkinkan analisis data interaktif. | 
| zookeeper-server | 3.9.2-amzn-0 | Layanan terpusat untuk menjaga informasi konfigurasi, penamaan, yang menyediakan sinkronisasi terdistribusi, dan menyediakan layanan grup. | 
| zookeeper-client | 3.9.2-amzn-0 | ZooKeeper klien baris perintah. | 

## 7.4.0 klasifikasi konfigurasi
<a name="emr-740-class"></a>

Klasifikasi konfigurasi memungkinkan Anda menyesuaikan aplikasi. Ini sering kali bersesuaian dengan file XML konfigurasi untuk aplikasi, seperti `hive-site.xml`. Untuk informasi selengkapnya, lihat [Konfigurasikan aplikasi](emr-configure-apps.md).

Tindakan konfigurasi ulang terjadi ketika Anda menentukan konfigurasi untuk grup instans di klaster yang sedang berjalan. Amazon EMR hanya memulai tindakan konfigurasi ulang untuk klasifikasi yang Anda modifikasi. Untuk informasi selengkapnya, lihat [Lakukan konfigurasi ulang pada grup instans di klaster yang sedang berjalan](emr-configure-apps-running-cluster.md).


**klasifikasi emr-7.4.0**  

| Klasifikasi | Deskripsi | Tindakan Konfigurasi Ulang | 
| --- | --- | --- | 
| capacity-scheduler | Ubah nilai dalam file capacity-scheduler.xml Hadoop. | Restarts the ResourceManager service. | 
| container-executor | Ubah nilai dalam file container-executor.cfg Hadoop YARN ini. | Not available. | 
| container-log4j | Ubah nilai dalam file container-log4j.properties Hadoop YARN. | Not available. | 
| core-site | Ubah nilai dalam file core-site.xml Hadoop. | Restarts the Hadoop HDFS services Namenode, SecondaryNamenode, Datanode, ZKFC, and Journalnode. Restarts the Hadoop YARN services ResourceManager, NodeManager, ProxyServer, and TimelineServer. Additionally restarts Hadoop KMS, Ranger KMS, HiveServer2, Hive MetaStore, Hadoop Httpfs, and MapReduce-HistoryServer. | 
| docker-conf | Ubah pengaturan terkait docker. | Not available. | 
| emrfs-site | Ubah pengaturan EMRFS. | Restarts the Hadoop HDFS services Namenode, SecondaryNamenode, Datanode, ZKFC, and Journalnode. Restarts the Hadoop YARN services ResourceManager, NodeManager, ProxyServer, and TimelineServer. Additionally restarts HBaseRegionserver, HBaseMaster, HBaseThrift, HBaseRest, HiveServer2, Hive MetaStore, Hadoop Httpfs, and MapReduce-HistoryServer. | 
| flink-conf | Ubah pengaturan flink-conf.yaml. | Restarts Flink history server. | 
| flink-log4j | Ubah pengaturan log4j.properties Flink. | Restarts Flink history server. | 
| flink-log4j-session | Ubah pengaturan Flink log4j-session.properties untuk sesi. Kubernetes/Yarn  | Restarts Flink history server. | 
| flink-log4j-cli | Ubah pengaturan log4j-cli.properties Flink. | Restarts Flink history server. | 
| hadoop-env | Ubah nilai dalam lingkungan Hadoop untuk semua komponen Hadoop. | Restarts the Hadoop HDFS services Namenode, SecondaryNamenode, Datanode, ZKFC, and Journalnode. Restarts the Hadoop YARN services ResourceManager, NodeManager, ProxyServer, and TimelineServer. Additionally restarts PhoenixQueryserver, HiveServer2, Hive MetaStore, and MapReduce-HistoryServer. | 
| hadoop-log4j | Ubah nilai dalam file log4j.properties Hadoop ini. | Restarts the Hadoop HDFS services SecondaryNamenode, Datanode, and Journalnode. Restarts the Hadoop YARN services ResourceManager, NodeManager, ProxyServer, and TimelineServer. Additionally restarts Hadoop KMS, Hadoop Httpfs, and MapReduce-HistoryServer. | 
| hadoop-ssl-server | Ubah konfigurasi server ssl hadoop | Not available. | 
| hadoop-ssl-client | Ubah konfigurasi klien ssl hadoop | Not available. | 
| hbase | Pengaturan Amazon EMR-curated untuk Apache. HBase | Custom EMR specific property. Sets emrfs-site and hbase-site configs. See those for their associated restarts. | 
| hbase-env | Ubah nilai HBase di lingkungan. | Restarts the HBase services RegionServer, HBaseMaster, ThriftServer, RestServer. | 
| hbase-log4j | Ubah nilai dalam file HBase hbase-log4j.properties. | Restarts the HBase services RegionServer, HBaseMaster, ThriftServer, RestServer. | 
| hbase-metrics | Ubah nilai dalam file HBase hadoop-metrics2-hbase.properties. | Restarts the HBase services RegionServer, HBaseMaster, ThriftServer, RestServer. | 
| hbase-policy | Ubah nilai dalam HBase file hbase-policy.xml. | Not available. | 
| hbase-site | Ubah nilai dalam HBase file hbase-site.xml. | Restarts the HBase services RegionServer, HBaseMaster, ThriftServer, RestServer. Additionally restarts Phoenix QueryServer. | 
| hdfs-encryption-zones | Konfigurasikan zona enkripsi HDFS. | This classification should not be reconfigured. | 
| hdfs-env | Ubah nilai dalam lingkungan HDFS. | Restarts Hadoop HDFS services Namenode, Datanode, and ZKFC. | 
| hdfs-site | Ubah nilai dalam hdfs-site.xml HDFS. | Restarts the Hadoop HDFS services Namenode, SecondaryNamenode, Datanode, ZKFC, and Journalnode. Additionally restarts Hadoop Httpfs. | 
| hcatalog-env | Ubah nilai HCatalog di lingkungan. | Restarts Hive HCatalog Server. | 
| hcatalog-server-jndi | Ubah nilai di HCatalog jndi.properties. | Restarts Hive HCatalog Server. | 
| hcatalog-server-proto-hive-site | Ubah nilai HCatalog proto-hive-site dalam.xml's. | Restarts Hive HCatalog Server. | 
| hcatalog-webhcat-env | Ubah nilai di lingkungan HCatalog WebHCat. | Restarts Hive WebHCat server. | 
| hcatalog-webhcat-log4j2 | Ubah nilai di HCat log4j2.properties HCatalog Web. | Restarts Hive WebHCat server. | 
| hcatalog-webhcat-site | Ubah nilai dalam file webhcat-site.xml HCatalog WebHCat. | Restarts Hive WebHCat server. | 
| hive | Pengaturan dikurasi Amazon EMR untuk Apache Hive. | Sets configurations to launch Hive LLAP service. | 
| hive-beeline-log4j2 | Ubah nilai dalam file beeline-log4j2.properties Hive. | Not available. | 
| hive-parquet-logging | Ubah nilai dalam file parquet-logging.properties Hive. | Not available. | 
| hive-env | Ubah nilai dalam lingkungan Hive. | Restarts HiveServer2, HiveMetastore, and Hive HCatalog-Server. Runs Hive schemaTool CLI commands to verify hive-metastore. | 
| hive-exec-log4j2 | Ubah nilai dalam file hive-exec-log 4j2.properties Hive. | Not available. | 
| hive-llap-daemon-log4j2 | Ubah nilai dalam file llap-daemon-log 4j2.properties Hive. | Not available. | 
| hive-log4j2 | Ubah nilai dalam file hive-log4j2.properties Hive. | Not available. | 
| hive-site | Ubah nilai dalam file hive-site.xml Hive | Restarts HiveServer2, HiveMetastore, and Hive HCatalog-Server. Runs Hive schemaTool CLI commands to verify hive-metastore. Also restarts Oozie and Zeppelin. | 
| hiveserver2-site | Ubah nilai dalam file hiveserver2-site.xml Hive Server2 | Not available. | 
| hue-ini | Ubah nilai dalam file ini Hue | Restarts Hue. Also activates Hue config override CLI commands to pick up new configurations. | 
| httpfs-env | Ubah nilai di lingkungan HTTPFS. | Restarts Hadoop Httpfs service. | 
| httpfs-site | Ubah nilai dalam file httpfs-site.xml Hadoop. | Restarts Hadoop Httpfs service. | 
| hadoop-kms-acls | Ubah nilai dalam file kms-acls.xml Hadoop. | Not available. | 
| hadoop-kms-env | Ubah nilai dalam lingkungan Hadoop KMS. | Restarts Hadoop-KMS service. | 
| hadoop-kms-java-home | Ubah rumah java KMS Hadoop | Not available. | 
| hadoop-kms-log4j | Ubah nilai dalam file kms-log4j.properties Hadoop. | Not available. | 
| hadoop-kms-site | Ubah nilai dalam file kms-site.xml Hadoop. | Restarts Hadoop-KMS and Ranger-KMS service. | 
| hudi-env | Ubah nilai di lingkungan Hudi. | Not available. | 
| hudi-defaults | Ubah nilai dalam file hudi-defaults.conf Hudi. | Not available. | 
| iceberg-defaults | Ubah nilai dalam file iceberg-defaults.conf Iceberg. | Not available. | 
| delta-defaults | Ubah nilai dalam file delta-defaults.conf Delta. | Not available. | 
| jupyter-notebook-conf | Ubah nilai dalam file jupyter\$1notebook\$1config.py Jupyter Notebook. | Not available. | 
| jupyter-hub-conf | Ubah nilai dalam JupyterHubs file jupyterhub\$1config.py. | Not available. | 
| jupyter-s3-conf | Konfigurasikan persistensi Jupyter Notebook S3. | Not available. | 
| jupyter-sparkmagic-conf | Ubah nilai dalam file config.json Sparkmagic. | Not available. | 
| livy-conf | Ubah nilai dalam file livy.conf Livy. | Restarts Livy Server. | 
| livy-env | Ubah nilai di lingkungan Livy. | Restarts Livy Server. | 
| livy-log4j2 | Ubah pengaturan Livy log4j2.properties. | Restarts Livy Server. | 
| mapred-env | Ubah nilai di lingkungan MapReduce aplikasi. | Restarts Hadoop MapReduce-HistoryServer. | 
| mapred-site | Ubah nilai dalam file mapred-site.xml MapReduce aplikasi. | Restarts Hadoop MapReduce-HistoryServer. | 
| oozie-env | Ubah nilai di lingkungan Oozie. | Restarts Oozie. | 
| oozie-log4j | Ubah nilai dalam file oozie-log4j.properties Oozie. | Restarts Oozie. | 
| oozie-site | Ubah nilai dalam file oozie-site.xml Oozie. | Restarts Oozie. | 
| phoenix-hbase-metrics | Ubah nilai dalam file hadoop-metrics2-hbase.properties Phoenix. | Not available. | 
| phoenix-hbase-site | Ubah nilai dalam file hbase-site.xml Phoenix. | Not available. | 
| phoenix-log4j2 | Ubah nilai dalam file log4j2.properties Phoenix. | Restarts Phoenix-QueryServer. | 
| phoenix-metrics | Ubah nilai dalam file hadoop-metrics2-phoenix.properties Phoenix. | Not available. | 
| pig-env | Ubah nilai di lingkungan Pig. | Not available. | 
| pig-properties | Ubah nilai dalam file pig.properties Pig. | Restarts Oozie. | 
| pig-log4j | Ubah nilai dalam file log4j.properties Pig. | Not available. | 
| presto-log | Ubah nilai dalam file log.properties Presto. | Restarts Presto-Server (for PrestoDB) | 
| presto-config | Ubah nilai dalam file config.properties Presto. | Restarts Presto-Server (for PrestoDB) | 
| presto-password-authenticator | Ubah nilai dalam file password-authenticator.properties Presto. | Not available. | 
| presto-env | Ubah nilai dalam file presto-env.sh Presto. | Restarts Presto-Server (for PrestoDB) | 
| presto-node | Ubah nilai dalam file node.properties Presto. | Not available. | 
| presto-connector-blackhole | Ubah nilai dalam file blackhole.properties Presto. | Not available. | 
| presto-connector-cassandra | Ubah nilai dalam file cassandra.properties Presto. | Not available. | 
| presto-connector-hive | Ubah nilai dalam file hive.properties Presto. | Restarts Presto-Server (for PrestoDB) | 
| presto-connector-jmx | Ubah nilai dalam file jmx.properties Presto. | Not available. | 
| presto-connector-kafka | Ubah nilai dalam file kafka.properties Presto. | Not available. | 
| presto-connector-lakeformation | Ubah nilai dalam file lakeformation.properties Presto. | Restarts Presto-Server (for PrestoDB) | 
| presto-connector-localfile | Ubah nilai dalam file localfile.properties Presto. | Not available. | 
| presto-connector-memory | Ubah nilai dalam file memory.properties Presto. | Not available. | 
| presto-connector-mongodb | Ubah nilai dalam file mongodb.properties Presto. | Not available. | 
| presto-connector-mysql | Ubah nilai dalam file mysql.properties Presto. | Not available. | 
| presto-connector-postgresql | Ubah nilai dalam file postgresql.properties Presto. | Not available. | 
| presto-connector-raptor | Ubah nilai dalam file raptor.properties Presto. | Not available. | 
| presto-connector-redis | Ubah nilai dalam file redis.properties Presto. | Not available. | 
| presto-connector-redshift | Ubah nilai dalam file redshift.properties Presto. | Not available. | 
| presto-connector-tpch | Ubah nilai dalam file tpch.properties Presto. | Not available. | 
| presto-connector-tpcds | Ubah nilai dalam file tpcds.properties Presto. | Not available. | 
| trino-log | Ubah nilai dalam file log.properties Trino. | Restarts Trino-Server (for Trino) | 
| trino-config | Ubah nilai dalam file config.properties Trino. | Restarts Trino-Server (for Trino) | 
| trino-password-authenticator | Ubah nilai dalam file password-authenticator.properties Trino. | Restarts Trino-Server (for Trino) | 
| trino-env | Ubah nilai dalam file trino-env.sh Trino. | Restarts Trino-Server (for Trino) | 
| trino-node | Ubah nilai dalam file node.properties Trino. | Not available. | 
| trino-connector-blackhole | Ubah nilai dalam file blackhole.properties Trino. | Not available. | 
| trino-connector-cassandra | Ubah nilai dalam file cassandra.properties Trino. | Not available. | 
| trino-connector-delta | Ubah nilai dalam file delta.properties Trino. | Restarts Trino-Server (for Trino) | 
| trino-connector-hive | Ubah nilai dalam file hive.properties Trino. | Restarts Trino-Server (for Trino) | 
| trino-exchange-manager | Ubah nilai dalam file exchange-manager.properties Trino. | Restarts Trino-Server (for Trino) | 
| trino-connector-iceberg | Ubah nilai dalam file iceberg.properties Trino. | Restarts Trino-Server (for Trino) | 
| trino-connector-hudi | Ubah nilai dalam file hudi.properties Trino. | Restarts Trino-Server (for Trino) | 
| trino-connector-jmx | Ubah nilai dalam file jmx.properties Trino. | Not available. | 
| trino-connector-kafka | Ubah nilai dalam file kafka.properties Trino. | Not available. | 
| trino-connector-localfile | Ubah nilai dalam file localfile.properties Trino. | Not available. | 
| trino-connector-memory | Ubah nilai dalam file memory.properties Trino. | Not available. | 
| trino-connector-mongodb | Ubah nilai dalam file mongodb.properties Trino. | Not available. | 
| trino-connector-mysql | Ubah nilai dalam file mysql.properties Trino. | Not available. | 
| trino-connector-postgresql | Ubah nilai dalam file postgresql.properties Trino. | Not available. | 
| trino-connector-raptor | Ubah nilai dalam file raptor.properties Trino. | Not available. | 
| trino-connector-redis | Ubah nilai dalam file redis.properties Trino. | Not available. | 
| trino-connector-redshift | Ubah nilai dalam file redshift.properties Trino. | Not available. | 
| trino-connector-tpch | Ubah nilai dalam file tpch.properties Trino. | Not available. | 
| trino-connector-tpcds | Ubah nilai dalam file tpcds.properties Trino. | Not available. | 
| ranger-kms-dbks-site | Ubah nilai dalam file dbks-site.xml Ranger KMS. | Restarts Ranger KMS Server. | 
| ranger-kms-site | Ubah nilai dalam ranger-kms-site file.xml. dari Ranger KMS. | Restarts Ranger KMS Server. | 
| ranger-kms-env | Ubah nilai di lingkungan Ranger KMS. | Restarts Ranger KMS Server. | 
| ranger-kms-logback | Ubah nilai dalam file kms-logback.xml dari Ranger KMS. | Not available. | 
| ranger-kms-db-ca | Ubah nilai untuk file CA pada S3 untuk koneksi MySQL SSL dengan Ranger KMS. | Not available. | 
| spark | Pengaturan terkurasi Amazon EMR untuk Apache Spark. | This property modifies spark-defaults. See actions there. | 
| spark-defaults | Ubah nilai dalam file spark-defaults.conf Spark. | Restarts Spark history server and Spark thrift server. | 
| spark-env | Ubah nilai di lingkungan Spark. | Restarts Spark history server and Spark thrift server. | 
| spark-hive-site | Ubah nilai dalam file hive-site.xml Spark | Not available. | 
| spark-log4j2 | Ubah nilai dalam file log4j2.properties Spark. | Restarts Spark history server and Spark thrift server. | 
| spark-metrics | Ubah nilai dalam file metrics.properties Spark. | Restarts Spark history server and Spark thrift server. | 
| sqoop-env | Ubah nilai dalam lingkungan Sqoop. | Not available. | 
| sqoop-oraoop-site | Ubah nilai dalam file oraoop-site.xml Sqoop OraOop ini. | Not available. | 
| sqoop-site | Ubah nilai dalam file sqoop-site.xml Sqoop. | Not available. | 
| tez-site | Ubah nilai dalam file tez-site.xml Tez. | Restart Oozie and HiveServer2. | 
| yarn-env | Ubah nilai di lingkungan YARN. | Restarts the Hadoop YARN services ResourceManager, NodeManager, ProxyServer, and TimelineServer. Additionally restarts MapReduce-HistoryServer. | 
| yarn-site | Ubah nilai dalam file yarn-site.xml YARN. | Restarts the Hadoop YARN services ResourceManager, NodeManager, ProxyServer, and TimelineServer. Additionally restarts Livy Server and MapReduce-HistoryServer. | 
| zeppelin-env | Ubah nilai di lingkungan Zeppelin. | Restarts Zeppelin. | 
| zeppelin-site | Ubah pengaturan konfigurasi di zeppelin-site.xml. | Restarts Zeppelin. | 
| zookeeper-config | Ubah nilai dalam ZooKeeper file zoo.cfg. | Restarts Zookeeper server. | 
| zookeeper-logback | Ubah nilai dalam ZooKeeper file logback.xml. | Restarts Zookeeper server. | 
| emr-metrics | Ubah pengaturan metrik emr untuk simpul ini. | Restarts the CloudWatchAgent service. | 

## 7.4.0 perubahan log
<a name="740-changelog"></a>


**Ubah log untuk catatan rilis dan rilis 7.4.0**  

| Date | Peristiwa | Deskripsi | 
| --- | --- | --- | 
| 2024-11-18 | Publikasi Docs | Catatan rilis Amazon EMR 7.4.0 pertama kali diterbitkan | 
| 2024-11-13 | Penerapan selesai | [Amazon EMR 7.4.0 sepenuhnya diterapkan ke semua Wilayah yang didukung](https://aws.amazon.com/about-aws/global-infrastructure/regional-product-services/) | 
| 2024-10-31 | Mulai penyebaran | Amazon EMR 7.4.0 pertama kali dikerahkan ke Wilayah komersial awal | 

# Amazon EMR rilis 7.3.0
<a name="emr-730-release"></a>

## 7.3.0 siklus hidup yang didukung
<a name="emr-730-supported-lifecycle"></a>

Tabel berikut menjelaskan tanggal siklus hidup yang didukung untuk rilis Amazon EMR 7.3.0.


| Fase Support | Date | 
| --- | --- | 
| Tanggal rilis awal | Oktober 16, 2024 | 
| Dukungan standar sampai | Oktober 15, 2026 | 
| Akhir dari dukungan | Oktober 16, 2026 | 
| Akhir hidup | Oktober 16, 2027 | 

## 7.3.0 versi aplikasi
<a name="emr-730-app-versions"></a>

Rilis ini mencakup aplikasi berikut: [https://docs.aws.amazon.com/AmazonCloudWatch/latest/monitoring/Install-CloudWatch-Agent.html](https://docs.aws.amazon.com/AmazonCloudWatch/latest/monitoring/Install-CloudWatch-Agent.html), [https://delta.io/](https://delta.io/), [https://flink.apache.org/](https://flink.apache.org/), [http://hbase.apache.org/](http://hbase.apache.org/), [https://cwiki.apache.org/confluence/display/Hive/HCatalog](https://cwiki.apache.org/confluence/display/Hive/HCatalog), [http://hive.apache.org/](http://hive.apache.org/), [https://hudi.apache.org](https://hudi.apache.org), [http://gethue.com/](http://gethue.com/), [https://iceberg.apache.org/](https://iceberg.apache.org/), [https://jupyter-enterprise-gateway.readthedocs.io/en/latest/](https://jupyter-enterprise-gateway.readthedocs.io/en/latest/), [https://jupyterhub.readthedocs.io/en/latest/#](https://jupyterhub.readthedocs.io/en/latest/#), [https://livy.incubator.apache.org/](https://livy.incubator.apache.org/), [http://oozie.apache.org/](http://oozie.apache.org/), [https://phoenix.apache.org/](https://phoenix.apache.org/), [http://pig.apache.org/](http://pig.apache.org/), [https://prestodb.io/](https://prestodb.io/), [https://spark.apache.org/docs/latest/](https://spark.apache.org/docs/latest/), [http://sqoop.apache.org/](http://sqoop.apache.org/), [https://www.tensorflow.org/](https://www.tensorflow.org/), [https://tez.apache.org/](https://tez.apache.org/), [https://trino.io/](https://trino.io/), [https://zeppelin.incubator.apache.org/](https://zeppelin.incubator.apache.org/), dan [https://zookeeper.apache.org](https://zookeeper.apache.org).

Tabel di bawah ini mencantumkan versi aplikasi yang tersedia dalam rilis Amazon EMR ini dan versi aplikasi dalam tiga rilis EMR Amazon sebelumnya (bila berlaku).

Untuk riwayat lengkap versi aplikasi untuk setiap rilis Amazon EMR, lihat topik berikut:
+ [Versi aplikasi di Amazon EMR 7.x rilis](emr-release-app-versions-7.x.md)
+ [Versi aplikasi di Amazon EMR 6.x rilis](emr-release-app-versions-6.x.md)
+ [Versi aplikasi di Amazon EMR 5.x rilis](emr-release-app-versions-5.x.md)
+ [Versi aplikasi di Amazon EMR 4.x rilis](emr-release-app-versions-4.x.md)


**Informasi versi aplikasi**  

|  | emr-7.3.0 | emr-7.2.0 | emr-7.1.0 | emr-7.0.0 | 
| --- | --- | --- | --- | --- | 
| AWS SDK for Java | 2.25.70, 1.12.747 | 2.23.18, 1.12.705 | 2.23.18, 1.12.656 | 2.20.160-amzn-0, 1.12.569 | 
| Python | 3.9, 3.11 | 3.9, 3.11 | 3.9, 3.11 | 3.9 | 
| Skala | 2.12.18 | 2.12.17 | 2.12.17 | 2.12.17 | 
| AmazonCloudWatchAgent | 1.300032.2-amzn-0 | 1.300032.2-amzn-0 | 1.300032.2-amzn-0 | 1.300031.1-amzn-0 | 
| Delta | 3.2.0-amzn-0 | 3.1.0 | 3.0.0 | 3.0.0 | 
| Flink | 1.18.1-amzn-2 | 1.18.1-amzn-1 | 1.18.1-amzn-0 | 1.18.0-amzn-0 | 
| Ganglia |  -  |  -  |  -  |  -  | 
| HBase | 2.4.17-amzn-7 | 2.4.17-amzn-6 | 2.4.17-amzn-5 | 2.4.17-amzn-4 | 
| HCatalog | 3.1.3-amzn-12 | 3.1.3-amzn-11 | 3.1.3-amzn-10 | 3.1.3-amzn-9 | 
| Hadoop | 3.3.6-amzn-5 | 3.3.6-amzn-4 | 3.3.6-amzn-3 | 3.3.6-amzn-2 | 
| Hive | 3.1.3-amzn-12 | 3.1.3-amzn-11 | 3.1.3-amzn-10 | 3.1.3-amzn-9 | 
| Hudi | 0.15.0-amzn-0 | 0.14.1-amzn-1 | 0.14.1-amzn-0 | 0.14.0-amzn-1 | 
| Hue | 4.11.0 | 4.11.0 | 4.11.0 | 4.11.0 | 
| Iceberg | 1.5.2-amzn-0 | 1.5.0-amzn-0 | 1.4.3-amzn-0 | 1.4.2-amzn-0 | 
| JupyterEnterpriseGateway | 2.6.0 | 2.6.0 | 2.6.0 | 2.6.0 | 
| JupyterHub | 1.5.0 | 1.5.0 | 1.5.0 | 1.5.0 | 
| Livy | 0.8.0-inkubasi | 0.8.0-inkubasi | 0.8.0-inkubasi | 0.7.1-inkubasi | 
| MXNet |  -  | 1.9.1 | 1.9.1 | 1.9.1 | 
| Mahout |  -  |  -  |  -  |  -  | 
| Oozie | 5.2.1 | 5.2.1 | 5.2.1 | 5.2.1 | 
| Phoenix | 5.1.3 | 5.1.3 | 5.1.3 | 5.1.3 | 
| Pig | 0.17.0 | 0.17.0 | 0.17.0 | 0.17.0 | 
| Presto | 0.285-amzn-1 | 0,285-amzn-0 | 0,284-amzn-0 | 0,283-amzn-1 | 
| Spark | 3.5.1-amzn-1 | 3.5.1-amzn-0 | 3.5.0-amzn-1 | 3.5.0-amzn-0 | 
| Sqoop | 1.4.7 | 1.4.7 | 1.4.7 | 1.4.7 | 
| TensorFlow | 2.16.1 | 2.11.0 | 2.11.0 | 2.11.0 | 
| Tez | 0.10.2-amzn-10 | 0.10.2-amzn-9 | 0.10.2-amzn-8 | 0.10.2-amzn-7 | 
| Trino (PrestoSQL) | 442-amzn-0 | 436-amzn-0 | 435-amzn-0 | 426-amzn-1 | 
| Zeppelin | 0.11.1 | 0.10.1 | 0.10.1 | 0.10.1 | 
| ZooKeeper | 3.9.1-amzn-1 | 3.9.1-amzn-1 | 3.9.1-amzn-0 | 3.5.10 | 

# Rincian komponen rilis 7.3.0
<a name="emr-730-release-components-details"></a>

Lihat tabel berikut untuk informasi selengkapnya tentang paket *Ekstra* di Amazon EMR 7.3.0.


| Aplikasi | Jenis Aplikasi | Paket | Jenis Package | Versi Package | 
| --- | --- | --- | --- | --- | 
|  AmazonCloudWatchAgent  |  Core  |  hadoop-hdfs-journalnode  |  Ekstra  |  3.3.6.amzn.5-1.amzn2023  | 
|  AmazonCloudWatchAgent  |  Core  |  ranger-km  |  Ekstra  |  2.0.0-1.amzn2023  | 
|  AmazonCloudWatchAgent  |  Core  |  s3-dist-cp  |  Ekstra  |  2.33.0-1.amzn2023  | 
|  AmazonCloudWatchAgent  |  Core  |  penjaga kebun binatang  |  Ekstra  |  3.9.1.amzn.1-1.amzn2023  | 
|  AmazonCloudWatchAgent  |  Core  |  zookeper-server  |  Ekstra  |  3.9.1.amzn.1-1.amzn2023  | 
|  Flink  |  Core  |  hadop-client  |  Ekstra  |  3.3.6.amzn.5-1.amzn2023  | 
|  Flink  |  Core  |  hadoop-hdfs  |  Ekstra  |  3.3.6.amzn.5-1.amzn2023  | 
|  Flink  |  Core  |  hadoop-hdfs-datanode  |  Ekstra  |  3.3.6.amzn.5-1.amzn2023  | 
|  Flink  |  Core  |  hadoop-hdfs-journalnode  |  Ekstra  |  3.3.6.amzn.5-1.amzn2023  | 
|  Flink  |  Core  |  hadoop-hdfs-namenode  |  Ekstra  |  3.3.6.amzn.5-1.amzn2023  | 
|  Flink  |  Core  |  hadoop-httpfs  |  Ekstra  |  3.3.6.amzn.5-1.amzn2023  | 
|  Flink  |  Core  |  hadoop-km  |  Ekstra  |  3.3.6.amzn.5-1.amzn2023  | 
|  Flink  |  Core  |  hadoop-mapreduce  |  Ekstra  |  3.3.6.amzn.5-1.amzn2023  | 
|  Flink  |  Core  |  hadoop-mapreduce-historyserver  |  Ekstra  |  3.3.6.amzn.5-1.amzn2023  | 
|  Flink  |  Core  |  hadoop-benang  |  Ekstra  |  3.3.6.amzn.5-1.amzn2023  | 
|  Flink  |  Core  |  hadoop-yarn-nodemanager  |  Ekstra  |  3.3.6.amzn.5-1.amzn2023  | 
|  Flink  |  Core  |  hadoop-yarn-proxyserver  |  Ekstra  |  3.3.6.amzn.5-1.amzn2023  | 
|  Flink  |  Core  |  hadoop-yarn-resourcemanager  |  Ekstra  |  3.3.6.amzn.5-1.amzn2023  | 
|  Flink  |  Core  |  hadoop-yarn-timelineserver  |  Ekstra  |  3.3.6.amzn.5-1.amzn2023  | 
|  Flink  |  Core  |  hudi  |  Ekstra  |  0.15.0.amzn.0-1.amzn2023  | 
|  Flink  |  Core  |  ranger-km  |  Ekstra  |  2.0.0-1.amzn2023  | 
|  Flink  |  Core  |  hadoop  |  Ekstra  |  3.3.6.amzn.5-1.amzn2023  | 
|  HBase  |  Core  |  s3-dist-cp  |  Ekstra  |  2.33.0-1.amzn2023  | 
|  HCatalog  |  Core  |  hadoop-yarn-proxyserver  |  Ekstra  |  3.3.6.amzn.5-1.amzn2023  | 
|  HCatalog  |  Core  |  mariadb-connector-java  |  Ekstra  |    | 
|  Hive  |  Core  |  hadoop-httpfs  |  Ekstra  |  3.3.6.amzn.5-1.amzn2023  | 
|  Hive  |  Core  |  hadoop-yarn-proxyserver  |  Ekstra  |  3.3.6.amzn.5-1.amzn2023  | 
|  Hive  |  Core  |  hive-hbase  |  Ekstra  |  3.1.3.amzn.12-1.amzn2023  | 
|  Hive  |  Core  |  mariadb-connector-java  |  Ekstra  |  2.7.2-1  | 
|  Hive  |  Core  |  s3-dist-cp  |  Ekstra  |  2.33.0-1.amzn2023  | 
|  Phoenix  |  Core  |  s3-dist-cp  |  Ekstra  |  2.33.0-1.amzn2023  | 
|  Spark  |  Core  |  spark-datanucleus  |  Ekstra  |  3.5.1.amzn.0-1.amzn2023  | 
|  Tez  |  Core  |  hadoop-mapreduce  |  Ekstra  |  3.3.6.amzn.5-1.amzn2023  | 
|  Tez  |  Core  |  hadoop-mapreduce-historyserver  |  Ekstra  |  3.3.6.amzn.5-1.amzn2023  | 
|  Tez  |  Core  |  hadoop-yarn-proxyserver  |  Ekstra  |  3.3.6.amzn.5-1.amzn2023  | 
|  Trino  |  Core  |  utilitas besar  |  Ekstra  |  1.2.0-1.amzn2023  | 
|  Trino  |  Core  |  hadop-client  |  Ekstra  |  3.3.6.amzn.5-1.amzn2023  | 
|  Trino  |  Core  |  hadoop-hdfs  |  Ekstra  |  3.3.6.amzn.5-1.amzn2023  | 
|  Trino  |  Core  |  hadoop-hdfs-datanode  |  Ekstra  |  3.3.6.amzn.5-1.amzn2023  | 
|  Trino  |  Core  |  hadoop-hdfs-journalnode  |  Ekstra  |  3.3.6.amzn.5-1.amzn2023  | 
|  Trino  |  Core  |  hadoop-hdfs-namenode  |  Ekstra  |  3.3.6.amzn.5-1.amzn2023  | 
|  Trino  |  Core  |  hadoop-km  |  Ekstra  |  3.3.6.amzn.5-1.amzn2023  | 
|  Trino  |  Core  |  hadoop-mapreduce  |  Ekstra  |  3.3.6.amzn.5-1.amzn2023  | 
|  Trino  |  Core  |  hadoop-mapreduce-historyserver  |  Ekstra  |  3.3.6.amzn.5-1.amzn2023  | 
|  Trino  |  Core  |  hadoop-benang  |  Ekstra  |  3.3.6.amzn.5-1.amzn2023  | 
|  Trino  |  Core  |  hadoop-yarn-nodemanager  |  Ekstra  |  3.3.6.amzn.5-1.amzn2023  | 
|  Trino  |  Core  |  hadoop-yarn-proxyserver  |  Ekstra  |  3.3.6.amzn.5-1.amzn2023  | 
|  Trino  |  Core  |  hadoop-yarn-resourcemanager  |  Ekstra  |  3.3.6.amzn.5-1.amzn2023  | 
|  Trino  |  Core  |  hadoop-yarn-timelineserver  |  Ekstra  |  3.3.6.amzn.5-1.amzn2023  | 
|  Trino  |  Core  |  hive  |  Ekstra  |  3.1.3.amzn.12-1.amzn2023  | 
|  Trino  |  Core  |  hive-hcatalog-server  |  Ekstra  |  3.1.3.amzn.12-1.amzn2023  | 
|  Trino  |  Core  |  mariadb-connector-java  |  Ekstra  |  2.7.2-1  | 
|  Trino  |  Core  |  ranger-km  |  Ekstra  |  2.0.0-1.amzn2023  | 
|  Trino  |  Core  |  penjaga kebun binatang  |  Ekstra  |  3.9.1.amzn.1-1.amzn2023  | 
|  Trino  |  Core  |  zookeper-server  |  Ekstra  |  3.9.1.amzn.1-1.amzn2023  | 
|  Trino  |  Core  |  bigtop-groovy  |  Ekstra  |  2.5.4-1.amzn2023  | 
|  Trino  |  Core  |  bigtop-jsvc  |  Ekstra  |  1.2.4-1.amzn2023  | 
|  Trino  |  Core  |  hadoop  |  Ekstra  |  3.3.6.amzn.5-1.amzn2023  | 
|  Trino  |  Core  |  hadoop-lzo  |  Ekstra  |  0.4.19-1.amzn2023  | 
|  Trino  |  Core  |  hive-hcatalog  |  Ekstra  |  3.1.3.amzn.12-1.amzn2023  | 
|  Trino  |  Core  |  sarang-jdbc  |  Ekstra  |  3.1.3.amzn.12-1.amzn2023  | 
|  Zookeeper  |  Core  |  emrfs  |  Ekstra  |  2.64.0-1.amzn2023  | 
|  Zookeeper  |  Core  |  hadop-client  |  Ekstra  |  3.3.6.amzn.5-1.amzn2023  | 
|  Zookeeper  |  Core  |  hadoop-hdfs  |  Ekstra  |  3.3.6.amzn.5-1.amzn2023  | 
|  Zookeeper  |  Core  |  hadoop-hdfs-datanode  |  Ekstra  |  3.3.6.amzn.5-1.amzn2023  | 
|  Zookeeper  |  Core  |  hadoop-hdfs-journalnode  |  Ekstra  |  3.3.6.amzn.5-1.amzn2023  | 
|  Zookeeper  |  Core  |  hadoop-hdfs-namenode  |  Ekstra  |  3.3.6.amzn.5-1.amzn2023  | 
|  Zookeeper  |  Core  |  hadoop-httpfs  |  Ekstra  |  3.3.6.amzn.5-1.amzn2023  | 
|  Zookeeper  |  Core  |  hadoop-km  |  Ekstra  |  3.3.6.amzn.5-1.amzn2023  | 
|  Zookeeper  |  Core  |  hadoop-mapreduce  |  Ekstra  |  3.3.6.amzn.5-1.amzn2023  | 
|  Zookeeper  |  Core  |  hadoop-mapreduce-historyserver  |  Ekstra  |  3.3.6.amzn.5-1.amzn2023  | 
|  Zookeeper  |  Core  |  hadoop-benang  |  Ekstra  |  3.3.6.amzn.5-1.amzn2023  | 
|  Zookeeper  |  Core  |  hadoop-yarn-nodemanager  |  Ekstra  |  3.3.6.amzn.5-1.amzn2023  | 
|  Zookeeper  |  Core  |  hadoop-yarn-proxyserver  |  Ekstra  |  3.3.6.amzn.5-1.amzn2023  | 
|  Zookeeper  |  Core  |  hadoop-yarn-resourcemanager  |  Ekstra  |  3.3.6.amzn.5-1.amzn2023  | 
|  Zookeeper  |  Core  |  hadoop-yarn-timelineserver  |  Ekstra  |  3.3.6.amzn.5-1.amzn2023  | 
|  Zookeeper  |  Core  |  ranger-km  |  Ekstra  |  2.0.0-1.amzn2023  | 

# 7.3.0 kerentanan dan eksposur umum
<a name="730-common-vulnerabilities-exposures"></a>

Tabel berikut mencantumkan semua CVEs yang tidak memengaruhi kluster EMR yang berjalan pada konfigurasi Amazon EMR 7.3.0 yang direkomendasikan. Amazon EMR bergantung pada sumber terbuka hulu untuk ketersediaan perbaikan dan akan memberikan versi stabil terbaru sebagai bagian dari komponen Core Engine dalam waktu 90 hari setelah Amazon EMR memverifikasi perbaikan.

