Memorystore for Redis maintenance changelogs

This page contains a log of maintenance changes. Memorystore for Redis releases maintenance updates for new features, security patches, bug fixes, performance improvements, and more.

You can perform maintenance updates by using self-service maintenance. Memorystore for Redis also performs scheduled maintenance updates once every few months. You can set windows for when maintenance updates occur. For more information, see Find and set maintenance windows.

To view the maintenance version, use the gcloud redis instances describe command. The maintenance version appears next to the maintenanceVersion parameter. For more information, see View instance information. Also, to learn more about maintenance updates, see About maintenance.

To get the latest maintenance changes, add the URL for the XML file of the maintenance changelog for Memorystore for Redis to your feed reader.

20251007_00_00

Date released Release type
2025-10-08 Self-service

Summary

Covered instances Summary
All Redis instances Refresh all versions of the Redis binary to address the CVEs listed in Security patches.

Security patches

CVE-2025-46817, CVE-2025-46818, CVE-2025-46819, CVE-2025-49844

20250806_01_00

Date released Release type
2025-08-29 Self-service

Summary

Covered instances Summary
All Redis instances Refresh the Redis host OS version and the Redis binary to address the CVEs listed in Security patches.

Security patches

CVE-2025-6965, CVE-2025-32463, CVE-2025-32462, CVE-2025-32023, CVE-2025-29768, CVE-2025-27423, CVE-2025-26603, CVE-2025-24014, CVE-2025-23266, CVE-2025-22134, CVE-2025-1215, CVE-2024-5742, CVE-2024-26130

20250701_00_01

Date released Release type
2025-07-23 Self-service

Summary

Covered instances Summary
All Redis instances Refresh the Redis host OS version and sidecar processes to address the CVEs listed in Security patches.

Security patches

CVE-2025-21999, CVE-2025-47273, CVE-2025-21997, CVE-2025-21922, CVE-2024-23653, CVE-2025-1377, CVE-2025-21726, CVE-2024-52006, CVE-2025-22056, CVE-2025-46836, CVE-2024-40635, CVE-2025-48060, CVE-2025-4598, CVE-2024-53427, CVE-2025-5914, CVE-2024-57979, CVE-2025-21964, CVE-2025-21760, CVE-2025-1372, CVE-2025-21887, CVE-2025-21756, CVE-2025-21763, CVE-2024-36903, CVE-2025-22005, CVE-2024-57977, CVE-2016-1585, CVE-2025-22035, CVE-2025-21959, CVE-2025-1365, CVE-2025-1371, CVE-2025-21812, CVE-2024-26739, CVE-2025-1181, CVE-2024-43840, CVE-2024-8176, CVE-2024-36927, CVE-2025-21853, CVE-2025-21796, CVE-2025-21920, CVE-2024-56549, CVE-2023-45288, CVE-2024-24786, CVE-2024-26783, CVE-2025-21898, CVE-2025-32415, CVE-2025-22870, CVE-2025-21980, CVE-2024-35866, CVE-2024-50349, CVE-2025-21762, CVE-2023-52927, CVE-2024-48615, CVE-2025-32728, CVE-2025-21891, CVE-2024-58083, CVE-2025-21727, CVE-2024-50063, CVE-2025-22868, CVE-2025-21919, CVE-2025-32414, CVE-2025-21962, CVE-2025-3198, CVE-2025-1632, CVE-2025-21963, CVE-2025-21867, CVE-2025-37785, CVE-2025-21764, CVE-2024-0553, CVE-2021-37600, CVE-2024-2961, CVE-2023-39804, CVE-2024-28085, CVE-2025-6965, CVE-2025-29087, CVE-2024-37371, CVE-2024-27280, CVE-2018-12886, CVE-2021-32740, CVE-2021-31799, CVE-2020-1751, CVE-2021-41817, CVE-2019-3843, CVE-2019-3844, CVE-2019-12290, CVE-2021-22569, CVE-2023-32731, CVE-2023-50387, CVE-2023-1428, CVE-2024-37370, CVE-2020-10663, CVE-2020-25613, CVE-2023-33953, CVE-2024-7254, CVE-2022-4415, CVE-2021-3997, CVE-2020-8130, CVE-2022-3171, CVE-2023-32732, CVE-2023-5678, CVE-2022-24795, CVE-2018-1000654, CVE-2024-0727, CVE-2021-36086, CVE-2019-9923, CVE-2023-4039, CVE-2021-36085, CVE-2021-33560, CVE-2019-9893, CVE-2024-2398, CVE-2021-36087, CVE-2018-7169, CVE-2007-2379, CVE-2020-14155, CVE-2021-22922, CVE-2021-36084, CVE-2023-29383, CVE-2013-4235, CVE-2019-13627, CVE-2019-19882, CVE-2022-1304, CVE-2017-11164, CVE-2022-48303, CVE-2017-16231, CVE-2021-22923, CVE-2023-28320, CVE-2019-20386, CVE-2023-4806, CVE-2020-13529, CVE-2023-4813, CVE-2019-20838, CVE-2019-15847, CVE-2018-18405, CVE-2019-8457, CVE-2019-14855, CVE-2024-26462, CVE-2019-17543, CVE-2020-16156, CVE-2017-7246, CVE-2023-4641, CVE-2021-20193, CVE-2023-45918, CVE-2023-7008, CVE-2019-18276, CVE-2017-7245, CVE-2020-19909, CVE-2024-2511, CVE-2023-50868, CVE-2024-33599, CVE-2024-5535, CVE-2024-33602, CVE-2024-27282, CVE-2024-4741, CVE-2024-33601, CVE-2024-33600, CVE-2024-27281

