Log delle modifiche per la manutenzione di Memorystore for Redis

Questa pagina contiene un log delle modifiche di manutenzione. Memorystore for Redis rilascia aggiornamenti di manutenzione per nuove funzionalità, patch di sicurezza, correzioni di bug, miglioramenti delle prestazioni e altro ancora.

Gli aggiornamenti di manutenzione possono essere eseguiti da te utilizzando la manutenzione self-service o da Memorystore for Redis tramite aggiornamenti di manutenzione pianificati che vengono eseguiti una volta ogni qualche mese. Per gli aggiornamenti di manutenzione pianificati, puoi impostare finestre per quando si verificano gli aggiornamenti di manutenzione. Per maggiori dettagli, vedi Individuazione e impostazione dei periodi di manutenzione.

Per scoprire di più sugli aggiornamenti di manutenzione, consulta la sezione Informazioni sulla manutenzione di Memorystore for Redis.

Per ricevere gli ultimi aggiornamenti di manutenzione, aggiungi il seguente URL al tuo aggregatore di feed: https://cloud.google.com/feeds/memorystore-for-redis-maintenance-changelog.xml.

20250806_01_00

Date released Tipo di release
2025-08-29 Self-service

Riepilogo

Istanze coperte Riepilogo
Tutte le istanze Redis Aggiorna la versione del sistema operativo host Redis e il binario Redis per risolvere le seguenti vulnerabilità CVE

Patch di sicurezza

CVE-2025-6965, CVE-2025-32463, CVE-2025-32462, CVE-2025-32023, CVE-2025-29768, CVE-2025-27423, CVE-2025-26603, CVE-2025-24014, CVE-2025-23266, CVE-2025-22134, CVE-2025-1215, CVE-2024-5742, CVE-2024-26130

20250701_00_01

Date released Tipo di release
2025-07-23 Self-service

Riepilogo

Istanze coperte Riepilogo
Tutte le istanze Redis Aggiorna la versione del sistema operativo host Redis e i processi secondari per risolvere i seguenti CVE

Patch di sicurezza

CVE-2025-21999, CVE-2025-47273, CVE-2025-21997, CVE-2025-21922, CVE-2024-23653, CVE-2025-1377, CVE-2025-21726, CVE-2024-52006, CVE-2025-22056, CVE-2025-46836, CVE-2024-40635, CVE-2025-48060, CVE-2025-4598, CVE-2024-53427, CVE-2025-5914, CVE-2024-57979, CVE-2025-21964, CVE-2025-21760, CVE-2025-1372, CVE-2025-21887, CVE-2025-21756, CVE-2025-21763, CVE-2024-36903, CVE-2025-22005, CVE-2024-57977, CVE-2016-1585, CVE-2025-22035, CVE-2025-21959, CVE-2025-1365, CVE-2025-1371, CVE-2025-21812, CVE-2024-26739, CVE-2025-1181, CVE-2024-43840, CVE-2024-8176, CVE-2024-36927, CVE-2025-21853, CVE-2025-21796, CVE-2025-21920, CVE-2024-56549, CVE-2023-45288, CVE-2024-24786, CVE-2024-26783, CVE-2025-21898, CVE-2025-32415, CVE-2025-22870, CVE-2025-21980, CVE-2024-35866, CVE-2024-50349, CVE-2025-21762, CVE-2023-52927, CVE-2024-48615, CVE-2025-32728, CVE-2025-21891, CVE-2024-58083, CVE-2025-21727, CVE-2024-50063, CVE-2025-22868, CVE-2025-21919, CVE-2025-32414, CVE-2025-21962, CVE-2025-3198, CVE-2025-1632, CVE-2025-21963, CVE-2025-21867, CVE-2025-37785, CVE-2025-21764, CVE-2024-0553, CVE-2021-37600, CVE-2024-2961, CVE-2023-39804, CVE-2024-28085, CVE-2025-6965, CVE-2025-29087, CVE-2024-37371, CVE-2024-27280, CVE-2018-12886, CVE-2021-32740, CVE-2021-31799, CVE-2020-1751, CVE-2021-41817, CVE-2019-3843, CVE-2019-3844, CVE-2019-12290, CVE-2021-22569, CVE-2023-32731, CVE-2023-50387, CVE-2023-1428, CVE-2024-37370, CVE-2020-10663, CVE-2020-25613, CVE-2023-33953, CVE-2024-7254, CVE-2022-4415, CVE-2021-3997, CVE-2020-8130, CVE-2022-3171, CVE-2023-32732, CVE-2023-5678, CVE-2022-24795, CVE-2018-1000654, CVE-2024-0727, CVE-2021-36086, CVE-2019-9923, CVE-2023-4039, CVE-2021-36085, CVE-2021-33560, CVE-2019-9893, CVE-2024-2398, CVE-2021-36087, CVE-2018-7169, CVE-2007-2379, CVE-2020-14155, CVE-2021-22922, CVE-2021-36084, CVE-2023-29383, CVE-2013-4235, CVE-2019-13627, CVE-2019-19882, CVE-2022-1304, CVE-2017-11164, CVE-2022-48303, CVE-2017-16231, CVE-2021-22923, CVE-2023-28320, CVE-2019-20386, CVE-2023-4806, CVE-2020-13529, CVE-2023-4813, CVE-2019-20838, CVE-2019-15847, CVE-2018-18405, CVE-2019-8457, CVE-2019-14855, CVE-2024-26462, CVE-2019-17543, CVE-2020-16156, CVE-2017-7246, CVE-2023-4641, CVE-2021-20193, CVE-2023-45918, CVE-2023-7008, CVE-2019-18276, CVE-2017-7245, CVE-2020-19909, CVE-2024-2511, CVE-2023-50868, CVE-2024-33599, CVE-2024-5535, CVE-2024-33602, CVE-2024-27282, CVE-2024-4741, CVE-2024-33601, CVE-2024-33600, CVE-2024-27281