Tabel ini diperbarui pada 3 Oktober 2024.


| ID CVE | Kepelikan | URL detail CVE | 
| --- | --- | --- | 
|  CVE-2015-1832  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2015-1832)-2015-1832  | 
|  CVE-2016-5018  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2016-5018)-2016-5018  | 
|  CVE-2018-11307  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-11307)-2018-11307  | 
|  CVE-2018-14718  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-14718)-2018-14718  | 
|  CVE-2018-14719  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE-2018-14719](https://nvd.nist.gov/vuln/detail/CVE-2018-14719)  | 
|  CVE-2018-14720  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-14720)-2018-14720  | 
|  CVE-2018-14721  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-14721)-2018-14721  | 
|  CVE-2018-19360  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-19360)-2018-19360  | 
|  CVE-2018-19361  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-19361)-2018-19361  | 
|  CVE-2018-19362  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-19362)-2018-19362  | 
|  CVE-2018-7489  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-7489)-2018-7489  | 
|  CVE-2019-14379  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-14379)-2019-14379  | 
|  CVE-2019-14540  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-14540)-2019-14540  | 
|  CVE-2019-14892  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-14892)-2019-14892  | 
|  CVE-2019-14893  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-14893)-2019-14893  | 
|  CVE-2019-16335  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-16335)-2019-16335  | 
|  CVE-2019-16942  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-16942)-2019-16942  | 
|  CVE-2019-16943  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-16943)-2019-16943  | 
|  CVE-2019-17267  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-17267)-2019-17267  | 
|  CVE-2019-17531  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-17531)-2019-17531  | 
|  CVE-2019-20330  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-20330)-2019-20330  | 
|  CVE-2019-20444  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-20444)-2019-20444  | 
|  CVE-2019-20445  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-20445)-2019-20445  | 
|  CVE-2020-8840  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-8840)-2020-8840  | 
|  CVE-2020-9546  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-9546)-2020-9546  | 
|  CVE-2020-9547  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-9547)-2020-9547  | 
|  CVE-2020-9548  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-9548)-2020-9548  | 
|  CVE-2022-1471  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-1471)-2022-1471  | 
|  CVE-2022-1471  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-1471)-2022-1471  | 
|  CVE-2022-1471  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-1471)-2022-1471  | 
|  CVE-2022-37865  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-37865)-2022-37865  | 
|  CVE-2022-39135  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-39135)-2022-39135  | 
|  CVE-2022-46337  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-46337)-2022-46337  | 
|  CVE-2022-46337  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-46337)-2022-46337  | 
|  CVE-2023-44981  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-44981)-2023-44981  | 
|  CVE-2023-44981  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-44981)-2023-44981  | 
|  CVE-2023-44981  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-44981)-2023-44981  | 
|  CVE-2012-0881  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2012-0881)-2012-0881  | 
|  CVE-2013-4002  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2013-4002)-2013-4002  | 
|  CVE-2015-2156  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2015-2156)-2015-2156  | 
|  CVE-2015-5237  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2015-5237)-2015-5237  | 
|  CVE-2016-6796  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2016-6796)-2016-6796  | 
|  CVE-2017-18640  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2017-18640)-2017-18640  | 
|  CVE-2017-18640  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2017-18640)-2017-18640  | 
|  CVE-2018-1000180  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-1000180)-2018-1000180  | 
|  CVE-2018-12022  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-12022)-2018-12022  | 
|  CVE-2018-12023  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-12023)-2018-12023  | 
|  CVE-2019-0205  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-0205)-2019-0205  | 
|  CVE-2019-0205  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-0205)-2019-0205  | 
|  CVE-2019-12086  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-12086)-2019-12086  | 
|  CVE-2019-14439  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-14439)-2019-14439  | 
|  CVE-2019-16869  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-16869)-2019-16869  | 
|  CVE-2020-10650  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-10650)-2020-10650  | 
|  CVE-2020-10672  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-10672)-2020-10672  | 
|  CVE-2020-10673  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-10673)-2020-10673  | 
|  CVE-2020-10968  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-10968)-2020-10968  | 
|  CVE-2020-10969  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-10969)-2020-10969  | 
|  CVE-2020-11111  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-11111)-2020-11111  | 
|  CVE-2020-11112  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-11112)-2020-11112  | 
|  CVE-2020-11113  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-11113)-2020-11113  | 
|  CVE-2020-11619  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-11619](https://nvd.nist.gov/vuln/detail/CVE-2020-11619)  | 
|  CVE-2020-11620  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-11620)-2020-11620  | 
|  CVE-2020-13936  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-13936)-2020-13936  | 
|  CVE-2020-13949  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-13949)-2020-13949  | 
|  CVE-2020-13949  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-13949)-2020-13949  | 
|  CVE-2020-13949  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-13949)-2020-13949  | 
|  CVE-2020-14060  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-14060)-2020-14060  | 
|  CVE-2020-14061  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-14061)-2020-14061  | 
|  CVE-2020-14062  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-14062)-2020-14062  | 
|  CVE-2020-14195  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-14195)-2020-14195  | 
|  CVE-2020-24616  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-24616)-2020-24616  | 
|  CVE-2020-24750  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-24750)-2020-24750  | 
|  CVE-2020-25649  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-25649)-2020-25649  | 
|  CVE-2020-28052  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-28052)-2020-28052  | 
|  CVE-2020-35490  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-35490)-2020-35490  | 
|  CVE-2020-35491  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-35491)-2020-35491  | 
|  CVE-2020-35728  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-35728)-2020-35728  | 
|  CVE-2020-36179  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36179)-2020-36179  | 
|  CVE-2020-36180  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36180)-2020-36180  | 
|  CVE-2020-36181  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36181)-2020-36181  | 
|  CVE-2020-36182  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36182)-2020-36182  | 
|  CVE-2020-36183  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36183)-2020-36183  | 
|  CVE-2020-36184  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36184)-2020-36184  | 
|  CVE-2020-36185  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36185)-2020-36185  | 
|  CVE-2020-36186  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36186)-2020-36186  | 
|  CVE-2020-36187  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36187)-2020-36187  | 
|  CVE-2020-36188  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36188)-2020-36188  | 
|  CVE-2020-36189  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36189)-2020-36189  | 
|  CVE-2020-36518  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36518)-2020-36518  | 
|  CVE-2021-20190  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2021-20190)-2021-20190  | 
|  CVE-2021-31684  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2021-31684)-2021-31684  | 
|  CVE-2021-31684  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2021-31684)-2021-31684  | 
|  CVE-2021-34538  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2021-34538)-2021-34538  | 
|  CVE-2021-34538  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2021-34538)-2021-34538  | 
|  CVE-2021-34538  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2021-34538)-2021-34538  | 
|  CVE-2021-35515  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2021-35515)-2021-35515  | 
|  CVE-2021-35516  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2021-35516)-2021-35516  | 
|  CVE-2021-35517  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2021-35517)-2021-35517  | 
|  CVE-2021-36090  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2021-36090)-2021-36090  | 
|  CVE-2021-37136  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2021-37136)-2021-37136  | 
|  CVE-2021-37137  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2021-37137)-2021-37137  | 
|  CVE-2022-25647  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-25647)-2022-25647  | 
|  CVE-2022-25857  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-25857)-2022-25857  | 
|  CVE-2022-25857  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-25857)-2022-25857  | 
|  CVE-2022-25857  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-25857)-2022-25857  | 
|  CVE-2022-3171  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-3171)-2022-3171  | 
|  CVE-2022-3171  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-3171)-2022-3171  | 
|  CVE-2022-3171  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-3171)-2022-3171  | 
|  CVE-2022-3509  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-3509)-2022-3509  | 
|  CVE-2022-3509  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-3509)-2022-3509  | 
|  CVE-2022-3509  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-3509)-2022-3509  | 
|  CVE-2022-3510  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-3510)-2022-3510  | 
|  CVE-2022-3510  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-3510)-2022-3510  | 
|  CVE-2022-3510  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-3510)-2022-3510  | 
|  CVE-2022-36364  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-36364)-2022-36364  | 
|  CVE-2022-37866  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-37866)-2022-37866  | 
|  CVE-2022-40149  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-40149)-2022-40149  | 
|  CVE-2022-40149  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-40149)-2022-40149  | 
|  CVE-2022-40149  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-40149)-2022-40149  | 
|  CVE-2022-40150  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-40150)-2022-40150  | 
|  CVE-2022-40150  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-40150)-2022-40150  | 
|  CVE-2022-40150  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-40150)-2022-40150  | 
|  CVE-2022-40152  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-40152)-2022-40152  | 
|  CVE-2022-42003  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-42003)-2022-42003  | 
|  CVE-2022-42003  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-42003)-2022-42003  | 
|  CVE-2022-42003  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-42003)-2022-42003  | 
|  CVE-2022-42003  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-42003)-2022-42003  | 
|  CVE-2022-42004  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-42004)-2022-42004  | 
|  CVE-2022-42004  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-42004)-2022-42004  | 
|  CVE-2022-42004  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-42004)-2022-42004  | 
|  CVE-2022-45685  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-45685)-2022-45685  | 
|  CVE-2022-45685  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-45685)-2022-45685  | 
|  CVE-2022-45685  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-45685)-2022-45685  | 
|  CVE-2022-45688  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-45688)-2022-45688  | 
|  CVE-2022-45693  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-45693)-2022-45693  | 
|  CVE-2022-45693  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-45693)-2022-45693  | 
|  CVE-2022-45693  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-45693)-2022-45693  | 
|  CVE-2022-46751  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-46751)-2022-46751  | 
|  CVE-2023-1370  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-1370)-2023-1370  | 
|  CVE-2023-1370  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-1370)-2023-1370  | 
|  CVE-2023-1436  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-1436)-2023-1436  | 
|  CVE-2023-1436  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-1436)-2023-1436  | 
|  CVE-2023-1436  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-1436)-2023-1436  | 
|  CVE-2023-2976  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-2976)-2023-2976  | 
|  CVE-2023-2976  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-2976)-2023-2976  | 
|  CVE-2023-2976  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-2976)-2023-2976  | 
|  CVE-2023-2976  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-2976)-2023-2976  | 
|  CVE-2023-2976  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-2976)-2023-2976  | 
|  CVE-2023-2976  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-2976)-2023-2976  | 
|  CVE-2023-2976  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-2976)-2023-2976  | 
|  CVE-2023-2976  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-2976)-2023-2976  | 
|  CVE-2023-2976  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-2976)-2023-2976  | 
|  CVE-2023-2976  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-2976)-2023-2976  | 
|  CVE-2023-34453  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-34453)-2023-34453  | 
|  CVE-2023-34454  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-34454)-2023-34454  | 
|  CVE-2023-34455  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-34455)-2023-34455  | 
|  CVE-2023-3635  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-3635)-2023-3635  | 
|  CVE-2023-36478  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-36478)-2023-36478  | 
|  CVE-2023-36478  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-36478)-2023-36478  | 
|  CVE-2023-39410  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-39410)-2023-39410  | 
|  CVE-2023-39410  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-39410)-2023-39410  | 
|  CVE-2023-43642  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-43642)-2023-43642  | 
|  CVE-2023-43642  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-43642)-2023-43642  | 
|  CVE-2023-50387  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-50387)-2023-50387  | 
|  CVE-2023-5072  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-5072)-2023-5072  | 
|  CVE-2023-6378  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-6378)-2023-6378  | 
|  CVE-2023-6378  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-6378)-2023-6378  | 
|  CVE-2023-6481  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-6481)-2023-6481  | 
|  CVE-2023-6481  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-6481)-2023-6481  | 
|  CVE-2024-21634  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-21634)-2024-21634  | 

## Catatan rilis 7.3.0
<a name="emr-730-relnotes"></a>

Catatan rilis berikut mencakup informasi untuk Amazon EMR rilis 7.3.0. Perubahan relatif terhadap 7.3.0.

**Fitur baru**
+ **Upgrade aplikasi** —Amazon EMR 7.3.0 application upgrades include Delta 3.2.0-amzn-0, Hudi 0.15.0-amzn-0, TensorFlow 2.16.1, Trino 442, and Zeppelin 0.11.1.
+ Rilis ini menambahkan 22 titik akhir open-source yang mendukung enkripsi in-transit melalui jaringan. Peningkatan ini mencakup kerangka kerja sumber terbuka seperti Hadoop, Hive, Tez,, Phoenix, dan Flink. HBase Jika Anda mengaktifkan enkripsi dalam perjalanan dan ingin terhubung ke titik akhir ini, Anda mungkin harus memodifikasi kode Anda untuk mendukung komunikasi TLS. Anda dapat menonaktifkan TLS untuk salah satu titik akhir ini sesuai kebutuhan. Untuk daftar lengkap titik akhir yang didukung, lihat [Memahami enkripsi dalam perjalanan](https://docs.aws.amazon.com/emr/latest/ManagementGuide/emr-encryption-support-matrix.html).
+ Dengan Amazon EMR 7.3.0, Apache Hive dengan Iceberg sekarang mendukung Katalog Data AWS Glue sebagai metastore, yang memberi Anda manfaat seperti repositori terpusat untuk menyimpan metadata, merayapi sumber data secara otomatis dan mengekstrak metadata, dan integrasi dengan layanan lain untuk alur kerja yang mulus.

**Masalah yang diketahui**
+ Python 3.11 tidak didukung dengan EMR Studio.
+ Jika Anda menggunakan enkripsi dalam transit dan otentikasi Kerberos, Anda tidak akan dapat menggunakan aplikasi Spark yang bergantung pada metastore Hive. Masalah ini diperbaiki di [HIVE-16340](https://issues.apache.org/jira/browse/HIVE-16340) dan akan sepenuhnya diselesaikan di [SPARK-44114 ketika Spark open-source](https://issues.apache.org/jira/browse/SPARK-44114) dapat meningkatkan ke Hive 3. Sementara itu, Anda dapat mengatasi masalah ini untuk sementara dengan `hive.metastore.use.SSL` menyetelnya. `false` Untuk informasi selengkapnya, lihat [Mengkonfigurasi aplikasi](https://docs.aws.amazon.com/emr/latest/ReleaseGuide/emr-configure-apps.html).
  + Jika Anda tidak menggunakan otentikasi Kerberos, Anda harus mengonfigurasi Spark untuk menggunakan SSL. Untuk melakukannya, atur konfigurasi berikut saat Anda menyediakan klaster Anda.

    ```
    [{
        "Classification": "spark-defaults",
        "Properties": {
            "spark.hadoop.hive.metastore.truststore.path": "/usr/share/aws/emr/security/conf/keystore-thrift.jks",
            "spark.hadoop.hive.metastore.use.SSL": "true"
        }
    }]
    ```
+ Jika Anda menggunakan domain khusus, beberapa tautan di UI Server Riwayat Spark di AWS konsol mungkin tidak berfungsi. Unggah skrip berikut ke bucket S3, lalu [tambahkan langkah](https://docs.aws.amazon.com/emr/latest/ManagementGuide/emr-add-steps-console.html) untuk menggunakan skrip shell.

  ```
  #!/bin/bash
  
  if grep -q ":8042" /etc/nginx/nginx.conf; then
      sudo sed -i '=s#\^(\\/nm\\/(?<nodeAddress>.*:8042)\\/(?<url>.*)\$)#^(\\/nm\\/(?<nodeAddress>(\\.|-|[a-zA-Z0-9])*:8042)\\/(?<url>(node|conf|logs|stacks|jmx).*)\$)#g' /etc/nginx/nginx.conf
  else
      sudo sed -i 's#\^(\\/nm\\/(?<nodeAddress>.*:8044)\\/(?<url>.*)\$)#^(\\/nm\\/(?<nodeAddress>(\\.|-|[a-zA-Z0-9])*:8044)\\/(?<url>(node|conf|logs|stacks|jmx).*)\$)#g' /etc/nginx/nginx.conf
  fi
  
  sudo systemctl restart nginx
  ```
+  **HBase pembuatan tabel di katalog Hive with Glue** - Dari EMR-7.3.0 hingga EMR-7.10.0, ada bug karena integrasi Hive Iceberg, yang menyebabkan HBase pembuatan tabel di Hive gagal saat Glue Data Catalog digunakan sebagai metastore. Silakan hubungi tim AWS dukungan jika Anda mengalami masalah ini.
+  **Tez UI** - Dari EMR-7.3 ke EMR-7.10, ada bug di mana mengakses UI Tez melalui UI Web Manajer Sumber Daya YARN gagal saat enkripsi dalam transit diaktifkan. Ini terjadi karena proxy YARN mencoba menggunakan protokol HTTP sementara Tez UI memerlukan HTTPS. Harap ubah `tez.tez-ui.history-url.base` konfigurasi `tez-site` dari `http` ke `https` untuk menyelesaikan masalah ini.

**Perubahan, penyempurnaan, dan masalah yang diselesaikan**
+  *Dimulai dengan Spark 3.3.1 (didukung dalam EMR versi 6.10 dan yang lebih baru), semua pelaksana dalam host dekomisioning diatur ke yang baru, yang disebut status DECOMMISSIONING. `ExecutorState`* Pelaksana yang dinonaktifkan tidak dapat digunakan oleh Yarn untuk mengalokasikan tugas dan dengan demikian akan meminta pelaksana baru, jika diperlukan, untuk tugas yang sedang dijalankan. Jadi, jika Anda menonaktifkan Spark DRA saat menggunakan EMR Managed Scaling, EMR Auto Scaling, atau mekanisme penskalaan khusus apa pun pada cluster EMR-EC2, maka Yarn dapat meminta pelaksana maksimum yang diizinkan untuk setiap pekerjaan. Untuk menghindari masalah ini, biarkan `spark.dynamicAllocation.enabled` properti disetel ke `TRUE` (yang merupakan default) saat Anda menggunakan kombinasi fitur di atas. Selain itu, Anda juga dapat mengatur batasan pelaksana minimum dan maksimum dengan menetapkan nilai untuk `spark.dynamicAllocation.maxExecutors` dan `spark.dynamicAllocation.minExecutors` properti untuk pekerjaan Spark Anda, untuk membatasi jumlah pelaksana yang dialokasikan selama eksekusi pekerjaan. 
+ Untuk mendukung verifikasi nama host TLS untuk YARN, rilis ini mengubah `yarn.resourcemanager.hostname` konfigurasi dari alamat IP instance utama ke nama DNS pribadi instance utama.
+ [MXNet proyek](https://github.com/apache/mxnet) telah mencapai akhir kehidupan dan sekarang diarsipkan. [Amazon EMR rilis 7.2.0](emr-720-release.md)adalah rilis terakhir yang mencakup MXNet.
+ Saat Anda meluncurkan cluster dengan *rilis patch terbaru* Amazon EMR 5.36 atau lebih tinggi, 6.6 atau lebih tinggi, atau 7.0 atau lebih tinggi, Amazon EMR menggunakan rilis Amazon Linux 2023 atau Amazon Linux 2 terbaru untuk AMI EMR Amazon default. Untuk informasi selengkapnya, lihat [Menggunakan AMI Amazon Linux default untuk Amazon EMR](https://docs.aws.amazon.com/emr/latest/ManagementGuide/emr-default-ami.html).    
[\[See the AWS documentation website for more details\]](http://docs.aws.amazon.com/id_id/emr/latest/ReleaseGuide/emr-730-release.html)

## 7.3.0 versi Java default
<a name="emr-730-jdk"></a>

Amazon EMR merilis 7.3 dan lebih tinggi dikirimkan dengan Amazon Corretto 17 (dibangun di atas OpenJDK) secara default untuk aplikasi yang mendukung Corretto 17 (JDK 17), dengan pengecualian Apache Livy.

Tabel berikut menunjukkan versi Java default untuk aplikasi di Amazon EMR 7.3.0. Jika Anda ingin mengubah JVM default pada cluster Anda, ikuti instruksi [Konfigurasikan aplikasi untuk menggunakan Java Virtual Machine tertentu](configuring-java8.md) untuk setiap aplikasi yang berjalan di cluster. Anda hanya dapat menggunakan satu versi runtime Java untuk sebuah cluster. Amazon EMR tidak mendukung menjalankan node atau aplikasi yang berbeda pada versi runtime yang berbeda pada cluster yang sama.


| Aplikasi | Versi Java/Amazon Corretto (defaultnya tebal) | 
| --- | --- | 
| kuala | 17, 11, 8 | 
| Flink | 17, 11, 8 | 
| HBase | 17, 11, 8 | 
| HCatalog | 17, 11, 8 | 
| Hadoop | 17, 11, 8 | 
| Hive | 17, 11, 8 | 
| Hudi | 17, 11, 8 | 
| Gunung es | 17, 11, 8 | 
| Livy | 17, 11, 8 | 
| Oozie | 17, 11, 8 | 
| Phoenix | 17, 11, 8 | 
| PrestoDB | 8 | 
| Spark | 17, 11, 8 | 
| Spark RAPIDS | 17, 11, 8 | 
| Sqoop | 8 | 
| Tez | 17, 11, 8 | 
| Trino | 21, 17 | 
| Zeppelin | 8 | 
| Pig | 8 | 
| Zookeeper | 17, 11, 8 | 

## 7.3.0 versi komponen
<a name="emr-730-components"></a>

Komponen yang diinstal oleh Amazon EMR dengan rilis ini tercantum di bawah ini. Beberapa komponen diinstal sebagai bagian dari paket aplikasi big data. Sedangkan komponen lainnya bersifak unik untuk Amazon EMR dan diinstal untuk proses sistem dan fitur. Ini biasanya dimulai dengan `emr` atau `aws`. Paket aplikasi big data dalam rilis Amazon EMR terbaru biasanya versi terbaru yang ditemukan di komunitas. Kami menyediakan rilis komunitas di Amazon EMR secepat mungkin.

Beberapa komponen yang ada di Amazon EMR berbeda dari versi komunitas. Komponen ini mempunyai label versi dalam bentuk `CommunityVersion-amzn-EmrVersion`. `EmrVersion` dimulai dari 0. Misalnya, jika komponen komunitas open source bernama `myapp-component` dengan versi 2.2 telah dimodifikasi tiga kali untuk dimasukkan dalam rilis EMR Amazon yang berbeda, versi rilisnya terdaftar sebagai. `2.2-amzn-2`


| Komponen | Versi | Deskripsi | 
| --- | --- | --- | 
| adot-java-agent | 1.31.0 | Agen Java yang mengumpulkan metrik dari daemon aplikasi. | 
| delta | 3.2.0-amzn-0 | Danau Delta adalah format tabel terbuka untuk kumpulan data analitik yang sangat besar | 
| emr-amazon-cloudwatch-agent | 1.300032.2-amzn-0 | Aplikasi yang mengumpulkan metrik tingkat sistem internal dan metrik aplikasi khusus dari instans Amazon EC2. | 
| emr-ddb | 5.5.0 | Konektor Amazon DynamoDB untuk aplikasi ekosistem Hadoop. | 
| emr-goodies | 3.12.0 | Perpustakaan kenyamanan ekstra untuk ekosistem Hadoop. | 
| emr-kinesis | 3.16.0 | Konektor Amazon Kinesis untuk aplikasi ekosistem Hadoop. | 
| emr-notebook-env | 1.16.0 | Conda env untuk emr notebook yang mencakup gateway jupyter korporasi | 
| emr-s3-dist-cp | 2.33.0 | Aplikasi salinan terdistribusi yang dioptimalkan untuk Amazon S3. | 
| emr-s3-select | 2.12.0 | EMR S3Select Connector | 
| emr-wal-cli | 1.3.0 | Cli digunakan untuk daftar emrwal/penghapusan. | 
| emrfs | 2.64.0 | Konektor Amazon S3 untuk aplikasi ekosistem Hadoop. | 
| flink-client | 1.18.1-amzn-2 | Skrip dan aplikasi klien baris perintah Apache Flink. | 
| flink-jobmanager-config | 1.18.1-amzn-2 | Mengelola sumber daya pada node EMR untuk Apache Flink. JobManager | 
| hadoop-client | 3.3.6-amzn-5 | Klien baris perintah Hadoop seperti 'hdfs', 'Hadoop', atau 'yarn'. | 
| hadoop-hdfs-datanode | 3.3.6-amzn-5 | Layanan tingkat simpul HDFS untuk menyimpan blok. | 
| hadoop-hdfs-library | 3.3.6-amzn-5 | Klien dan perpustakaan baris perintah HDFS | 
| hadoop-hdfs-namenode | 3.3.6-amzn-5 | Layanan HDFS untuk melacak nama file dan lokasi blok. | 
| hadoop-hdfs-journalnode | 3.3.6-amzn-5 | Layanan HDFS untuk mengelola jurnal filesystem Hadoop pada klaster HA. | 
| hadoop-httpfs-server | 3.3.6-amzn-5 | Titik akhir HTTP untuk operasi HDFS. | 
| hadoop-kms-server | 3.3.6-amzn-5 | Server manajemen kunci kriptografi berdasarkan API Hadoop. KeyProvider  | 
| hadoop-mapred | 3.3.6-amzn-5 | MapReduce pustaka mesin eksekusi untuk menjalankan MapReduce aplikasi. | 
| hadoop-yarn-nodemanager | 3.3.6-amzn-5 | Layanan YARN untuk mengelola kontainer pada simpul individu. | 
| hadoop-yarn-resourcemanager | 3.3.6-amzn-5 | Layanan YARN untuk mengalokasikan dan mengelola sumber daya klaster dan aplikasi terdistribusi. | 
| hadoop-yarn-timeline-server | 3.3.6-amzn-5 | Layanan untuk mengambil informasi terkini dan historis untuk aplikasi YARN. | 
| hbase-hmaster | 2.4.17-amzn-7 | Layanan untuk HBase cluster yang bertanggung jawab untuk koordinasi Daerah dan pelaksanaan perintah administratif. | 
| hbase-region-server | 2.4.17-amzn-7 | Layanan untuk melayani satu atau lebih HBase wilayah. | 
| hbase-client | 2.4.17-amzn-7 | HBase klien baris perintah. | 
| hbase-rest-server | 2.4.17-amzn-7 | Layanan menyediakan titik akhir RESTful HTTP untuk HBase. | 
| hbase-thrift-server | 2.4.17-amzn-7 | Layanan menyediakan titik akhir Thrift ke. HBase | 
| hbase-operator-tools | 2.4.17-amzn-7 | Alat perbaikan untuk HBase cluster Apache. | 
| hcatalog-client | 3.1.3-amzn-12 | Klien baris perintah 'hcat' untuk memanipulasi hcatalog-server. | 
| hcatalog-server | 3.1.3-amzn-12 | Penyediaan layanan HCatalog, tabel dan lapisan manajemen penyimpanan untuk aplikasi terdistribusi. | 
| hcatalog-webhcat-server | 3.1.3-amzn-12 | Titik akhir HTTP menyediakan antarmuka REST ke HCatalog. | 
| hive-client | 3.1.3-amzn-12 | Klien baris perintah Hive. | 
| hive-hbase | 3.1.3-amzn-12 | Klien Hive-hbase. | 
| hive-metastore-server | 3.1.3-amzn-12 | Layanan untuk mengakses metastore Hive, repositori semantik yang menyimpan metadata untuk SQL pada operasi Hadoop. | 
| hive-server2 | 3.1.3-amzn-12 | Layanan untuk menerima kueri Hive sebagai permintaan web. | 
| hudi | 0.15.0-amzn-0 | Kerangka pemrosesan tambahan untuk memberi daya pada pipa data pada latensi rendah dan efisiensi tinggi. | 
| hudi-presto | 0.15.0-amzn-0 | Perpustakaan paket untuk menjalankan Presto dengan Hudi. | 
| hudi-trino | 0.15.0-amzn-0 | Perpustakaan bundel untuk menjalankan Trino dengan Hudi. | 
| hudi-spark | 0.15.0-amzn-0 | Perpustakaan paket untuk menjalankan Spark dengan Hudi. | 
| hue-server | 4.11.0 | Aplikasi web untuk menganalisis data menggunakan aplikasi ekosistem Hadoop | 
| iceberg | 1.5.2-amzn-0 | Apache Iceberg adalah format tabel terbuka untuk kumpulan data analitik besar | 
| jupyterhub | 1.5.0 | Server multi-pengguna untuk notebook Jupyter | 
| livy-server | 0.8.0-inkubasi | Antarmuka REST untuk berinteraksi dengan Apache Spark | 
| nginx | 1.12.1 | nginx [engine x] adalah server HTTP dan server proksi balik | 
| mariadb-server | 5.5.68\$1 | Server basis data MariaDB. | 
| nvidia-cuda | 12.3.0 | Driver Nvidia dan kit alat Cuda | 
| oozie-client | 5.2.1 | Klien baris perintah Oozie. | 
| oozie-server | 5.2.1 | Layanan untuk menerima permintaan alur kerja Oozie. | 
| opencv | 4.7.0 | Perpustakaan Visi Komputer Sumber Terbuka. | 
| phoenix-library | 5.1.3 | Perpustakaan phoenix untuk server dan klien | 
| phoenix-connectors | 6.0.0 | Konektor Apache Phoenix untuk Spark-3 | 
| phoenix-query-server | 6.0.0 | Sebuah server ringan yang menyediakan akses JDBC serta Protocol Buffers dan akses format JSON ke API Avatica  | 
| presto-coordinator | 0.285-amzn-1 | Layanan untuk menerima kueri dan mengelola eksekusi kueri antara presto-worker. | 
| presto-worker | 0.285-amzn-1 | Layanan untuk mengeksekusi potongan kueri. | 
| presto-client | 0.285-amzn-1 | Klien baris perintah Presto yang diinstal pada master klaster HA yang siaga di mana server Presto server tidak dimulai. | 
| trino-coordinator | 442-amzn-0 | Layanan untuk menerima kueri dan mengelola eksekusi kueri di antara trino-workers. | 
| trino-worker | 442-amzn-0 | Layanan untuk mengeksekusi potongan kueri. | 
| trino-client | 442-amzn-0 | Klien baris perintah Trino yang diinstal pada master siaga cluster HA di mana server Trino tidak dimulai. | 
| pig-client | 0.17.0 | Klien baris perintah Pig. | 
| r | 4.3.2 | Proyek R untuk Komputasi Statistik | 
| ranger-kms-server | 2.0.0 | Sistem Pengelolaan Kunci Ranger Apache | 
| spark-client | 3.5.1-amzn-1 | Klien baris perintah Spark. | 
| spark-history-server | 3.5.1-amzn-1 | Web UI untuk melihat log acara untuk seluruh masa pakai aplikasi Spark. | 
| spark-on-yarn | 3.5.1-amzn-1 | Mesin eksekusi dalam memori untuk YARN. | 
| spark-yarn-slave | 3.5.1-amzn-1 | Perpustakaan Apache Spark yang dibutuhkan oleh slave YARN. | 
| spark-rapids | 24.06.1-amzn-0 | Plugin Nvidia Spark RAPIDS yang mempercepat Apache Spark dengan. GPUs | 
| sqoop-client | 1.4.7 | Klien baris perintah Apache Sqoop. | 
| tensorflow | 2.16.1 | TensorFlow pustaka perangkat lunak open source untuk perhitungan numerik kinerja tinggi. | 
| tez-on-yarn | 0.10.2-amzn-10 | Aplikasi dan perpustakaan tez YARN. | 
| tez-on-worker | 0.10.2-amzn-10 | Aplikasi dan pustaka YARN tez untuk node pekerja. | 
| zeppelin-server | 0.11.1 | Notebook berbasis web yang memungkinkan analisis data interaktif. | 
| zookeeper-server | 3.9.1-amzn-1 | Layanan terpusat untuk menjaga informasi konfigurasi, penamaan, yang menyediakan sinkronisasi terdistribusi, dan menyediakan layanan grup. | 
| zookeeper-client | 3.9.1-amzn-1 | ZooKeeper klien baris perintah. | 

## 7.3.0 klasifikasi konfigurasi
<a name="emr-730-class"></a>

Klasifikasi konfigurasi memungkinkan Anda menyesuaikan aplikasi. Ini sering kali bersesuaian dengan file XML konfigurasi untuk aplikasi, seperti `hive-site.xml`. Untuk informasi selengkapnya, lihat [Konfigurasikan aplikasi](emr-configure-apps.md).