20250326_00_00

Date released Release type
2025-03-26 Self-service

Summary

Covered instances Summary
All Redis instances Refresh the Redis host OS version and the Redis binary to address the CVEs listed in Security patches.

Security patches

CVE-2023-44487, CVE-2023-45288, CVE-2024-0131, CVE-2024-0134, CVE-2024-0147, CVE-2024-0149, CVE-2024-0150, CVE-2024-10524, CVE-2024-11053, CVE-2024-12084, CVE-2024-12085, CVE-2024-12086, CVE-2024-12087, CVE-2024-12088, CVE-2024-12747, CVE-2024-13176, CVE-2024-23653, CVE-2024-26982, CVE-2024-40896, CVE-2024-40945, CVE-2024-45306, CVE-2024-45310, CVE-2024-45337, CVE-2024-46981, CVE-2024-47745, CVE-2024-47814, CVE-2024-49861, CVE-2024-49878, CVE-2024-49926, CVE-2024-49927, CVE-2024-49946, CVE-2024-49948, CVE-2024-49949, CVE-2024-49952, CVE-2024-49954, CVE-2024-49959, CVE-2024-49994, CVE-2024-49996, CVE-2024-50010, CVE-2024-50014, CVE-2024-50024, CVE-2024-50036, CVE-2024-50038, CVE-2024-50047, CVE-2024-50055, CVE-2024-50060, CVE-2024-50072, CVE-2024-50082, CVE-2024-50083, CVE-2024-50095, CVE-2024-50099, CVE-2024-50101, CVE-2024-50110, CVE-2024-50115, CVE-2024-50131, CVE-2024-50138, CVE-2024-50141, CVE-2024-50142, CVE-2024-50143, CVE-2024-50147, CVE-2024-50151, CVE-2024-50153, CVE-2024-50154, CVE-2024-50162, CVE-2024-50163, CVE-2024-50164, CVE-2024-50186, CVE-2024-50191, CVE-2024-50192, CVE-2024-50194, CVE-2024-50195, CVE-2024-50215, CVE-2024-50228, CVE-2024-50251, CVE-2024-50256, CVE-2024-50257, CVE-2024-50262, CVE-2024-50271, CVE-2024-50272, CVE-2024-50278, CVE-2024-50279, CVE-2024-50304, CVE-2024-50602, CVE-2024-53042, CVE-2024-53052, CVE-2024-53054, CVE-2024-53066, CVE-2024-53082, CVE-2024-53093, CVE-2024-53096, CVE-2024-53099, CVE-2024-53100, CVE-2024-53113, CVE-2024-53119, CVE-2024-53121, CVE-2024-53124, CVE-2024-53128, CVE-2024-53135, CVE-2024-53136, CVE-2024-53140, CVE-2024-53166, CVE-2024-53170, CVE-2024-53589, CVE-2024-53869, CVE-2024-56664, CVE-2024-57841, CVE-2024-57890, CVE-2024-57949, CVE-2024-57951, CVE-2024-57996, CVE-2024-58005, CVE-2024-58017, CVE-2024-9287, CVE-2024-9341, CVE-2024-9407, CVE-2024-9675, CVE-2024-9681, CVE-2025-0395, CVE-2025-0840, CVE-2025-21631, CVE-2025-21665, CVE-2025-21666, CVE-2025-21667, CVE-2025-21669, CVE-2025-21671, CVE-2025-21683, CVE-2025-21690, CVE-2025-21716, CVE-2025-21745, CVE-2025-21779, CVE-2025-21785, CVE-2025-21791, CVE-2025-21814, CVE-2025-21844, CVE-2025-21846, CVE-2025-21858, CVE-2025-21864, CVE-2025-22869, CVE-2025-26465, CVE-2025-26466, CVE-2025-27113