20250326_00_00

Date released Tipo di release
2025-03-26 Self-service

Riepilogo

Istanze coperte Riepilogo
Tutte le istanze Redis Aggiorna la versione del sistema operativo host Redis e il binario Redis per risolvere le seguenti vulnerabilità CVE

Patch di sicurezza

CVE-2023-44487, CVE-2023-45288, CVE-2024-0131, CVE-2024-0134, CVE-2024-0147, CVE-2024-0149, CVE-2024-0150, CVE-2024-10524, CVE-2024-11053, CVE-2024-12084, CVE-2024-12085, CVE-2024-12086, CVE-2024-12087, CVE-2024-12088, CVE-2024-12747, CVE-2024-13176, CVE-2024-23653, CVE-2024-26982, CVE-2024-40896, CVE-2024-40945, CVE-2024-45306, CVE-2024-45310, CVE-2024-45337, CVE-2024-46981, CVE-2024-47745, CVE-2024-47814, CVE-2024-49861, CVE-2024-49878, CVE-2024-49926, CVE-2024-49927, CVE-2024-49946, CVE-2024-49948, CVE-2024-49949, CVE-2024-49952, CVE-2024-49954, CVE-2024-49959, CVE-2024-49994, CVE-2024-49996, CVE-2024-50010, CVE-2024-50014, CVE-2024-50024, CVE-2024-50036, CVE-2024-50038, CVE-2024-50047, CVE-2024-50055, CVE-2024-50060, CVE-2024-50072, CVE-2024-50082, CVE-2024-50083, CVE-2024-50095, CVE-2024-50099, CVE-2024-50101, CVE-2024-50110, CVE-2024-50115, CVE-2024-50131, CVE-2024-50138, CVE-2024-50141, CVE-2024-50142, CVE-2024-50143, CVE-2024-50147, CVE-2024-50151, CVE-2024-50153, CVE-2024-50154, CVE-2024-50162, CVE-2024-50163, CVE-2024-50164, CVE-2024-50186, CVE-2024-50191, CVE-2024-50192, CVE-2024-50194, CVE-2024-50195, CVE-2024-50215, CVE-2024-50228, CVE-2024-50251, CVE-2024-50256, CVE-2024-50257, CVE-2024-50262, CVE-2024-50271, CVE-2024-50272, CVE-2024-50278, CVE-2024-50279, CVE-2024-50304, CVE-2024-50602, CVE-2024-53042, CVE-2024-53052, CVE-2024-53054, CVE-2024-53066, CVE-2024-53082, CVE-2024-53093, CVE-2024-53096, CVE-2024-53099, CVE-2024-53100, CVE-2024-53113, CVE-2024-53119, CVE-2024-53121, CVE-2024-53124, CVE-2024-53128, CVE-2024-53135, CVE-2024-53136, CVE-2024-53140, CVE-2024-53166, CVE-2024-53170, CVE-2024-53589, CVE-2024-53869, CVE-2024-56664, CVE-2024-57841, CVE-2024-57890, CVE-2024-57949, CVE-2024-57951, CVE-2024-57996, CVE-2024-58005, CVE-2024-58017, CVE-2024-9287, CVE-2024-9341, CVE-2024-9407, CVE-2024-9675, CVE-2024-9681, CVE-2025-0395, CVE-2025-0840, CVE-2025-21631, CVE-2025-21665, CVE-2025-21666, CVE-2025-21667, CVE-2025-21669, CVE-2025-21671, CVE-2025-21683, CVE-2025-21690, CVE-2025-21716, CVE-2025-21745, CVE-2025-21779, CVE-2025-21785, CVE-2025-21791, CVE-2025-21814, CVE-2025-21844, CVE-2025-21846, CVE-2025-21858, CVE-2025-21864, CVE-2025-22869, CVE-2025-26465, CVE-2025-26466, CVE-2025-27113

