Log delle modifiche di manutenzione di Memorystore for Redis

Questa pagina contiene un log delle modifiche di manutenzione. Release di Memorystore for Redis aggiornamenti di manutenzione per nuove funzionalità, patch di sicurezza, correzioni di bug, prestazioni miglioramenti e altro ancora.

Gli aggiornamenti di manutenzione possono essere eseguiti da te utilizzando manutenzione self-service o tramite Memorystore for Redis tramite aggiornamenti di manutenzione pianificati che si verificano una volta a intervalli di qualche mese. Per gli aggiornamenti di manutenzione pianificati, puoi impostare finestre per quando vengono eseguiti aggiornamenti di manutenzione. Per maggiori dettagli, vedi Trovare e impostare periodi di manutenzione.

Per scoprire di più sugli aggiornamenti di manutenzione, consulta Informazioni sulla manutenzione di Memorystore for Redis

Per ricevere le ultime modifiche di manutenzione, aggiungi il seguente URL a nel tuo lettore di feed: https://cloud.google.com/feeds/memorystore-for-redis-maintenance-changelog.xml.

20240503_00_00

Data di uscita Tipo di release
2024-05-10 Self-service

Riepilogo

Istanze coperte Riepilogo
Tutte le istanze Redis Aggiorna la versione di Redis debian OS per risolvere le seguenti CVE

Patch di sicurezza

CVE-2023-3576, CVE-2023-41175, CVE-2023-46218, CVE-2023-44487, CVE-2023-40745, CVE-2023-44487, CVE-2022-48303, CVE-2023-39804, CVE-2023-47038,

20240411_00_00

Data di uscita Tipo di release
2024-04-12 Self-service

Riepilogo

Istanze coperte Riepilogo
Solo istanze Redis 7.2 Aggiunge miglioramenti all'affidabilità e alle prestazioni per la ricerca vettoriale.

20240328_00_00

Data di uscita Tipo di release
2024-03-28 Self-service

Riepilogo

Istanze coperte Riepilogo
Solo istanze Redis 7.2 Aggiunge miglioramenti all'affidabilità e alle prestazioni per la ricerca vettoriale.

20240220_00_00

Data di uscita Tipo di release
2024-02-20 Self-service

Riepilogo

Istanze coperte Riepilogo
Tutte le istanze Redis Imposta la versione del sistema operativo dell'host Redis su cos-105-17412-294-10.
Miglioramenti generali dell'affidabilità.

Patch di sicurezza

CVE-2023-40547, CVE-2023-40548, CVE-2023-40551, CVE-2023-46838, CVE-2024-1085, CVE-2024-1086, CVE-2022-42010, CVE-2022-42011, CVE-2022-42012, CVE-2023-1077, CVE-2023-2156, CVE-2023-31022, CVE-2023-34324, CVE-2023-34969, CVE-2023-35945, CVE-2023-40546, CVE-2023-40549, CVE-2023-40550, CVE-2023-42754, CVE-2023-44487, CVE-2023-45322, CVE-2023-46218, CVE-2023-46813, CVE-2023-46862, CVE-2023-4733, CVE-2023-4734, CVE-2023-4735, CVE-2023-4736, CVE-2023-4738, CVE-2023-4750, CVE-2023-4752, CVE-2023-4781, CVE-2023-48795, CVE-2023-51384, CVE-2023-51385, CVE-2023-52071, CVE-2023-5344, CVE-2023-5441, CVE-2023-5535, CVE-2023-5678, CVE-2023-5717, CVE-2023-6040, CVE-2023-6111, CVE-2023-6531, CVE-2023-6817, CVE-2023-6915, CVE-2023-6931, CVE-2023-6932, CVE-2023-7104, CVE-2023-7192, CVE-2024-0193, CVE-2024-0584, CVE-2024-0646, CVE-2024-22195

20231114_00_00

Data di uscita Tipo di release
2023-11-14 Self-service

Riepilogo

Istanze coperte Riepilogo
Solo istanze Redis 6.x Imposta la versione della patch Redis OSS su 6.2.14.
Solo istanze Redix 7.0 Imposta la versione della patch Redis OSS su 7.0.14.
Tutte le istanze Redis Imposta la versione del sistema operativo dell'host Redis su cos-105-17412-226-10.
Miglioramenti generali dell'affidabilità.