20241107_00_00

Date released Release type
2024-12-17 Self-service

Summary

Covered instances Summary
All Redis instances Refresh the Redis host OS version to address the CVEs listed in Security patches.

Security patches

CVE-2023-27043, CVE-2023-52889, CVE-2023-7256, CVE-2024-0126, CVE-2024-0132, CVE-2024-0133, CVE-2024-2511, CVE-2024-31227, CVE-2024-31228, CVE-2024-31449, CVE-2024-37370, CVE-2024-37371, CVE-2024-38632, CVE-2024-39472, CVE-2024-41012, CVE-2024-41057, CVE-2024-41058, CVE-2024-41073, CVE-2024-41098, CVE-2024-41957, CVE-2024-41965, CVE-2024-42268, CVE-2024-42269, CVE-2024-42270, CVE-2024-42283, CVE-2024-42285, CVE-2024-42302, CVE-2024-42307, CVE-2024-42316, CVE-2024-43817, CVE-2024-43828, CVE-2024-43837, CVE-2024-43853, CVE-2024-43854, CVE-2024-43855, CVE-2024-43856, CVE-2024-43871, CVE-2024-43873, CVE-2024-43882, CVE-2024-43889, CVE-2024-43892, CVE-2024-43893, CVE-2024-43914, CVE-2024-44940, CVE-2024-44944, CVE-2024-44947, CVE-2024-44952, CVE-2024-44958, CVE-2024-44965, CVE-2024-44970, CVE-2024-44983, CVE-2024-44985, CVE-2024-44986, CVE-2024-44987, CVE-2024-44989, CVE-2024-44990, CVE-2024-45000, CVE-2024-45003, CVE-2024-45018, CVE-2024-45021, CVE-2024-45022, CVE-2024-45025, CVE-2024-45490, CVE-2024-45491, CVE-2024-45492, CVE-2024-4603, CVE-2024-46679, CVE-2024-46686, CVE-2024-46721, CVE-2024-46737, CVE-2024-46738, CVE-2024-46743, CVE-2024-46744, CVE-2024-46750, CVE-2024-46763, CVE-2024-46800, CVE-2024-46829, CVE-2024-46848, CVE-2024-46855, CVE-2024-4741, CVE-2024-47678, CVE-2024-47679, CVE-2024-47682, CVE-2024-47684, CVE-2024-47685, CVE-2024-47692, CVE-2024-47693, CVE-2024-47696, CVE-2024-47701, CVE-2024-47705, CVE-2024-47706, CVE-2024-47707, CVE-2024-47710, CVE-2024-47727, CVE-2024-47728, CVE-2024-47734, CVE-2024-47737, CVE-2024-47739, CVE-2024-47742, CVE-2024-47743, CVE-2024-48957, CVE-2024-48958, CVE-2024-49850, CVE-2024-49851, CVE-2024-49858, CVE-2024-49860, CVE-2024-49870, CVE-2024-49875, CVE-2024-49881, CVE-2024-49883, CVE-2024-49884, CVE-2024-49889, CVE-2024-49936, CVE-2024-49967, CVE-2024-49975, CVE-2024-49978, CVE-2024-49983, CVE-2024-49993, CVE-2024-50000, CVE-2024-50001, CVE-2024-50002, CVE-2024-50006, CVE-2024-50015, CVE-2024-50019, CVE-2024-50033, CVE-2024-50035, CVE-2024-50039, CVE-2024-50045, CVE-2024-50046, CVE-2024-5535, CVE-2024-6119, CVE-2024-6197, CVE-2024-6232, CVE-2024-6345, CVE-2024-6602, CVE-2024-7264, CVE-2024-7592,