Tindakan konfigurasi ulang terjadi ketika Anda menentukan konfigurasi untuk grup instans di klaster yang sedang berjalan. Amazon EMR hanya memulai tindakan konfigurasi ulang untuk klasifikasi yang Anda modifikasi. Untuk informasi selengkapnya, lihat [Lakukan konfigurasi ulang pada grup instans di klaster yang sedang berjalan](emr-configure-apps-running-cluster.md).


**klasifikasi emr-7.3.0**  

| Klasifikasi | Deskripsi | Tindakan Konfigurasi Ulang | 
| --- | --- | --- | 
| capacity-scheduler | Ubah nilai dalam file capacity-scheduler.xml Hadoop. | Restarts the ResourceManager service. | 
| container-executor | Ubah nilai dalam file container-executor.cfg Hadoop YARN ini. | Not available. | 
| container-log4j | Ubah nilai dalam file container-log4j.properties Hadoop YARN. | Not available. | 
| core-site | Ubah nilai dalam file core-site.xml Hadoop. | Restarts the Hadoop HDFS services Namenode, SecondaryNamenode, Datanode, ZKFC, and Journalnode. Restarts the Hadoop YARN services ResourceManager, NodeManager, ProxyServer, and TimelineServer. Additionally restarts Hadoop KMS, Ranger KMS, HiveServer2, Hive MetaStore, Hadoop Httpfs, and MapReduce-HistoryServer. | 
| docker-conf | Ubah pengaturan terkait docker. | Not available. | 
| emrfs-site | Ubah pengaturan EMRFS. | Restarts the Hadoop HDFS services Namenode, SecondaryNamenode, Datanode, ZKFC, and Journalnode. Restarts the Hadoop YARN services ResourceManager, NodeManager, ProxyServer, and TimelineServer. Additionally restarts HBaseRegionserver, HBaseMaster, HBaseThrift, HBaseRest, HiveServer2, Hive MetaStore, Hadoop Httpfs, and MapReduce-HistoryServer. | 
| flink-conf | Ubah pengaturan flink-conf.yaml. | Restarts Flink history server. | 
| flink-log4j | Ubah pengaturan log4j.properties Flink. | Restarts Flink history server. | 
| flink-log4j-session | Ubah pengaturan Flink log4j-session.properties untuk sesi. Kubernetes/Yarn  | Restarts Flink history server. | 
| flink-log4j-cli | Ubah pengaturan log4j-cli.properties Flink. | Restarts Flink history server. | 
| hadoop-env | Ubah nilai dalam lingkungan Hadoop untuk semua komponen Hadoop. | Restarts the Hadoop HDFS services Namenode, SecondaryNamenode, Datanode, ZKFC, and Journalnode. Restarts the Hadoop YARN services ResourceManager, NodeManager, ProxyServer, and TimelineServer. Additionally restarts PhoenixQueryserver, HiveServer2, Hive MetaStore, and MapReduce-HistoryServer. | 
| hadoop-log4j | Ubah nilai dalam file log4j.properties Hadoop ini. | Restarts the Hadoop HDFS services SecondaryNamenode, Datanode, and Journalnode. Restarts the Hadoop YARN services ResourceManager, NodeManager, ProxyServer, and TimelineServer. Additionally restarts Hadoop KMS, Hadoop Httpfs, and MapReduce-HistoryServer. | 
| hadoop-ssl-server | Ubah konfigurasi server ssl hadoop | Not available. | 
| hadoop-ssl-client | Ubah konfigurasi klien ssl hadoop | Not available. | 
| hbase | Pengaturan Amazon EMR-curated untuk Apache. HBase | Custom EMR specific property. Sets emrfs-site and hbase-site configs. See those for their associated restarts. | 
| hbase-env | Ubah nilai HBase di lingkungan. | Restarts the HBase services RegionServer, HBaseMaster, ThriftServer, RestServer. | 
| hbase-log4j | Ubah nilai dalam file HBase hbase-log4j.properties. | Restarts the HBase services RegionServer, HBaseMaster, ThriftServer, RestServer. | 
| hbase-metrics | Ubah nilai dalam file HBase hadoop-metrics2-hbase.properties. | Restarts the HBase services RegionServer, HBaseMaster, ThriftServer, RestServer. | 
| hbase-policy | Ubah nilai dalam HBase file hbase-policy.xml. | Not available. | 
| hbase-site | Ubah nilai dalam HBase file hbase-site.xml. | Restarts the HBase services RegionServer, HBaseMaster, ThriftServer, RestServer. Additionally restarts Phoenix QueryServer. | 
| hdfs-encryption-zones | Konfigurasikan zona enkripsi HDFS. | This classification should not be reconfigured. | 
| hdfs-env | Ubah nilai dalam lingkungan HDFS. | Restarts Hadoop HDFS services Namenode, Datanode, and ZKFC. | 
| hdfs-site | Ubah nilai dalam hdfs-site.xml HDFS. | Restarts the Hadoop HDFS services Namenode, SecondaryNamenode, Datanode, ZKFC, and Journalnode. Additionally restarts Hadoop Httpfs. | 
| hcatalog-env | Ubah nilai HCatalog di lingkungan. | Restarts Hive HCatalog Server. | 
| hcatalog-server-jndi | Ubah nilai di HCatalog jndi.properties. | Restarts Hive HCatalog Server. | 
| hcatalog-server-proto-hive-site | Ubah nilai HCatalog proto-hive-site dalam.xml's. | Restarts Hive HCatalog Server. | 
| hcatalog-webhcat-env | Ubah nilai di lingkungan HCatalog WebHCat. | Restarts Hive WebHCat server. | 
| hcatalog-webhcat-log4j2 | Ubah nilai di HCat log4j2.properties HCatalog Web. | Restarts Hive WebHCat server. | 
| hcatalog-webhcat-site | Ubah nilai dalam file webhcat-site.xml HCatalog WebHCat. | Restarts Hive WebHCat server. | 
| hive | Pengaturan dikurasi Amazon EMR untuk Apache Hive. | Sets configurations to launch Hive LLAP service. | 
| hive-beeline-log4j2 | Ubah nilai dalam file beeline-log4j2.properties Hive. | Not available. | 
| hive-parquet-logging | Ubah nilai dalam file parquet-logging.properties Hive. | Not available. | 
| hive-env | Ubah nilai dalam lingkungan Hive. | Restarts HiveServer2, HiveMetastore, and Hive HCatalog-Server. Runs Hive schemaTool CLI commands to verify hive-metastore. | 
| hive-exec-log4j2 | Ubah nilai dalam file hive-exec-log 4j2.properties Hive. | Not available. | 
| hive-llap-daemon-log4j2 | Ubah nilai dalam file llap-daemon-log 4j2.properties Hive. | Not available. | 
| hive-log4j2 | Ubah nilai dalam file hive-log4j2.properties Hive. | Not available. | 
| hive-site | Ubah nilai dalam file hive-site.xml Hive | Restarts HiveServer2, HiveMetastore, and Hive HCatalog-Server. Runs Hive schemaTool CLI commands to verify hive-metastore. Also restarts Oozie and Zeppelin. | 
| hiveserver2-site | Ubah nilai dalam file hiveserver2-site.xml Hive Server2 | Not available. | 
| hue-ini | Ubah nilai dalam file ini Hue | Restarts Hue. Also activates Hue config override CLI commands to pick up new configurations. | 
| httpfs-env | Ubah nilai di lingkungan HTTPFS. | Restarts Hadoop Httpfs service. | 
| httpfs-site | Ubah nilai dalam file httpfs-site.xml Hadoop. | Restarts Hadoop Httpfs service. | 
| hadoop-kms-acls | Ubah nilai dalam file kms-acls.xml Hadoop. | Not available. | 
| hadoop-kms-env | Ubah nilai dalam lingkungan Hadoop KMS. | Restarts Hadoop-KMS service. | 
| hadoop-kms-java-home | Ubah rumah java KMS Hadoop | Not available. | 
| hadoop-kms-log4j | Ubah nilai dalam file kms-log4j.properties Hadoop. | Not available. | 
| hadoop-kms-site | Ubah nilai dalam file kms-site.xml Hadoop. | Restarts Hadoop-KMS and Ranger-KMS service. | 
| hudi-env | Ubah nilai di lingkungan Hudi. | Not available. | 
| hudi-defaults | Ubah nilai dalam file hudi-defaults.conf Hudi. | Not available. | 
| iceberg-defaults | Ubah nilai dalam file iceberg-defaults.conf Iceberg. | Not available. | 
| delta-defaults | Ubah nilai dalam file delta-defaults.conf Delta. | Not available. | 
| jupyter-notebook-conf | Ubah nilai dalam file jupyter\$1notebook\$1config.py Jupyter Notebook. | Not available. | 
| jupyter-hub-conf | Ubah nilai dalam JupyterHubs file jupyterhub\$1config.py. | Not available. | 
| jupyter-s3-conf | Konfigurasikan persistensi Jupyter Notebook S3. | Not available. | 
| jupyter-sparkmagic-conf | Ubah nilai dalam file config.json Sparkmagic. | Not available. | 
| livy-conf | Ubah nilai dalam file livy.conf Livy. | Restarts Livy Server. | 
| livy-env | Ubah nilai di lingkungan Livy. | Restarts Livy Server. | 
| livy-log4j2 | Ubah pengaturan Livy log4j2.properties. | Restarts Livy Server. | 
| mapred-env | Ubah nilai di lingkungan MapReduce aplikasi. | Restarts Hadoop MapReduce-HistoryServer. | 
| mapred-site | Ubah nilai dalam file mapred-site.xml MapReduce aplikasi. | Restarts Hadoop MapReduce-HistoryServer. | 
| oozie-env | Ubah nilai di lingkungan Oozie. | Restarts Oozie. | 
| oozie-log4j | Ubah nilai dalam file oozie-log4j.properties Oozie. | Restarts Oozie. | 
| oozie-site | Ubah nilai dalam file oozie-site.xml Oozie. | Restarts Oozie. | 
| phoenix-hbase-metrics | Ubah nilai dalam file hadoop-metrics2-hbase.properties Phoenix. | Not available. | 
| phoenix-hbase-site | Ubah nilai dalam file hbase-site.xml Phoenix. | Not available. | 
| phoenix-log4j | Ubah nilai dalam file log4j.properties Phoenix. | Restarts Phoenix-QueryServer. | 
| phoenix-metrics | Ubah nilai dalam file hadoop-metrics2-phoenix.properties Phoenix. | Not available. | 
| pig-env | Ubah nilai di lingkungan Pig. | Not available. | 
| pig-properties | Ubah nilai dalam file pig.properties Pig. | Restarts Oozie. | 
| pig-log4j | Ubah nilai dalam file log4j.properties Pig. | Not available. | 
| presto-log | Ubah nilai dalam file log.properties Presto. | Restarts Presto-Server (for PrestoDB) | 
| presto-config | Ubah nilai dalam file config.properties Presto. | Restarts Presto-Server (for PrestoDB) | 
| presto-password-authenticator | Ubah nilai dalam file password-authenticator.properties Presto. | Not available. | 
| presto-env | Ubah nilai dalam file presto-env.sh Presto. | Restarts Presto-Server (for PrestoDB) | 
| presto-node | Ubah nilai dalam file node.properties Presto. | Not available. | 
| presto-connector-blackhole | Ubah nilai dalam file blackhole.properties Presto. | Not available. | 
| presto-connector-cassandra | Ubah nilai dalam file cassandra.properties Presto. | Not available. | 
| presto-connector-hive | Ubah nilai dalam file hive.properties Presto. | Restarts Presto-Server (for PrestoDB) | 
| presto-connector-jmx | Ubah nilai dalam file jmx.properties Presto. | Not available. | 
| presto-connector-kafka | Ubah nilai dalam file kafka.properties Presto. | Not available. | 
| presto-connector-lakeformation | Ubah nilai dalam file lakeformation.properties Presto. | Restarts Presto-Server (for PrestoDB) | 
| presto-connector-localfile | Ubah nilai dalam file localfile.properties Presto. | Not available. | 
| presto-connector-memory | Ubah nilai dalam file memory.properties Presto. | Not available. | 
| presto-connector-mongodb | Ubah nilai dalam file mongodb.properties Presto. | Not available. | 
| presto-connector-mysql | Ubah nilai dalam file mysql.properties Presto. | Not available. | 
| presto-connector-postgresql | Ubah nilai dalam file postgresql.properties Presto. | Not available. | 
| presto-connector-raptor | Ubah nilai dalam file raptor.properties Presto. | Not available. | 
| presto-connector-redis | Ubah nilai dalam file redis.properties Presto. | Not available. | 
| presto-connector-redshift | Ubah nilai dalam file redshift.properties Presto. | Not available. | 
| presto-connector-tpch | Ubah nilai dalam file tpch.properties Presto. | Not available. | 
| presto-connector-tpcds | Ubah nilai dalam file tpcds.properties Presto. | Not available. | 
| trino-log | Ubah nilai dalam file log.properties Trino. | Restarts Trino-Server (for Trino) | 
| trino-config | Ubah nilai dalam file config.properties Trino. | Restarts Trino-Server (for Trino) | 
| trino-password-authenticator | Ubah nilai dalam file password-authenticator.properties Trino. | Restarts Trino-Server (for Trino) | 
| trino-env | Ubah nilai dalam file trino-env.sh Trino. | Restarts Trino-Server (for Trino) | 
| trino-node | Ubah nilai dalam file node.properties Trino. | Not available. | 
| trino-connector-blackhole | Ubah nilai dalam file blackhole.properties Trino. | Not available. | 
| trino-connector-cassandra | Ubah nilai dalam file cassandra.properties Trino. | Not available. | 
| trino-connector-delta | Ubah nilai dalam file delta.properties Trino. | Restarts Trino-Server (for Trino) | 
| trino-connector-hive | Ubah nilai dalam file hive.properties Trino. | Restarts Trino-Server (for Trino) | 
| trino-exchange-manager | Ubah nilai dalam file exchange-manager.properties Trino. | Restarts Trino-Server (for Trino) | 
| trino-connector-iceberg | Ubah nilai dalam file iceberg.properties Trino. | Restarts Trino-Server (for Trino) | 
| trino-connector-hudi | Ubah nilai dalam file hudi.properties Trino. | Restarts Trino-Server (for Trino) | 
| trino-connector-jmx | Ubah nilai dalam file jmx.properties Trino. | Not available. | 
| trino-connector-kafka | Ubah nilai dalam file kafka.properties Trino. | Not available. | 
| trino-connector-localfile | Ubah nilai dalam file localfile.properties Trino. | Not available. | 
| trino-connector-memory | Ubah nilai dalam file memory.properties Trino. | Not available. | 
| trino-connector-mongodb | Ubah nilai dalam file mongodb.properties Trino. | Not available. | 
| trino-connector-mysql | Ubah nilai dalam file mysql.properties Trino. | Not available. | 
| trino-connector-postgresql | Ubah nilai dalam file postgresql.properties Trino. | Not available. | 
| trino-connector-raptor | Ubah nilai dalam file raptor.properties Trino. | Not available. | 
| trino-connector-redis | Ubah nilai dalam file redis.properties Trino. | Not available. | 
| trino-connector-redshift | Ubah nilai dalam file redshift.properties Trino. | Not available. | 
| trino-connector-tpch | Ubah nilai dalam file tpch.properties Trino. | Not available. | 
| trino-connector-tpcds | Ubah nilai dalam file tpcds.properties Trino. | Not available. | 
| ranger-kms-dbks-site | Ubah nilai dalam file dbks-site.xml Ranger KMS. | Restarts Ranger KMS Server. | 
| ranger-kms-site | Ubah nilai dalam ranger-kms-site file.xml. dari Ranger KMS. | Restarts Ranger KMS Server. | 
| ranger-kms-env | Ubah nilai di lingkungan Ranger KMS. | Restarts Ranger KMS Server. | 
| ranger-kms-logback | Ubah nilai dalam file kms-logback.xml dari Ranger KMS. | Not available. | 
| ranger-kms-db-ca | Ubah nilai untuk file CA pada S3 untuk koneksi MySQL SSL dengan Ranger KMS. | Not available. | 
| spark | Pengaturan terkurasi Amazon EMR untuk Apache Spark. | This property modifies spark-defaults. See actions there. | 
| spark-defaults | Ubah nilai dalam file spark-defaults.conf Spark. | Restarts Spark history server and Spark thrift server. | 
| spark-env | Ubah nilai di lingkungan Spark. | Restarts Spark history server and Spark thrift server. | 
| spark-hive-site | Ubah nilai dalam file hive-site.xml Spark | Not available. | 
| spark-log4j2 | Ubah nilai dalam file log4j2.properties Spark. | Restarts Spark history server and Spark thrift server. | 
| spark-metrics | Ubah nilai dalam file metrics.properties Spark. | Restarts Spark history server and Spark thrift server. | 
| sqoop-env | Ubah nilai dalam lingkungan Sqoop. | Not available. | 
| sqoop-oraoop-site | Ubah nilai dalam file oraoop-site.xml Sqoop OraOop ini. | Not available. | 
| sqoop-site | Ubah nilai dalam file sqoop-site.xml Sqoop. | Not available. | 
| tez-site | Ubah nilai dalam file tez-site.xml Tez. | Restart Oozie and HiveServer2. | 
| yarn-env | Ubah nilai di lingkungan YARN. | Restarts the Hadoop YARN services ResourceManager, NodeManager, ProxyServer, and TimelineServer. Additionally restarts MapReduce-HistoryServer. | 
| yarn-site | Ubah nilai dalam file yarn-site.xml YARN. | Restarts the Hadoop YARN services ResourceManager, NodeManager, ProxyServer, and TimelineServer. Additionally restarts Livy Server and MapReduce-HistoryServer. | 
| zeppelin-env | Ubah nilai di lingkungan Zeppelin. | Restarts Zeppelin. | 
| zeppelin-site | Ubah pengaturan konfigurasi di zeppelin-site.xml. | Restarts Zeppelin. | 
| zookeeper-config | Ubah nilai dalam ZooKeeper file zoo.cfg. | Restarts Zookeeper server. | 
| zookeeper-logback | Ubah nilai dalam ZooKeeper file logback.xml. | Restarts Zookeeper server. | 
| emr-metrics | Ubah pengaturan metrik emr untuk simpul ini. | Restarts the CloudWatchAgent service. | 

## 7.3.0 perubahan log
<a name="730-changelog"></a>


**Ubah log untuk catatan rilis dan rilis 7.3.0**  

| Date | Peristiwa | Deskripsi | 
| --- | --- | --- | 
| 2024-10-17 | Publikasi Docs | Catatan rilis Amazon EMR 7.3.0 pertama kali diterbitkan | 
| 2024-10-16 | Penerapan selesai | [Amazon EMR 7.3.0 sepenuhnya diterapkan ke semua Wilayah yang didukung](https://aws.amazon.com/about-aws/global-infrastructure/regional-product-services/) | 
| 2024-10-14 | Rilis awal | Amazon EMR 7.3.0 pertama kali dikerahkan ke Wilayah komersial awal | 

# Amazon EMR rilis 7.2.0
<a name="emr-720-release"></a>

## 7.2.0 siklus hidup yang didukung
<a name="emr-720-supported-lifecycle"></a>

Tabel berikut menjelaskan tanggal siklus hidup yang didukung untuk rilis Amazon EMR 7.2.0.


| Fase Support | Date | 
| --- | --- | 
| Tanggal rilis awal | Juli 25, 2024 | 
| Dukungan standar sampai | Juli 24, 2026 | 
| Akhir dari dukungan | Juli 25, 2026 | 
| Akhir hidup | Juli 25, 2027 | 

## 7.2.0 versi aplikasi
<a name="emr-720-app-versions"></a>

Rilis ini mencakup aplikasi berikut: [https://docs.aws.amazon.com/AmazonCloudWatch/latest/monitoring/Install-CloudWatch-Agent.html](https://docs.aws.amazon.com/AmazonCloudWatch/latest/monitoring/Install-CloudWatch-Agent.html), [https://delta.io/](https://delta.io/), [https://flink.apache.org/](https://flink.apache.org/), [http://hbase.apache.org/](http://hbase.apache.org/), [https://cwiki.apache.org/confluence/display/Hive/HCatalog](https://cwiki.apache.org/confluence/display/Hive/HCatalog), [http://hive.apache.org/](http://hive.apache.org/), [https://hudi.apache.org](https://hudi.apache.org), [http://gethue.com/](http://gethue.com/), [https://iceberg.apache.org/](https://iceberg.apache.org/), [https://jupyter-enterprise-gateway.readthedocs.io/en/latest/](https://jupyter-enterprise-gateway.readthedocs.io/en/latest/), [https://jupyterhub.readthedocs.io/en/latest/#](https://jupyterhub.readthedocs.io/en/latest/#), [https://livy.incubator.apache.org/](https://livy.incubator.apache.org/), [https://mxnet.incubator.apache.org/](https://mxnet.incubator.apache.org/), [http://oozie.apache.org/](http://oozie.apache.org/), [https://phoenix.apache.org/](https://phoenix.apache.org/), [http://pig.apache.org/](http://pig.apache.org/), [https://prestodb.io/](https://prestodb.io/), [https://spark.apache.org/docs/latest/](https://spark.apache.org/docs/latest/), [http://sqoop.apache.org/](http://sqoop.apache.org/), [https://www.tensorflow.org/](https://www.tensorflow.org/), [https://tez.apache.org/](https://tez.apache.org/), [https://trino.io/](https://trino.io/), [https://zeppelin.incubator.apache.org/](https://zeppelin.incubator.apache.org/), dan [https://zookeeper.apache.org](https://zookeeper.apache.org).

Tabel di bawah ini mencantumkan versi aplikasi yang tersedia dalam rilis Amazon EMR ini dan versi aplikasi dalam tiga rilis EMR Amazon sebelumnya (bila berlaku).

Untuk riwayat lengkap versi aplikasi untuk setiap rilis Amazon EMR, lihat topik berikut:
+ [Versi aplikasi di Amazon EMR 7.x rilis](emr-release-app-versions-7.x.md)
+ [Versi aplikasi di Amazon EMR 6.x rilis](emr-release-app-versions-6.x.md)
+ [Versi aplikasi di Amazon EMR 5.x rilis](emr-release-app-versions-5.x.md)
+ [Versi aplikasi di Amazon EMR 4.x rilis](emr-release-app-versions-4.x.md)


**Informasi versi aplikasi**  

|  | emr-7.3.0 | emr-7.2.0 | emr-7.1.0 | emr-7.0.0 | 
| --- | --- | --- | --- | --- | 
| AWS SDK for Java | 2.25.70, 1.12.747 | 2.23.18, 1.12.705 | 2.23.18, 1.12.656 | 2.20.160-amzn-0, 1.12.569 | 
| Python | 3.9, 3.11 | 3.9, 3.11 | 3.9, 3.11 | 3.9 | 
| Skala | 2.12.18 | 2.12.17 | 2.12.17 | 2.12.17 | 
| AmazonCloudWatchAgent | 1.300032.2-amzn-0 | 1.300032.2-amzn-0 | 1.300032.2-amzn-0 | 1.300031.1-amzn-0 | 
| Delta | 3.2.0-amzn-0 | 3.1.0 | 3.0.0 | 3.0.0 | 
| Flink | 1.18.1-amzn-2 | 1.18.1-amzn-1 | 1.18.1-amzn-0 | 1.18.0-amzn-0 | 
| Ganglia |  -  |  -  |  -  |  -  | 
| HBase | 2.4.17-amzn-7 | 2.4.17-amzn-6 | 2.4.17-amzn-5 | 2.4.17-amzn-4 | 
| HCatalog | 3.1.3-amzn-12 | 3.1.3-amzn-11 | 3.1.3-amzn-10 | 3.1.3-amzn-9 | 
| Hadoop | 3.3.6-amzn-5 | 3.3.6-amzn-4 | 3.3.6-amzn-3 | 3.3.6-amzn-2 | 
| Hive | 3.1.3-amzn-12 | 3.1.3-amzn-11 | 3.1.3-amzn-10 | 3.1.3-amzn-9 | 
| Hudi | 0.15.0-amzn-0 | 0.14.1-amzn-1 | 0.14.1-amzn-0 | 0.14.0-amzn-1 | 
| Hue | 4.11.0 | 4.11.0 | 4.11.0 | 4.11.0 | 
| Iceberg | 1.5.2-amzn-0 | 1.5.0-amzn-0 | 1.4.3-amzn-0 | 1.4.2-amzn-0 | 
| JupyterEnterpriseGateway | 2.6.0 | 2.6.0 | 2.6.0 | 2.6.0 | 
| JupyterHub | 1.5.0 | 1.5.0 | 1.5.0 | 1.5.0 | 
| Livy | 0.8.0-inkubasi | 0.8.0-inkubasi | 0.8.0-inkubasi | 0.7.1-inkubasi | 
| MXNet |  -  | 1.9.1 | 1.9.1 | 1.9.1 | 
| Mahout |  -  |  -  |  -  |  -  | 
| Oozie | 5.2.1 | 5.2.1 | 5.2.1 | 5.2.1 | 
| Phoenix | 5.1.3 | 5.1.3 | 5.1.3 | 5.1.3 | 
| Pig | 0.17.0 | 0.17.0 | 0.17.0 | 0.17.0 | 
| Presto | 0.285-amzn-1 | 0,285-amzn-0 | 0,284-amzn-0 | 0,283-amzn-1 | 
| Spark | 3.5.1-amzn-1 | 3.5.1-amzn-0 | 3.5.0-amzn-1 | 3.5.0-amzn-0 | 
| Sqoop | 1.4.7 | 1.4.7 | 1.4.7 | 1.4.7 | 
| TensorFlow | 2.16.1 | 2.11.0 | 2.11.0 | 2.11.0 | 
| Tez | 0.10.2-amzn-10 | 0.10.2-amzn-9 | 0.10.2-amzn-8 | 0.10.2-amzn-7 | 
| Trino (PrestoSQL) | 442-amzn-0 | 436-amzn-0 | 435-amzn-0 | 426-amzn-1 | 
| Zeppelin | 0.11.1 | 0.10.1 | 0.10.1 | 0.10.1 | 
| ZooKeeper | 3.9.1-amzn-1 | 3.9.1-amzn-1 | 3.9.1-amzn-0 | 3.5.10 | 

# Rincian komponen rilis 7.2.0
<a name="emr-720-release-components-details"></a>

Lihat tabel berikut untuk informasi selengkapnya tentang paket *Ekstra* di Amazon EMR 7.2.0.


| Aplikasi | Jenis Aplikasi | Paket | Jenis Package | Versi Package | 
| --- | --- | --- | --- | --- | 
|  AmazonCloudWatchAgent  |  Core  |  hadoop-hdfs-journalnode  |  Ekstra  |  3.3.6.amzn.4-1.amzn2023  | 
|  AmazonCloudWatchAgent  |  Core  |  ranger-km  |  Ekstra  |  2.0.0-1.amzn2023  | 
|  AmazonCloudWatchAgent  |  Core  |  s3-dist-cp  |  Ekstra  |  2.32.0-1.amzn2023  | 
|  AmazonCloudWatchAgent  |  Core  |  penjaga kebun binatang  |  Ekstra  |  3.9.1.amzn.1-1.amzn2023  | 
|  AmazonCloudWatchAgent  |  Core  |  zookeper-server  |  Ekstra  |  3.9.1.amzn.1-1.amzn2023  | 
|  Flink  |  Core  |  hadop-client  |  Ekstra  |  3.3.6.amzn.4-1.amzn2023  | 
|  Flink  |  Core  |  hadoop-hdfs  |  Ekstra  |  3.3.6.amzn.4-1.amzn2023  | 
|  Flink  |  Core  |  hadoop-hdfs-datanode  |  Ekstra  |  3.3.6.amzn.4-1.amzn2023  | 
|  Flink  |  Core  |  hadoop-hdfs-journalnode  |  Ekstra  |  3.3.6.amzn.4-1.amzn2023  | 
|  Flink  |  Core  |  hadoop-hdfs-namenode  |  Ekstra  |  3.3.6.amzn.4-1.amzn2023  | 
|  Flink  |  Core  |  hadoop-httpfs  |  Ekstra  |  3.3.6.amzn.4-1.amzn2023  | 
|  Flink  |  Core  |  hadoop-km  |  Ekstra  |  3.3.6.amzn.4-1.amzn2023  | 
|  Flink  |  Core  |  hadoop-mapreduce  |  Ekstra  |  3.3.6.amzn.4-1.amzn2023  | 
|  Flink  |  Core  |  hadoop-mapreduce-historyserver  |  Ekstra  |  3.3.6.amzn.4-1.amzn2023  | 
|  Flink  |  Core  |  hadoop-benang  |  Ekstra  |  3.3.6.amzn.4-1.amzn2023  | 
|  Flink  |  Core  |  hadoop-yarn-nodemanager  |  Ekstra  |  3.3.6.amzn.4-1.amzn2023  | 
|  Flink  |  Core  |  hadoop-yarn-proxyserver  |  Ekstra  |  3.3.6.amzn.4-1.amzn2023  | 
|  Flink  |  Core  |  hadoop-yarn-resourcemanager  |  Ekstra  |  3.3.6.amzn.4-1.amzn2023  | 
|  Flink  |  Core  |  hadoop-yarn-timelineserver  |  Ekstra  |  3.3.6.amzn.4-1.amzn2023  | 
|  Flink  |  Core  |  hudi  |  Ekstra  |  0.14.1.amzn.1-1.amzn2023  | 
|  Flink  |  Core  |  ranger-km  |  Ekstra  |  2.0.0-1.amzn2023  | 
|  Flink  |  Core  |  hadoop  |  Ekstra  |  3.3.6.amzn.4-1.amzn2023  | 
|  HBase  |  Core  |  s3-dist-cp  |  Ekstra  |  2.32.0-1.amzn2023  | 
|  HCatalog  |  Core  |  hadoop-yarn-proxyserver  |  Ekstra  |  3.3.6.amzn.4-1.amzn2023  | 
|  HCatalog  |  Core  |  mariadb-connector-java  |  Ekstra  |  2.7.2-1  | 
|  Hive  |  Core  |  hadoop-httpfs  |  Ekstra  |  3.3.6.amzn.4-1.amzn2023  | 
|  Hive  |  Core  |  hadoop-yarn-proxyserver  |  Ekstra  |  3.3.6.amzn.4-1.amzn2023  | 
|  Hive  |  Core  |  hive-hbase  |  Ekstra  |  3.1.3.amzn.11-1.amzn2023  | 
|  Hive  |  Core  |  mariadb-connector-java  |  Ekstra  |  2.7.2-1  | 
|  Hive  |  Core  |  s3-dist-cp  |  Ekstra  |  2.32.0-1.amzn2023  | 
|  Phoenix  |  Core  |  s3-dist-cp  |  Ekstra  |  2.32.0-1.amzn2023  | 
|  Spark  |  Core  |  spark-datanucleus  |  Ekstra  |  3.5.1.amzn.0-1.amzn2023  | 
|  Tez  |  Core  |  hadoop-mapreduce  |  Ekstra  |  3.3.6.amzn.4-1.amzn2023  | 
|  Tez  |  Core  |  hadoop-mapreduce-historyserver  |  Ekstra  |  3.3.6.amzn.4-1.amzn2023  | 
|  Tez  |  Core  |  hadoop-yarn-proxyserver  |  Ekstra  |  3.3.6.amzn.4-1.amzn2023  | 
|  Trino  |  Core  |  utilitas besar  |  Ekstra  |  1.2.0-1.amzn2023  | 
|  Trino  |  Core  |  hadop-client  |  Ekstra  |  3.3.6.amzn.4-1.amzn2023  | 
|  Trino  |  Core  |  hadoop-hdfs  |  Ekstra  |  3.3.6.amzn.4-1.amzn2023  | 
|  Trino  |  Core  |  hadoop-hdfs-datanode  |  Ekstra  |  3.3.6.amzn.4-1.amzn2023  | 
|  Trino  |  Core  |  hadoop-hdfs-journalnode  |  Ekstra  |  3.3.6.amzn.4-1.amzn2023  | 
|  Trino  |  Core  |  hadoop-hdfs-namenode  |  Ekstra  |  3.3.6.amzn.4-1.amzn2023  | 
|  Trino  |  Core  |  hadoop-km  |  Ekstra  |  3.3.6.amzn.4-1.amzn2023  | 
|  Trino  |  Core  |  hadoop-mapreduce  |  Ekstra  |  3.3.6.amzn.4-1.amzn2023  | 
|  Trino  |  Core  |  hadoop-mapreduce-historyserver  |  Ekstra  |  3.3.6.amzn.4-1.amzn2023  | 
|  Trino  |  Core  |  hadoop-benang  |  Ekstra  |  3.3.6.amzn.4-1.amzn2023  | 
|  Trino  |  Core  |  hadoop-yarn-nodemanager  |  Ekstra  |  3.3.6.amzn.4-1.amzn2023  | 
|  Trino  |  Core  |  hadoop-yarn-proxyserver  |  Ekstra  |  3.3.6.amzn.4-1.amzn2023  | 
|  Trino  |  Core  |  hadoop-yarn-resourcemanager  |  Ekstra  |  3.3.6.amzn.4-1.amzn2023  | 
|  Trino  |  Core  |  hadoop-yarn-timelineserver  |  Ekstra  |  3.3.6.amzn.4-1.amzn2023  | 
|  Trino  |  Core  |  hive  |  Ekstra  |  3.1.3.amzn.11-1.amzn2023  | 
|  Trino  |  Core  |  hive-hcatalog-server  |  Ekstra  |  3.1.3.amzn.11-1.amzn2023  | 
|  Trino  |  Core  |  mariadb-connector-java  |  Ekstra  |  2.7.2-1  | 
|  Trino  |  Core  |  ranger-km  |  Ekstra  |  2.0.0-1.amzn2023  | 
|  Trino  |  Core  |  penjaga kebun binatang  |  Ekstra  |  3.9.1.amzn.1-1.amzn2023  | 
|  Trino  |  Core  |  zookeper-server  |  Ekstra  |  3.9.1.amzn.1-1.amzn2023  | 
|  Trino  |  Core  |  bigtop-groovy  |  Ekstra  |  2.5.4-1.amzn2023  | 
|  Trino  |  Core  |  bigtop-jsvc  |  Ekstra  |  1.2.4-1.amzn2023  | 
|  Trino  |  Core  |  hadoop  |  Ekstra  |  3.3.6.amzn.4-1.amzn2023  | 
|  Trino  |  Core  |  hadoop-lzo  |  Ekstra  |  0.4.19-1.amzn2023  | 
|  Trino  |  Core  |  hive-hcatalog  |  Ekstra  |  3.1.3.amzn.11-1.amzn2023  | 
|  Trino  |  Core  |  sarang-jdbc  |  Ekstra  |  3.1.3.amzn.11-1.amzn2023  | 
|  Zookeeper  |  Core  |  emrfs  |  Ekstra  |  2.63.0-1.amzn2023  | 
|  Zookeeper  |  Core  |  hadop-client  |  Ekstra  |  3.3.6.amzn.4-1.amzn2023  | 
|  Zookeeper  |  Core  |  hadoop-hdfs  |  Ekstra  |  3.3.6.amzn.4-1.amzn2023  | 
|  Zookeeper  |  Core  |  hadoop-hdfs-datanode  |  Ekstra  |  3.3.6.amzn.4-1.amzn2023  | 
|  Zookeeper  |  Core  |  hadoop-hdfs-journalnode  |  Ekstra  |  3.3.6.amzn.4-1.amzn2023  | 
|  Zookeeper  |  Core  |  hadoop-hdfs-namenode  |  Ekstra  |  3.3.6.amzn.4-1.amzn2023  | 
|  Zookeeper  |  Core  |  hadoop-httpfs  |  Ekstra  |  3.3.6.amzn.4-1.amzn2023  | 
|  Zookeeper  |  Core  |  hadoop-km  |  Ekstra  |  3.3.6.amzn.4-1.amzn2023  | 
|  Zookeeper  |  Core  |  hadoop-mapreduce  |  Ekstra  |  3.3.6.amzn.4-1.amzn2023  | 
|  Zookeeper  |  Core  |  hadoop-mapreduce-historyserver  |  Ekstra  |  3.3.6.amzn.4-1.amzn2023  | 
|  Zookeeper  |  Core  |  hadoop-benang  |  Ekstra  |  3.3.6.amzn.4-1.amzn2023  | 
|  Zookeeper  |  Core  |  hadoop-yarn-nodemanager  |  Ekstra  |  3.3.6.amzn.4-1.amzn2023  | 
|  Zookeeper  |  Core  |  hadoop-yarn-proxyserver  |  Ekstra  |  3.3.6.amzn.4-1.amzn2023  | 
|  Zookeeper  |  Core  |  hadoop-yarn-resourcemanager  |  Ekstra  |  3.3.6.amzn.4-1.amzn2023  | 
|  Zookeeper  |  Core  |  hadoop-yarn-timelineserver  |  Ekstra  |  3.3.6.amzn.4-1.amzn2023  | 
|  Zookeeper  |  Core  |  ranger-km  |  Ekstra  |  2.0.0-1.amzn2023  | 

# 7.2.0 kerentanan dan eksposur umum
<a name="720-common-vulnerabilities-exposures"></a>

Tabel berikut mencantumkan semua CVEs yang tidak memengaruhi kluster EMR yang berjalan pada konfigurasi Amazon EMR 7.2.0 yang direkomendasikan. Amazon EMR bergantung pada sumber terbuka hulu untuk ketersediaan perbaikan dan akan memberikan versi stabil terbaru sebagai bagian dari komponen Core Engine dalam waktu 90 hari setelah Amazon EMR memverifikasi perbaikan.