Patch di sicurezza

CVE-2022-4415, CVE-2023-0361, CVE-2022-29458, CVE-2022-3821, CVE-2018-1121, CVE-2018-17075, CVE-2018-17142, CVE-2018-17143, CVE-2018-17846, CVE-2018-17847, CVE-2018-17848, CVE-2020-22916, CVE-2022-4269, CVE-2022-47007, CVE-2022-47008, CVE-2022-47010, CVE-2022-47011, CVE-2022-48063, CVE-2022-48064, CVE-2022-48065, CVE-2023-2163, CVE-2023-23914, CVE-2023-28736, CVE-2023-28938, CVE-2023-29499, CVE-2023-3117, CVE-2023-32611, CVE-2023-32636, CVE-2023-32643, CVE-2023-32665, CVE-2023-3338, CVE-2023-38039, CVE-2023-38545, CVE-2023-39189, CVE-2023-39192, CVE-2023-39194, CVE-2023-4015, CVE-2023-4016, CVE-2023-40217, CVE-2023-4206, CVE-2023-4207, CVE-2023-4208, CVE-2023-4244, CVE-2023-42752, CVE-2023-42753, CVE-2023-42756, CVE-2023-4569, CVE-2023-45863, CVE-2023-4622, CVE-2023-4623, CVE-2023-4921

20230821_00_00

Data di uscita Tipo di release
2023-08-21 Manutenzione automatica

Riepilogo

Istanze coperte Riepilogo
Tutte le istanze Redis Imposta la versione del sistema operativo dell'host Redis su cos-105-17412-156-23.
Miglioramenti generali dell'affidabilità.

Patch di sicurezza

CVE-2023-4128, CVE-2023-3812, CVE-2023-4387, CVE-2023-4147, CVE-2023-29491, CVE-2023-4004, CVE-2023-38408, CVE-2023-3611, CVE-2023-3776, CVE-2023-3623, CVE-2016-4074, CVE-2015-8863, CVE-2022-28737, CVE-2022-3623, CVE-2023-4194, CVE-2023-3995, CVE-2023-3817, CVE-2023-1206, CVE-2023-4459

20230727_00_00

Data di uscita Tipo di release
2023-07-27 Self-service

Riepilogo

Istanze coperte Riepilogo
Solo istanze Redis 6.x Imposta la versione della patch Redis OSS su 6.2.13.
Solo istanze Redix 7.0 Imposta la versione della patch Redis OSS su 7.0.12.
Tutte le istanze Redis Imposta la versione del sistema operativo dell'host Redis su cos-105-17412-156-4.
Miglioramenti generali dell'affidabilità.

Patch di sicurezza

CVE-2015-20107, CVE-2020-10735, CVE-2021-28861, CVE-2022-24834, CVE-2022-45061, CVE-2023-1786, CVE-2023-1972, CVE-2023-20867, CVE-2023-2124, CVE-2023-2426, CVE-2023-24329, CVE-2023-25515, CVE-2023-25516, CVE-2023-2609, CVE-2023-2610, CVE-2023-2650, CVE-2023-27534, CVE-2023-28319, CVE-2023-28320, CVE-2023-28321, CVE-2023-28322, CVE-2023-28484, CVE-2023-28856, CVE-2023-29402, CVE-2023-29403, CVE-2023-29404, CVE-2023-29405, CVE-2023-29491, CVE-2023-3090, CVE-2023-31248, CVE-2023-32233, CVE-2023-3268, CVE-2023-3390, CVE-2023-34256, CVE-2023-35001, CVE-2023-36824

20230508_00_00

Data di uscita Tipo di release
2023-05-08 Manutenzione automatica

Riepilogo

Istanze coperte Riepilogo
Solo istanze Redis 5.x Imposta la versione della patch Redis OSS su 5.0.14.
Tutte le istanze Redis Imposta la versione del sistema operativo dell'host Redis su cos-105-17412-1-71.
Miglioramenti generali dell'affidabilità.