20241107_00_00

Date released Tipo di release
2024-12-17 Self-service

Riepilogo

Istanze coperte Riepilogo
Tutte le istanze Redis Aggiorna la versione del sistema operativo host Redis per risolvere le seguenti vulnerabilità CVE

Patch di sicurezza

CVE-2023-27043, CVE-2023-52889, CVE-2023-7256, CVE-2024-0126, CVE-2024-0132, CVE-2024-0133, CVE-2024-2511, CVE-2024-31227, CVE-2024-31228, CVE-2024-31449, CVE-2024-37370, CVE-2024-37371, CVE-2024-38632, CVE-2024-39472, CVE-2024-41012, CVE-2024-41057, CVE-2024-41058, CVE-2024-41073, CVE-2024-41098, CVE-2024-41957, CVE-2024-41965, CVE-2024-42268, CVE-2024-42269, CVE-2024-42270, CVE-2024-42283, CVE-2024-42285, CVE-2024-42302, CVE-2024-42307, CVE-2024-42316, CVE-2024-43817, CVE-2024-43828, CVE-2024-43837, CVE-2024-43853, CVE-2024-43854, CVE-2024-43855, CVE-2024-43856, CVE-2024-43871, CVE-2024-43873, CVE-2024-43882, CVE-2024-43889, CVE-2024-43892, CVE-2024-43893, CVE-2024-43914, CVE-2024-44940, CVE-2024-44944, CVE-2024-44947, CVE-2024-44952, CVE-2024-44958, CVE-2024-44965, CVE-2024-44970, CVE-2024-44983, CVE-2024-44985, CVE-2024-44986, CVE-2024-44987, CVE-2024-44989, CVE-2024-44990, CVE-2024-45000, CVE-2024-45003, CVE-2024-45018, CVE-2024-45021, CVE-2024-45022, CVE-2024-45025, CVE-2024-45490, CVE-2024-45491, CVE-2024-45492, CVE-2024-4603, CVE-2024-46679, CVE-2024-46686, CVE-2024-46721, CVE-2024-46737, CVE-2024-46738, CVE-2024-46743, CVE-2024-46744, CVE-2024-46750, CVE-2024-46763, CVE-2024-46800, CVE-2024-46829, CVE-2024-46848, CVE-2024-46855, CVE-2024-4741, CVE-2024-47678, CVE-2024-47679, CVE-2024-47682, CVE-2024-47684, CVE-2024-47685, CVE-2024-47692, CVE-2024-47693, CVE-2024-47696, CVE-2024-47701, CVE-2024-47705, CVE-2024-47706, CVE-2024-47707, CVE-2024-47710, CVE-2024-47727, CVE-2024-47728, CVE-2024-47734, CVE-2024-47737, CVE-2024-47739, CVE-2024-47742, CVE-2024-47743, CVE-2024-48957, CVE-2024-48958, CVE-2024-49850, CVE-2024-49851, CVE-2024-49858, CVE-2024-49860, CVE-2024-49870, CVE-2024-49875, CVE-2024-49881, CVE-2024-49883, CVE-2024-49884, CVE-2024-49889, CVE-2024-49936, CVE-2024-49967, CVE-2024-49975, CVE-2024-49978, CVE-2024-49983, CVE-2024-49993, CVE-2024-50000, CVE-2024-50001, CVE-2024-50002, CVE-2024-50006, CVE-2024-50015, CVE-2024-50019, CVE-2024-50033, CVE-2024-50035, CVE-2024-50039, CVE-2024-50045, CVE-2024-50046, CVE-2024-5535, CVE-2024-6119, CVE-2024-6197, CVE-2024-6232, CVE-2024-6345, CVE-2024-6602, CVE-2024-7264, CVE-2024-7592,