20240724_00_00

Date released Release type
2024-08-21 Self-service

Summary

Covered instances Summary
All Redis instances Refresh the Redis host OS version to address the CVEs listed in Security patches.

Security patches

CVE-2024-0607, CVE-2024-0853, CVE-2024-2511, CVE-2024-4741, CVE-2024-6197, CVE-2024-6345, CVE-2024-6387,

20240503_00_00

Date released Release type
2024-05-10 Self-service

Summary

Covered instances Summary
All Redis instances Refresh the Redis Debian OS version to address the CVEs listed in Security patches.

Security patches

CVE-2023-3576, CVE-2023-41175, CVE-2023-46218, CVE-2023-44487, CVE-2023-40745, CVE-2023-44487, CVE-2022-48303, CVE-2023-39804, CVE-2023-47038,

20240411_00_00

Date released Release type
2024-04-12 Self-Service

Summary

Covered instances Summary
Redis 7.2 instances only Adds reliability and performance improvements for Vector Search.

20240328_00_00

Date released Release type
2024-03-28 Self-Service

Summary

Covered instances Summary
Redis 7.2 instances only Adds reliability and performance improvements for Vector Search.

20240220_00_00

Date released Release type
2024-02-20 Self-Service

Summary

Covered instances Summary
All Redis instances Sets the Redis host OS version to cos-105-17412-294-10.
General reliability improvements.

Security patches

CVE-2023-40547, CVE-2023-40548, CVE-2023-40551, CVE-2023-46838, CVE-2024-1085, CVE-2024-1086, CVE-2022-42010, CVE-2022-42011, CVE-2022-42012, CVE-2023-1077, CVE-2023-2156, CVE-2023-31022, CVE-2023-34324, CVE-2023-34969, CVE-2023-35945, CVE-2023-40546, CVE-2023-40549, CVE-2023-40550, CVE-2023-42754, CVE-2023-44487, CVE-2023-45322, CVE-2023-46218, CVE-2023-46813, CVE-2023-46862, CVE-2023-4733, CVE-2023-4734, CVE-2023-4735, CVE-2023-4736, CVE-2023-4738, CVE-2023-4750, CVE-2023-4752, CVE-2023-4781, CVE-2023-48795, CVE-2023-51384, CVE-2023-51385, CVE-2023-52071, CVE-2023-5344, CVE-2023-5441, CVE-2023-5535, CVE-2023-5678, CVE-2023-5717, CVE-2023-6040, CVE-2023-6111, CVE-2023-6531, CVE-2023-6817, CVE-2023-6915, CVE-2023-6931, CVE-2023-6932, CVE-2023-7104, CVE-2023-7192, CVE-2024-0193, CVE-2024-0584, CVE-2024-0646, CVE-2024-22195

20231114_00_00

Date released Release type
2023-11-14 Self-Service

Summary

Covered instances Summary
Redis 6.x instances only Sets the OSS Redis patch version to 6.2.14.
Redix 7.0 instances only Sets the OSS Redis patch version to 7.0.14.
All Redis instances Sets the Redis host OS version to cos-105-17412-226-10.
General reliability improvements.