Patch di sicurezza

CVE-2004-0971 CVE-2018-25032, CVE-2020-17437, CVE-2021-20270, CVE-2021-27291, CVE-2021-33574, CVE-2021-3997, CVE-2021-3999, CVE-2021-4122, CVE-2021-4160, CVE-2021-43396, CVE-2022-1154, CVE-2022-1160, CVE-2022-1304, CVE-2022-1381, CVE-2022-1420, CVE-2022-1586, CVE-2022-1587, CVE-2022-1616, CVE-2022-1619, CVE-2022-1620, CVE-2022-1621, CVE-2022-1629, CVE-2022-1664, CVE-2022-1674, CVE-2022-1720, CVE-2022-1733, CVE-2022-1735, CVE-2022-1769, CVE-2022-1771, CVE-2022-1785, CVE-2022-1796, CVE-2022-1851, CVE-2022-1886, CVE-2022-1898, CVE-2022-1927, CVE-2022-1942, CVE-2022-2124, CVE-2022-2125, CVE-2022-2126, CVE-2022-2129, CVE-2022-22943, CVE-2022-23218, CVE-2022-23219, CVE-2022-26280, CVE-2022-2928, CVE-2022-2929, CVE-2022-29824, CVE-2022-34903, CVE-2022-3715, CVE-2022-37434, CVE-2022-37454, CVE-2022-40768, CVE-2022-41723, CVE-2022-41725, CVE-2022-42898, CVE-2022-43750, CVE-2022-44638, CVE-2023-0180, CVE-2023-0183, CVE-2023-0184, CVE-2023-0185, CVE-2023-0187, CVE-2023-0188, CVE-2023-0189

20230322_00_00

Data di uscita Tipo di release
2023-03-29 Self-service

Riepilogo

Istanze coperte Riepilogo
Solo istanze Redis 6.x Imposta la versione della patch Redis OSS su 6.2.11. La patch include le correzioni CVE CVE-2023-25155 e CVE-2022-36021.
Tutte le istanze Redis Imposta la versione del sistema operativo dell'host Redis su cos-97-16919-235-36.