20240724_00_00

Date released Tipo di release
2024-08-21 Self-service

Riepilogo

Istanze coperte Riepilogo
Tutte le istanze Redis Aggiorna la versione del sistema operativo host Redis per risolvere le seguenti vulnerabilità CVE

Patch di sicurezza

CVE-2024-0607, CVE-2024-0853, CVE-2024-2511, CVE-2024-4741, CVE-2024-6197, CVE-2024-6345, CVE-2024-6387,

20240503_00_00

Date released Tipo di release
2024-05-10 Self-service

Riepilogo

Istanze coperte Riepilogo
Tutte le istanze Redis Aggiorna la versione del sistema operativo Debian di Redis per risolvere i seguenti CVE

Patch di sicurezza

CVE-2023-3576, CVE-2023-41175, CVE-2023-46218, CVE-2023-44487, CVE-2023-40745, CVE-2023-44487, CVE-2022-48303, CVE-2023-39804, CVE-2023-47038,

20240411_00_00

Date released Tipo di release
2024-04-12 Self-service

Riepilogo

Istanze coperte Riepilogo
Solo istanze Redis 7.2 Aggiunge miglioramenti di affidabilità e prestazioni per la ricerca vettoriale.

20240328_00_00

Date released Tipo di release
2024-03-28 Self-service

Riepilogo

Istanze coperte Riepilogo
Solo istanze Redis 7.2 Aggiunge miglioramenti di affidabilità e prestazioni per la ricerca vettoriale.

20240220_00_00

Date released Tipo di release
2024-02-20 Self-service

Riepilogo

Istanze coperte Riepilogo
Tutte le istanze Redis Imposta la versione del sistema operativo host Redis su cos-105-17412-294-10.
Miglioramenti generali dell'affidabilità.

Patch di sicurezza

CVE-2023-40547, CVE-2023-40548, CVE-2023-40551, CVE-2023-46838, CVE-2024-1085, CVE-2024-1086, CVE-2022-42010, CVE-2022-42011, CVE-2022-42012, CVE-2023-1077, CVE-2023-2156, CVE-2023-31022, CVE-2023-34324, CVE-2023-34969, CVE-2023-35945, CVE-2023-40546, CVE-2023-40549, CVE-2023-40550, CVE-2023-42754, CVE-2023-44487, CVE-2023-45322, CVE-2023-46218, CVE-2023-46813, CVE-2023-46862, CVE-2023-4733, CVE-2023-4734, CVE-2023-4735, CVE-2023-4736, CVE-2023-4738, CVE-2023-4750, CVE-2023-4752, CVE-2023-4781, CVE-2023-48795, CVE-2023-51384, CVE-2023-51385, CVE-2023-52071, CVE-2023-5344, CVE-2023-5441, CVE-2023-5535, CVE-2023-5678, CVE-2023-5717, CVE-2023-6040, CVE-2023-6111, CVE-2023-6531, CVE-2023-6817, CVE-2023-6915, CVE-2023-6931, CVE-2023-6932, CVE-2023-7104, CVE-2023-7192, CVE-2024-0193, CVE-2024-0584, CVE-2024-0646, CVE-2024-22195

20231114_00_00

Date released Tipo di release
2023-11-14 Self-service

Riepilogo

Istanze coperte Riepilogo
Solo istanze Redis 6.x Imposta la versione della patch OSS Redis su 6.2.14.
Solo istanze Redis 7.0 Imposta la versione della patch OSS Redis su 7.0.14.
Tutte le istanze Redis Imposta la versione del sistema operativo host Redis su cos-105-17412-226-10.
Miglioramenti generali dell'affidabilità.