Tabel ini diperbarui pada 15 September 2024.


| ID CVE | Kepelikan | URL detail CVE | 
| --- | --- | --- | 
|  CVE-2015-1832  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2015-1832)-2015-1832  | 
|  CVE-2015-4852  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2015-4852)-2015-4852  | 
|  CVE-2015-7501  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2015-7501)-2015-7501  | 
|  CVE-2016-5018  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2016-5018)-2016-5018  | 
|  CVE-2017-1000487  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2017-1000487)-2017-1000487  | 
|  CVE-2017-12629  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE-2017-12629](https://nvd.nist.gov/vuln/detail/CVE-2017-12629)  | 
|  CVE-2017-15095  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2017-15095)-2017-15095  | 
|  CVE-2017-15095  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2017-15095)-2017-15095  | 
|  CVE-2017-17485  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2017-17485)-2017-17485  | 
|  CVE-2017-17485  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2017-17485)-2017-17485  | 
|  CVE-2017-7525  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2017-7525)-2017-7525  | 
|  CVE-2017-7657  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2017-7657)-2017-7657  | 
|  CVE-2017-7658  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2017-7658)-2017-7658  | 
|  CVE-2018-11307  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-11307)-2018-11307  | 
|  CVE-2018-11307  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-11307)-2018-11307  | 
|  CVE-2018-11307  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-11307)-2018-11307  | 
|  CVE-2018-14718  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-14718)-2018-14718  | 
|  CVE-2018-14718  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-14718)-2018-14718  | 
|  CVE-2018-14718  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-14718)-2018-14718  | 
|  CVE-2018-14719  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE-2018-14719](https://nvd.nist.gov/vuln/detail/CVE-2018-14719)  | 
|  CVE-2018-14719  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE-2018-14719](https://nvd.nist.gov/vuln/detail/CVE-2018-14719)  | 
|  CVE-2018-14719  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE-2018-14719](https://nvd.nist.gov/vuln/detail/CVE-2018-14719)  | 
|  CVE-2018-14720  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-14720)-2018-14720  | 
|  CVE-2018-14720  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-14720)-2018-14720  | 
|  CVE-2018-14720  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-14720)-2018-14720  | 
|  CVE-2018-14721  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-14721)-2018-14721  | 
|  CVE-2018-14721  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-14721)-2018-14721  | 
|  CVE-2018-14721  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-14721)-2018-14721  | 
|  CVE-2018-17190  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-17190)-2018-17190  | 
|  CVE-2018-19360  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-19360)-2018-19360  | 
|  CVE-2018-19360  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-19360)-2018-19360  | 
|  CVE-2018-19360  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-19360)-2018-19360  | 
|  CVE-2018-19361  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-19361)-2018-19361  | 
|  CVE-2018-19361  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-19361)-2018-19361  | 
|  CVE-2018-19361  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-19361)-2018-19361  | 
|  CVE-2018-19362  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-19362)-2018-19362  | 
|  CVE-2018-19362  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-19362)-2018-19362  | 
|  CVE-2018-19362  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-19362)-2018-19362  | 
|  CVE-2018-7489  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-7489)-2018-7489  | 
|  CVE-2018-7489  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-7489)-2018-7489  | 
|  CVE-2018-7489  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-7489)-2018-7489  | 
|  CVE-2019-10202  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-10202)-2019-10202  | 
|  CVE-2019-14379  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-14379)-2019-14379  | 
|  CVE-2019-14379  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-14379)-2019-14379  | 
|  CVE-2019-14379  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-14379)-2019-14379  | 
|  CVE-2019-14379  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-14379)-2019-14379  | 
|  CVE-2019-14540  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-14540)-2019-14540  | 
|  CVE-2019-14540  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-14540)-2019-14540  | 
|  CVE-2019-14540  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-14540)-2019-14540  | 
|  CVE-2019-14540  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-14540)-2019-14540  | 
|  CVE-2019-14892  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-14892)-2019-14892  | 
|  CVE-2019-14892  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-14892)-2019-14892  | 
|  CVE-2019-14892  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-14892)-2019-14892  | 
|  CVE-2019-14892  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-14892)-2019-14892  | 
|  CVE-2019-14893  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-14893)-2019-14893  | 
|  CVE-2019-14893  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-14893)-2019-14893  | 
|  CVE-2019-14893  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-14893)-2019-14893  | 
|  CVE-2019-16335  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-16335)-2019-16335  | 
|  CVE-2019-16335  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-16335)-2019-16335  | 
|  CVE-2019-16335  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-16335)-2019-16335  | 
|  CVE-2019-16335  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-16335)-2019-16335  | 
|  CVE-2019-16942  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-16942)-2019-16942  | 
|  CVE-2019-16942  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-16942)-2019-16942  | 
|  CVE-2019-16942  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-16942)-2019-16942  | 
|  CVE-2019-16942  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-16942)-2019-16942  | 
|  CVE-2019-16943  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-16943)-2019-16943  | 
|  CVE-2019-16943  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-16943)-2019-16943  | 
|  CVE-2019-16943  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-16943)-2019-16943  | 
|  CVE-2019-16943  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-16943)-2019-16943  | 
|  CVE-2019-17195  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-17195)-2019-17195  | 
|  CVE-2019-17195  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-17195)-2019-17195  | 
|  CVE-2019-17267  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-17267)-2019-17267  | 
|  CVE-2019-17267  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-17267)-2019-17267  | 
|  CVE-2019-17267  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-17267)-2019-17267  | 
|  CVE-2019-17267  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-17267)-2019-17267  | 
|  CVE-2019-17531  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-17531)-2019-17531  | 
|  CVE-2019-17531  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-17531)-2019-17531  | 
|  CVE-2019-17531  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-17531)-2019-17531  | 
|  CVE-2019-17531  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-17531)-2019-17531  | 
|  CVE-2019-20330  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-20330)-2019-20330  | 
|  CVE-2019-20330  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-20330)-2019-20330  | 
|  CVE-2019-20330  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-20330)-2019-20330  | 
|  CVE-2019-20330  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-20330)-2019-20330  | 
|  CVE-2019-20444  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-20444)-2019-20444  | 
|  CVE-2019-20444  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-20444)-2019-20444  | 
|  CVE-2019-20445  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-20445)-2019-20445  | 
|  CVE-2019-20445  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-20445)-2019-20445  | 
|  CVE-2020-7692  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-7692)-2020-7692  | 
|  CVE-2020-7692  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-7692)-2020-7692  | 
|  CVE-2020-8840  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-8840)-2020-8840  | 
|  CVE-2020-8840  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-8840)-2020-8840  | 
|  CVE-2020-8840  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-8840)-2020-8840  | 
|  CVE-2020-8840  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-8840)-2020-8840  | 
|  CVE-2020-9480  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-9480)-2020-9480  | 
|  CVE-2020-9546  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-9546)-2020-9546  | 
|  CVE-2020-9546  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-9546)-2020-9546  | 
|  CVE-2020-9546  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-9546)-2020-9546  | 
|  CVE-2020-9546  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-9546)-2020-9546  | 
|  CVE-2020-9547  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-9547)-2020-9547  | 
|  CVE-2020-9547  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-9547)-2020-9547  | 
|  CVE-2020-9547  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-9547)-2020-9547  | 
|  CVE-2020-9547  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-9547)-2020-9547  | 
|  CVE-2020-9548  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-9548)-2020-9548  | 
|  CVE-2020-9548  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-9548)-2020-9548  | 
|  CVE-2020-9548  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-9548)-2020-9548  | 
|  CVE-2020-9548  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-9548)-2020-9548  | 
|  CVE-2021-26291  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2021-26291)-2021-26291  | 
|  CVE-2021-26291  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2021-26291)-2021-26291  | 
|  CVE-2021-32797  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2021-32797)-2021-32797  | 
|  CVE-2021-32798  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2021-32798)-2021-32798  | 
|  CVE-2021-35958  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2021-35958)-2021-35958  | 
|  CVE-2021-37404  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2021-37404)-2021-37404  | 
|  CVE-2022-1471  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-1471)-2022-1471  | 
|  CVE-2022-1471  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-1471)-2022-1471  | 
|  CVE-2022-1471  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-1471)-2022-1471  | 
|  CVE-2022-1471  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-1471)-2022-1471  | 
|  CVE-2022-25168  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-25168)-2022-25168  | 
|  CVE-2022-26612  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-26612)-2022-26612  | 
|  CVE-2022-32532  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-32532)-2022-32532  | 
|  CVE-2022-33980  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-33980)-2022-33980  | 
|  CVE-2022-37865  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-37865)-2022-37865  | 
|  CVE-2022-39135  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-39135)-2022-39135  | 
|  CVE-2022-40664  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-40664)-2022-40664  | 
|  CVE-2022-42889  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-42889)-2022-42889  | 
|  CVE-2022-46337  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-46337)-2022-46337  | 
|  CVE-2022-46337  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-46337)-2022-46337  | 
|  CVE-2022-46337  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-46337)-2022-46337  | 
|  CVE-2023-38647  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-38647)-2023-38647  | 
|  CVE-2023-38647  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-38647)-2023-38647  | 
|  CVE-2023-44981  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-44981)-2023-44981  | 
|  CVE-2023-44981  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-44981)-2023-44981  | 
|  CVE-2023-44981  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-44981)-2023-44981  | 
|  CVE-2023-44981  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-44981)-2023-44981  | 
|  CVE-2023-44981  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-44981)-2023-44981  | 
|  CVE-2023-44981  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-44981)-2023-44981  | 
|  CVE-2024-1597  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-1597)-2024-1597  | 
|  CVE-2024-1597  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-1597)-2024-1597  | 
|  CVE-2024-1597  |  KRITIS  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-1597)-2024-1597  | 
|  CVE-2012-0881  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2012-0881)-2012-0881  | 
|  CVE-2012-0881  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2012-0881)-2012-0881  | 
|  CVE-2013-4002  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2013-4002)-2013-4002  | 
|  CVE-2013-4002  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2013-4002)-2013-4002  | 
|  CVE-2014-0114  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2014-0114)-2014-0114  | 
|  CVE-2014-0114  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2014-0114)-2014-0114  | 
|  CVE-2015-2080  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2015-2080)-2015-2080  | 
|  CVE-2015-2156  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2015-2156)-2015-2156  | 
|  CVE-2015-2156  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2015-2156)-2015-2156  | 
|  CVE-2015-5237  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2015-5237)-2015-5237  | 
|  CVE-2015-5237  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2015-5237)-2015-5237  | 
|  CVE-2015-6420  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2015-6420)-2015-6420  | 
|  CVE-2016-1000338  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2016-1000338)-2016-1000338  | 
|  CVE-2016-1000340  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2016-1000340)-2016-1000340  | 
|  CVE-2016-1000342  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2016-1000342)-2016-1000342  | 
|  CVE-2016-1000343  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2016-1000343)-2016-1000343  | 
|  CVE-2016-1000344  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2016-1000344)-2016-1000344  | 
|  CVE-2016-1000352  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2016-1000352)-2016-1000352  | 
|  CVE-2016-6796  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2016-6796)-2016-6796  | 
|  CVE-2017-1000034  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2017-1000034)-2017-1000034  | 
|  CVE-2017-12612  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2017-12612)-2017-12612  | 
|  CVE-2017-15288  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2017-15288)-2017-15288  | 
|  CVE-2017-18640  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2017-18640)-2017-18640  | 
|  CVE-2017-18640  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2017-18640)-2017-18640  | 
|  CVE-2017-5637  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2017-5637)-2017-5637  | 
|  CVE-2017-7656  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2017-7656)-2017-7656  | 
|  CVE-2017-7687  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2017-7687)-2017-7687  | 
|  CVE-2017-9735  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2017-9735)-2017-9735  | 
|  CVE-2017-9790  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2017-9790)-2017-9790  | 
|  CVE-2018-10054  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-10054)-2018-10054  | 
|  CVE-2018-10936  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-10936)-2018-10936  | 
|  CVE-2018-11793  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-11793)-2018-11793  | 
|  CVE-2018-11804  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-11804)-2018-11804  | 
|  CVE-2018-12022  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-12022)-2018-12022  | 
|  CVE-2018-12022  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-12022)-2018-12022  | 
|  CVE-2018-12022  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-12022)-2018-12022  | 
|  CVE-2018-12023  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-12023)-2018-12023  | 
|  CVE-2018-12023  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-12023)-2018-12023  | 
|  CVE-2018-12023  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-12023)-2018-12023  | 
|  CVE-2018-3258  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-3258)-2018-3258  | 
|  CVE-2018-3827  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE-2018-3827](https://nvd.nist.gov/vuln/detail/CVE-2018-3827)  | 
|  CVE-2018-3831  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-3831)-2018-3831  | 
|  CVE-2018-5968  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-5968)-2018-5968  | 
|  CVE-2018-5968  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-5968)-2018-5968  | 
|  CVE-2018-8012  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-8012)-2018-8012  | 
|  CVE-2018-8768  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2018-8768)-2018-8768  | 
|  CVE-2019-0204  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-0204)-2019-0204  | 
|  CVE-2019-0205  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-0205)-2019-0205  | 
|  CVE-2019-0205  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-0205)-2019-0205  | 
|  CVE-2019-0205  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-0205)-2019-0205  | 
|  CVE-2019-0205  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-0205)-2019-0205  | 
|  CVE-2019-10086  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-10086)-2019-10086  | 
|  CVE-2019-10086  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-10086)-2019-10086  | 
|  CVE-2019-10086  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-10086)-2019-10086  | 
|  CVE-2019-10086  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-10086)-2019-10086  | 
|  CVE-2019-10099  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-10099)-2019-10099  | 
|  CVE-2019-10172  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-10172)-2019-10172  | 
|  CVE-2019-12086  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-12086)-2019-12086  | 
|  CVE-2019-12086  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-12086)-2019-12086  | 
|  CVE-2019-12086  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-12086)-2019-12086  | 
|  CVE-2019-12086  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-12086)-2019-12086  | 
|  CVE-2019-14439  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-14439)-2019-14439  | 
|  CVE-2019-14439  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-14439)-2019-14439  | 
|  CVE-2019-14439  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-14439)-2019-14439  | 
|  CVE-2019-14439  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-14439)-2019-14439  | 
|  CVE-2019-16869  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-16869)-2019-16869  | 
|  CVE-2019-16869  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-16869)-2019-16869  | 
|  CVE-2019-17566  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-17566)-2019-17566  | 
|  CVE-2019-17566  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-17566)-2019-17566  | 
|  CVE-2019-7611  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2019-7611)-2019-7611  | 
|  CVE-2020-10650  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-10650)-2020-10650  | 
|  CVE-2020-10650  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-10650)-2020-10650  | 
|  CVE-2020-10650  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-10650)-2020-10650  | 
|  CVE-2020-10650  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-10650)-2020-10650  | 
|  CVE-2020-10672  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-10672)-2020-10672  | 
|  CVE-2020-10672  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-10672)-2020-10672  | 
|  CVE-2020-10672  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-10672)-2020-10672  | 
|  CVE-2020-10672  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-10672)-2020-10672  | 
|  CVE-2020-10673  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-10673)-2020-10673  | 
|  CVE-2020-10673  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-10673)-2020-10673  | 
|  CVE-2020-10673  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-10673)-2020-10673  | 
|  CVE-2020-10673  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-10673)-2020-10673  | 
|  CVE-2020-10968  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-10968)-2020-10968  | 
|  CVE-2020-10968  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-10968)-2020-10968  | 
|  CVE-2020-10968  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-10968)-2020-10968  | 
|  CVE-2020-10968  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-10968)-2020-10968  | 
|  CVE-2020-10969  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-10969)-2020-10969  | 
|  CVE-2020-10969  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-10969)-2020-10969  | 
|  CVE-2020-10969  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-10969)-2020-10969  | 
|  CVE-2020-10969  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-10969)-2020-10969  | 
|  CVE-2020-11111  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-11111)-2020-11111  | 
|  CVE-2020-11111  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-11111)-2020-11111  | 
|  CVE-2020-11111  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-11111)-2020-11111  | 
|  CVE-2020-11111  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-11111)-2020-11111  | 
|  CVE-2020-11112  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-11112)-2020-11112  | 
|  CVE-2020-11112  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-11112)-2020-11112  | 
|  CVE-2020-11112  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-11112)-2020-11112  | 
|  CVE-2020-11113  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-11113)-2020-11113  | 
|  CVE-2020-11113  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-11113)-2020-11113  | 
|  CVE-2020-11113  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-11113)-2020-11113  | 
|  CVE-2020-11619  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-11619](https://nvd.nist.gov/vuln/detail/CVE-2020-11619)  | 
|  CVE-2020-11619  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-11619](https://nvd.nist.gov/vuln/detail/CVE-2020-11619)  | 
|  CVE-2020-11619  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE-2020-11619](https://nvd.nist.gov/vuln/detail/CVE-2020-11619)  | 
|  CVE-2020-11620  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-11620)-2020-11620  | 
|  CVE-2020-11620  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-11620)-2020-11620  | 
|  CVE-2020-11620  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-11620)-2020-11620  | 
|  CVE-2020-11620  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-11620)-2020-11620  | 
|  CVE-2020-11988  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-11988)-2020-11988  | 
|  CVE-2020-13692  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-13692)-2020-13692  | 
|  CVE-2020-13936  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-13936)-2020-13936  | 
|  CVE-2020-13949  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-13949)-2020-13949  | 
|  CVE-2020-13949  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-13949)-2020-13949  | 
|  CVE-2020-13949  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-13949)-2020-13949  | 
|  CVE-2020-13949  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-13949)-2020-13949  | 
|  CVE-2020-13949  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-13949)-2020-13949  | 
|  CVE-2020-14060  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-14060)-2020-14060  | 
|  CVE-2020-14060  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-14060)-2020-14060  | 
|  CVE-2020-14060  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-14060)-2020-14060  | 
|  CVE-2020-14060  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-14060)-2020-14060  | 
|  CVE-2020-14061  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-14061)-2020-14061  | 
|  CVE-2020-14061  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-14061)-2020-14061  | 
|  CVE-2020-14061  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-14061)-2020-14061  | 
|  CVE-2020-14061  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-14061)-2020-14061  | 
|  CVE-2020-14062  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-14062)-2020-14062  | 
|  CVE-2020-14062  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-14062)-2020-14062  | 
|  CVE-2020-14062  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-14062)-2020-14062  | 
|  CVE-2020-14062  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-14062)-2020-14062  | 
|  CVE-2020-14195  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-14195)-2020-14195  | 
|  CVE-2020-14195  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-14195)-2020-14195  | 
|  CVE-2020-14195  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-14195)-2020-14195  | 
|  CVE-2020-14195  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-14195)-2020-14195  | 
|  CVE-2020-17533  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-17533)-2020-17533  | 
|  CVE-2020-24616  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-24616)-2020-24616  | 
|  CVE-2020-24616  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-24616)-2020-24616  | 
|  CVE-2020-24616  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-24616)-2020-24616  | 
|  CVE-2020-24616  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-24616)-2020-24616  | 
|  CVE-2020-24750  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-24750)-2020-24750  | 
|  CVE-2020-24750  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-24750)-2020-24750  | 
|  CVE-2020-24750  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-24750)-2020-24750  | 
|  CVE-2020-24750  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-24750)-2020-24750  | 
|  CVE-2020-25649  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-25649)-2020-25649  | 
|  CVE-2020-25649  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-25649)-2020-25649  | 
|  CVE-2020-25649  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-25649)-2020-25649  | 
|  CVE-2020-25649  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-25649)-2020-25649  | 
|  CVE-2020-28491  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-28491)-2020-28491  | 
|  CVE-2020-35211  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-35211)-2020-35211  | 
|  CVE-2020-35490  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-35490)-2020-35490  | 
|  CVE-2020-35490  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-35490)-2020-35490  | 
|  CVE-2020-35490  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-35490)-2020-35490  | 
|  CVE-2020-35490  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-35490)-2020-35490  | 
|  CVE-2020-35490  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-35490)-2020-35490  | 
|  CVE-2020-35491  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-35491)-2020-35491  | 
|  CVE-2020-35491  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-35491)-2020-35491  | 
|  CVE-2020-35491  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-35491)-2020-35491  | 
|  CVE-2020-35491  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-35491)-2020-35491  | 
|  CVE-2020-35491  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-35491)-2020-35491  | 
|  CVE-2020-35728  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-35728)-2020-35728  | 
|  CVE-2020-35728  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-35728)-2020-35728  | 
|  CVE-2020-35728  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-35728)-2020-35728  | 
|  CVE-2020-35728  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-35728)-2020-35728  | 
|  CVE-2020-35728  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-35728)-2020-35728  | 
|  CVE-2020-36179  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36179)-2020-36179  | 
|  CVE-2020-36179  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36179)-2020-36179  | 
|  CVE-2020-36179  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36179)-2020-36179  | 
|  CVE-2020-36179  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36179)-2020-36179  | 
|  CVE-2020-36179  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36179)-2020-36179  | 
|  CVE-2020-36180  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36180)-2020-36180  | 
|  CVE-2020-36180  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36180)-2020-36180  | 
|  CVE-2020-36180  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36180)-2020-36180  | 
|  CVE-2020-36180  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36180)-2020-36180  | 
|  CVE-2020-36180  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36180)-2020-36180  | 
|  CVE-2020-36181  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36181)-2020-36181  | 
|  CVE-2020-36181  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36181)-2020-36181  | 
|  CVE-2020-36181  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36181)-2020-36181  | 
|  CVE-2020-36181  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36181)-2020-36181  | 
|  CVE-2020-36181  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36181)-2020-36181  | 
|  CVE-2020-36182  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36182)-2020-36182  | 
|  CVE-2020-36182  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36182)-2020-36182  | 
|  CVE-2020-36182  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36182)-2020-36182  | 
|  CVE-2020-36182  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36182)-2020-36182  | 
|  CVE-2020-36182  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36182)-2020-36182  | 
|  CVE-2020-36183  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36183)-2020-36183  | 
|  CVE-2020-36183  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36183)-2020-36183  | 
|  CVE-2020-36183  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36183)-2020-36183  | 
|  CVE-2020-36183  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36183)-2020-36183  | 
|  CVE-2020-36183  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36183)-2020-36183  | 
|  CVE-2020-36184  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36184)-2020-36184  | 
|  CVE-2020-36184  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36184)-2020-36184  | 
|  CVE-2020-36184  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36184)-2020-36184  | 
|  CVE-2020-36184  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36184)-2020-36184  | 
|  CVE-2020-36184  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36184)-2020-36184  | 
|  CVE-2020-36185  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36185)-2020-36185  | 
|  CVE-2020-36185  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36185)-2020-36185  | 
|  CVE-2020-36185  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36185)-2020-36185  | 
|  CVE-2020-36185  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36185)-2020-36185  | 
|  CVE-2020-36185  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36185)-2020-36185  | 
|  CVE-2020-36186  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36186)-2020-36186  | 
|  CVE-2020-36186  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36186)-2020-36186  | 
|  CVE-2020-36186  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36186)-2020-36186  | 
|  CVE-2020-36186  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36186)-2020-36186  | 
|  CVE-2020-36186  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36186)-2020-36186  | 
|  CVE-2020-36187  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36187)-2020-36187  | 
|  CVE-2020-36187  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36187)-2020-36187  | 
|  CVE-2020-36187  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36187)-2020-36187  | 
|  CVE-2020-36187  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36187)-2020-36187  | 
|  CVE-2020-36187  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36187)-2020-36187  | 
|  CVE-2020-36188  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36188)-2020-36188  | 
|  CVE-2020-36188  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36188)-2020-36188  | 
|  CVE-2020-36188  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36188)-2020-36188  | 
|  CVE-2020-36188  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36188)-2020-36188  | 
|  CVE-2020-36188  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36188)-2020-36188  | 
|  CVE-2020-36189  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36189)-2020-36189  | 
|  CVE-2020-36189  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36189)-2020-36189  | 
|  CVE-2020-36189  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36189)-2020-36189  | 
|  CVE-2020-36189  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36189)-2020-36189  | 
|  CVE-2020-36189  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36189)-2020-36189  | 
|  CVE-2020-36518  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36518)-2020-36518  | 
|  CVE-2020-36518  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36518)-2020-36518  | 
|  CVE-2020-36518  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36518)-2020-36518  | 
|  CVE-2020-36518  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36518)-2020-36518  | 
|  CVE-2020-36518  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36518)-2020-36518  | 
|  CVE-2020-36518  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-36518)-2020-36518  | 
|  CVE-2020-9492  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2020-9492)-2020-9492  | 
|  CVE-2021-20190  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2021-20190)-2021-20190  | 
|  CVE-2021-20190  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2021-20190)-2021-20190  | 
|  CVE-2021-20190  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2021-20190)-2021-20190  | 
|  CVE-2021-20190  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2021-20190)-2021-20190  | 
|  CVE-2021-20190  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2021-20190)-2021-20190  | 
|  CVE-2021-22573  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2021-22573)-2021-22573  | 
|  CVE-2021-22573  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2021-22573)-2021-22573  | 
|  CVE-2021-22573  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2021-22573)-2021-22573  | 
|  CVE-2021-25646  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2021-25646)-2021-25646  | 
|  CVE-2021-26919  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE-2021-26919](https://nvd.nist.gov/vuln/detail/CVE-2021-26919)  | 
|  CVE-2021-28165  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2021-28165)-2021-28165  | 
|  CVE-2021-31684  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2021-31684)-2021-31684  | 
|  CVE-2021-31684  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2021-31684)-2021-31684  | 
|  CVE-2021-31684  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2021-31684)-2021-31684  | 
|  CVE-2021-33036  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2021-33036)-2021-33036  | 
|  CVE-2021-33813  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2021-33813)-2021-33813  | 
|  CVE-2021-33813  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2021-33813)-2021-33813  | 
|  CVE-2021-34538  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2021-34538)-2021-34538  | 
|  CVE-2021-34538  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2021-34538)-2021-34538  | 
|  CVE-2021-34538  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2021-34538)-2021-34538  | 
|  CVE-2021-35515  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2021-35515)-2021-35515  | 
|  CVE-2021-35515  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2021-35515)-2021-35515  | 
|  CVE-2021-35515  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2021-35515)-2021-35515  | 
|  CVE-2021-35515  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2021-35515)-2021-35515  | 
|  CVE-2021-35515  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2021-35515)-2021-35515  | 
|  CVE-2021-35515  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2021-35515)-2021-35515  | 
|  CVE-2021-35515  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2021-35515)-2021-35515  | 
|  CVE-2021-35516  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2021-35516)-2021-35516  | 
|  CVE-2021-35516  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2021-35516)-2021-35516  | 
|  CVE-2021-35516  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2021-35516)-2021-35516  | 
|  CVE-2021-35516  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2021-35516)-2021-35516  | 
|  CVE-2021-35516  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2021-35516)-2021-35516  | 
|  CVE-2021-35516  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2021-35516)-2021-35516  | 
|  CVE-2021-35516  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2021-35516)-2021-35516  | 
|  CVE-2021-35517  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2021-35517)-2021-35517  | 
|  CVE-2021-35517  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2021-35517)-2021-35517  | 
|  CVE-2021-35517  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2021-35517)-2021-35517  | 
|  CVE-2021-35517  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2021-35517)-2021-35517  | 
|  CVE-2021-35517  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2021-35517)-2021-35517  | 
|  CVE-2021-36090  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2021-36090)-2021-36090  | 
|  CVE-2021-36090  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2021-36090)-2021-36090  | 
|  CVE-2021-36090  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2021-36090)-2021-36090  | 
|  CVE-2021-36090  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2021-36090)-2021-36090  | 
|  CVE-2021-36090  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2021-36090)-2021-36090  | 
|  CVE-2021-37136  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2021-37136)-2021-37136  | 
|  CVE-2021-37136  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2021-37136)-2021-37136  | 
|  CVE-2021-37137  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2021-37137)-2021-37137  | 
|  CVE-2021-37137  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2021-37137)-2021-37137  | 
|  CVE-2021-37714  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2021-37714)-2021-37714  | 
|  CVE-2021-37714  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2021-37714)-2021-37714  | 
|  CVE-2021-37714  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2021-37714)-2021-37714  | 
|  CVE-2021-37714  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2021-37714)-2021-37714  | 
|  CVE-2021-46877  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2021-46877)-2021-46877  | 
|  CVE-2022-24758  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-24758)-2022-24758  | 
|  CVE-2022-25647  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-25647)-2022-25647  | 
|  CVE-2022-25647  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-25647)-2022-25647  | 
|  CVE-2022-25647  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-25647)-2022-25647  | 
|  CVE-2022-25647  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-25647)-2022-25647  | 
|  CVE-2022-25647  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-25647)-2022-25647  | 
|  CVE-2022-25647  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-25647)-2022-25647  | 
|  CVE-2022-25647  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-25647)-2022-25647  | 
|  CVE-2022-25647  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-25647)-2022-25647  | 
|  CVE-2022-25857  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-25857)-2022-25857  | 
|  CVE-2022-25857  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-25857)-2022-25857  | 
|  CVE-2022-25857  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-25857)-2022-25857  | 
|  CVE-2022-25857  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-25857)-2022-25857  | 
|  CVE-2022-31197  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-31197)-2022-31197  | 
|  CVE-2022-3171  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-3171)-2022-3171  | 
|  CVE-2022-3171  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-3171)-2022-3171  | 
|  CVE-2022-3171  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-3171)-2022-3171  | 
|  CVE-2022-3171  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-3171)-2022-3171  | 
|  CVE-2022-3171  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-3171)-2022-3171  | 
|  CVE-2022-3171  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-3171)-2022-3171  | 
|  CVE-2022-3171  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-3171)-2022-3171  | 
|  CVE-2022-3171  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-3171)-2022-3171  | 
|  CVE-2022-3171  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-3171)-2022-3171  | 
|  CVE-2022-34169  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-34169)-2022-34169  | 
|  CVE-2022-3509  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-3509)-2022-3509  | 
|  CVE-2022-3509  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-3509)-2022-3509  | 
|  CVE-2022-3509  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-3509)-2022-3509  | 
|  CVE-2022-3509  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-3509)-2022-3509  | 
|  CVE-2022-3509  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-3509)-2022-3509  | 
|  CVE-2022-3509  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-3509)-2022-3509  | 
|  CVE-2022-3509  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-3509)-2022-3509  | 
|  CVE-2022-3509  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-3509)-2022-3509  | 
|  CVE-2022-3509  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-3509)-2022-3509  | 
|  CVE-2022-3510  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-3510)-2022-3510  | 
|  CVE-2022-3510  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-3510)-2022-3510  | 
|  CVE-2022-3510  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-3510)-2022-3510  | 
|  CVE-2022-3510  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-3510)-2022-3510  | 
|  CVE-2022-3510  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-3510)-2022-3510  | 
|  CVE-2022-3510  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-3510)-2022-3510  | 
|  CVE-2022-3510  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-3510)-2022-3510  | 
|  CVE-2022-3510  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-3510)-2022-3510  | 
|  CVE-2022-3510  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-3510)-2022-3510  | 
|  CVE-2022-36364  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-36364)-2022-36364  | 
|  CVE-2022-37866  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-37866)-2022-37866  | 
|  CVE-2022-37866  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-37866)-2022-37866  | 
|  CVE-2022-40146  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-40146)-2022-40146  | 
|  CVE-2022-40149  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-40149)-2022-40149  | 
|  CVE-2022-40149  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-40149)-2022-40149  | 
|  CVE-2022-40149  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-40149)-2022-40149  | 
|  CVE-2022-40149  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-40149)-2022-40149  | 
|  CVE-2022-40149  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-40149)-2022-40149  | 
|  CVE-2022-40150  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-40150)-2022-40150  | 
|  CVE-2022-40150  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-40150)-2022-40150  | 
|  CVE-2022-40150  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-40150)-2022-40150  | 
|  CVE-2022-40150  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-40150)-2022-40150  | 
|  CVE-2022-40150  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-40150)-2022-40150  | 
|  CVE-2022-40152  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-40152)-2022-40152  | 
|  CVE-2022-40152  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-40152)-2022-40152  | 
|  CVE-2022-41704  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-41704)-2022-41704  | 
|  CVE-2022-42003  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-42003)-2022-42003  | 
|  CVE-2022-42003  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-42003)-2022-42003  | 
|  CVE-2022-42003  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-42003)-2022-42003  | 
|  CVE-2022-42003  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-42003)-2022-42003  | 
|  CVE-2022-42003  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-42003)-2022-42003  | 
|  CVE-2022-42003  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-42003)-2022-42003  | 
|  CVE-2022-42003  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-42003)-2022-42003  | 
|  CVE-2022-42003  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-42003)-2022-42003  | 
|  CVE-2022-42003  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-42003)-2022-42003  | 
|  CVE-2022-42003  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-42003)-2022-42003  | 
|  CVE-2022-42003  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-42003)-2022-42003  | 
|  CVE-2022-42003  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-42003)-2022-42003  | 
|  CVE-2022-42004  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-42004)-2022-42004  | 
|  CVE-2022-42004  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-42004)-2022-42004  | 
|  CVE-2022-42004  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-42004)-2022-42004  | 
|  CVE-2022-42004  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-42004)-2022-42004  | 
|  CVE-2022-42004  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-42004)-2022-42004  | 
|  CVE-2022-42004  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-42004)-2022-42004  | 
|  CVE-2022-42004  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-42004)-2022-42004  | 
|  CVE-2022-42004  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-42004)-2022-42004  | 
|  CVE-2022-42004  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-42004)-2022-42004  | 
|  CVE-2022-42004  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-42004)-2022-42004  | 
|  CVE-2022-4244  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-4244)-2022-4244  | 
|  CVE-2022-42890  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-42890)-2022-42890  | 
|  CVE-2022-44729  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE-2022-44729](https://nvd.nist.gov/vuln/detail/CVE-2022-44729)  | 
|  CVE-2022-44729  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE-2022-44729](https://nvd.nist.gov/vuln/detail/CVE-2022-44729)  | 
|  CVE-2022-44729  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE-2022-44729](https://nvd.nist.gov/vuln/detail/CVE-2022-44729)  | 
|  CVE-2022-45685  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-45685)-2022-45685  | 
|  CVE-2022-45685  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-45685)-2022-45685  | 
|  CVE-2022-45685  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-45685)-2022-45685  | 
|  CVE-2022-45685  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-45685)-2022-45685  | 
|  CVE-2022-45685  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-45685)-2022-45685  | 
|  CVE-2022-45688  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-45688)-2022-45688  | 
|  CVE-2022-45688  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-45688)-2022-45688  | 
|  CVE-2022-45688  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-45688)-2022-45688  | 
|  CVE-2022-45693  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-45693)-2022-45693  | 
|  CVE-2022-45693  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-45693)-2022-45693  | 
|  CVE-2022-45693  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-45693)-2022-45693  | 
|  CVE-2022-45693  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-45693)-2022-45693  | 
|  CVE-2022-45693  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-45693)-2022-45693  | 
|  CVE-2022-46751  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-46751)-2022-46751  | 
|  CVE-2022-46751  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-46751)-2022-46751  | 
|  CVE-2022-46751  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-46751)-2022-46751  | 
|  CVE-2023-1370  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-1370)-2023-1370  | 
|  CVE-2023-1370  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-1370)-2023-1370  | 
|  CVE-2023-1370  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-1370)-2023-1370  | 
|  CVE-2023-1370  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-1370)-2023-1370  | 
|  CVE-2023-1370  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-1370)-2023-1370  | 
|  CVE-2023-1428  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-1428)-2023-1428  | 
|  CVE-2023-1436  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-1436)-2023-1436  | 
|  CVE-2023-1436  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-1436)-2023-1436  | 
|  CVE-2023-1436  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-1436)-2023-1436  | 
|  CVE-2023-1436  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-1436)-2023-1436  | 
|  CVE-2023-1436  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-1436)-2023-1436  | 
|  CVE-2023-20883  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-20883)-2023-20883  | 
|  CVE-2023-24580  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-24580)-2023-24580  | 
|  CVE-2023-25194  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-25194)-2023-25194  | 
|  CVE-2023-25194  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-25194)-2023-25194  | 
|  CVE-2023-25194  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-25194)-2023-25194  | 
|  CVE-2023-2976  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-2976)-2023-2976  | 
|  CVE-2023-2976  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-2976)-2023-2976  | 
|  CVE-2023-2976  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-2976)-2023-2976  | 
|  CVE-2023-2976  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-2976)-2023-2976  | 
|  CVE-2023-2976  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-2976)-2023-2976  | 
|  CVE-2023-2976  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-2976)-2023-2976  | 
|  CVE-2023-2976  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-2976)-2023-2976  | 
|  CVE-2023-2976  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-2976)-2023-2976  | 
|  CVE-2023-2976  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-2976)-2023-2976  | 
|  CVE-2023-2976  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-2976)-2023-2976  | 
|  CVE-2023-2976  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-2976)-2023-2976  | 
|  CVE-2023-2976  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-2976)-2023-2976  | 
|  CVE-2023-2976  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-2976)-2023-2976  | 
|  CVE-2023-2976  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-2976)-2023-2976  | 
|  CVE-2023-2976  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-2976)-2023-2976  | 
|  CVE-2023-2976  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-2976)-2023-2976  | 
|  CVE-2023-2976  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-2976)-2023-2976  | 
|  CVE-2023-2976  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-2976)-2023-2976  | 
|  CVE-2023-2976  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-2976)-2023-2976  | 
|  CVE-2023-2976  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-2976)-2023-2976  | 
|  CVE-2023-2976  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-2976)-2023-2976  | 
|  CVE-2023-2976  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-2976)-2023-2976  | 
|  CVE-2023-31418  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-31418)-2023-31418  | 
|  CVE-2023-32731  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-32731)-2023-32731  | 
|  CVE-2023-34453  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-34453)-2023-34453  | 
|  CVE-2023-34453  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-34453)-2023-34453  | 
|  CVE-2023-34453  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-34453)-2023-34453  | 
|  CVE-2023-34453  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-34453)-2023-34453  | 
|  CVE-2023-34453  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-34453)-2023-34453  | 
|  CVE-2023-34454  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-34454)-2023-34454  | 
|  CVE-2023-34454  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-34454)-2023-34454  | 
|  CVE-2023-34454  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-34454)-2023-34454  | 
|  CVE-2023-34454  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-34454)-2023-34454  | 
|  CVE-2023-34454  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-34454)-2023-34454  | 
|  CVE-2023-34455  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-34455)-2023-34455  | 
|  CVE-2023-34455  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-34455)-2023-34455  | 
|  CVE-2023-34455  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-34455)-2023-34455  | 
|  CVE-2023-34455  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-34455)-2023-34455  | 
|  CVE-2023-34455  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-34455)-2023-34455  | 
|  CVE-2023-34610  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-34610)-2023-34610  | 
|  CVE-2023-36053  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-36053)-2023-36053  | 
|  CVE-2023-3635  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-3635)-2023-3635  | 
|  CVE-2023-3635  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-3635)-2023-3635  | 
|  CVE-2023-3635  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-3635)-2023-3635  | 
|  CVE-2023-3635  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-3635)-2023-3635  | 
|  CVE-2023-3635  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-3635)-2023-3635  | 
|  CVE-2023-36478  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-36478)-2023-36478  | 
|  CVE-2023-36478  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-36478)-2023-36478  | 
|  CVE-2023-39410  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-39410)-2023-39410  | 
|  CVE-2023-39410  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-39410)-2023-39410  | 
|  CVE-2023-39410  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-39410)-2023-39410  | 
|  CVE-2023-39410  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-39410)-2023-39410  | 
|  CVE-2023-39410  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-39410)-2023-39410  | 
|  CVE-2023-39410  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-39410)-2023-39410  | 
|  CVE-2023-39410  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-39410)-2023-39410  | 
|  CVE-2023-41164  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-41164)-2023-41164  | 
|  CVE-2023-43642  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-43642)-2023-43642  | 
|  CVE-2023-43642  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-43642)-2023-43642  | 
|  CVE-2023-43642  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-43642)-2023-43642  | 
|  CVE-2023-43642  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-43642)-2023-43642  | 
|  CVE-2023-43642  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-43642)-2023-43642  | 
|  CVE-2023-43642  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-43642)-2023-43642  | 
|  CVE-2023-43642  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-43642)-2023-43642  | 
|  CVE-2023-43665  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-43665)-2023-43665  | 
|  CVE-2023-46120  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-46120)-2023-46120  | 
|  CVE-2023-46695  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-46695)-2023-46695  | 
|  CVE-2023-4759  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-4759)-2023-4759  | 
|  CVE-2023-5072  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-5072)-2023-5072  | 
|  CVE-2023-5072  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-5072)-2023-5072  | 
|  CVE-2023-5072  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-5072)-2023-5072  | 
|  CVE-2023-6378  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-6378)-2023-6378  | 
|  CVE-2023-6378  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-6378)-2023-6378  | 
|  CVE-2023-6378  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-6378)-2023-6378  | 
|  CVE-2023-6378  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-6378)-2023-6378  | 
|  CVE-2023-6481  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-6481)-2023-6481  | 
|  CVE-2023-6481  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-6481)-2023-6481  | 
|  CVE-2023-6481  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-6481)-2023-6481  | 
|  CVE-2023-6481  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2023-6481)-2023-6481  | 
|  CVE-2024-21634  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-21634)-2024-21634  | 
|  CVE-2024-24680  |  TINGGI  |  [https://nvd.nist. gov/vuln/detail/CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-24680)-2024-24680  | 