Patch di sicurezza

CVE-2023-28466, CVE-2023-26604, CVE-2023-25155, CVE-2023-23931, CVE-2023-23586, CVE-2023-23454, CVE-2023-1355, CVE-2023-1264, CVE-2023-1175, CVE-2023-1170, CVE-2023-1127, CVE-2023-0512, CVE-2023-0461, CVE-2023-0433, CVE-2023-0288, CVE-2023-0286, CVE-2023-0215, CVE-2023-0054, CVE-2023-0051, CVE-2023-0049, CVE-2022-48303, CVE-2022-47946, CVE-2022-47929, CVE-2022-4696, CVE-2022-46663, CVE-2022-4450, CVE-2022-43945, CVE-2022-4378, CVE-2022-4304, CVE-2022-4292, CVE-2022-42915, CVE-2022-4285, CVE-2022-42329, CVE-2022-42328, CVE-2022-4141, CVE-2022-41222, CVE-2022-40897, CVE-2022-40320, CVE-2022-40304, CVE-2022-40303, CVE-2022-39188, CVE-2022-3821, CVE-2022-3705, CVE-2022-36946, CVE-2022-3625, CVE-2022-36123, CVE-2022-36021, CVE-2022-35977, CVE-2022-3586, CVE-2022-35737, CVE-2022-35260, CVE-2022-35252, CVE-2022-3524, CVE-2022-33744, CVE-2022-33743, CVE-2022-3352, CVE-2022-3324, CVE-2022-3297, CVE-2022-3296, CVE-2022-3278, CVE-2022-3256, CVE-2022-3235, CVE-2022-3234, CVE-2022-32296, CVE-2022-32221, CVE-2022-32208, CVE-2022-32207, CVE-2022-32206, CVE-2022-32205, CVE-2022-32149, CVE-2022-3176, CVE-2022-3169, CVE-2022-3153, CVE-2022-3134, CVE-2022-3107, CVE-2022-3104, CVE-2022-31030, CVE-2022-3099, CVE-2022-30594, CVE-2022-3037, CVE-2022-3028, CVE-2022-3016, CVE-2022-30115, CVE-2022-29869, CVE-2022-2982, CVE-2022-2980, CVE-2022-2977, CVE-2022-2959, CVE-2022-29582, CVE-2022-29581, CVE-2022-2946, CVE-2022-29458, CVE-2022-2938, CVE-2022-2923, CVE-2022-29217, CVE-2022-29162, CVE-2022-29154, CVE-2022-2905, CVE-2022-28893, CVE-2022-2889, CVE-2022-2874, CVE-2022-2862, CVE-2022-2849, CVE-2022-2845, CVE-2022-2819, CVE-2022-2817, CVE-2022-2816, CVE-2022-27782, CVE-2022-27781, CVE-2022-27780, CVE-2022-27779, CVE-2022-27778, CVE-2022-27776, CVE-2022-27775, CVE-2022-27774, CVE-2022-27666, CVE-2022-27239, CVE-2022-2602, CVE-2022-2598, CVE-2022-2581, CVE-2022-2580, CVE-2022-2571, CVE-2022-2526, CVE-2022-2522, CVE-2022-2509, CVE-2022-2503, CVE-2022-24769, CVE-2022-24448, CVE-2022-23960, CVE-2022-23648, CVE-2022-23471, CVE-2022-2345, CVE-2022-2344, CVE-2022-2343, CVE-2022-23308, CVE-2022-2327, CVE-2022-2304, CVE-2022-2289, CVE-2022-2288, CVE-2022-2287, CVE-2022-2286, CVE-2022-2285, CVE-2022-2284, CVE-2022-2264, CVE-2022-22576, CVE-2022-2257, CVE-2022-2231, CVE-2022-2210, CVE-2022-2208, CVE-2022-2207, CVE-2022-2206, CVE-2022-2183, CVE-2022-2182, CVE-2022-2175, CVE-2022-21505, CVE-2022-2097, CVE-2022-2068, CVE-2022-20409, CVE-2022-1998, CVE-2022-1786, CVE-2022-1729, CVE-2022-1516, CVE-2022-1508, CVE-2022-1353, CVE-2022-1292, CVE-2022-1271, CVE-2022-1116, CVE-2022-1055, CVE-2022-1012, CVE-2022-1011, CVE-2022-0995, CVE-2022-0943, CVE-2022-0886, CVE-2022-0854, CVE-2022-0850, CVE-2022-0847, CVE-2022-0778, CVE-2022-0729, CVE-2022-0714, CVE-2022-0696, CVE-2022-0696, CVE-2022-0685, CVE-2022-0629, CVE-2022-0617, CVE-2022-0572, CVE-2022-0494, CVE-2022-0492, CVE-2022-0443, CVE-2022-0413, CVE-2022-0408, CVE-2022-0407, CVE-2022-0393, CVE-2022-0392, CVE-2022-0368, CVE-2022-0361, CVE-2022-0359, CVE-2022-0319, CVE-2022-0318, CVE-2022-0264, CVE-2022-0261, CVE-2022-0185, CVE-2022-0168, CVE-2022-0158, CVE-2022-0156, CVE-2022-0128, CVE-2022-0002, CVE-2022-0001, CVE-2021-46848, CVE-2021-46828, CVE-2021-45485, CVE-2021-45402, CVE-2021-45346, CVE-2021-43816, CVE-2021-43784, CVE-2021-43618, CVE-2021-43527, CVE-2021-4209, CVE-2021-4203, CVE-2021-4193, CVE-2021-4192, CVE-2021-4187, CVE-2021-4173, CVE-2021-4166, CVE-2021-41617, CVE-2021-4159, CVE-2021-4157, CVE-2021-4155, CVE-2021-4154, CVE-2021-4148, CVE-2021-4136, CVE-2021-41190, CVE-2021-41103, CVE-2021-4083, CVE-2021-4069, CVE-2021-40528, CVE-2021-4037, CVE-2021-4019, CVE-2021-4002, CVE-2021-4001, CVE-2021-3984, CVE-2021-3974, CVE-2021-3973, CVE-2021-3968, CVE-2021-3928, CVE-2021-3927, CVE-2021-3903, CVE-2021-3875, CVE-2021-3872, CVE-2021-38561, CVE-2021-38205, CVE-2021-3753, CVE-2021-3743, CVE-2021-3732, CVE-2021-3711, CVE-2021-3669, CVE-2021-3580, CVE-2021-35477, CVE-2021-34556, CVE-2021-33656, CVE-2021-31879, CVE-2021-28715, CVE-2021-28714, CVE-2021-26341, CVE-2021-22926, CVE-2021-22924, CVE-2021-22898, CVE-2021-22897, CVE-2021-22890, CVE-2021-22876, CVE-2021-22600, CVE-2021-22570, CVE-2021-22543, CVE-2021-20322, CVE-2021-20321, CVE-2021-20208, CVE-2020-36516, CVE-2020-14387, CVE-2020-13529, CVE-2019-9924, CVE-2019-18276, CVE-2019-17595, CVE-2019-17594