Patch di sicurezza

CVE-2022-4415, CVE-2023-0361, CVE-2022-29458, CVE-2022-3821, CVE-2018-1121, CVE-2018-17075, CVE-2018-17142, CVE-2018-17143, CVE-2018-17846, CVE-2018-17847, CVE-2018-17848, CVE-2020-22916, CVE-2022-4269, CVE-2022-47007, CVE-2022-47008, CVE-2022-47010, CVE-2022-47011, CVE-2022-48063, CVE-2022-48064, CVE-2022-48065, CVE-2023-2163, CVE-2023-23914, CVE-2023-28736, CVE-2023-28938, CVE-2023-29499, CVE-2023-3117, CVE-2023-32611, CVE-2023-32636, CVE-2023-32643, CVE-2023-32665, CVE-2023-3338, CVE-2023-38039, CVE-2023-38545, CVE-2023-39189, CVE-2023-39192, CVE-2023-39194, CVE-2023-4015, CVE-2023-4016, CVE-2023-40217, CVE-2023-4206, CVE-2023-4207, CVE-2023-4208, CVE-2023-4244, CVE-2023-42752, CVE-2023-42753, CVE-2023-42756, CVE-2023-4569, CVE-2023-45863, CVE-2023-4622, CVE-2023-4623, CVE-2023-4921

20230821_00_00

Date released Tipo di release
2023-08-21 Manutenzione automatica

Riepilogo

Istanze coperte Riepilogo
Tutte le istanze Redis Imposta la versione del sistema operativo host Redis su cos-105-17412-156-23.
Miglioramenti generali dell'affidabilità.

Patch di sicurezza

CVE-2023-4128, CVE-2023-3812, CVE-2023-4387, CVE-2023-4147, CVE-2023-29491, CVE-2023-4004, CVE-2023-38408, CVE-2023-3611, CVE-2023-3776, CVE-2023-3623, CVE-2016-4074, CVE-2015-8863, CVE-2022-28737, CVE-2022-3623, CVE-2023-4194, CVE-2023-3995, CVE-2023-3817, CVE-2023-1206, CVE-2023-4459

20230727_00_00

Date released Tipo di release
2023-07-27 Self-service

Riepilogo

Istanze coperte Riepilogo
Solo istanze Redis 6.x Imposta la versione della patch OSS Redis su 6.2.13.
Solo istanze Redis 7.0 Imposta la versione patch di OSS Redis su 7.0.12.
Tutte le istanze Redis Imposta la versione del sistema operativo host Redis su cos-105-17412-156-4.
Miglioramenti generali dell'affidabilità.

Patch di sicurezza

CVE-2015-20107, CVE-2020-10735, CVE-2021-28861, CVE-2022-24834, CVE-2022-45061, CVE-2023-1786, CVE-2023-1972, CVE-2023-20867, CVE-2023-2124, CVE-2023-2426, CVE-2023-24329, CVE-2023-25515, CVE-2023-25516, CVE-2023-2609, CVE-2023-2610, CVE-2023-2650, CVE-2023-27534, CVE-2023-28319, CVE-2023-28320, CVE-2023-28321, CVE-2023-28322, CVE-2023-28484, CVE-2023-28856, CVE-2023-29402, CVE-2023-29403, CVE-2023-29404, CVE-2023-29405, CVE-2023-29491, CVE-2023-3090, CVE-2023-31248, CVE-2023-32233, CVE-2023-3268, CVE-2023-3390, CVE-2023-34256, CVE-2023-35001, CVE-2023-36824

20230508_00_00

Date released Tipo di release
2023-05-08 Manutenzione automatica

Riepilogo

Istanze coperte Riepilogo
Solo istanze Redis 5.x Imposta la versione della patch OSS Redis su 5.0.14.
Tutte le istanze Redis Imposta la versione del sistema operativo host Redis su cos-105-17412-1-71.
Miglioramenti generali dell'affidabilità.