Security patches

CVE-2022-4415, CVE-2023-0361, CVE-2022-29458, CVE-2022-3821, CVE-2018-1121, CVE-2018-17075, CVE-2018-17142, CVE-2018-17143, CVE-2018-17846, CVE-2018-17847, CVE-2018-17848, CVE-2020-22916, CVE-2022-4269, CVE-2022-47007, CVE-2022-47008, CVE-2022-47010, CVE-2022-47011, CVE-2022-48063, CVE-2022-48064, CVE-2022-48065, CVE-2023-2163, CVE-2023-23914, CVE-2023-28736, CVE-2023-28938, CVE-2023-29499, CVE-2023-3117, CVE-2023-32611, CVE-2023-32636, CVE-2023-32643, CVE-2023-32665, CVE-2023-3338, CVE-2023-38039, CVE-2023-38545, CVE-2023-39189, CVE-2023-39192, CVE-2023-39194, CVE-2023-4015, CVE-2023-4016, CVE-2023-40217, CVE-2023-4206, CVE-2023-4207, CVE-2023-4208, CVE-2023-4244, CVE-2023-42752, CVE-2023-42753, CVE-2023-42756, CVE-2023-4569, CVE-2023-45863, CVE-2023-4622, CVE-2023-4623, CVE-2023-4921

20230821_00_00

Date released Release type
2023-08-21 Automatic Maintenance

Summary

Covered instances Summary
All Redis instances Sets the Redis host OS version to cos-105-17412-156-23.
General reliability improvements.

Security patches

CVE-2023-4128, CVE-2023-3812, CVE-2023-4387, CVE-2023-4147, CVE-2023-29491, CVE-2023-4004, CVE-2023-38408, CVE-2023-3611, CVE-2023-3776, CVE-2023-3623, CVE-2016-4074, CVE-2015-8863, CVE-2022-28737, CVE-2022-3623, CVE-2023-4194, CVE-2023-3995, CVE-2023-3817, CVE-2023-1206, CVE-2023-4459

20230727_00_00

Date released Release type
2023-07-27 Self-Service

Summary

Covered instances Summary
Redis 6.x instances only Sets the OSS Redis patch version to 6.2.13.
Redix 7.0 instances only Sets the OSS Redis patch version to 7.0.12.
All Redis instances Sets the Redis host OS version to cos-105-17412-156-4.
General reliability improvements.

Security patches

CVE-2015-20107, CVE-2020-10735, CVE-2021-28861, CVE-2022-24834, CVE-2022-45061, CVE-2023-1786, CVE-2023-1972, CVE-2023-20867, CVE-2023-2124, CVE-2023-2426, CVE-2023-24329, CVE-2023-25515, CVE-2023-25516, CVE-2023-2609, CVE-2023-2610, CVE-2023-2650, CVE-2023-27534, CVE-2023-28319, CVE-2023-28320, CVE-2023-28321, CVE-2023-28322, CVE-2023-28484, CVE-2023-28856, CVE-2023-29402, CVE-2023-29403, CVE-2023-29404, CVE-2023-29405, CVE-2023-29491, CVE-2023-3090, CVE-2023-31248, CVE-2023-32233, CVE-2023-3268, CVE-2023-3390, CVE-2023-34256, CVE-2023-35001, CVE-2023-36824

20230508_00_00

Date released Release type
2023-05-08 Automatic Maintenance

Summary

Covered instances Summary
Redis 5.x instances only Sets the OSS Redis patch version to 5.0.14.
All Redis instances Sets the Redis host OS version to cos-105-17412-1-71.
General reliability improvements.

Security patches

CVE-2004-0971, CVE-2018-25032, CVE-2020-17437, CVE-2021-20270, CVE-2021-27291, CVE-2021-33574, CVE-2021-3997, CVE-2021-3999, CVE-2021-4122, CVE-2021-4160, CVE-2021-43396, CVE-2022-1154, CVE-2022-1160, CVE-2022-1304, CVE-2022-1381, CVE-2022-1420, CVE-2022-1586, CVE-2022-1587, CVE-2022-1616, CVE-2022-1619, CVE-2022-1620, CVE-2022-1621, CVE-2022-1629, CVE-2022-1664, CVE-2022-1674, CVE-2022-1720, CVE-2022-1733, CVE-2022-1735, CVE-2022-1769, CVE-2022-1771, CVE-2022-1785, CVE-2022-1796, CVE-2022-1851, CVE-2022-1886, CVE-2022-1898, CVE-2022-1927, CVE-2022-1942, CVE-2022-2124, CVE-2022-2125, CVE-2022-2126, CVE-2022-2129, CVE-2022-22943, CVE-2022-23218, CVE-2022-23219, CVE-2022-26280, CVE-2022-2928, CVE-2022-2929, CVE-2022-29824, CVE-2022-34903, CVE-2022-3715, CVE-2022-37434, CVE-2022-37454, CVE-2022-40768, CVE-2022-41723, CVE-2022-41725, CVE-2022-42898, CVE-2022-43750, CVE-2022-44638, CVE-2023-0180, CVE-2023-0183, CVE-2023-0184, CVE-2023-0185, CVE-2023-0187, CVE-2023-0188, CVE-2023-0189