## Catatan rilis 7.2.0
<a name="emr-720-relnotes"></a>

Catatan rilis berikut mencakup informasi untuk Amazon EMR rilis 7.2.0. Perubahan relatif terhadap 7.2.0.

**Fitur baru**
+ **Upgrade aplikasi** —Amazon EMR 7.2.0 application upgrades include Iceberg 1.5.0-amzn-0 and Delta 3.1.0.
+ Amazon EMR menambahkan dukungan sehingga Anda dapat menggunakan aplikasi lain seperti HBase, Flink, dan Hive dengan kelas penyimpanan Amazon S3 Express One Zone.
+ Rilis ini menambahkan kemampuan untuk membaca objek yang dipulihkan, sehingga Anda dapat membaca objek Glacier dari lokasi S3 dengan protokol. `S3A` Kemampuan ini bekerja dengan Spark, Flink, dan Hive.
+ Label node dengan penskalaan terkelola - Gunakan label node dengan instance Anda berdasarkan tipe pasar atau tipe node untuk meningkatkan penskalaan otomatis dari Amazon EMR. Untuk informasi selengkapnya, lihat [Menggunakan penskalaan terkelola di Amazon EMR](https://docs.aws.amazon.com/emr/latest/ManagementGuide/emr-managed-scaling.html).

**Masalah yang diketahui**
+ Python 3.11 tidak didukung dengan EMR Studio.

**Perubahan, penyempurnaan, dan masalah yang diselesaikan**
+ Rilis ini memperbaiki masalah dalam skrip instance-state on-cluster yang memantau kesehatan instance yang menghabiskan CPU dan sumber daya memori yang berlebihan ketika ada sejumlah besar utas and/or yang membuka pegangan file pada node.
+  *Dimulai dengan Spark 3.3.1 (didukung dalam EMR versi 6.10 dan yang lebih baru), semua pelaksana dalam host dekomisioning diatur ke yang baru, yang disebut status DECOMMISSIONING. `ExecutorState`* Pelaksana yang dinonaktifkan tidak dapat digunakan oleh Yarn untuk mengalokasikan tugas dan dengan demikian akan meminta pelaksana baru, jika diperlukan, untuk tugas yang sedang dijalankan. Jadi, jika Anda menonaktifkan Spark DRA saat menggunakan EMR Managed Scaling, EMR Auto Scaling, atau mekanisme penskalaan khusus apa pun pada cluster EMR-EC2, maka Yarn dapat meminta pelaksana maksimum yang diizinkan untuk setiap pekerjaan. Untuk menghindari masalah ini, biarkan `spark.dynamicAllocation.enabled` properti disetel ke `TRUE` (yang merupakan default) saat Anda menggunakan kombinasi fitur di atas. Selain itu, Anda juga dapat mengatur batasan pelaksana minimum dan maksimum dengan menetapkan nilai untuk `spark.dynamicAllocation.maxExecutors` dan `spark.dynamicAllocation.minExecutors` properti untuk pekerjaan Spark Anda, untuk membatasi jumlah pelaksana yang dialokasikan selama eksekusi pekerjaan. 
+ Rilis ini memperbaiki masalah kebuntuan yang dapat terjadi selama operasi pembersihan langkah internal. Operasi ini mengelola siklus hidup langkah-langkah saat mereka menyelesaikan pada cluster EMR. Masalah ini memengaruhi operasi EMR Amazon yang kritis, seperti operasi langkah dan penskalaan.
+ Rilis ini menyelesaikan masalah di mana cluster khusus dengan kustom AMIs yang memiliki file log tertentu yang sudah ada sebelumnya dapat menyebabkan daemon manajemen log EMR Amazon gagal.
+ Amazon EMR 7.2.0 memutakhirkan daemon EMR Amazon yang bertanggung jawab atas pengelolaan klaster dan aktivitas pemantauan dari SDK v1 ke v2. AWS 
+ Saat Anda meluncurkan cluster dengan *rilis patch terbaru* Amazon EMR 5.36 atau lebih tinggi, 6.6 atau lebih tinggi, atau 7.0 atau lebih tinggi, Amazon EMR menggunakan rilis Amazon Linux 2023 atau Amazon Linux 2 terbaru untuk AMI EMR Amazon default. Untuk informasi selengkapnya, lihat [Menggunakan AMI Amazon Linux default untuk Amazon EMR](https://docs.aws.amazon.com/emr/latest/ManagementGuide/emr-default-ami.html).    
[\[See the AWS documentation website for more details\]](http://docs.aws.amazon.com/id_id/emr/latest/ReleaseGuide/emr-720-release.html)

## 7.2.0 versi Java default
<a name="emr-720-jdk"></a>

Amazon EMR merilis 7.2 dan lebih tinggi dikirimkan dengan Amazon Corretto 17 (dibangun di atas OpenJDK) secara default untuk aplikasi yang mendukung Corretto 17 (JDK 17), dengan pengecualian Apache Livy.

Tabel berikut menunjukkan versi Java default untuk aplikasi di Amazon EMR 7.2.0. Jika Anda ingin mengubah JVM default pada cluster Anda, ikuti instruksi [Konfigurasikan aplikasi untuk menggunakan Java Virtual Machine tertentu](configuring-java8.md) untuk setiap aplikasi yang berjalan di cluster. Anda hanya dapat menggunakan satu versi runtime Java untuk sebuah cluster. Amazon EMR tidak mendukung menjalankan node atau aplikasi yang berbeda pada versi runtime yang berbeda pada cluster yang sama.


| Aplikasi | Versi Java/Amazon Corretto (defaultnya tebal) | 
| --- | --- | 
| kuala | 17, 11, 8 | 
| Flink | 17, 11, 8 | 
| HBase | 11, 8 | 
| HCatalog | 17, 11, 8 | 
| Hadoop | 17, 11, 8 | 
| Hive | 17, 11, 8 | 
| Hudi | 17, 11, 8 | 
| Gunung es | 17, 11, 8 | 
| Livy | 17, 11, 8 | 
| Oozie | 17, 11, 8 | 
| Phoenix | 8 | 
| PrestoDB | 8 | 
| Spark | 17, 11, 8 | 
| Spark RAPIDS | 17, 11, 8 | 
| Sqoop | 8 | 
| Tez | 17, 11, 8 | 
| Trino | 21, 17 | 
| Zeppelin | 8 | 
| Pig | 8 | 
| Zookeeper | 8 | 

## 7.2.0 versi komponen
<a name="emr-720-components"></a>

Komponen yang diinstal oleh Amazon EMR dengan rilis ini tercantum di bawah ini. Beberapa komponen diinstal sebagai bagian dari paket aplikasi big data. Sedangkan komponen lainnya bersifak unik untuk Amazon EMR dan diinstal untuk proses sistem dan fitur. Ini biasanya dimulai dengan `emr` atau `aws`. Paket aplikasi big data dalam rilis Amazon EMR terbaru biasanya versi terbaru yang ditemukan di komunitas. Kami menyediakan rilis komunitas di Amazon EMR secepat mungkin.

Beberapa komponen yang ada di Amazon EMR berbeda dari versi komunitas. Komponen ini mempunyai label versi dalam bentuk `CommunityVersion-amzn-EmrVersion`. `EmrVersion` dimulai dari 0. Misalnya, jika komponen komunitas open source bernama `myapp-component` dengan versi 2.2 telah dimodifikasi tiga kali untuk dimasukkan dalam rilis EMR Amazon yang berbeda, versi rilisnya terdaftar sebagai. `2.2-amzn-2`


| Komponen | Versi | Deskripsi | 
| --- | --- | --- | 
| adot-java-agent | 1.31.0 | Agen Java yang mengumpulkan metrik dari daemon aplikasi. | 
| delta | 3.1.0 | Danau Delta adalah format tabel terbuka untuk kumpulan data analitik yang sangat besar | 
| emr-amazon-cloudwatch-agent | 1.300032.2-amzn-0 | Aplikasi yang mengumpulkan metrik tingkat sistem internal dan metrik aplikasi khusus dari instans Amazon EC2. | 
| emr-ddb | 5.4.0 | Konektor Amazon DynamoDB untuk aplikasi ekosistem Hadoop. | 
| emr-goodies | 3.11.0 | Perpustakaan kenyamanan ekstra untuk ekosistem Hadoop. | 
| emr-kinesis | 3.15.0 | Konektor Amazon Kinesis untuk aplikasi ekosistem Hadoop. | 
| emr-notebook-env | 1.16.0 | Conda env untuk emr notebook yang mencakup gateway jupyter korporasi | 
| emr-s3-dist-cp | 2.32.0 | Aplikasi salinan terdistribusi yang dioptimalkan untuk Amazon S3. | 
| emr-s3-select | 2.11.0 | EMR S3Select Connector | 
| emr-wal-cli | 1.2.2 | Cli digunakan untuk daftar emrwal/penghapusan. | 
| emrfs | 2.63.0 | Konektor Amazon S3 untuk aplikasi ekosistem Hadoop. | 
| flink-client | 1.18.1-amzn-1 | Skrip dan aplikasi klien baris perintah Apache Flink. | 
| flink-jobmanager-config | 1.18.1-amzn-1 | Mengelola sumber daya pada node EMR untuk Apache Flink. JobManager | 
| hadoop-client | 3.3.6-amzn-4 | Klien baris perintah Hadoop seperti 'hdfs', 'Hadoop', atau 'yarn'. | 
| hadoop-hdfs-datanode | 3.3.6-amzn-4 | Layanan tingkat simpul HDFS untuk menyimpan blok. | 
| hadoop-hdfs-library | 3.3.6-amzn-4 | Klien dan perpustakaan baris perintah HDFS | 
| hadoop-hdfs-namenode | 3.3.6-amzn-4 | Layanan HDFS untuk melacak nama file dan lokasi blok. | 
| hadoop-hdfs-journalnode | 3.3.6-amzn-4 | Layanan HDFS untuk mengelola jurnal filesystem Hadoop pada klaster HA. | 
| hadoop-httpfs-server | 3.3.6-amzn-4 | Titik akhir HTTP untuk operasi HDFS. | 
| hadoop-kms-server | 3.3.6-amzn-4 | Server manajemen kunci kriptografi berdasarkan API Hadoop. KeyProvider  | 
| hadoop-mapred | 3.3.6-amzn-4 | MapReduce pustaka mesin eksekusi untuk menjalankan MapReduce aplikasi. | 
| hadoop-yarn-nodemanager | 3.3.6-amzn-4 | Layanan YARN untuk mengelola kontainer pada simpul individu. | 
| hadoop-yarn-resourcemanager | 3.3.6-amzn-4 | Layanan YARN untuk mengalokasikan dan mengelola sumber daya klaster dan aplikasi terdistribusi. | 
| hadoop-yarn-timeline-server | 3.3.6-amzn-4 | Layanan untuk mengambil informasi terkini dan historis untuk aplikasi YARN. | 
| hbase-hmaster | 2.4.17-amzn-6 | Layanan untuk HBase cluster yang bertanggung jawab untuk koordinasi Daerah dan pelaksanaan perintah administratif. | 
| hbase-region-server | 2.4.17-amzn-6 | Layanan untuk melayani satu atau lebih HBase wilayah. | 
| hbase-client | 2.4.17-amzn-6 | HBase klien baris perintah. | 
| hbase-rest-server | 2.4.17-amzn-6 | Layanan menyediakan titik akhir RESTful HTTP untuk HBase. | 
| hbase-thrift-server | 2.4.17-amzn-6 | Layanan menyediakan titik akhir Thrift ke. HBase | 
| hbase-operator-tools | 2.4.17-amzn-6 | Alat perbaikan untuk HBase cluster Apache. | 
| hcatalog-client | 3.1.3-amzn-11 | Klien baris perintah 'hcat' untuk memanipulasi hcatalog-server. | 
| hcatalog-server | 3.1.3-amzn-11 | Penyediaan layanan HCatalog, tabel dan lapisan manajemen penyimpanan untuk aplikasi terdistribusi. | 
| hcatalog-webhcat-server | 3.1.3-amzn-11 | Titik akhir HTTP menyediakan antarmuka REST ke HCatalog. | 
| hive-client | 3.1.3-amzn-11 | Klien baris perintah Hive. | 
| hive-hbase | 3.1.3-amzn-11 | Klien Hive-hbase. | 
| hive-metastore-server | 3.1.3-amzn-11 | Layanan untuk mengakses metastore Hive, repositori semantik yang menyimpan metadata untuk SQL pada operasi Hadoop. | 
| hive-server2 | 3.1.3-amzn-11 | Layanan untuk menerima kueri Hive sebagai permintaan web. | 
| hudi | 0.14.1-amzn-1 | Kerangka pemrosesan tambahan untuk memberi daya pada pipa data pada latensi rendah dan efisiensi tinggi. | 
| hudi-presto | 0.14.1-amzn-1 | Perpustakaan paket untuk menjalankan Presto dengan Hudi. | 
| hudi-trino | 0.14.1-amzn-1 | Perpustakaan bundel untuk menjalankan Trino dengan Hudi. | 
| hudi-spark | 0.14.1-amzn-1 | Perpustakaan paket untuk menjalankan Spark dengan Hudi. | 
| hue-server | 4.11.0 | Aplikasi web untuk menganalisis data menggunakan aplikasi ekosistem Hadoop | 
| iceberg | 1.5.0-amzn-0 | Apache Iceberg adalah format tabel terbuka untuk kumpulan data analitik besar | 
| jupyterhub | 1.5.0 | Server multi-pengguna untuk notebook Jupyter | 
| livy-server | 0.8.0-inkubasi | Antarmuka REST untuk berinteraksi dengan Apache Spark | 
| nginx | 1.12.1 | nginx [engine x] adalah server HTTP dan server proksi balik | 
| mxnet | 1.9.1 | Perpustakaan yang fleksibel, dapat diskalakan, dan efisien untuk deep learning. | 
| mariadb-server | 5.5.68\$1 | Server basis data MariaDB. | 
| nvidia-cuda | 11.8.0 | Driver Nvidia dan kit alat Cuda | 
| oozie-client | 5.2.1 | Klien baris perintah Oozie. | 
| oozie-server | 5.2.1 | Layanan untuk menerima permintaan alur kerja Oozie. | 
| opencv | 4.7.0 | Perpustakaan Visi Komputer Sumber Terbuka. | 
| phoenix-library | 5.1.3 | Perpustakaan phoenix untuk server dan klien | 
| phoenix-connectors | 5.1.3 | Konektor Apache Phoenix untuk Spark-3 | 
| phoenix-query-server | 6.0.0 | Sebuah server ringan yang menyediakan akses JDBC serta Protocol Buffers dan akses format JSON ke API Avatica  | 
| presto-coordinator | 0,285-amzn-0 | Layanan untuk menerima kueri dan mengelola eksekusi kueri antara presto-worker. | 
| presto-worker | 0,285-amzn-0 | Layanan untuk mengeksekusi potongan kueri. | 
| presto-client | 0,285-amzn-0 | Klien baris perintah Presto yang diinstal pada master klaster HA yang siaga di mana server Presto server tidak dimulai. | 
| trino-coordinator | 436-amzn-0 | Layanan untuk menerima kueri dan mengelola eksekusi kueri di antara trino-workers. | 
| trino-worker | 436-amzn-0 | Layanan untuk mengeksekusi potongan kueri. | 
| trino-client | 436-amzn-0 | Klien baris perintah Trino yang diinstal pada master siaga cluster HA di mana server Trino tidak dimulai. | 
| pig-client | 0.17.0 | Klien baris perintah Pig. | 
| r | 4.3.2 | Proyek R untuk Komputasi Statistik | 
| ranger-kms-server | 2.0.0 | Sistem Pengelolaan Kunci Ranger Apache | 
| spark-client | 3.5.1-amzn-0 | Klien baris perintah Spark. | 
| spark-history-server | 3.5.1-amzn-0 | Web UI untuk melihat log acara untuk seluruh masa pakai aplikasi Spark. | 
| spark-on-yarn | 3.5.1-amzn-0 | Mesin eksekusi dalam memori untuk YARN. | 
| spark-yarn-slave | 3.5.1-amzn-0 | Perpustakaan Apache Spark yang dibutuhkan oleh slave YARN. | 
| spark-rapids | 24.02.0-amzn-0 | Plugin Nvidia Spark RAPIDS yang mempercepat Apache Spark dengan. GPUs | 
| sqoop-client | 1.4.7 | Klien baris perintah Apache Sqoop. | 
| tensorflow | 2.11.0 | TensorFlow pustaka perangkat lunak open source untuk perhitungan numerik kinerja tinggi. | 
| tez-on-yarn | 0.10.2-amzn-9 | Aplikasi dan perpustakaan tez YARN. | 
| tez-on-worker | 0.10.2-amzn-9 | Aplikasi dan pustaka YARN tez untuk node pekerja. | 
| zeppelin-server | 0.10.1 | Notebook berbasis web yang memungkinkan analisis data interaktif. | 
| zookeeper-server | 3.9.1-amzn-1 | Layanan terpusat untuk menjaga informasi konfigurasi, penamaan, yang menyediakan sinkronisasi terdistribusi, dan menyediakan layanan grup. | 
| zookeeper-client | 3.9.1-amzn-1 | ZooKeeper klien baris perintah. | 

## 7.2.0 klasifikasi konfigurasi
<a name="emr-720-class"></a>

Klasifikasi konfigurasi memungkinkan Anda menyesuaikan aplikasi. Ini sering kali bersesuaian dengan file XML konfigurasi untuk aplikasi, seperti `hive-site.xml`. Untuk informasi selengkapnya, lihat [Konfigurasikan aplikasi](emr-configure-apps.md).

Tindakan konfigurasi ulang terjadi ketika Anda menentukan konfigurasi untuk grup instans di klaster yang sedang berjalan. Amazon EMR hanya memulai tindakan konfigurasi ulang untuk klasifikasi yang Anda modifikasi. Untuk informasi selengkapnya, lihat [Lakukan konfigurasi ulang pada grup instans di klaster yang sedang berjalan](emr-configure-apps-running-cluster.md).