Patch di sicurezza

CVE-2004-0971, CVE-2018-25032, CVE-2020-17437, CVE-2021-20270, CVE-2021-27291, CVE-2021-33574, CVE-2021-3997, CVE-2021-3999, CVE-2021-4122, CVE-2021-4160, CVE-2021-43396, CVE-2022-1154, CVE-2022-1160, CVE-2022-1304, CVE-2022-1381, CVE-2022-1420, CVE-2022-1586, CVE-2022-1587, CVE-2022-1616, CVE-2022-1619, CVE-2022-1620, CVE-2022-1621, CVE-2022-1629, CVE-2022-1664, CVE-2022-1674, CVE-2022-1720, CVE-2022-1733, CVE-2022-1735, CVE-2022-1769, CVE-2022-1771, CVE-2022-1785, CVE-2022-1796, CVE-2022-1851, CVE-2022-1886, CVE-2022-1898, CVE-2022-1927, CVE-2022-1942, CVE-2022-2124, CVE-2022-2125, CVE-2022-2126, CVE-2022-2129, CVE-2022-22943, CVE-2022-23218, CVE-2022-23219, CVE-2022-26280, CVE-2022-2928, CVE-2022-2929, CVE-2022-29824, CVE-2022-34903, CVE-2022-3715, CVE-2022-37434, CVE-2022-37454, CVE-2022-40768, CVE-2022-41723, CVE-2022-41725, CVE-2022-42898, CVE-2022-43750, CVE-2022-44638, CVE-2023-0180, CVE-2023-0183, CVE-2023-0184, CVE-2023-0185, CVE-2023-0187, CVE-2023-0188, CVE-2023-0189

20230322_00_00

Date released Tipo di release
2023-03-29 Self-service

Riepilogo

Istanze coperte Riepilogo
Solo istanze Redis 6.x Imposta la versione della patch OSS Redis su 6.2.11. La patch include le correzioni CVE CVE-2023-25155 e CVE-2022-36021.
Tutte le istanze Redis Imposta la versione del sistema operativo host Redis su cos-97-16919-235-36.