20230322_00_00

Date released Release type
2023-03-29 Self-Service

Summary

Covered instances Summary
Redis 6.x instances only Sets the OSS Redis patch version to 6.2.11. The patch includes CVE fixes CVE-2023-25155 and CVE-2022-36021.
All Redis instances Sets the Redis host OS version to cos-97-16919-235-36.

Security patches

CVE-2023-28466, CVE-2023-26604, CVE-2023-25155, CVE-2023-23931, CVE-2023-23586, CVE-2023-23454, CVE-2023-1355, CVE-2023-1264, CVE-2023-1175, CVE-2023-1170, CVE-2023-1127, CVE-2023-0512, CVE-2023-0461, CVE-2023-0433, CVE-2023-0288, CVE-2023-0286, CVE-2023-0215, CVE-2023-0054, CVE-2023-0051, CVE-2023-0049, CVE-2022-48303, CVE-2022-47946, CVE-2022-47929, CVE-2022-4696, CVE-2022-46663, CVE-2022-4450, CVE-2022-43945, CVE-2022-4378, CVE-2022-4304, CVE-2022-4292, CVE-2022-42915, CVE-2022-4285, CVE-2022-42329, CVE-2022-42328, CVE-2022-4141, CVE-2022-41222, CVE-2022-40897, CVE-2022-40320, CVE-2022-40304, CVE-2022-40303, CVE-2022-39188, CVE-2022-3821, CVE-2022-3705, CVE-2022-36946, CVE-2022-3625, CVE-2022-36123, CVE-2022-36021, CVE-2022-35977, CVE-2022-3586, CVE-2022-35737, CVE-2022-35260, CVE-2022-35252, CVE-2022-3524, CVE-2022-33744, CVE-2022-33743, CVE-2022-3352, CVE-2022-3324, CVE-2022-3297, CVE-2022-3296, CVE-2022-3278, CVE-2022-3256, CVE-2022-3235, CVE-2022-3234, CVE-2022-32296, CVE-2022-32221, CVE-2022-32208, CVE-2022-32207, CVE-2022-32206, CVE-2022-32205, CVE-2022-32149, CVE-2022-3176, CVE-2022-3169, CVE-2022-3153, CVE-2022-3134, CVE-2022-3107, CVE-2022-3104, CVE-2022-31030, CVE-2022-3099, CVE-2022-30594, CVE-2022-3037, CVE-2022-3028, CVE-2022-3016, CVE-2022-30115, CVE-2022-29869, CVE-2022-2982, CVE-2022-2980, CVE-2022-2977, CVE-2022-2959, CVE-2022-29582, CVE-2022-29581, CVE-2022-2946, CVE-2022-29458, CVE-2022-2938, CVE-2022-2923, CVE-2022-29217, CVE-2022-29162, CVE-2022-29154, CVE-2022-2905, CVE-2022-28893, CVE-2022-2889, CVE-2022-2874, CVE-2022-2862, CVE-2022-2849, CVE-2022-2845, CVE-2022-2819, CVE-2022-2817, CVE-2022-2816, CVE-2022-27782, CVE-2022-27781, CVE-2022-27780, CVE-2022-27779, CVE-2022-27778, CVE-2022-27776, CVE-2022-27775, CVE-2022-27774, CVE-2022-27666, CVE-2022-27239, CVE-2022-2602, CVE-2022-2598, CVE-2022-2581, CVE-2022-2580, CVE-2022-2571, CVE-2022-2526, CVE-2022-2522, CVE-2022-2509, CVE-2022-2503, CVE-2022-24769, CVE-2022-24448, CVE-2022-23960, CVE-2022