**klasifikasi emr-7.2.0**  

| Klasifikasi | Deskripsi | Tindakan Konfigurasi Ulang | 
| --- | --- | --- | 
| capacity-scheduler | Ubah nilai dalam file capacity-scheduler.xml Hadoop. | Restarts the ResourceManager service. | 
| container-executor | Ubah nilai dalam file container-executor.cfg Hadoop YARN ini. | Not available. | 
| container-log4j | Ubah nilai dalam file container-log4j.properties Hadoop YARN. | Not available. | 
| core-site | Ubah nilai dalam file core-site.xml Hadoop. | Restarts the Hadoop HDFS services Namenode, SecondaryNamenode, Datanode, ZKFC, and Journalnode. Restarts the Hadoop YARN services ResourceManager, NodeManager, ProxyServer, and TimelineServer. Additionally restarts Hadoop KMS, Ranger KMS, HiveServer2, Hive MetaStore, Hadoop Httpfs, and MapReduce-HistoryServer. | 
| docker-conf | Ubah pengaturan terkait docker. | Not available. | 
| emrfs-site | Ubah pengaturan EMRFS. | Restarts the Hadoop HDFS services Namenode, SecondaryNamenode, Datanode, ZKFC, and Journalnode. Restarts the Hadoop YARN services ResourceManager, NodeManager, ProxyServer, and TimelineServer. Additionally restarts HBaseRegionserver, HBaseMaster, HBaseThrift, HBaseRest, HiveServer2, Hive MetaStore, Hadoop Httpfs, and MapReduce-HistoryServer. | 
| flink-conf | Ubah pengaturan flink-conf.yaml. | Restarts Flink history server. | 
| flink-log4j | Ubah pengaturan log4j.properties Flink. | Restarts Flink history server. | 
| flink-log4j-session | Ubah pengaturan Flink log4j-session.properties untuk sesi. Kubernetes/Yarn  | Restarts Flink history server. | 
| flink-log4j-cli | Ubah pengaturan log4j-cli.properties Flink. | Restarts Flink history server. | 
| hadoop-env | Ubah nilai dalam lingkungan Hadoop untuk semua komponen Hadoop. | Restarts the Hadoop HDFS services Namenode, SecondaryNamenode, Datanode, ZKFC, and Journalnode. Restarts the Hadoop YARN services ResourceManager, NodeManager, ProxyServer, and TimelineServer. Additionally restarts PhoenixQueryserver, HiveServer2, Hive MetaStore, and MapReduce-HistoryServer. | 
| hadoop-log4j | Ubah nilai dalam file log4j.properties Hadoop ini. | Restarts the Hadoop HDFS services SecondaryNamenode, Datanode, and Journalnode. Restarts the Hadoop YARN services ResourceManager, NodeManager, ProxyServer, and TimelineServer. Additionally restarts Hadoop KMS, Hadoop Httpfs, and MapReduce-HistoryServer. | 
| hadoop-ssl-server | Ubah konfigurasi server ssl hadoop | Not available. | 
| hadoop-ssl-client | Ubah konfigurasi klien ssl hadoop | Not available. | 
| hbase | Pengaturan Amazon EMR-curated untuk Apache. HBase | Custom EMR specific property. Sets emrfs-site and hbase-site configs. See those for their associated restarts. | 
| hbase-env | Ubah nilai HBase di lingkungan. | Restarts the HBase services RegionServer, HBaseMaster, ThriftServer, RestServer. | 
| hbase-log4j | Ubah nilai dalam file HBase hbase-log4j.properties. | Restarts the HBase services RegionServer, HBaseMaster, ThriftServer, RestServer. | 
| hbase-metrics | Ubah nilai dalam file HBase hadoop-metrics2-hbase.properties. | Restarts the HBase services RegionServer, HBaseMaster, ThriftServer, RestServer. | 
| hbase-policy | Ubah nilai dalam HBase file hbase-policy.xml. | Not available. | 
| hbase-site | Ubah nilai dalam HBase file hbase-site.xml. | Restarts the HBase services RegionServer, HBaseMaster, ThriftServer, RestServer. Additionally restarts Phoenix QueryServer. | 
| hdfs-encryption-zones | Konfigurasikan zona enkripsi HDFS. | This classification should not be reconfigured. | 
| hdfs-env | Ubah nilai dalam lingkungan HDFS. | Restarts Hadoop HDFS services Namenode, Datanode, and ZKFC. | 
| hdfs-site | Ubah nilai dalam hdfs-site.xml HDFS. | Restarts the Hadoop HDFS services Namenode, SecondaryNamenode, Datanode, ZKFC, and Journalnode. Additionally restarts Hadoop Httpfs. | 
| hcatalog-env | Ubah nilai HCatalog di lingkungan. | Restarts Hive HCatalog Server. | 
| hcatalog-server-jndi | Ubah nilai di HCatalog jndi.properties. | Restarts Hive HCatalog Server. | 
| hcatalog-server-proto-hive-site | Ubah nilai HCatalog proto-hive-site dalam.xml's. | Restarts Hive HCatalog Server. | 
| hcatalog-webhcat-env | Ubah nilai di lingkungan HCatalog WebHCat. | Restarts Hive WebHCat server. | 
| hcatalog-webhcat-log4j2 | Ubah nilai di HCat log4j2.properties HCatalog Web. | Restarts Hive WebHCat server. | 
| hcatalog-webhcat-site | Ubah nilai dalam file webhcat-site.xml HCatalog WebHCat. | Restarts Hive WebHCat server. | 
| hive | Pengaturan dikurasi Amazon EMR untuk Apache Hive. | Sets configurations to launch Hive LLAP service. | 
| hive-beeline-log4j2 | Ubah nilai dalam file beeline-log4j2.properties Hive. | Not available. | 
| hive-parquet-logging | Ubah nilai dalam file parquet-logging.properties Hive. | Not available. | 
| hive-env | Ubah nilai dalam lingkungan Hive. | Restarts HiveServer2, HiveMetastore, and Hive HCatalog-Server. Runs Hive schemaTool CLI commands to verify hive-metastore. | 
| hive-exec-log4j2 | Ubah nilai dalam file hive-exec-log 4j2.properties Hive. | Not available. | 
| hive-llap-daemon-log4j2 | Ubah nilai dalam file llap-daemon-log 4j2.properties Hive. | Not available. | 
| hive-log4j2 | Ubah nilai dalam file hive-log4j2.properties Hive. | Not available. | 
| hive-site | Ubah nilai dalam file hive-site.xml Hive | Restarts HiveServer2, HiveMetastore, and Hive HCatalog-Server. Runs Hive schemaTool CLI commands to verify hive-metastore. Also restarts Oozie and Zeppelin. | 
| hiveserver2-site | Ubah nilai dalam file hiveserver2-site.xml Hive Server2 | Not available. | 
| hue-ini | Ubah nilai dalam file ini Hue | Restarts Hue. Also activates Hue config override CLI commands to pick up new configurations. | 
| httpfs-env | Ubah nilai di lingkungan HTTPFS. | Restarts Hadoop Httpfs service. | 
| httpfs-site | Ubah nilai dalam file httpfs-site.xml Hadoop. | Restarts Hadoop Httpfs service. | 
| hadoop-kms-acls | Ubah nilai dalam file kms-acls.xml Hadoop. | Not available. | 
| hadoop-kms-env | Ubah nilai dalam lingkungan Hadoop KMS. | Restarts Hadoop-KMS service. | 
| hadoop-kms-java-home | Ubah rumah java KMS Hadoop | Not available. | 
| hadoop-kms-log4j | Ubah nilai dalam file kms-log4j.properties Hadoop. | Not available. | 
| hadoop-kms-site | Ubah nilai dalam file kms-site.xml Hadoop. | Restarts Hadoop-KMS and Ranger-KMS service. | 
| hudi-env | Ubah nilai di lingkungan Hudi. | Not available. | 
| hudi-defaults | Ubah nilai dalam file hudi-defaults.conf Hudi. | Not available. | 
| iceberg-defaults | Ubah nilai dalam file iceberg-defaults.conf Iceberg. | Not available. | 
| delta-defaults | Ubah nilai dalam file delta-defaults.conf Delta. | Not available. | 
| jupyter-notebook-conf | Ubah nilai dalam file jupyter\$1notebook\$1config.py Jupyter Notebook. | Not available. | 
| jupyter-hub-conf | Ubah nilai dalam JupyterHubs file jupyterhub\$1config.py. | Not available. | 
| jupyter-s3-conf | Konfigurasikan persistensi Jupyter Notebook S3. | Not available. | 
| jupyter-sparkmagic-conf | Ubah nilai dalam file config.json Sparkmagic. | Not available. | 
| livy-conf | Ubah nilai dalam file livy.conf Livy. | Restarts Livy Server. | 
| livy-env | Ubah nilai di lingkungan Livy. | Restarts Livy Server. | 
| livy-log4j2 | Ubah pengaturan Livy log4j2.properties. | Restarts Livy Server. | 
| mapred-env | Ubah nilai di lingkungan MapReduce aplikasi. | Restarts Hadoop MapReduce-HistoryServer. | 
| mapred-site | Ubah nilai dalam file mapred-site.xml MapReduce aplikasi. | Restarts Hadoop MapReduce-HistoryServer. | 
| oozie-env | Ubah nilai di lingkungan Oozie. | Restarts Oozie. | 
| oozie-log4j | Ubah nilai dalam file oozie-log4j.properties Oozie. | Restarts Oozie. | 
| oozie-site | Ubah nilai dalam file oozie-site.xml Oozie. | Restarts Oozie. | 
| phoenix-hbase-metrics | Ubah nilai dalam file hadoop-metrics2-hbase.properties Phoenix. | Not available. | 
| phoenix-hbase-site | Ubah nilai dalam file hbase-site.xml Phoenix. | Not available. | 
| phoenix-log4j | Ubah nilai dalam file log4j.properties Phoenix. | Restarts Phoenix-QueryServer. | 
| phoenix-metrics | Ubah nilai dalam file hadoop-metrics2-phoenix.properties Phoenix. | Not available. | 
| pig-env | Ubah nilai di lingkungan Pig. | Not available. | 
| pig-properties | Ubah nilai dalam file pig.properties Pig. | Restarts Oozie. | 
| pig-log4j | Ubah nilai dalam file log4j.properties Pig. | Not available. | 
| presto-log | Ubah nilai dalam file log.properties Presto. | Restarts Presto-Server (for PrestoDB) | 
| presto-config | Ubah nilai dalam file config.properties Presto. | Restarts Presto-Server (for PrestoDB) | 
| presto-password-authenticator | Ubah nilai dalam file password-authenticator.properties Presto. | Not available. | 
| presto-env | Ubah nilai dalam file presto-env.sh Presto. | Restarts Presto-Server (for PrestoDB) | 
| presto-node | Ubah nilai dalam file node.properties Presto. | Not available. | 
| presto-connector-blackhole | Ubah nilai dalam file blackhole.properties Presto. | Not available. | 
| presto-connector-cassandra | Ubah nilai dalam file cassandra.properties Presto. | Not available. | 
| presto-connector-hive | Ubah nilai dalam file hive.properties Presto. | Restarts Presto-Server (for PrestoDB) | 
| presto-connector-jmx | Ubah nilai dalam file jmx.properties Presto. | Not available. | 
| presto-connector-kafka | Ubah nilai dalam file kafka.properties Presto. | Not available. | 
| presto-connector-lakeformation | Ubah nilai dalam file lakeformation.properties Presto. | Restarts Presto-Server (for PrestoDB) | 
| presto-connector-localfile | Ubah nilai dalam file localfile.properties Presto. | Not available. | 
| presto-connector-memory | Ubah nilai dalam file memory.properties Presto. | Not available. | 
| presto-connector-mongodb | Ubah nilai dalam file mongodb.properties Presto. | Not available. | 
| presto-connector-mysql | Ubah nilai dalam file mysql.properties Presto. | Not available. | 
| presto-connector-postgresql | Ubah nilai dalam file postgresql.properties Presto. | Not available. | 
| presto-connector-raptor | Ubah nilai dalam file raptor.properties Presto. | Not available. | 
| presto-connector-redis | Ubah nilai dalam file redis.properties Presto. | Not available. | 
| presto-connector-redshift | Ubah nilai dalam file redshift.properties Presto. | Not available. | 
| presto-connector-tpch | Ubah nilai dalam file tpch.properties Presto. | Not available. | 
| presto-connector-tpcds | Ubah nilai dalam file tpcds.properties Presto. | Not available. | 
| trino-log | Ubah nilai dalam file log.properties Trino. | Restarts Trino-Server (for Trino) | 
| trino-config | Ubah nilai dalam file config.properties Trino. | Restarts Trino-Server (for Trino) | 
| trino-password-authenticator | Ubah nilai dalam file password-authenticator.properties Trino. | Restarts Trino-Server (for Trino) | 
| trino-env | Ubah nilai dalam file trino-env.sh Trino. | Restarts Trino-Server (for Trino) | 
| trino-node | Ubah nilai dalam file node.properties Trino. | Not available. | 
| trino-connector-blackhole | Ubah nilai dalam file blackhole.properties Trino. | Not available. | 
| trino-connector-cassandra | Ubah nilai dalam file cassandra.properties Trino. | Not available. | 
| trino-connector-delta | Ubah nilai dalam file delta.properties Trino. | Restarts Trino-Server (for Trino) | 
| trino-connector-hive | Ubah nilai dalam file hive.properties Trino. | Restarts Trino-Server (for Trino) | 
| trino-exchange-manager | Ubah nilai dalam file exchange-manager.properties Trino. | Restarts Trino-Server (for Trino) | 
| trino-connector-iceberg | Ubah nilai dalam file iceberg.properties Trino. | Restarts Trino-Server (for Trino) | 
| trino-connector-hudi | Ubah nilai dalam file hudi.properties Trino. | Restarts Trino-Server (for Trino) | 
| trino-connector-jmx | Ubah nilai dalam file jmx.properties Trino. | Not available. | 
| trino-connector-kafka | Ubah nilai dalam file kafka.properties Trino. | Not available. | 
| trino-connector-localfile | Ubah nilai dalam file localfile.properties Trino. | Not available. | 
| trino-connector-memory | Ubah nilai dalam file memory.properties Trino. | Not available. | 
| trino-connector-mongodb | Ubah nilai dalam file mongodb.properties Trino. | Not available. | 
| trino-connector-mysql | Ubah nilai dalam file mysql.properties Trino. | Not available. | 
| trino-connector-postgresql | Ubah nilai dalam file postgresql.properties Trino. | Not available. | 
| trino-connector-raptor | Ubah nilai dalam file raptor.properties Trino. | Not available. | 
| trino-connector-redis | Ubah nilai dalam file redis.properties Trino. | Not available. | 
| trino-connector-redshift | Ubah nilai dalam file redshift.properties Trino. | Not available. | 
| trino-connector-tpch | Ubah nilai dalam file tpch.properties Trino. | Not available. | 
| trino-connector-tpcds | Ubah nilai dalam file tpcds.properties Trino. | Not available. | 
| ranger-kms-dbks-site | Ubah nilai dalam file dbks-site.xml Ranger KMS. | Restarts Ranger KMS Server. | 
| ranger-kms-site | Ubah nilai dalam ranger-kms-site file.xml. dari Ranger KMS. | Restarts Ranger KMS Server. | 
| ranger-kms-env | Ubah nilai di lingkungan Ranger KMS. | Restarts Ranger KMS Server. | 
| ranger-kms-logback | Ubah nilai dalam file kms-logback.xml dari Ranger KMS. | Not available. | 
| ranger-kms-db-ca | Ubah nilai untuk file CA pada S3 untuk koneksi MySQL SSL dengan Ranger KMS. | Not available. | 
| spark | Pengaturan terkurasi Amazon EMR untuk Apache Spark. | This property modifies spark-defaults. See actions there. | 
| spark-defaults | Ubah nilai dalam file spark-defaults.conf Spark. | Restarts Spark history server and Spark thrift server. | 
| spark-env | Ubah nilai di lingkungan Spark. | Restarts Spark history server and Spark thrift server. | 
| spark-hive-site | Ubah nilai dalam file hive-site.xml Spark | Not available. | 
| spark-log4j2 | Ubah nilai dalam file log4j2.properties Spark. | Restarts Spark history server and Spark thrift server. | 
| spark-metrics | Ubah nilai dalam file metrics.properties Spark. | Restarts Spark history server and Spark thrift server. | 
| sqoop-env | Ubah nilai dalam lingkungan Sqoop. | Not available. | 
| sqoop-oraoop-site | Ubah nilai dalam file oraoop-site.xml Sqoop OraOop ini. | Not available. | 
| sqoop-site | Ubah nilai dalam file sqoop-site.xml Sqoop. | Not available. | 
| tez-site | Ubah nilai dalam file tez-site.xml Tez. | Restart Oozie and HiveServer2. | 
| yarn-env | Ubah nilai di lingkungan YARN. | Restarts the Hadoop YARN services ResourceManager, NodeManager, ProxyServer, and TimelineServer. Additionally restarts MapReduce-HistoryServer. | 
| yarn-site | Ubah nilai dalam file yarn-site.xml YARN. | Restarts the Hadoop YARN services ResourceManager, NodeManager, ProxyServer, and TimelineServer. Additionally restarts Livy Server and MapReduce-HistoryServer. | 
| zeppelin-env | Ubah nilai di lingkungan Zeppelin. | Restarts Zeppelin. | 
| zeppelin-site | Ubah pengaturan konfigurasi di zeppelin-site.xml. | Restarts Zeppelin. | 
| zookeeper-config | Ubah nilai dalam ZooKeeper file zoo.cfg. | Restarts Zookeeper server. | 
| zookeeper-logback | Ubah nilai dalam ZooKeeper file logback.xml. | Restarts Zookeeper server. | 
| emr-metrics | Ubah pengaturan metrik emr untuk simpul ini. | Restarts the CloudWatchAgent service. | 

## 7.2.0 perubahan log
<a name="720-changelog"></a>


**Ubah log untuk catatan rilis dan rilis 7.2.0**  

| Date | Peristiwa | Deskripsi | 
| --- | --- | --- | 
| 2025-09-03 | Revisi dokumen | Catatan rilis Amazon EMR 7.2.0 ditambahkan | 
| 2024-07-25 | Publikasi Docs | Catatan rilis Amazon EMR 7.2.0 pertama kali diterbitkan | 
| 2024-07-16 | Rilis awal | Amazon EMR 7.2.0 pertama kali dikerahkan ke Wilayah komersial awal | 

# Amazon EMR rilis 7.1.0
<a name="emr-710-release"></a>

## 7.1.0 versi aplikasi
<a name="emr-710-app-versions"></a>

Rilis ini mencakup aplikasi berikut: [https://docs.aws.amazon.com/AmazonCloudWatch/latest/monitoring/Install-CloudWatch-Agent.html](https://docs.aws.amazon.com/AmazonCloudWatch/latest/monitoring/Install-CloudWatch-Agent.html), [https://delta.io/](https://delta.io/), [https://flink.apache.org/](https://flink.apache.org/), [http://hbase.apache.org/](http://hbase.apache.org/), [https://cwiki.apache.org/confluence/display/Hive/HCatalog](https://cwiki.apache.org/confluence/display/Hive/HCatalog), [http://hive.apache.org/](http://hive.apache.org/), [https://hudi.apache.org](https://hudi.apache.org), [http://gethue.com/](http://gethue.com/), [https://iceberg.apache.org/](https://iceberg.apache.org/), [https://jupyter-enterprise-gateway.readthedocs.io/en/latest/](https://jupyter-enterprise-gateway.readthedocs.io/en/latest/), [https://jupyterhub.readthedocs.io/en/latest/#](https://jupyterhub.readthedocs.io/en/latest/#), [https://livy.incubator.apache.org/](https://livy.incubator.apache.org/), [https://mxnet.incubator.apache.org/](https://mxnet.incubator.apache.org/), [http://oozie.apache.org/](http://oozie.apache.org/), [https://phoenix.apache.org/](https://phoenix.apache.org/), [http://pig.apache.org/](http://pig.apache.org/), [https://prestodb.io/](https://prestodb.io/), [https://spark.apache.org/docs/latest/](https://spark.apache.org/docs/latest/), [http://sqoop.apache.org/](http://sqoop.apache.org/), [https://www.tensorflow.org/](https://www.tensorflow.org/), [https://tez.apache.org/](https://tez.apache.org/), [https://trino.io/](https://trino.io/), [https://zeppelin.incubator.apache.org/](https://zeppelin.incubator.apache.org/), dan [https://zookeeper.apache.org](https://zookeeper.apache.org).

Tabel di bawah ini mencantumkan versi aplikasi yang tersedia dalam rilis Amazon EMR ini dan versi aplikasi dalam tiga rilis EMR Amazon sebelumnya (bila berlaku).

Untuk riwayat lengkap versi aplikasi untuk setiap rilis Amazon EMR, lihat topik berikut:
+ [Versi aplikasi di Amazon EMR 7.x rilis](emr-release-app-versions-7.x.md)
+ [Versi aplikasi di Amazon EMR 6.x rilis](emr-release-app-versions-6.x.md)
+ [Versi aplikasi di Amazon EMR 5.x rilis](emr-release-app-versions-5.x.md)
+ [Versi aplikasi di Amazon EMR 4.x rilis](emr-release-app-versions-4.x.md)


**Informasi versi aplikasi**  

|  | emr-7.3.0 | emr-7.2.0 | emr-7.1.0 | emr-7.0.0 | 
| --- | --- | --- | --- | --- | 
| AWS SDK for Java | 2.25.70, 1.12.747 | 2.23.18, 1.12.705 | 2.23.18, 1.12.656 | 2.20.160-amzn-0, 1.12.569 | 
| Python | 3.9, 3.11 | 3.9, 3.11 | 3.9, 3.11 | 3.9 | 
| Skala | 2.12.18 | 2.12.17 | 2.12.17 | 2.12.17 | 
| AmazonCloudWatchAgent | 1.300032.2-amzn-0 | 1.300032.2-amzn-0 | 1.300032.2-amzn-0 | 1.300031.1-amzn-0 | 
| Delta | 3.2.0-amzn-0 | 3.1.0 | 3.0.0 | 3.0.0 | 
| Flink | 1.18.1-amzn-2 | 1.18.1-amzn-1 | 1.18.1-amzn-0 | 1.18.0-amzn-0 | 
| Ganglia |  -  |  -  |  -  |  -  | 
| HBase | 2.4.17-amzn-7 | 2.4.17-amzn-6 | 2.4.17-amzn-5 | 2.4.17-amzn-4 | 
| HCatalog | 3.1.3-amzn-12 | 3.1.3-amzn-11 | 3.1.3-amzn-10 | 3.1.3-amzn-9 | 
| Hadoop | 3.3.6-amzn-5 | 3.3.6-amzn-4 | 3.3.6-amzn-3 | 3.3.6-amzn-2 | 
| Hive | 3.1.3-amzn-12 | 3.1.3-amzn-11 | 3.1.3-amzn-10 | 3.1.3-amzn-9 | 
| Hudi | 0.15.0-amzn-0 | 0.14.1-amzn-1 | 0.14.1-amzn-0 | 0.14.0-amzn-1 | 
| Hue | 4.11.0 | 4.11.0 | 4.11.0 | 4.11.0 | 
| Iceberg | 1.5.2-amzn-0 | 1.5.0-amzn-0 | 1.4.3-amzn-0 | 1.4.2-amzn-0 | 
| JupyterEnterpriseGateway | 2.6.0 | 2.6.0 | 2.6.0 | 2.6.0 | 
| JupyterHub | 1.5.0 | 1.5.0 | 1.5.0 | 1.5.0 | 
| Livy | 0.8.0-inkubasi | 0.8.0-inkubasi | 0.8.0-inkubasi | 0.7.1-inkubasi | 
| MXNet |  -  | 1.9.1 | 1.9.1 | 1.9.1 | 
| Mahout |  -  |  -  |  -  |  -  | 
| Oozie | 5.2.1 | 5.2.1 | 5.2.1 | 5.2.1 | 
| Phoenix | 5.1.3 | 5.1.3 | 5.1.3 | 5.1.3 | 
| Pig | 0.17.0 | 0.17.0 | 0.17.0 | 0.17.0 | 
| Presto | 0.285-amzn-1 | 0,285-amzn-0 | 0,284-amzn-0 | 0,283-amzn-1 | 
| Spark | 3.5.1-amzn-1 | 3.5.1-amzn-0 | 3.5.0-amzn-1 | 3.5.0-amzn-0 | 
| Sqoop | 1.4.7 | 1.4.7 | 1.4.7 | 1.4.7 | 
| TensorFlow | 2.16.1 | 2.11.0 | 2.11.0 | 2.11.0 | 
| Tez | 0.10.2-amzn-10 | 0.10.2-amzn-9 | 0.10.2-amzn-8 | 0.10.2-amzn-7 | 
| Trino (PrestoSQL) | 442-amzn-0 | 436-amzn-0 | 435-amzn-0 | 426-amzn-1 | 
| Zeppelin | 0.11.1 | 0.10.1 | 0.10.1 | 0.10.1 | 
| ZooKeeper | 3.9.1-amzn-1 | 3.9.1-amzn-1 | 3.9.1-amzn-0 | 3.5.10 | 

## Catatan rilis 7.1.0
<a name="emr-710-relnotes"></a>

Catatan rilis berikut mencakup informasi untuk Amazon EMR rilis 7.1.0. Perubahan relatif terhadap 7.1.0.

**Fitur baru**
+ **Upgrade aplikasi** —Amazon EMR 7.1.0 application upgrades include Livy 0.8.0, Trino 435, and ZooKeeper 3.9.1.
+ [https://docs.aws.amazon.com/emr/latest/ManagementGuide/emr-plan-node-replacement.html](https://docs.aws.amazon.com/emr/latest/ManagementGuide/emr-plan-node-replacement.html) - Dengan Amazon EMR 7.1.0 dan yang lebih tinggi, penggantian node yang tidak sehat diaktifkan secara default, sehingga Amazon EMR akan dengan anggun mengganti node Anda yang tidak sehat. Agar tidak memengaruhi alur kerja yang ada di Amazon EMR rilis 7.0.0 dan yang lebih rendah, penggantian node yang tidak sehat dinonaktifkan jika Anda mengaktifkan perlindungan penghentian di klaster.
+ [https://docs.aws.amazon.com/emr/latest/ReleaseGuide/emr-AmazonCloudWatchAgent.html](https://docs.aws.amazon.com/emr/latest/ReleaseGuide/emr-AmazonCloudWatchAgent.html) — Konfigurasikan CloudWatch agen untuk menggunakan metrik sistem tambahan, menambahkan metrik aplikasi, dan mengubah tujuan metrik dengan API konfigurasi Amazon EMR.

**Masalah yang diketahui**
+ Aplikasi JupyterEnterpriseGateway (JEG) tidak mendukung Python 3.11 dalam rilis ini.
+ Skrip instance-state on-cluster yang memantau kesehatan instance dapat mengkonsumsi CPU dan sumber daya memori yang berlebihan ketika ada sejumlah besar thread yang and/or membuka pegangan file pada node.

**Perubahan, penyempurnaan, dan masalah yang diselesaikan**
+  *Dimulai dengan Spark 3.3.1 (didukung dalam EMR versi 6.10 dan yang lebih baru), semua pelaksana dalam host dekomisioning diatur ke yang baru, yang disebut status DECOMMISSIONING. `ExecutorState`* Pelaksana yang dinonaktifkan tidak dapat digunakan oleh Yarn untuk mengalokasikan tugas dan dengan demikian akan meminta pelaksana baru, jika diperlukan, untuk tugas yang sedang dijalankan. Jadi, jika Anda menonaktifkan Spark DRA saat menggunakan EMR Managed Scaling, EMR Auto Scaling, atau mekanisme penskalaan khusus apa pun pada cluster EMR-EC2, maka Yarn dapat meminta pelaksana maksimum yang diizinkan untuk setiap pekerjaan. Untuk menghindari masalah ini, biarkan `spark.dynamicAllocation.enabled` properti disetel ke `TRUE` (yang merupakan default) saat Anda menggunakan kombinasi fitur di atas. Selain itu, Anda juga dapat mengatur batasan pelaksana minimum dan maksimum dengan menetapkan nilai untuk `spark.dynamicAllocation.maxExecutors` dan `spark.dynamicAllocation.minExecutors` properti untuk pekerjaan Spark Anda, untuk membatasi jumlah pelaksana yang dialokasikan selama eksekusi pekerjaan. 
+ Sementara Amazon EMR 7.1.0 mendukung Python 3.9 secara default, Livy 0.8.0 dan Spark di Amazon EMR 7.1.0 mendukung Python 3.11.
+ Rilis ini memperbaiki masalah kebutuhan untuk menjalankan setiap baris satu per satu saat menggunakan dengan PySpark Python versi 3.11.
+ Peningkatan **Zeppelin -** Amazon EMR 7.1.0 menyertakan peningkatan Zeppelin ke SDK for Java v2. AWS Upgrade ini memungkinkan Notebook Zeppelin S3 untuk menerima penyedia bahan enkripsi kustom. AWS SDK for Java v2 menghapus antarmuka EncryptionMaterialsProvider . Saat Anda meningkatkan ke Amazon EMR 7.1.0, Anda harus menerapkan [antarmuka Keyring](https://github.com/aws/amazon-s3-encryption-client-java/blob/main/src/main/java/software/amazon/encryption/s3/materials/Keyring.java) jika Anda ingin menggunakan enkripsi khusus. Untuk contoh cara mengimplementasikan antarmuka Keyring, lihat [ KmsKeyring.java.](https://github.com/aws/amazon-s3-encryption-client-java/blob/a5d714fe27f97793997e41745939ef7da8a22167/src/main/java/software/amazon/encryption/s3/materials/KmsKeyring.java#L36)
+ Saat memutakhirkan ke Amazon EMR rilis 7.1.0, ubah penyedia kunci kustom Anda untuk enkripsi disk lokal untuk menghasilkan kunci menggunakan algoritme AES. AES/GCM/NoPadding Jika Anda tidak memperbarui algoritme, pembuatan klaster mungkin gagal dengan kesalahan `Local disk encryption failed on master instance (i-123456789) due to internal error.` Untuk informasi selengkapnya tentang membuat penyedia kunci kustom, lihat [Membuat penyedia kunci kustom](https://docs.aws.amazon.com/emr/latest/ManagementGuide/emr-encryption-enable.html#emr-custom-keys).
+ Amazon EMR 7.1.0 meningkatkan ketahanan node di bawah kondisi ruang disk rendah dengan meningkatkan logika pemotongan log untuk file dengan pegangan file terbuka.
+ Rilis ini meningkatkan logika encoding dan decoding untuk meminimalkan risiko korupsi data dan kegagalan node dengan daemon Amazon EMR membaca dan menulis file saat memulai ulang node.
+ Saat Anda meluncurkan cluster dengan *rilis patch terbaru* Amazon EMR 5.36 atau lebih tinggi, 6.6 atau lebih tinggi, atau 7.0 atau lebih tinggi, Amazon EMR menggunakan rilis Amazon Linux 2023 atau Amazon Linux 2 terbaru untuk AMI EMR Amazon default. Untuk informasi selengkapnya, lihat [Menggunakan AMI Amazon Linux default untuk Amazon EMR](https://docs.aws.amazon.com/emr/latest/ManagementGuide/emr-default-ami.html).    
[\[See the AWS documentation website for more details\]](http://docs.aws.amazon.com/id_id/emr/latest/ReleaseGuide/emr-710-release.html)

## 7.1.0 versi Java default
<a name="emr-710-jdk"></a>

Amazon EMR merilis 7.1 dan lebih tinggi dikirimkan dengan Amazon Corretto 17 (dibangun di atas OpenJDK) secara default untuk aplikasi yang mendukung Corretto 17 (JDK 17), dengan pengecualian Apache Livy.

Tabel berikut menunjukkan versi Java default untuk aplikasi di Amazon EMR 7.1.0. Jika Anda ingin mengubah JVM default pada cluster Anda, ikuti instruksi [Konfigurasikan aplikasi untuk menggunakan Java Virtual Machine tertentu](configuring-java8.md) untuk setiap aplikasi yang berjalan di cluster. Anda hanya dapat menggunakan satu versi runtime Java untuk sebuah cluster. Amazon EMR tidak mendukung menjalankan node atau aplikasi yang berbeda pada versi runtime yang berbeda pada cluster yang sama.


| Aplikasi | Versi Java/Amazon Corretto (defaultnya tebal) | 
| --- | --- | 
| kuala | 17, 11, 8 | 
| Flink | 17, 11, 8 | 
| HBase | 11, 8 | 
| HCatalog | 17, 11, 8 | 
| Hadoop | 17, 11, 8 | 
| Hive | 17, 11, 8 | 
| Hudi | 17, 11, 8 | 
| Gunung es | 17, 11, 8 | 
| Livy | 17, 11, 8 | 
| Oozie | 17, 11, 8 | 
| Phoenix | 8 | 
| PrestoDB | 8 | 
| Spark | 17, 11, 8 | 
| Spark RAPIDS | 17, 11, 8 | 
| Sqoop | 8 | 
| Tez | 17, 11, 8 | 
| Trino | 17 | 
| Zeppelin | 8 | 
| Pig | 8 | 
| Zookeeper | 8 | 

## 7.1.0 versi komponen
<a name="emr-710-components"></a>

Komponen yang diinstal oleh Amazon EMR dengan rilis ini tercantum di bawah ini. Beberapa komponen diinstal sebagai bagian dari paket aplikasi big data. Sedangkan komponen lainnya bersifak unik untuk Amazon EMR dan diinstal untuk proses sistem dan fitur. Ini biasanya dimulai dengan `emr` atau `aws`. Paket aplikasi big data dalam rilis Amazon EMR terbaru biasanya versi terbaru yang ditemukan di komunitas. Kami menyediakan rilis komunitas di Amazon EMR secepat mungkin.

Beberapa komponen yang ada di Amazon EMR berbeda dari versi komunitas. Komponen ini mempunyai label versi dalam bentuk `CommunityVersion-amzn-EmrVersion`. `EmrVersion` dimulai dari 0. Misalnya, jika komponen komunitas open source bernama `myapp-component` dengan versi 2.2 telah dimodifikasi tiga kali untuk dimasukkan dalam rilis EMR Amazon yang berbeda, versi rilisnya terdaftar sebagai. `2.2-amzn-2`


| Komponen | Versi | Deskripsi | 
| --- | --- | --- | 
| adot-java-agent | 1.31.0 | Agen Java yang mengumpulkan metrik dari daemon aplikasi. | 
| delta | 3.0.0 | Danau Delta adalah format tabel terbuka untuk kumpulan data analitik yang sangat besar | 
| emr-amazon-cloudwatch-agent | 1.300032.2-amzn-0 | Aplikasi yang mengumpulkan metrik tingkat sistem internal dan metrik aplikasi khusus dari instans Amazon EC2. | 
| emr-ddb | 5.3.0 | Konektor Amazon DynamoDB untuk aplikasi ekosistem Hadoop. | 
| emr-goodies | 3.10.0 | Perpustakaan kenyamanan ekstra untuk ekosistem Hadoop. | 
| emr-kinesis | 3.14.0 | Konektor Amazon Kinesis untuk aplikasi ekosistem Hadoop. | 
| emr-notebook-env | 1.7.0 | Conda env untuk emr notebook yang mencakup gateway jupyter korporasi | 
| emr-s3-dist-cp | 2.31.0 | Aplikasi salinan terdistribusi yang dioptimalkan untuk Amazon S3. | 
| emr-s3-select | 2.10.0 | EMR S3Select Connector | 
| emr-wal-cli | 1.2.2 | Cli digunakan untuk daftar emrwal/penghapusan. | 
| emrfs | 2.62.0 | Konektor Amazon S3 untuk aplikasi ekosistem Hadoop. | 
| flink-client | 1.18.1-amzn-0 | Skrip dan aplikasi klien baris perintah Apache Flink. | 
| flink-jobmanager-config | 1.18.1-amzn-0 | Mengelola sumber daya pada node EMR untuk Apache Flink. JobManager | 
| hadoop-client | 3.3.6-amzn-3 | Klien baris perintah Hadoop seperti 'hdfs', 'Hadoop', atau 'yarn'. | 
| hadoop-hdfs-datanode | 3.3.6-amzn-3 | Layanan tingkat simpul HDFS untuk menyimpan blok. | 
| hadoop-hdfs-library | 3.3.6-amzn-3 | Klien dan perpustakaan baris perintah HDFS | 
| hadoop-hdfs-namenode | 3.3.6-amzn-3 | Layanan HDFS untuk melacak nama file dan lokasi blok. | 
| hadoop-hdfs-journalnode | 3.3.6-amzn-3 | Layanan HDFS untuk mengelola jurnal filesystem Hadoop pada klaster HA. | 
| hadoop-httpfs-server | 3.3.6-amzn-3 | Titik akhir HTTP untuk operasi HDFS. | 
| hadoop-kms-server | 3.3.6-amzn-3 | Server manajemen kunci kriptografi berdasarkan API Hadoop. KeyProvider  | 
| hadoop-mapred | 3.3.6-amzn-3 | MapReduce pustaka mesin eksekusi untuk menjalankan MapReduce aplikasi. | 
| hadoop-yarn-nodemanager | 3.3.6-amzn-3 | Layanan YARN untuk mengelola kontainer pada simpul individu. | 
| hadoop-yarn-resourcemanager | 3.3.6-amzn-3 | Layanan YARN untuk mengalokasikan dan mengelola sumber daya klaster dan aplikasi terdistribusi. | 
| hadoop-yarn-timeline-server | 3.3.6-amzn-3 | Layanan untuk mengambil informasi terkini dan historis untuk aplikasi YARN. | 
| hbase-hmaster | 2.4.17-amzn-5 | Layanan untuk HBase cluster yang bertanggung jawab untuk koordinasi Daerah dan pelaksanaan perintah administratif. | 
| hbase-region-server | 2.4.17-amzn-5 | Layanan untuk melayani satu atau lebih HBase wilayah. | 
| hbase-client | 2.4.17-amzn-5 | HBase klien baris perintah. | 
| hbase-rest-server | 2.4.17-amzn-5 | Layanan menyediakan titik akhir RESTful HTTP untuk HBase. | 
| hbase-thrift-server | 2.4.17-amzn-5 | Layanan menyediakan titik akhir Thrift ke. HBase | 
| hbase-operator-tools | 2.4.17-amzn-5 | Alat perbaikan untuk HBase cluster Apache. | 
| hcatalog-client | 3.1.3-amzn-10 | Klien baris perintah 'hcat' untuk memanipulasi hcatalog-server. | 
| hcatalog-server | 3.1.3-amzn-10 | Penyediaan layanan HCatalog, tabel dan lapisan manajemen penyimpanan untuk aplikasi terdistribusi. | 
| hcatalog-webhcat-server | 3.1.3-amzn-10 | Titik akhir HTTP menyediakan antarmuka REST ke HCatalog. | 
| hive-client | 3.1.3-amzn-10 | Klien baris perintah Hive. | 
| hive-hbase | 3.1.3-amzn-10 | Klien Hive-hbase. | 
| hive-metastore-server | 3.1.3-amzn-10 | Layanan untuk mengakses metastore Hive, repositori semantik yang menyimpan metadata untuk SQL pada operasi Hadoop. | 
| hive-server2 | 3.1.3-amzn-10 | Layanan untuk menerima kueri Hive sebagai permintaan web. | 
| hudi | 0.14.1-amzn-0 | Kerangka pemrosesan tambahan untuk memberi daya pada pipa data pada latensi rendah dan efisiensi tinggi. | 
| hudi-presto | 0.14.1-amzn-0 | Perpustakaan paket untuk menjalankan Presto dengan Hudi. | 
| hudi-trino | 0.14.1-amzn-0 | Perpustakaan bundel untuk menjalankan Trino dengan Hudi. | 
| hudi-spark | 0.14.1-amzn-0 | Perpustakaan paket untuk menjalankan Spark dengan Hudi. | 
| hue-server | 4.11.0 | Aplikasi web untuk menganalisis data menggunakan aplikasi ekosistem Hadoop | 
| iceberg | 1.4.3-amzn-0 | Apache Iceberg adalah format tabel terbuka untuk kumpulan data analitik besar | 
| jupyterhub | 1.5.0 | Server multi-pengguna untuk notebook Jupyter | 
| livy-server | 0.8.0-inkubasi | Antarmuka REST untuk berinteraksi dengan Apache Spark | 
| nginx | 1.12.1 | nginx [engine x] adalah server HTTP dan server proksi balik | 
| mxnet | 1.9.1 | Perpustakaan yang fleksibel, dapat diskalakan, dan efisien untuk deep learning. | 
| mariadb-server | 5.5.68\$1 | Server basis data MariaDB. | 
| nvidia-cuda | 11.8.0 | Driver Nvidia dan kit alat Cuda | 
| oozie-client | 5.2.1 | Klien baris perintah Oozie. | 
| oozie-server | 5.2.1 | Layanan untuk menerima permintaan alur kerja Oozie. | 
| opencv | 4.7.0 | Perpustakaan Visi Komputer Sumber Terbuka. | 
| phoenix-library | 5.1.3 | Perpustakaan phoenix untuk server dan klien | 
| phoenix-connectors | 5.1.3 | Konektor Apache Phoenix untuk Spark-3 | 
| phoenix-query-server | 6.0.0 | Sebuah server ringan yang menyediakan akses JDBC serta Protocol Buffers dan akses format JSON ke API Avatica  | 
| presto-coordinator | 0,284-amzn-0 | Layanan untuk menerima kueri dan mengelola eksekusi kueri antara presto-worker. | 
| presto-worker | 0,284-amzn-0 | Layanan untuk mengeksekusi potongan kueri. | 
| presto-client | 0,284-amzn-0 | Klien baris perintah Presto yang diinstal pada master klaster HA yang siaga di mana server Presto server tidak dimulai. | 
| trino-coordinator | 435-amzn-0 | Layanan untuk menerima kueri dan mengelola eksekusi kueri di antara trino-workers. | 
| trino-worker | 435-amzn-0 | Layanan untuk mengeksekusi potongan kueri. | 
| trino-client | 435-amzn-0 | Klien baris perintah Trino yang diinstal pada master siaga cluster HA di mana server Trino tidak dimulai. | 
| pig-client | 0.17.0 | Klien baris perintah Pig. | 
| r | 4.3.2 | Proyek R untuk Komputasi Statistik | 
| ranger-kms-server | 2.0.0 | Sistem Pengelolaan Kunci Ranger Apache | 
| spark-client | 3.5.0-amzn-1 | Klien baris perintah Spark. | 
| spark-history-server | 3.5.0-amzn-1 | Web UI untuk melihat log acara untuk seluruh masa pakai aplikasi Spark. | 
| spark-on-yarn | 3.5.0-amzn-1 | Mesin eksekusi dalam memori untuk YARN. | 
| spark-yarn-slave | 3.5.0-amzn-1 | Perpustakaan Apache Spark yang dibutuhkan oleh slave YARN. | 
| spark-rapids | 23.10.0-amzn-1 | Plugin Nvidia Spark RAPIDS yang mempercepat Apache Spark dengan. GPUs | 
| sqoop-client | 1.4.7 | Klien baris perintah Apache Sqoop. | 
| tensorflow | 2.11.0 | TensorFlow pustaka perangkat lunak open source untuk perhitungan numerik kinerja tinggi. | 
| tez-on-yarn | 0.10.2-amzn-8 | Aplikasi dan perpustakaan tez YARN. | 
| tez-on-worker | 0.10.2-amzn-8 | Aplikasi dan pustaka YARN tez untuk node pekerja. | 
| zeppelin-server | 0.10.1 | Notebook berbasis web yang memungkinkan analisis data interaktif. | 
| zookeeper-server | 3.9.1-amzn-0 | Layanan terpusat untuk menjaga informasi konfigurasi, penamaan, yang menyediakan sinkronisasi terdistribusi, dan menyediakan layanan grup. | 
| zookeeper-client | 3.9.1-amzn-0 | ZooKeeper klien baris perintah. | 

## 7.1.0 klasifikasi konfigurasi
<a name="emr-710-class"></a>

Klasifikasi konfigurasi memungkinkan Anda menyesuaikan aplikasi. Ini sering kali bersesuaian dengan file XML konfigurasi untuk aplikasi, seperti `hive-site.xml`. Untuk informasi selengkapnya, lihat [Konfigurasikan aplikasi](emr-configure-apps.md).