Patch di sicurezza

CVE-2023-28466, CVE-2023-26604, CVE-2023-25155, CVE-2023-23931, CVE-2023-23586, CVE-2023-23454, CVE-2023-1355, CVE-2023-1264, CVE-2023-1175, CVE-2023-1170, CVE-2023-1127, CVE-2023-0512, CVE-2023-0461, CVE-2023-0433, CVE-2023-0288, CVE-2023-0286, CVE-2023-0215, CVE-2023-0054, CVE-2023-0051, CVE-2023-0049, CVE-2022-48303, CVE-2022-47946, CVE-2022-47929, CVE-2022-4696, CVE-2022-46663, CVE-2022-4450, CVE-2022-43945, CVE-2022-4378, CVE-2022-4304, CVE-2022-4292, CVE-2022-42915, CVE-2022-4285, CVE-2022-42329, CVE-2022-42328, CVE-2022-4141, CVE-2022-41222, CVE-2022-40897, CVE-2022-40320, CVE-2022-40304, CVE-2022-40303, CVE-2022-39188, CVE-2022-3821, CVE-2022-3705, CVE-2022-36946, CVE-2022-3625, CVE-2022-36123, CVE-2022-36021, CVE-2022-35977, CVE-2022-3586, CVE-2022-35737, CVE-2022-35260, CVE-2022-35252, CVE-2022-3524, CVE-2022-33744, CVE-2022-33743, CVE-2022-3352, CVE-2022-3324, CVE-2022-3297, CVE-2022-3296, CVE-2022-3278, CVE-2022-3256, CVE-2022-3235, CVE-2022-3234, CVE-2022-32296, CVE-2022-32221, CVE-2022-32208, CVE-2022-32207, CVE-2022-32206, CVE-2022-32205, CVE-2022-32149, CVE-2022-3176, CVE-2022-3169, CVE-2022-3153, CVE-2022-3134, CVE-2022-3107, CVE-2022-3104, CVE-2022-31030, CVE-2022-3099, CVE-2022-30594, CVE-2022-3037, CVE-2022-3028, CVE-2022-3016, CVE-2022-30115, CVE-2022-29869, CVE-2022-2982, CVE-2022-2980, CVE-2022-2977, CVE-2022-2959, CVE-2022-29582, CVE-2022-29581, CVE-2022-2946, CVE-2022-29458, CVE-2022-2938, CVE-2022-2923, CVE-2022-29217, CVE-2022-29162, CVE-2022-29154, CVE-2022-2905, CVE-2022-28893, CVE-2022-2889, CVE-2022-2874, CVE-2022-2862, CVE-2022-2849, CVE-2022-2845, CVE-2022-2819, CVE-2022-2817, CVE-2022-2816, CVE-2022-27782, CVE-2022-27781, CVE-2022-27780, CVE-2022-27779, CVE-2022-27778, CVE-2022-27776, CVE-2022-27775, CVE-2022-27774, CVE-2022-27666, CVE-2022-27239, CVE-2022-2602, CVE-2022-2598, CVE-2022-2581, CVE-2022-2580, CVE-2022-2571, CVE-2022-2526, CVE-2022-2522, CVE-2022-2509, CVE-2022-2503, CVE-2022-24769, CVE-2022-24448, CVE-2022-23960, CVE-2022-23648, CVE-2022-23471, CVE-2022-2345, CVE-2022-2344, CVE-2022-2343, CVE-2022-23308, CVE-2022-2327, CVE-2022-2304, CVE-2022-2289, CVE-2022-2288, CVE-2022-2287, CVE-2022-2286, CVE-2022-2285, CVE-2022-2284, CVE-2022-2264, CVE-2022-22576, CVE-2022-2257, CVE-2022-2231, CVE-2022-2210, CVE-2022-2208, CVE-2022-2207, CVE-2022-2206, CVE-2022-2183, CVE-2022-2182, CVE-2022-2175, CVE-2022-21505, CVE-2022-2097, CVE-2022-2068, CVE-2022-20409, CVE-2022-1998, CVE-2022-1786, CVE-2022-1729, CVE-2022-1516, CVE-2022-1508, CVE-2022-1353, CVE-2022-1292, CVE-2022-1271, CVE-2022-1116, CVE-2022-1055, CVE-2022-1012, CVE-2022-1011, CVE-2022-0995, CVE-2022-0943, CVE-2022-0886, CVE-2022-0854, CVE-2022-0850, CVE-2022-0847, CVE-2022-0778, CVE-2022-0729, CVE-2022-0714, CVE-2022-0696, CVE-2022-0696, CVE-2022-0685, CVE-2022-0629, CVE-2022-0617, CVE-2022-0572, CVE-2022-0494, CVE-2022-0492, CVE-2022-0443, CVE-2022-0413, CVE-2022-0408, CVE-2022-0407, CVE-2022-0393, CVE-2022-0392, CVE-2022-0368, CVE-2022-0361, CVE-2022-0359, CVE-2022-0319, CVE-2022-0318, CVE-2022-0264, CVE-2022-0261, CVE-2022-0185, CVE-2022-0168, CVE-2022-0158, CVE-2022-0156, CVE-2022-0128, CVE-2022-0002, CVE-2022-0001, CVE-2021-46848, CVE-2021-46828, CVE-2021-45485, CVE-2021-45402, CVE-2021-45346, CVE-2021-43816, CVE-2021-43784, CVE-2021-43618, CVE-2021-43527, CVE-2021-4209, CVE-2021-4203, CVE-2021-4193, CVE-2021-4192, CVE-2021-4187, CVE-2021-4173, CVE-2021-4166, CVE-2021-41617, CVE-2021-4159, CVE-2021-4157, CVE-2021-4155, CVE-2021-4154, CVE-2021-4148, CVE-2021-4136, CVE-2021-41190, CVE-2021-41103, CVE-2021-4083, CVE-2021-4069, CVE-2021-40528, CVE-2021-4037, CVE-2021-4019, CVE-2021-4002, CVE-2021-4001, CVE-2021-3984, CVE-2021-3974, CVE-2021-3973, CVE-2021-3968, CVE-2021-3928, CVE-2021-3927, CVE-2021-3903, CVE-2021-3875, CVE-2021-3872, CVE-2021-38561, CVE-2021-38205, CVE-2021-3753, CVE-2021-3743, CVE-2021-3732, CVE-2021-3711, CVE-2021-3669, CVE-2021-3580, CVE-2021-35477, CVE-2021-34556, CVE-2021-33656, CVE-2021-31879, CVE-2021-28715, CVE-2021-28714, CVE-2021-26341, CVE-2021-22926, CVE-2021-22924, CVE-2021-22898, CVE-2021-22897, CVE-2021-22890, CVE-2021-22876, CVE-2021-22600, CVE-2021-22570, CVE-2021-22543, CVE-2021-20322, CVE-2021-20321, CVE-2021-20208, CVE-2020-36516, CVE-2020-14387, CVE-2020-13529, CVE-2019-9924, CVE-2019-18276, CVE-2019-17595, CVE-2019-17594