-23648, CVE-2022-23471, CVE-2022-2345, CVE-2022-2344, CVE-2022-2343, CVE-2022-23308, CVE-2022-2327, CVE-2022-2304, CVE-2022-2289, CVE-2022-2288, CVE-2022-2287, CVE-2022-2286, CVE-2022-2285, CVE-2022-2284, CVE-2022-2264, CVE-2022-22576, CVE-2022-2257, CVE-2022-2231, CVE-2022-2210, CVE-2022-2208, CVE-2022-2207, CVE-2022-2206, CVE-2022-2183, CVE-2022-2182, CVE-2022-2175, CVE-2022-21505, CVE-2022-2097, CVE-2022-2068, CVE-2022-20409, CVE-2022-1998, CVE-2022-1786, CVE-2022-1729, CVE-2022-1516, CVE-2022-1508, CVE-2022-1353, CVE-2022-1292, CVE-2022-1271, CVE-2022-1116, CVE-2022-1055, CVE-2022-1012, CVE-2022-1011, CVE-2022-0995, CVE-2022-0943, CVE-2022-0886, CVE-2022-0854, CVE-2022-0850, CVE-2022-0847, CVE-2022-0778, CVE-2022-0729, CVE-2022-0714, CVE-2022-0696, CVE-2022-0696, CVE-2022-0685, CVE-2022-0629, CVE-2022-0617, CVE-2022-0572, CVE-2022-0494, CVE-2022-0492, CVE-2022-0443, CVE-2022-0413, CVE-2022-0408, CVE-2022-0407, CVE-2022-0393, CVE-2022-0392, CVE-2022-0368, CVE-2022-0361, CVE-2022-0359, CVE-2022-0319, CVE-2022-0318, CVE-2022-0264, CVE-2022-0261, CVE-2022-0185, CVE-2022-0168, CVE-2022-0158, CVE-2022-0156, CVE-2022-0128, CVE-2022-0002, CVE-2022-0001, CVE-2021-46848, CVE-2021-46828, CVE-2021-45485, CVE-2021-45402, CVE-2021-45346, CVE-2021-43816, CVE-2021-43784, CVE-2021-43618, CVE-2021-43527, CVE-2021-4209, CVE-2021-4203, CVE-2021-4193, CVE-2021-4192, CVE-2021-4187, CVE-2021-4173, CVE-2021-4166, CVE-2021-41617, CVE-2021-4159, CVE-2021-4157, CVE-2021-4155, CVE-2021-4154, CVE-2021-4148, CVE-2021-4136, CVE-2021-41190, CVE-2021-41103, CVE-2021-4083, CVE-2021-4069, CVE-2021-40528, CVE-2021-4037, CVE-2021-4019, CVE-2021-4002, CVE-2021-4001, CVE-2021-3984, CVE-2021-3974, CVE-2021-3973, CVE-2021-3968, CVE-2021-3928, CVE-2021-3927, CVE-2021-3903, CVE-2021-3875, CVE-2021-3872, CVE-2021-38561, CVE-2021-38205, CVE-2021-3753, CVE-2021-3743, CVE-2021-3732, CVE-2021-3711, CVE-2021-3669, CVE-2021-3580, CVE-2021-35477, CVE-2021-34556, CVE-2021-33656, CVE-2021-31879, CVE-2021-28715, CVE-2021-28714, CVE-2021-26341, CVE-2021-22926, CVE-2021-22924, CVE-2021-22898, CVE-2021-22897, CVE-2021-22890, CVE-2021-22876, CVE-2021-22600, CVE-2021-22570, CVE-2021-22543, CVE-2021-20322, CVE-2021-20321, CVE-2021-20208, CVE-2020-36516, CVE-2020-14387, CVE-2020-13529, CVE-2019-9924, CVE-2019-18276, CVE-2019-17595, CVE-2019-17594