Tindakan konfigurasi ulang terjadi ketika Anda menentukan konfigurasi untuk grup instans di klaster yang sedang berjalan. Amazon EMR hanya memulai tindakan konfigurasi ulang untuk klasifikasi yang Anda modifikasi. Untuk informasi selengkapnya, lihat [Lakukan konfigurasi ulang pada grup instans di klaster yang sedang berjalan](emr-configure-apps-running-cluster.md).


**klasifikasi emr-7.1.0**  

| Klasifikasi | Deskripsi | Tindakan Konfigurasi Ulang | 
| --- | --- | --- | 
| capacity-scheduler | Ubah nilai dalam file capacity-scheduler.xml Hadoop. | Restarts the ResourceManager service. | 
| container-executor | Ubah nilai dalam file container-executor.cfg Hadoop YARN ini. | Not available. | 
| container-log4j | Ubah nilai dalam file container-log4j.properties Hadoop YARN. | Not available. | 
| core-site | Ubah nilai dalam file core-site.xml Hadoop. | Restarts the Hadoop HDFS services Namenode, SecondaryNamenode, Datanode, ZKFC, and Journalnode. Restarts the Hadoop YARN services ResourceManager, NodeManager, ProxyServer, and TimelineServer. Additionally restarts Hadoop KMS, Ranger KMS, HiveServer2, Hive MetaStore, Hadoop Httpfs, and MapReduce-HistoryServer. | 
| docker-conf | Ubah pengaturan terkait docker. | Not available. | 
| emrfs-site | Ubah pengaturan EMRFS. | Restarts the Hadoop HDFS services Namenode, SecondaryNamenode, Datanode, ZKFC, and Journalnode. Restarts the Hadoop YARN services ResourceManager, NodeManager, ProxyServer, and TimelineServer. Additionally restarts HBaseRegionserver, HBaseMaster, HBaseThrift, HBaseRest, HiveServer2, Hive MetaStore, Hadoop Httpfs, and MapReduce-HistoryServer. | 
| flink-conf | Ubah pengaturan flink-conf.yaml. | Restarts Flink history server. | 
| flink-log4j | Ubah pengaturan log4j.properties Flink. | Restarts Flink history server. | 
| flink-log4j-session | Ubah pengaturan Flink log4j-session.properties untuk sesi. Kubernetes/Yarn  | Restarts Flink history server. | 
| flink-log4j-cli | Ubah pengaturan log4j-cli.properties Flink. | Restarts Flink history server. | 
| hadoop-env | Ubah nilai dalam lingkungan Hadoop untuk semua komponen Hadoop. | Restarts the Hadoop HDFS services Namenode, SecondaryNamenode, Datanode, ZKFC, and Journalnode. Restarts the Hadoop YARN services ResourceManager, NodeManager, ProxyServer, and TimelineServer. Additionally restarts PhoenixQueryserver, HiveServer2, Hive MetaStore, and MapReduce-HistoryServer. | 
| hadoop-log4j | Ubah nilai dalam file log4j.properties Hadoop ini. | Restarts the Hadoop HDFS services SecondaryNamenode, Datanode, and Journalnode. Restarts the Hadoop YARN services ResourceManager, NodeManager, ProxyServer, and TimelineServer. Additionally restarts Hadoop KMS, Hadoop Httpfs, and MapReduce-HistoryServer. | 
| hadoop-ssl-server | Ubah konfigurasi server ssl hadoop | Not available. | 
| hadoop-ssl-client | Ubah konfigurasi klien ssl hadoop | Not available. | 
| hbase | Pengaturan Amazon EMR-curated untuk Apache. HBase | Custom EMR specific property. Sets emrfs-site and hbase-site configs. See those for their associated restarts. | 
| hbase-env | Ubah nilai HBase di lingkungan. | Restarts the HBase services RegionServer, HBaseMaster, ThriftServer, RestServer. | 
| hbase-log4j | Ubah nilai dalam file HBase hbase-log4j.properties. | Restarts the HBase services RegionServer, HBaseMaster, ThriftServer, RestServer. | 
| hbase-metrics | Ubah nilai dalam file HBase hadoop-metrics2-hbase.properties. | Restarts the HBase services RegionServer, HBaseMaster, ThriftServer, RestServer. | 
| hbase-policy | Ubah nilai dalam HBase file hbase-policy.xml. | Not available. | 
| hbase-site | Ubah nilai dalam HBase file hbase-site.xml. | Restarts the HBase services RegionServer, HBaseMaster, ThriftServer, RestServer. Additionally restarts Phoenix QueryServer. | 
| hdfs-encryption-zones | Konfigurasikan zona enkripsi HDFS. | This classification should not be reconfigured. | 
| hdfs-env | Ubah nilai dalam lingkungan HDFS. | Restarts Hadoop HDFS services Namenode, Datanode, and ZKFC. | 
| hdfs-site | Ubah nilai dalam hdfs-site.xml HDFS. | Restarts the Hadoop HDFS services Namenode, SecondaryNamenode, Datanode, ZKFC, and Journalnode. Additionally restarts Hadoop Httpfs. | 
| hcatalog-env | Ubah nilai HCatalog di lingkungan. | Restarts Hive HCatalog Server. | 
| hcatalog-server-jndi | Ubah nilai di HCatalog jndi.properties. | Restarts Hive HCatalog Server. | 
| hcatalog-server-proto-hive-site | Ubah nilai HCatalog proto-hive-site dalam.xml's. | Restarts Hive HCatalog Server. | 
| hcatalog-webhcat-env | Ubah nilai di lingkungan HCatalog WebHCat. | Restarts Hive WebHCat server. | 
| hcatalog-webhcat-log4j2 | Ubah nilai di HCat log4j2.properties HCatalog Web. | Restarts Hive WebHCat server. | 
| hcatalog-webhcat-site | Ubah nilai dalam file webhcat-site.xml HCatalog WebHCat. | Restarts Hive WebHCat server. | 
| hive | Pengaturan dikurasi Amazon EMR untuk Apache Hive. | Sets configurations to launch Hive LLAP service. | 
| hive-beeline-log4j2 | Ubah nilai dalam file beeline-log4j2.properties Hive. | Not available. | 
| hive-parquet-logging | Ubah nilai dalam file parquet-logging.properties Hive. | Not available. | 
| hive-env | Ubah nilai dalam lingkungan Hive. | Restarts HiveServer2, HiveMetastore, and Hive HCatalog-Server. Runs Hive schemaTool CLI commands to verify hive-metastore. | 
| hive-exec-log4j2 | Ubah nilai dalam file hive-exec-log 4j2.properties Hive. | Not available. | 
| hive-llap-daemon-log4j2 | Ubah nilai dalam file llap-daemon-log 4j2.properties Hive. | Not available. | 
| hive-log4j2 | Ubah nilai dalam file hive-log4j2.properties Hive. | Not available. | 
| hive-site | Ubah nilai dalam file hive-site.xml Hive | Restarts HiveServer2, HiveMetastore, and Hive HCatalog-Server. Runs Hive schemaTool CLI commands to verify hive-metastore. Also restarts Oozie and Zeppelin. | 
| hiveserver2-site | Ubah nilai dalam file hiveserver2-site.xml Hive Server2 | Not available. | 
| hue-ini | Ubah nilai dalam file ini Hue | Restarts Hue. Also activates Hue config override CLI commands to pick up new configurations. | 
| httpfs-env | Ubah nilai di lingkungan HTTPFS. | Restarts Hadoop Httpfs service. | 
| httpfs-site | Ubah nilai dalam file httpfs-site.xml Hadoop. | Restarts Hadoop Httpfs service. | 
| hadoop-kms-acls | Ubah nilai dalam file kms-acls.xml Hadoop. | Not available. | 
| hadoop-kms-env | Ubah nilai dalam lingkungan Hadoop KMS. | Restarts Hadoop-KMS service. | 
| hadoop-kms-java-home | Ubah rumah java KMS Hadoop | Not available. | 
| hadoop-kms-log4j | Ubah nilai dalam file kms-log4j.properties Hadoop. | Not available. | 
| hadoop-kms-site | Ubah nilai dalam file kms-site.xml Hadoop. | Restarts Hadoop-KMS and Ranger-KMS service. | 
| hudi-env | Ubah nilai di lingkungan Hudi. | Not available. | 
| hudi-defaults | Ubah nilai dalam file hudi-defaults.conf Hudi. | Not available. | 
| iceberg-defaults | Ubah nilai dalam file iceberg-defaults.conf Iceberg. | Not available. | 
| delta-defaults | Ubah nilai dalam file delta-defaults.conf Delta. | Not available. | 
| jupyter-notebook-conf | Ubah nilai dalam file jupyter\$1notebook\$1config.py Jupyter Notebook. | Not available. | 
| jupyter-hub-conf | Ubah nilai dalam JupyterHubs file jupyterhub\$1config.py. | Not available. | 
| jupyter-s3-conf | Konfigurasikan persistensi Jupyter Notebook S3. | Not available. | 
| jupyter-sparkmagic-conf | Ubah nilai dalam file config.json Sparkmagic. | Not available. | 
| livy-conf | Ubah nilai dalam file livy.conf Livy. | Restarts Livy Server. | 
| livy-env | Ubah nilai di lingkungan Livy. | Restarts Livy Server. | 
| livy-log4j2 | Ubah pengaturan Livy log4j2.properties. | Restarts Livy Server. | 
| mapred-env | Ubah nilai di lingkungan MapReduce aplikasi. | Restarts Hadoop MapReduce-HistoryServer. | 
| mapred-site | Ubah nilai dalam file mapred-site.xml MapReduce aplikasi. | Restarts Hadoop MapReduce-HistoryServer. | 
| oozie-env | Ubah nilai di lingkungan Oozie. | Restarts Oozie. | 
| oozie-log4j | Ubah nilai dalam file oozie-log4j.properties Oozie. | Restarts Oozie. | 
| oozie-site | Ubah nilai dalam file oozie-site.xml Oozie. | Restarts Oozie. | 
| phoenix-hbase-metrics | Ubah nilai dalam file hadoop-metrics2-hbase.properties Phoenix. | Not available. | 
| phoenix-hbase-site | Ubah nilai dalam file hbase-site.xml Phoenix. | Not available. | 
| phoenix-log4j | Ubah nilai dalam file log4j.properties Phoenix. | Restarts Phoenix-QueryServer. | 
| phoenix-metrics | Ubah nilai dalam file hadoop-metrics2-phoenix.properties Phoenix. | Not available. | 
| pig-env | Ubah nilai di lingkungan Pig. | Not available. | 
| pig-properties | Ubah nilai dalam file pig.properties Pig. | Restarts Oozie. | 
| pig-log4j | Ubah nilai dalam file log4j.properties Pig. | Not available. | 
| presto-log | Ubah nilai dalam file log.properties Presto. | Restarts Presto-Server (for PrestoDB) | 
| presto-config | Ubah nilai dalam file config.properties Presto. | Restarts Presto-Server (for PrestoDB) | 
| presto-password-authenticator | Ubah nilai dalam file password-authenticator.properties Presto. | Not available. | 
| presto-env | Ubah nilai dalam file presto-env.sh Presto. | Restarts Presto-Server (for PrestoDB) | 
| presto-node | Ubah nilai dalam file node.properties Presto. | Not available. | 
| presto-connector-blackhole | Ubah nilai dalam file blackhole.properties Presto. | Not available. | 
| presto-connector-cassandra | Ubah nilai dalam file cassandra.properties Presto. | Not available. | 
| presto-connector-hive | Ubah nilai dalam file hive.properties Presto. | Restarts Presto-Server (for PrestoDB) | 
| presto-connector-jmx | Ubah nilai dalam file jmx.properties Presto. | Not available. | 
| presto-connector-kafka | Ubah nilai dalam file kafka.properties Presto. | Not available. | 
| presto-connector-lakeformation | Ubah nilai dalam file lakeformation.properties Presto. | Restarts Presto-Server (for PrestoDB) | 
| presto-connector-localfile | Ubah nilai dalam file localfile.properties Presto. | Not available. | 
| presto-connector-memory | Ubah nilai dalam file memory.properties Presto. | Not available. | 
| presto-connector-mongodb | Ubah nilai dalam file mongodb.properties Presto. | Not available. | 
| presto-connector-mysql | Ubah nilai dalam file mysql.properties Presto. | Not available. | 
| presto-connector-postgresql | Ubah nilai dalam file postgresql.properties Presto. | Not available. | 
| presto-connector-raptor | Ubah nilai dalam file raptor.properties Presto. | Not available. | 
| presto-connector-redis | Ubah nilai dalam file redis.properties Presto. | Not available. | 
| presto-connector-redshift | Ubah nilai dalam file redshift.properties Presto. | Not available. | 
| presto-connector-tpch | Ubah nilai dalam file tpch.properties Presto. | Not available. | 
| presto-connector-tpcds | Ubah nilai dalam file tpcds.properties Presto. | Not available. | 
| trino-log | Ubah nilai dalam file log.properties Trino. | Restarts Trino-Server (for Trino) | 
| trino-config | Ubah nilai dalam file config.properties Trino. | Restarts Trino-Server (for Trino) | 
| trino-password-authenticator | Ubah nilai dalam file password-authenticator.properties Trino. | Restarts Trino-Server (for Trino) | 
| trino-env | Ubah nilai dalam file trino-env.sh Trino. | Restarts Trino-Server (for Trino) | 
| trino-node | Ubah nilai dalam file node.properties Trino. | Not available. | 
| trino-connector-blackhole | Ubah nilai dalam file blackhole.properties Trino. | Not available. | 
| trino-connector-cassandra | Ubah nilai dalam file cassandra.properties Trino. | Not available. | 
| trino-connector-delta | Ubah nilai dalam file delta.properties Trino. | Restarts Trino-Server (for Trino) | 
| trino-connector-hive | Ubah nilai dalam file hive.properties Trino. | Restarts Trino-Server (for Trino) | 
| trino-exchange-manager | Ubah nilai dalam file exchange-manager.properties Trino. | Restarts Trino-Server (for Trino) | 
| trino-connector-iceberg | Ubah nilai dalam file iceberg.properties Trino. | Restarts Trino-Server (for Trino) | 
| trino-connector-hudi | Ubah nilai dalam file hudi.properties Trino. | Restarts Trino-Server (for Trino) | 
| trino-connector-jmx | Ubah nilai dalam file jmx.properties Trino. | Not available. | 
| trino-connector-kafka | Ubah nilai dalam file kafka.properties Trino. | Not available. | 
| trino-connector-localfile | Ubah nilai dalam file localfile.properties Trino. | Not available. | 
| trino-connector-memory | Ubah nilai dalam file memory.properties Trino. | Not available. | 
| trino-connector-mongodb | Ubah nilai dalam file mongodb.properties Trino. | Not available. | 
| trino-connector-mysql | Ubah nilai dalam file mysql.properties Trino. | Not available. | 
| trino-connector-postgresql | Ubah nilai dalam file postgresql.properties Trino. | Not available. | 
| trino-connector-raptor | Ubah nilai dalam file raptor.properties Trino. | Not available. | 
| trino-connector-redis | Ubah nilai dalam file redis.properties Trino. | Not available. | 
| trino-connector-redshift | Ubah nilai dalam file redshift.properties Trino. | Not available. | 
| trino-connector-tpch | Ubah nilai dalam file tpch.properties Trino. | Not available. | 
| trino-connector-tpcds | Ubah nilai dalam file tpcds.properties Trino. | Not available. | 
| ranger-kms-dbks-site | Ubah nilai dalam file dbks-site.xml Ranger KMS. | Restarts Ranger KMS Server. | 
| ranger-kms-site | Ubah nilai dalam ranger-kms-site file.xml. dari Ranger KMS. | Restarts Ranger KMS Server. | 
| ranger-kms-env | Ubah nilai di lingkungan Ranger KMS. | Restarts Ranger KMS Server. | 
| ranger-kms-logback | Ubah nilai dalam file kms-logback.xml dari Ranger KMS. | Not available. | 
| ranger-kms-db-ca | Ubah nilai untuk file CA pada S3 untuk koneksi MySQL SSL dengan Ranger KMS. | Not available. | 
| spark | Pengaturan terkurasi Amazon EMR untuk Apache Spark. | This property modifies spark-defaults. See actions there. | 
| spark-defaults | Ubah nilai dalam file spark-defaults.conf Spark. | Restarts Spark history server and Spark thrift server. | 
| spark-env | Ubah nilai di lingkungan Spark. | Restarts Spark history server and Spark thrift server. | 
| spark-hive-site | Ubah nilai dalam file hive-site.xml Spark | Not available. | 
| spark-log4j2 | Ubah nilai dalam file log4j2.properties Spark. | Restarts Spark history server and Spark thrift server. | 
| spark-metrics | Ubah nilai dalam file metrics.properties Spark. | Restarts Spark history server and Spark thrift server. | 
| sqoop-env | Ubah nilai dalam lingkungan Sqoop. | Not available. | 
| sqoop-oraoop-site | Ubah nilai dalam file oraoop-site.xml Sqoop OraOop ini. | Not available. | 
| sqoop-site | Ubah nilai dalam file sqoop-site.xml Sqoop. | Not available. | 
| tez-site | Ubah nilai dalam file tez-site.xml Tez. | Restart Oozie and HiveServer2. | 
| yarn-env | Ubah nilai di lingkungan YARN. | Restarts the Hadoop YARN services ResourceManager, NodeManager, ProxyServer, and TimelineServer. Additionally restarts MapReduce-HistoryServer. | 
| yarn-site | Ubah nilai dalam file yarn-site.xml YARN. | Restarts the Hadoop YARN services ResourceManager, NodeManager, ProxyServer, and TimelineServer. Additionally restarts Livy Server and MapReduce-HistoryServer. | 
| zeppelin-env | Ubah nilai di lingkungan Zeppelin. | Restarts Zeppelin. | 
| zeppelin-site | Ubah pengaturan konfigurasi di zeppelin-site.xml. | Restarts Zeppelin. | 
| zookeeper-config | Ubah nilai dalam ZooKeeper file zoo.cfg. | Restarts Zookeeper server. | 
| zookeeper-logback | Ubah nilai dalam ZooKeeper file logback.xml. | Restarts Zookeeper server. | 
| emr-metrics | Ubah pengaturan metrik emr untuk simpul ini. | Restarts the CloudWatchAgent service. | 

## 7.1.0 perubahan log
<a name="710-changelog"></a>


**Ubah log untuk catatan rilis dan rilis 7.1.0**  

| Date | Peristiwa | Deskripsi | 
| --- | --- | --- | 
| 2025-09-03 | Revisi dokumen | Catatan rilis Amazon EMR 7.1.0 menambahkan masalah yang diketahui | 
| 2024-05-10 | Publikasi Docs | Amazon EMR 7.1.0 catatan rilis pertama kali diterbitkan | 
| 2024-05-10 | Publikasi Docs | Amazon EMR 7.1.0 catatan rilis pertama kali diterbitkan | 
| 2024-05-08 | Penerapan selesai | [Amazon EMR 7.1.0 sepenuhnya diterapkan ke semua Wilayah yang didukung](https://aws.amazon.com/about-aws/global-infrastructure/regional-product-services/) | 
| 2024-04-23 | Rilis awal | Amazon EMR 7.1.0 pertama kali dikerahkan ke Wilayah komersial awal | 

# Amazon EMR rilis 7.0.0
<a name="emr-700-release"></a>

## 7.0.0 versi aplikasi
<a name="emr-700-app-versions"></a>

Rilis ini mencakup aplikasi berikut: [https://docs.aws.amazon.com/AmazonCloudWatch/latest/monitoring/Install-CloudWatch-Agent.html](https://docs.aws.amazon.com/AmazonCloudWatch/latest/monitoring/Install-CloudWatch-Agent.html), [https://delta.io/](https://delta.io/), [https://flink.apache.org/](https://flink.apache.org/), [http://hbase.apache.org/](http://hbase.apache.org/), [https://cwiki.apache.org/confluence/display/Hive/HCatalog](https://cwiki.apache.org/confluence/display/Hive/HCatalog), [http://hive.apache.org/](http://hive.apache.org/), [https://hudi.apache.org](https://hudi.apache.org), [http://gethue.com/](http://gethue.com/), [https://iceberg.apache.org/](https://iceberg.apache.org/), [https://jupyter-enterprise-gateway.readthedocs.io/en/latest/](https://jupyter-enterprise-gateway.readthedocs.io/en/latest/), [https://jupyterhub.readthedocs.io/en/latest/#](https://jupyterhub.readthedocs.io/en/latest/#), [https://livy.incubator.apache.org/](https://livy.incubator.apache.org/), [https://mxnet.incubator.apache.org/](https://mxnet.incubator.apache.org/), [http://oozie.apache.org/](http://oozie.apache.org/), [https://phoenix.apache.org/](https://phoenix.apache.org/), [http://pig.apache.org/](http://pig.apache.org/), [https://prestodb.io/](https://prestodb.io/), [https://spark.apache.org/docs/latest/](https://spark.apache.org/docs/latest/), [http://sqoop.apache.org/](http://sqoop.apache.org/), [https://www.tensorflow.org/](https://www.tensorflow.org/), [https://tez.apache.org/](https://tez.apache.org/), [https://trino.io/](https://trino.io/), [https://zeppelin.incubator.apache.org/](https://zeppelin.incubator.apache.org/), dan [https://zookeeper.apache.org](https://zookeeper.apache.org).

Tabel di bawah ini mencantumkan versi aplikasi yang tersedia dalam rilis Amazon EMR ini dan versi aplikasi dalam tiga rilis EMR Amazon sebelumnya (bila berlaku).

Untuk riwayat lengkap versi aplikasi untuk setiap rilis Amazon EMR, lihat topik berikut:
+ [Versi aplikasi di Amazon EMR 7.x rilis](emr-release-app-versions-7.x.md)
+ [Versi aplikasi di Amazon EMR 6.x rilis](emr-release-app-versions-6.x.md)
+ [Versi aplikasi di Amazon EMR 5.x rilis](emr-release-app-versions-5.x.md)
+ [Versi aplikasi di Amazon EMR 4.x rilis](emr-release-app-versions-4.x.md)


**Informasi versi aplikasi**  

|  | emr-7.3.0 | emr-7.2.0 | emr-7.1.0 | emr-7.0.0 | 
| --- | --- | --- | --- | --- | 
| AWS SDK for Java | 2.25.70, 1.12.747 | 2.23.18, 1.12.705 | 2.23.18, 1.12.656 | 2.20.160-amzn-0, 1.12.569 | 
| Python | 3.9, 3.11 | 3.9, 3.11 | 3.9, 3.11 | 3.9 | 
| Skala | 2.12.18 | 2.12.17 | 2.12.17 | 2.12.17 | 
| AmazonCloudWatchAgent | 1.300032.2-amzn-0 | 1.300032.2-amzn-0 | 1.300032.2-amzn-0 | 1.300031.1-amzn-0 | 
| Delta | 3.2.0-amzn-0 | 3.1.0 | 3.0.0 | 3.0.0 | 
| Flink | 1.18.1-amzn-2 | 1.18.1-amzn-1 | 1.18.1-amzn-0 | 1.18.0-amzn-0 | 
| Ganglia |  -  |  -  |  -  |  -  | 
| HBase | 2.4.17-amzn-7 | 2.4.17-amzn-6 | 2.4.17-amzn-5 | 2.4.17-amzn-4 | 
| HCatalog | 3.1.3-amzn-12 | 3.1.3-amzn-11 | 3.1.3-amzn-10 | 3.1.3-amzn-9 | 
| Hadoop | 3.3.6-amzn-5 | 3.3.6-amzn-4 | 3.3.6-amzn-3 | 3.3.6-amzn-2 | 
| Hive | 3.1.3-amzn-12 | 3.1.3-amzn-11 | 3.1.3-amzn-10 | 3.1.3-amzn-9 | 
| Hudi | 0.15.0-amzn-0 | 0.14.1-amzn-1 | 0.14.1-amzn-0 | 0.14.0-amzn-1 | 
| Hue | 4.11.0 | 4.11.0 | 4.11.0 | 4.11.0 | 
| Iceberg | 1.5.2-amzn-0 | 1.5.0-amzn-0 | 1.4.3-amzn-0 | 1.4.2-amzn-0 | 
| JupyterEnterpriseGateway | 2.6.0 | 2.6.0 | 2.6.0 | 2.6.0 | 
| JupyterHub | 1.5.0 | 1.5.0 | 1.5.0 | 1.5.0 | 
| Livy | 0.8.0-inkubasi | 0.8.0-inkubasi | 0.8.0-inkubasi | 0.7.1-inkubasi | 
| MXNet |  -  | 1.9.1 | 1.9.1 | 1.9.1 | 
| Mahout |  -  |  -  |  -  |  -  | 
| Oozie | 5.2.1 | 5.2.1 | 5.2.1 | 5.2.1 | 
| Phoenix | 5.1.3 | 5.1.3 | 5.1.3 | 5.1.3 | 
| Pig | 0.17.0 | 0.17.0 | 0.17.0 | 0.17.0 | 
| Presto | 0.285-amzn-1 | 0,285-amzn-0 | 0,284-amzn-0 | 0,283-amzn-1 | 
| Spark | 3.5.1-amzn-1 | 3.5.1-amzn-0 | 3.5.0-amzn-1 | 3.5.0-amzn-0 | 
| Sqoop | 1.4.7 | 1.4.7 | 1.4.7 | 1.4.7 | 
| TensorFlow | 2.16.1 | 2.11.0 | 2.11.0 | 2.11.0 | 
| Tez | 0.10.2-amzn-10 | 0.10.2-amzn-9 | 0.10.2-amzn-8 | 0.10.2-amzn-7 | 
| Trino (PrestoSQL) | 442-amzn-0 | 436-amzn-0 | 435-amzn-0 | 426-amzn-1 | 
| Zeppelin | 0.11.1 | 0.10.1 | 0.10.1 | 0.10.1 | 
| ZooKeeper | 3.9.1-amzn-1 | 3.9.1-amzn-1 | 3.9.1-amzn-0 | 3.5.10 | 

## Catatan rilis 7.0.0
<a name="emr-700-relnotes"></a>

Catatan rilis berikut mencakup informasi untuk Amazon EMR rilis 7.0.0. Perubahan relatif terhadap 6.15.0.

**Fitur baru**
+ **Upgrade aplikasi** —Amazon EMR 7.0.0 application upgrades include Python 3.9, Spark 3.5, Flink 1.18, and Delta 3.0. Rilis ini juga menambahkan dukungan untuk [CloudWatch Agen Amazon](emr-AmazonCloudWatchAgent.md) aplikasi dan menghapus dukungan untuk Ganglia.
+ **Amazon Corretto 17** - Amazon EMR merilis 7.0 dan kapal yang lebih tinggi dengan Amazon Corretto 17 (dibangun di OpenJDK) secara default untuk aplikasi yang mendukung Corretto 17 (JDK 17), dengan pengecualian Apache Livy. Untuk informasi selengkapnya tentang versi JDK yang didukung untuk aplikasi dalam rilis ini, lihat. [7.0.0 versi Java default](#emr-700-jdk)
+ **Amazon Linux 2023** - Dengan rilis 7.0, kluster EMR Amazon sekarang berjalan secara default. AL2023 Untuk informasi tentang bagaimana hal ini memengaruhi versi AMI default, lihat [Pertimbangan pembaruan perangkat lunak](https://docs.aws.amazon.com/emr/latest/ManagementGuide/emr-default-ami.html#emr-default-ami-managing) di Panduan Manajemen *EMR Amazon*. Perhatikan juga bahwa Python 2.7 AL2023 dihapus, sehingga setiap komponen yang memerlukan Python sekarang harus ditulis dengan Python 3.
+ **S3 di Outposts** dengan `s3a` - Amazon EMR sekarang mendukung Amazon S3 pada bucket Outposts dengan sistem file. `s3a` Untuk informasi lebih lanjut tentang S3 di Outposts, [lihat Apa itu S3](https://docs.aws.amazon.com/AmazonS3/latest/userguide/S3onOutposts.html) di Outposts? di *Panduan Pengguna Layanan Penyimpanan Sederhana Amazon*.

**Masalah yang diketahui**
+ Perhatikan bahwa Anda tidak dapat menjalankan lebih dari satu baris pada satu waktu jika Anda menggunakan PySpark dengan Python versi 3.10 atau yang lebih baru. Anda harus menjalankan setiap baris satu per satu.
+ Skrip instance-state on-cluster yang memantau kesehatan instance dapat mengkonsumsi CPU dan sumber daya memori yang berlebihan ketika ada sejumlah besar thread yang and/or membuka pegangan file pada node.

**Perubahan, penyempurnaan, dan masalah yang diselesaikan**
+  *Dimulai dengan Spark 3.3.1 (didukung dalam EMR versi 6.10 dan yang lebih baru), semua pelaksana dalam host dekomisioning diatur ke yang baru, yang disebut status DECOMMISSIONING. `ExecutorState`* Pelaksana yang dinonaktifkan tidak dapat digunakan oleh Yarn untuk mengalokasikan tugas dan dengan demikian akan meminta pelaksana baru, jika diperlukan, untuk tugas yang sedang dijalankan. Jadi, jika Anda menonaktifkan Spark DRA saat menggunakan EMR Managed Scaling, EMR Auto Scaling, atau mekanisme penskalaan khusus apa pun pada cluster EMR-EC2, maka Yarn dapat meminta pelaksana maksimum yang diizinkan untuk setiap pekerjaan. Untuk menghindari masalah ini, biarkan `spark.dynamicAllocation.enabled` properti disetel ke `TRUE` (yang merupakan default) saat Anda menggunakan kombinasi fitur di atas. Selain itu, Anda juga dapat mengatur batasan pelaksana minimum dan maksimum dengan menetapkan nilai untuk `spark.dynamicAllocation.maxExecutors` dan `spark.dynamicAllocation.minExecutors` properti untuk pekerjaan Spark Anda, untuk membatasi jumlah pelaksana yang dialokasikan selama eksekusi pekerjaan. 
+ Untuk mempertahankan status semua instance dalam sebuah cluster, Amazon EMR terintegrasi dengan Apache YARN, Apache HDFS, dan Kerberos. Dengan 7.0, kami meningkatkan integrasi ini untuk menghapus status instance yang dihentikan secara andal karena penskalaan atau operasi lainnya. Ini sangat penting untuk cluster berumur panjang yang telah mengelola penskalaan yang diaktifkan, karena mereka sering menskalakan dan mengumpulkan ribuan instance yang dihentikan selama masa hidup mereka.
+ Rilis ini meningkatkan konfigurasi Kerberos untuk hanya menyertakan dukungan untuk cipher berbasis AES. Kerberos KDC dengan cipher berbasis non-AES tidak lagi didukung dengan kluster EMR yang berjalan di Amazon EMR rilis 7.0.0 dan yang lebih tinggi. Cipher berbasis AES menawarkan keamanan terkuat untuk cluster Anda.
+ Sebagai bagian dari migrasi AWS SDK 2.x, Amazon EMR 7.0 menyertakan pembaruan ke konektor Spark Kinesis untuk kompatibilitas. Pembaruan ini tidak tersedia di versi komunitas Apache Spark. Jika Anda menggunakan konektor Spark Kinesis dari rilis EMR Amazon yang lebih rendah dari 7.0, Anda harus memigrasikan kode aplikasi agar berjalan di SDK 2.x sebelum dapat memigrasikan beban kerja ke Amazon EMR 7.0. Untuk informasi selengkapnya, lihat [Migrasi konektor Spark Kinesis ke SDK 2.x untuk Amazon EMR 7.0](migrating-spark-kinesis.md).
+ `aws-sagemaker-spark-sdk`Komponen ini tidak tersedia dari Amazon EMR 7.x dan seterusnya.
+ Saat Anda meluncurkan cluster dengan *rilis patch terbaru* Amazon EMR 5.36 atau lebih tinggi, 6.6 atau lebih tinggi, atau 7.0 atau lebih tinggi, Amazon EMR menggunakan rilis Amazon Linux 2023 atau Amazon Linux 2 terbaru untuk AMI EMR Amazon default. Untuk informasi selengkapnya, lihat [Menggunakan AMI Amazon Linux default untuk Amazon EMR](https://docs.aws.amazon.com/emr/latest/ManagementGuide/emr-default-ami.html).    
[\[See the AWS documentation website for more details\]](http://docs.aws.amazon.com/id_id/emr/latest/ReleaseGuide/emr-700-release.html)

## 7.0.0 versi Java default
<a name="emr-700-jdk"></a>

Amazon EMR merilis 7.0 dan lebih tinggi dikirimkan dengan Amazon Corretto 17 (dibangun di atas OpenJDK) secara default untuk aplikasi yang mendukung Corretto 17 (JDK 17), dengan pengecualian Apache Livy.

Tabel berikut menunjukkan versi Java default untuk aplikasi di Amazon EMR 7.0.0. Jika Anda ingin mengubah JVM default pada cluster Anda, ikuti instruksi [Konfigurasikan aplikasi untuk menggunakan Java Virtual Machine tertentu](configuring-java8.md) untuk setiap aplikasi yang berjalan di cluster. Anda hanya dapat menggunakan satu versi runtime Java untuk sebuah cluster. Amazon EMR tidak mendukung menjalankan node atau aplikasi yang berbeda pada versi runtime yang berbeda pada cluster yang sama.


| Aplikasi | Versi Java/Amazon Corretto (defaultnya tebal) | 
| --- | --- | 
| kuala | 17, 11, 8 | 
| Flink | 11, 8 | 
| HBase | 11, 8 | 
| HCatalog | 17, 11, 8 | 
| Hadoop | 17, 11, 8 | 
| Hive | 17, 11, 8 | 
| Hudi | 17, 11, 8 | 
| Gunung es | 17, 11, 8 | 
| Livy | 17, 11, 8 | 
| Oozie | 17, 11, 8 | 
| Phoenix | 8 | 
| PrestoDB | 8 | 
| Spark | 17, 11, 8 | 
| Spark RAPIDS | 17, 11, 8 | 
| Sqoop | 8 | 
| Tez | 17, 11, 8 | 
| Trino | 17 | 
| Zeppelin | 8 | 
| Pig | 8 | 
| Zookeeper | 8 | 

## 7.0.0 versi komponen
<a name="emr-700-components"></a>

Komponen yang diinstal oleh Amazon EMR dengan rilis ini tercantum di bawah ini. Beberapa komponen diinstal sebagai bagian dari paket aplikasi big data. Sedangkan komponen lainnya bersifak unik untuk Amazon EMR dan diinstal untuk proses sistem dan fitur. Ini biasanya dimulai dengan `emr` atau `aws`. Paket aplikasi big data dalam rilis Amazon EMR terbaru biasanya versi terbaru yang ditemukan di komunitas. Kami menyediakan rilis komunitas di Amazon EMR secepat mungkin.

Beberapa komponen yang ada di Amazon EMR berbeda dari versi komunitas. Komponen ini mempunyai label versi dalam bentuk `CommunityVersion-amzn-EmrVersion`. `EmrVersion` dimulai dari 0. Misalnya, jika komponen komunitas open source bernama `myapp-component` dengan versi 2.2 telah dimodifikasi tiga kali untuk dimasukkan dalam rilis EMR Amazon yang berbeda, versi rilisnya terdaftar sebagai. `2.2-amzn-2`


| Komponen | Versi | Deskripsi | 
| --- | --- | --- | 
| adot-java-agent | 1.31.0 | Agen Java yang mengumpulkan metrik dari daemon aplikasi. | 
| delta | 3.0.0 | Danau Delta adalah format tabel terbuka untuk kumpulan data analitik yang sangat besar | 
| delta-standalone-connectors | 0.6.0 | Delta Connectors menyediakan runtime yang berbeda untuk mengintegrasikan Delta Lake dengan mesin seperti Flink, Hive dan Presto. | 
| emr-amazon-cloudwatch-agent | 1.300031.1-amzn-0 | Aplikasi yang mengumpulkan metrik tingkat sistem internal dan metrik aplikasi khusus dari instans Amazon EC2. | 
| emr-ddb | 5.2.0 | Konektor Amazon DynamoDB untuk aplikasi ekosistem Hadoop. | 
| emr-goodies | 3.9.0 | Perpustakaan kenyamanan ekstra untuk ekosistem Hadoop. | 
| emr-kinesis | 3.13.0 | Konektor Amazon Kinesis untuk aplikasi ekosistem Hadoop. | 
| emr-notebook-env | 1.7.0 | Conda env untuk emr notebook yang mencakup gateway jupyter korporasi | 
| emr-s3-dist-cp | 2.30.0 | Aplikasi salinan terdistribusi yang dioptimalkan untuk Amazon S3. | 
| emr-s3-select | 2.9.0 | EMR S3Select Connector | 
| emr-wal-cli | 1.2.1 | Cli digunakan untuk daftar emrwal/penghapusan. | 
| emrfs | 2.61.0 | Konektor Amazon S3 untuk aplikasi ekosistem Hadoop. | 
| flink-client | 1.18.0-amzn-0 | Skrip dan aplikasi klien baris perintah Apache Flink. | 
| flink-jobmanager-config | 1.18.0-amzn-0 | Mengelola sumber daya pada node EMR untuk Apache Flink. JobManager | 
| hadoop-client | 3.3.6-amzn-2 | Klien baris perintah Hadoop seperti 'hdfs', 'Hadoop', atau 'yarn'. | 
| hadoop-hdfs-datanode | 3.3.6-amzn-2 | Layanan tingkat simpul HDFS untuk menyimpan blok. | 
| hadoop-hdfs-library | 3.3.6-amzn-2 | Klien dan perpustakaan baris perintah HDFS | 
| hadoop-hdfs-namenode | 3.3.6-amzn-2 | Layanan HDFS untuk melacak nama file dan lokasi blok. | 
| hadoop-hdfs-journalnode | 3.3.6-amzn-2 | Layanan HDFS untuk mengelola jurnal filesystem Hadoop pada klaster HA. | 
| hadoop-httpfs-server | 3.3.6-amzn-2 | Titik akhir HTTP untuk operasi HDFS. | 
| hadoop-kms-server | 3.3.6-amzn-2 | Server manajemen kunci kriptografi berdasarkan API Hadoop. KeyProvider  | 
| hadoop-mapred | 3.3.6-amzn-2 | MapReduce pustaka mesin eksekusi untuk menjalankan MapReduce aplikasi. | 
| hadoop-yarn-nodemanager | 3.3.6-amzn-2 | Layanan YARN untuk mengelola kontainer pada simpul individu. | 
| hadoop-yarn-resourcemanager | 3.3.6-amzn-2 | Layanan YARN untuk mengalokasikan dan mengelola sumber daya klaster dan aplikasi terdistribusi. | 
| hadoop-yarn-timeline-server | 3.3.6-amzn-2 | Layanan untuk mengambil informasi terkini dan historis untuk aplikasi YARN. | 
| hbase-hmaster | 2.4.17-amzn-4 | Layanan untuk HBase cluster yang bertanggung jawab untuk koordinasi Daerah dan pelaksanaan perintah administratif. | 
| hbase-region-server | 2.4.17-amzn-4 | Layanan untuk melayani satu atau lebih HBase wilayah. | 
| hbase-client | 2.4.17-amzn-4 | HBase klien baris perintah. | 
| hbase-rest-server | 2.4.17-amzn-4 | Layanan menyediakan titik akhir RESTful HTTP untuk HBase. | 
| hbase-thrift-server | 2.4.17-amzn-4 | Layanan menyediakan titik akhir Thrift ke. HBase | 
| hbase-operator-tools | 2.4.17-amzn-4 | Alat perbaikan untuk HBase cluster Apache. | 
| hcatalog-client | 3.1.3-amzn-9 | Klien baris perintah 'hcat' untuk memanipulasi hcatalog-server. | 
| hcatalog-server | 3.1.3-amzn-9 | Penyediaan layanan HCatalog, tabel dan lapisan manajemen penyimpanan untuk aplikasi terdistribusi. | 
| hcatalog-webhcat-server | 3.1.3-amzn-9 | Titik akhir HTTP menyediakan antarmuka REST ke HCatalog. | 
| hive-client | 3.1.3-amzn-9 | Klien baris perintah Hive. | 
| hive-hbase | 3.1.3-amzn-9 | Klien Hive-hbase. | 
| hive-metastore-server | 3.1.3-amzn-9 | Layanan untuk mengakses metastore Hive, repositori semantik yang menyimpan metadata untuk SQL pada operasi Hadoop. | 
| hive-server2 | 3.1.3-amzn-9 | Layanan untuk menerima kueri Hive sebagai permintaan web. | 
| hudi | 0.14.0-amzn-1 | Kerangka pemrosesan tambahan untuk memberi daya pada pipa data pada latensi rendah dan efisiensi tinggi. | 
| hudi-presto | 0.14.0-amzn-1 | Perpustakaan paket untuk menjalankan Presto dengan Hudi. | 
| hudi-trino | 0.14.0-amzn-1 | Perpustakaan bundel untuk menjalankan Trino dengan Hudi. | 
| hudi-spark | 0.14.0-amzn-1 | Perpustakaan paket untuk menjalankan Spark dengan Hudi. | 
| hue-server | 4.11.0 | Aplikasi web untuk menganalisis data menggunakan aplikasi ekosistem Hadoop | 
| iceberg | 1.4.2-amzn-0 | Apache Iceberg adalah format tabel terbuka untuk kumpulan data analitik besar | 
| jupyterhub | 1.5.0 | Server multi-pengguna untuk notebook Jupyter | 
| livy-server | 0.7.1-inkubasi | Antarmuka REST untuk berinteraksi dengan Apache Spark | 
| nginx | 1.12.1 | nginx [engine x] adalah server HTTP dan server proksi balik | 
| mxnet | 1.9.1 | Perpustakaan yang fleksibel, dapat diskalakan, dan efisien untuk deep learning. | 
| mariadb-server | 5.5.68\$1 | Server basis data MariaDB. | 
| nvidia-cuda | 11.8.0 | Driver Nvidia dan kit alat Cuda | 
| oozie-client | 5.2.1 | Klien baris perintah Oozie. | 
| oozie-server | 5.2.1 | Layanan untuk menerima permintaan alur kerja Oozie. | 
| opencv | 4.7.0 | Perpustakaan Visi Komputer Sumber Terbuka. | 
| phoenix-library | 5.1.3 | Perpustakaan phoenix untuk server dan klien | 
| phoenix-connectors | 5.1.3 | Konektor Apache Phoenix untuk Spark-3 | 
| phoenix-query-server | 6.0.0 | Sebuah server ringan yang menyediakan akses JDBC serta Protocol Buffers dan akses format JSON ke API Avatica  | 
| presto-coordinator | 0,283-amzn-1 | Layanan untuk menerima kueri dan mengelola eksekusi kueri antara presto-worker. | 
| presto-worker | 0,283-amzn-1 | Layanan untuk mengeksekusi potongan kueri. | 
| presto-client | 0,283-amzn-1 | Klien baris perintah Presto yang diinstal pada master klaster HA yang siaga di mana server Presto server tidak dimulai. | 
| trino-coordinator | 426-amzn-1 | Layanan untuk menerima kueri dan mengelola eksekusi kueri di antara trino-workers. | 
| trino-worker | 426-amzn-1 | Layanan untuk mengeksekusi potongan kueri. | 
| trino-client | 426-amzn-1 | Klien baris perintah Trino yang diinstal pada master siaga cluster HA di mana server Trino tidak dimulai. | 
| pig-client | 0.17.0 | Klien baris perintah Pig. | 
| r | 4.3.2 | Proyek R untuk Komputasi Statistik | 
| ranger-kms-server | 2.0.0 | Sistem Pengelolaan Kunci Ranger Apache | 
| spark-client | 3.5.0-amzn-0 | Klien baris perintah Spark. | 
| spark-history-server | 3.5.0-amzn-0 | Web UI untuk melihat log acara untuk seluruh masa pakai aplikasi Spark. | 
| spark-on-yarn | 3.5.0-amzn-0 | Mesin eksekusi dalam memori untuk YARN. | 
| spark-yarn-slave | 3.5.0-amzn-0 | Perpustakaan Apache Spark yang dibutuhkan oleh slave YARN. | 
| spark-rapids | 23.10.0-amzn-0 | Plugin Nvidia Spark RAPIDS yang mempercepat Apache Spark dengan. GPUs | 
| sqoop-client | 1.4.7 | Klien baris perintah Apache Sqoop. | 
| tensorflow | 2.11.0 | TensorFlow pustaka perangkat lunak open source untuk perhitungan numerik kinerja tinggi. | 
| tez-on-yarn | 0.10.2-amzn-7 | Aplikasi dan perpustakaan tez YARN. | 
| tez-on-worker | 0.10.2-amzn-7 | Aplikasi dan pustaka YARN tez untuk node pekerja. | 
| webserver | 2.4.58 | Server HTTP Apache. | 
| zeppelin-server | 0.10.1 | Notebook berbasis web yang memungkinkan analisis data interaktif. | 
| zookeeper-server | 3.5.10 | Layanan terpusat untuk menjaga informasi konfigurasi, penamaan, yang menyediakan sinkronisasi terdistribusi, dan menyediakan layanan grup. | 
| zookeeper-client | 3.5.10 | ZooKeeper klien baris perintah. | 

## 7.0.0 klasifikasi konfigurasi
<a name="emr-700-class"></a>

Klasifikasi konfigurasi memungkinkan Anda menyesuaikan aplikasi. Ini sering kali bersesuaian dengan file XML konfigurasi untuk aplikasi, seperti `hive-site.xml`. Untuk informasi selengkapnya, lihat [Konfigurasikan aplikasi](emr-configure-apps.md).

Tindakan konfigurasi ulang terjadi ketika Anda menentukan konfigurasi untuk grup instans di klaster yang sedang berjalan. Amazon EMR hanya memulai tindakan konfigurasi ulang untuk klasifikasi yang Anda modifikasi. Untuk informasi selengkapnya, lihat [Lakukan konfigurasi ulang pada grup instans di klaster yang sedang berjalan](emr-configure-apps-running-cluster.md).


**klasifikasi emr-7.0.0**  

| Klasifikasi | Deskripsi | Tindakan Konfigurasi Ulang | 
| --- | --- | --- | 
| capacity-scheduler | Ubah nilai dalam file capacity-scheduler.xml Hadoop. | Restarts the ResourceManager service. | 
| container-executor | Ubah nilai dalam file container-executor.cfg Hadoop YARN ini. | Not available. | 
| container-log4j | Ubah nilai dalam file container-log4j.properties Hadoop YARN. | Not available. | 
| core-site | Ubah nilai dalam file core-site.xml Hadoop. | Restarts the Hadoop HDFS services Namenode, SecondaryNamenode, Datanode, ZKFC, and Journalnode. Restarts the Hadoop YARN services ResourceManager, NodeManager, ProxyServer, and TimelineServer. Additionally restarts Hadoop KMS, Ranger KMS, HiveServer2, Hive MetaStore, Hadoop Httpfs, and MapReduce-HistoryServer. | 
| docker-conf | Ubah pengaturan terkait docker. | Not available. | 
| emrfs-site | Ubah pengaturan EMRFS. | Restarts the Hadoop HDFS services Namenode, SecondaryNamenode, Datanode, ZKFC, and Journalnode. Restarts the Hadoop YARN services ResourceManager, NodeManager, ProxyServer, and TimelineServer. Additionally restarts HBaseRegionserver, HBaseMaster, HBaseThrift, HBaseRest, HiveServer2, Hive MetaStore, Hadoop Httpfs, and MapReduce-HistoryServer. | 
| flink-conf | Ubah pengaturan flink-conf.yaml. | Restarts Flink history server. | 
| flink-log4j | Ubah pengaturan log4j.properties Flink. | Restarts Flink history server. | 
| flink-log4j-session | Ubah pengaturan Flink log4j-session.properties untuk sesi. Kubernetes/Yarn  | Restarts Flink history server. | 
| flink-log4j-cli | Ubah pengaturan log4j-cli.properties Flink. | Restarts Flink history server. | 
| hadoop-env | Ubah nilai dalam lingkungan Hadoop untuk semua komponen Hadoop. | Restarts the Hadoop HDFS services Namenode, SecondaryNamenode, Datanode, ZKFC, and Journalnode. Restarts the Hadoop YARN services ResourceManager, NodeManager, ProxyServer, and TimelineServer. Additionally restarts PhoenixQueryserver, HiveServer2, Hive MetaStore, and MapReduce-HistoryServer. | 
| hadoop-log4j | Ubah nilai dalam file log4j.properties Hadoop ini. | Restarts the Hadoop HDFS services SecondaryNamenode, Datanode, and Journalnode. Restarts the Hadoop YARN services ResourceManager, NodeManager, ProxyServer, and TimelineServer. Additionally restarts Hadoop KMS, Hadoop Httpfs, and MapReduce-HistoryServer. | 
| hadoop-ssl-server | Ubah konfigurasi server ssl hadoop | Not available. | 
| hadoop-ssl-client | Ubah konfigurasi klien ssl hadoop | Not available. | 
| hbase | Pengaturan Amazon EMR-curated untuk Apache. HBase | Custom EMR specific property. Sets emrfs-site and hbase-site configs. See those for their associated restarts. | 
| hbase-env | Ubah nilai HBase di lingkungan. | Restarts the HBase services RegionServer, HBaseMaster, ThriftServer, RestServer. | 
| hbase-log4j | Ubah nilai dalam file HBase hbase-log4j.properties. | Restarts the HBase services RegionServer, HBaseMaster, ThriftServer, RestServer. | 
| hbase-metrics | Ubah nilai dalam file HBase hadoop-metrics2-hbase.properties. | Restarts the HBase services RegionServer, HBaseMaster, ThriftServer, RestServer. | 
| hbase-policy | Ubah nilai dalam HBase file hbase-policy.xml. | Not available. | 
| hbase-site | Ubah nilai dalam HBase file hbase-site.xml. | Restarts the HBase services RegionServer, HBaseMaster, ThriftServer, RestServer. Additionally restarts Phoenix QueryServer. | 
| hdfs-encryption-zones | Konfigurasikan zona enkripsi HDFS. | This classification should not be reconfigured. | 
| hdfs-env | Ubah nilai dalam lingkungan HDFS. | Restarts Hadoop HDFS services Namenode, Datanode, and ZKFC. | 
| hdfs-site | Ubah nilai dalam hdfs-site.xml HDFS. | Restarts the Hadoop HDFS services Namenode, SecondaryNamenode, Datanode, ZKFC, and Journalnode. Additionally restarts Hadoop Httpfs. | 
| hcatalog-env | Ubah nilai HCatalog di lingkungan. | Restarts Hive HCatalog Server. | 
| hcatalog-server-jndi | Ubah nilai di HCatalog jndi.properties. | Restarts Hive HCatalog Server. | 
| hcatalog-server-proto-hive-site | Ubah nilai HCatalog proto-hive-site dalam.xml's. | Restarts Hive HCatalog Server. | 
| hcatalog-webhcat-env | Ubah nilai di lingkungan HCatalog WebHCat. | Restarts Hive WebHCat server. | 
| hcatalog-webhcat-log4j2 | Ubah nilai di HCat log4j2.properties HCatalog Web. | Restarts Hive WebHCat server. | 
| hcatalog-webhcat-site | Ubah nilai dalam file webhcat-site.xml HCatalog WebHCat. | Restarts Hive WebHCat server. | 
| hive | Pengaturan dikurasi Amazon EMR untuk Apache Hive. | Sets configurations to launch Hive LLAP service. | 
| hive-beeline-log4j2 | Ubah nilai dalam file beeline-log4j2.properties Hive. | Not available. | 
| hive-parquet-logging | Ubah nilai dalam file parquet-logging.properties Hive. | Not available. | 
| hive-env | Ubah nilai dalam lingkungan Hive. | Restarts HiveServer2, HiveMetastore, and Hive HCatalog-Server. Runs Hive schemaTool CLI commands to verify hive-metastore. | 
| hive-exec-log4j2 | Ubah nilai dalam file hive-exec-log 4j2.properties Hive. | Not available. | 
| hive-llap-daemon-log4j2 | Ubah nilai dalam file llap-daemon-log 4j2.properties Hive. | Not available. | 
| hive-log4j2 | Ubah nilai dalam file hive-log4j2.properties Hive. | Not available. | 
| hive-site | Ubah nilai dalam file hive-site.xml Hive | Restarts HiveServer2, HiveMetastore, and Hive HCatalog-Server. Runs Hive schemaTool CLI commands to verify hive-metastore. Also restarts Oozie and Zeppelin. | 
| hiveserver2-site | Ubah nilai dalam file hiveserver2-site.xml Hive Server2 | Not available. | 
| hue-ini | Ubah nilai dalam file ini Hue | Restarts Hue. Also activates Hue config override CLI commands to pick up new configurations. | 
| httpfs-env | Ubah nilai di lingkungan HTTPFS. | Restarts Hadoop Httpfs service. | 
| httpfs-site | Ubah nilai dalam file httpfs-site.xml Hadoop. | Restarts Hadoop Httpfs service. | 
| hadoop-kms-acls | Ubah nilai dalam file kms-acls.xml Hadoop. | Not available. | 
| hadoop-kms-env | Ubah nilai dalam lingkungan Hadoop KMS. | Restarts Hadoop-KMS service. | 
| hadoop-kms-java-home | Ubah rumah java KMS Hadoop | Not available. | 
| hadoop-kms-log4j | Ubah nilai dalam file kms-log4j.properties Hadoop. | Not available. | 
| hadoop-kms-site | Ubah nilai dalam file kms-site.xml Hadoop. | Restarts Hadoop-KMS and Ranger-KMS service. | 
| hudi-env | Ubah nilai di lingkungan Hudi. | Not available. | 
| hudi-defaults | Ubah nilai dalam file hudi-defaults.conf Hudi. | Not available. | 
| iceberg-defaults | Ubah nilai dalam file iceberg-defaults.conf Iceberg. | Not available. | 
| delta-defaults | Ubah nilai dalam file delta-defaults.conf Delta. | Not available. | 
| jupyter-notebook-conf | Ubah nilai dalam file jupyter\$1notebook\$1config.py Jupyter Notebook. | Not available. | 
| jupyter-hub-conf | Ubah nilai dalam JupyterHubs file jupyterhub\$1config.py. | Not available. | 
| jupyter-s3-conf | Konfigurasikan persistensi Jupyter Notebook S3. | Not available. | 
| jupyter-sparkmagic-conf | Ubah nilai dalam file config.json Sparkmagic. | Not available. | 
| livy-conf | Ubah nilai dalam file livy.conf Livy. | Restarts Livy Server. | 
| livy-env | Ubah nilai di lingkungan Livy. | Restarts Livy Server. | 
| livy-log4j2 | Ubah pengaturan Livy log4j2.properties. | Restarts Livy Server. | 
| mapred-env | Ubah nilai di lingkungan MapReduce aplikasi. | Restarts Hadoop MapReduce-HistoryServer. | 
| mapred-site | Ubah nilai dalam file mapred-site.xml MapReduce aplikasi. | Restarts Hadoop MapReduce-HistoryServer. | 
| oozie-env | Ubah nilai di lingkungan Oozie. | Restarts Oozie. | 
| oozie-log4j | Ubah nilai dalam file oozie-log4j.properties Oozie. | Restarts Oozie. | 
| oozie-site | Ubah nilai dalam file oozie-site.xml Oozie. | Restarts Oozie. | 
| phoenix-hbase-metrics | Ubah nilai dalam file hadoop-metrics2-hbase.properties Phoenix. | Not available. | 
| phoenix-hbase-site | Ubah nilai dalam file hbase-site.xml Phoenix. | Not available. | 
| phoenix-log4j | Ubah nilai dalam file log4j.properties Phoenix. | Restarts Phoenix-QueryServer. | 
| phoenix-metrics | Ubah nilai dalam file hadoop-metrics2-phoenix.properties Phoenix. | Not available. | 
| pig-env | Ubah nilai di lingkungan Pig. | Not available. | 
| pig-properties | Ubah nilai dalam file pig.properties Pig. | Restarts Oozie. | 
| pig-log4j | Ubah nilai dalam file log4j.properties Pig. | Not available. | 
| presto-log | Ubah nilai dalam file log.properties Presto. | Restarts Presto-Server (for PrestoDB) | 
| presto-config | Ubah nilai dalam file config.properties Presto. | Restarts Presto-Server (for PrestoDB) | 
| presto-password-authenticator | Ubah nilai dalam file password-authenticator.properties Presto. | Not available. | 
| presto-env | Ubah nilai dalam file presto-env.sh Presto. | Restarts Presto-Server (for PrestoDB) | 
| presto-node | Ubah nilai dalam file node.properties Presto. | Not available. | 
| presto-connector-blackhole | Ubah nilai dalam file blackhole.properties Presto. | Not available. | 
| presto-connector-cassandra | Ubah nilai dalam file cassandra.properties Presto. | Not available. | 
| presto-connector-hive | Ubah nilai dalam file hive.properties Presto. | Restarts Presto-Server (for PrestoDB) | 
| presto-connector-jmx | Ubah nilai dalam file jmx.properties Presto. | Not available. | 
| presto-connector-kafka | Ubah nilai dalam file kafka.properties Presto. | Not available. | 
| presto-connector-lakeformation | Ubah nilai dalam file lakeformation.properties Presto. | Restarts Presto-Server (for PrestoDB) | 
| presto-connector-localfile | Ubah nilai dalam file localfile.properties Presto. | Not available. | 
| presto-connector-memory | Ubah nilai dalam file memory.properties Presto. | Not available. | 
| presto-connector-mongodb | Ubah nilai dalam file mongodb.properties Presto. | Not available. | 
| presto-connector-mysql | Ubah nilai dalam file mysql.properties Presto. | Not available. | 
| presto-connector-postgresql | Ubah nilai dalam file postgresql.properties Presto. | Not available. | 
| presto-connector-raptor | Ubah nilai dalam file raptor.properties Presto. | Not available. | 
| presto-connector-redis | Ubah nilai dalam file redis.properties Presto. | Not available. | 
| presto-connector-redshift | Ubah nilai dalam file redshift.properties Presto. | Not available. | 
| presto-connector-tpch | Ubah nilai dalam file tpch.properties Presto. | Not available. | 
| presto-connector-tpcds | Ubah nilai dalam file tpcds.properties Presto. | Not available. | 
| trino-log | Ubah nilai dalam file log.properties Trino. | Restarts Trino-Server (for Trino) | 
| trino-config | Ubah nilai dalam file config.properties Trino. | Restarts Trino-Server (for Trino) | 
| trino-password-authenticator | Ubah nilai dalam file password-authenticator.properties Trino. | Restarts Trino-Server (for Trino) | 
| trino-env | Ubah nilai dalam file trino-env.sh Trino. | Restarts Trino-Server (for Trino) | 
| trino-node | Ubah nilai dalam file node.properties Trino. | Not available. | 
| trino-connector-blackhole | Ubah nilai dalam file blackhole.properties Trino. | Not available. | 
| trino-connector-cassandra | Ubah nilai dalam file cassandra.properties Trino. | Not available. | 
| trino-connector-delta | Ubah nilai dalam file delta.properties Trino. | Restarts Trino-Server (for Trino) | 
| trino-connector-hive | Ubah nilai dalam file hive.properties Trino. | Restarts Trino-Server (for Trino) | 
| trino-exchange-manager | Ubah nilai dalam file exchange-manager.properties Trino. | Restarts Trino-Server (for Trino) | 
| trino-connector-iceberg | Ubah nilai dalam file iceberg.properties Trino. | Restarts Trino-Server (for Trino) | 
| trino-connector-hudi | Ubah nilai dalam file hudi.properties Trino. | Restarts Trino-Server (for Trino) | 
| trino-connector-jmx | Ubah nilai dalam file jmx.properties Trino. | Not available. | 
| trino-connector-kafka | Ubah nilai dalam file kafka.properties Trino. | Not available. | 
| trino-connector-localfile | Ubah nilai dalam file localfile.properties Trino. | Not available. | 
| trino-connector-memory | Ubah nilai dalam file memory.properties Trino. | Not available. | 
| trino-connector-mongodb | Ubah nilai dalam file mongodb.properties Trino. | Not available. | 
| trino-connector-mysql | Ubah nilai dalam file mysql.properties Trino. | Not available. | 
| trino-connector-postgresql | Ubah nilai dalam file postgresql.properties Trino. | Not available. | 
| trino-connector-raptor | Ubah nilai dalam file raptor.properties Trino. | Not available. | 
| trino-connector-redis | Ubah nilai dalam file redis.properties Trino. | Not available. | 
| trino-connector-redshift | Ubah nilai dalam file redshift.properties Trino. | Not available. | 
| trino-connector-tpch | Ubah nilai dalam file tpch.properties Trino. | Not available. | 
| trino-connector-tpcds | Ubah nilai dalam file tpcds.properties Trino. | Not available. | 
| ranger-kms-dbks-site | Ubah nilai dalam file dbks-site.xml Ranger KMS. | Restarts Ranger KMS Server. | 
| ranger-kms-site | Ubah nilai dalam ranger-kms-site file.xml. dari Ranger KMS. | Restarts Ranger KMS Server. | 
| ranger-kms-env | Ubah nilai di lingkungan Ranger KMS. | Restarts Ranger KMS Server. | 
| ranger-kms-logback | Ubah nilai dalam file kms-logback.xml dari Ranger KMS. | Not available. | 
| ranger-kms-db-ca | Ubah nilai untuk file CA pada S3 untuk koneksi MySQL SSL dengan Ranger KMS. | Not available. | 
| spark | Pengaturan terkurasi Amazon EMR untuk Apache Spark. | This property modifies spark-defaults. See actions there. | 
| spark-defaults | Ubah nilai dalam file spark-defaults.conf Spark. | Restarts Spark history server and Spark thrift server. | 
| spark-env | Ubah nilai di lingkungan Spark. | Restarts Spark history server and Spark thrift server. | 
| spark-hive-site | Ubah nilai dalam file hive-site.xml Spark | Not available. | 
| spark-log4j2 | Ubah nilai dalam file log4j2.properties Spark. | Restarts Spark history server and Spark thrift server. | 
| spark-metrics | Ubah nilai dalam file metrics.properties Spark. | Restarts Spark history server and Spark thrift server. | 
| sqoop-env | Ubah nilai dalam lingkungan Sqoop. | Not available. | 
| sqoop-oraoop-site | Ubah nilai dalam file oraoop-site.xml Sqoop OraOop ini. | Not available. | 
| sqoop-site | Ubah nilai dalam file sqoop-site.xml Sqoop. | Not available. | 
| tez-site | Ubah nilai dalam file tez-site.xml Tez. | Restart Oozie and HiveServer2. | 
| yarn-env | Ubah nilai di lingkungan YARN. | Restarts the Hadoop YARN services ResourceManager, NodeManager, ProxyServer, and TimelineServer. Additionally restarts MapReduce-HistoryServer. | 
| yarn-site | Ubah nilai dalam file yarn-site.xml YARN. | Restarts the Hadoop YARN services ResourceManager, NodeManager, ProxyServer, and TimelineServer. Additionally restarts Livy Server and MapReduce-HistoryServer. | 
| zeppelin-env | Ubah nilai di lingkungan Zeppelin. | Restarts Zeppelin. | 
| zeppelin-site | Ubah pengaturan konfigurasi di zeppelin-site.xml. | Restarts Zeppelin. | 
| zookeeper-config | Ubah nilai dalam ZooKeeper file zoo.cfg. | Restarts Zookeeper server. | 
| zookeeper-log4j | Ubah nilai dalam file ZooKeeper log4j.properties. | Restarts Zookeeper server. | 

## 7.0.0 perubahan log
<a name="700-changelog"></a>


**Ubah log untuk catatan rilis dan rilis 7.0.0**  

| Date | Peristiwa | Deskripsi | 
| --- | --- | --- | 
| 2025-09-03 | Revisi dokumen | Catatan rilis Amazon EMR 7.0.0 menambahkan masalah yang diketahui | 
| 2023-12-29 | Penerapan selesai | [Amazon EMR 7.0.0 sepenuhnya diterapkan ke semua Wilayah yang didukung](https://aws.amazon.com/about-aws/global-infrastructure/regional-product-services/) | 
| 2023-12-28 | Publikasi Docs | Amazon EMR 7.0.0 catatan rilis pertama kali diterbitkan | 
| 2023-12-19 | Rilis awal | Amazon EMR 7.0.0 pertama kali dikerahkan ke Wilayah komersial awal | 