Correções de vulnerabilidades

A atualização de um cluster para a versão mais recente do Google Distributed Cloud traz funcionalidades e correções adicionais ao seu cluster. Com cada lançamento de patch, corrigimos várias vulnerabilidades de segurança, o que torna a atualização para a versão do patch recomendado mais importante. A atualização é uma responsabilidade partilhada entre a Google e o cliente. Para mais informações sobre as responsabilidades partilhadas, consulte o modelo de responsabilidade partilhada

Esta página destina-se a especialistas de segurança que apoiam a resolução de problemas ou vulnerabilidades de segurança que precisam de assistência estratégica, como incidentes e problemas encaminhados do apoio técnico. Para saber mais sobre as funções comuns e exemplos de tarefas que referimos no conteúdo, consulte o artigo Funções e tarefas comuns de utilizadores do GKE. Google Cloud

Como são classificadas as vulnerabilidades

Normalmente, as vulnerabilidades de segurança são identificadas através do sistema Common Vulnerabilities and Exposures (CVE). A equipa de segurança do GKE classifica as vulnerabilidades de acordo com o sistema de pontuação de vulnerabilidades do Kubernetes. As classificações têm em conta muitos fatores, incluindo a configuração do GKE e do Google Distributed Cloud, bem como o reforço da segurança. Devido a estes fatores e aos investimentos que a Google faz em segurança, estas classificações de vulnerabilidades podem diferir de outras fontes de classificação. Google Cloud

A tabela seguinte descreve as categorias de gravidade das vulnerabilidades:

Gravidade Descrição
Crítico Uma vulnerabilidade facilmente explorável em todos os clusters por um atacante remoto não autenticado que leva à total violação do sistema.
Alto Uma vulnerabilidade facilmente explorável para muitos clusters que leva à perda de confidencialidade, integridade ou disponibilidade.
Médio Uma vulnerabilidade explorável para alguns clusters em que a perda de confidencialidade, integridade ou disponibilidade é limitada por configurações comuns, dificuldade da própria exploração, acesso necessário ou interação do utilizador.
Baixo Todas as outras vulnerabilidades de contentores. A exploração é improvável ou as consequências da exploração são limitadas.

Boletins de segurança

A maioria das vulnerabilidades é corrigida nas versões suportadas do Google Distributed Cloud antes de poderem ser exploradas. Quando existem incidentes comunicados com o potencial de comprometer a segurança dos seus clusters e dados, publicamos boletins de segurança. Um boletim de segurança descreve o problema de segurança e o respetivo impacto, e fornece uma mitigação. Para mais informações e uma lista de boletins publicados, consulte a página Boletins de segurança.

Quando é publicado um boletim de segurança para uma vulnerabilidade que afeta o Google Distributed Cloud (apenas software) no VMware, publicamos uma nota de lançamento correspondente com um link para o boletim.

Vulnerabilidades corrigidas pela versão de patch do Google Distributed Cloud

A tabela seguinte lista todas as vulnerabilidades que foram corrigidas a partir de janeiro de 2025. Para correções mais antigas, consulte as notas de lançamento. As correções na tabela seguinte estão listadas por versão de lançamento e gravidade do Google Distributed Cloud:

Menor Patches e gravidade Vulnerabilidades corrigidas

1,33

1.33.200-gke.70:
gravidade crítica
CVE-2024-52533 e CVE-2025-54349
1.33.200-gke.70:
Gravidade elevada
CVE-2021-33194, CVE-2022-49043, CVE-2023-52356, CVE-2024-7006, CVE-2024-25062, CVE-2025-27113, CVE-2025-27363, CVE-2025-32414 e CVE-2025-32415
1.33.200-gke.70:
SO otimizado para contentores
CVE-2024-45337, CVE-2024-56201, CVE-2025-22868, CVE-2025-22869, CVE-2025-27516 e CVE-2025-30204
1.33.200-gke.70:
Ubuntu
N/A
1.33.100-gke.89:
gravidade crítica
N/A
1.33.100-gke.89:
Gravidade elevada
N/A
1.33.100-gke.89:
SO otimizado para contentores
CVE-2021-33503, CVE-2023-43804, CVE-2024-6174, CVE-2024-52533, CVE-2025-7545, CVE-2025-7546, CVE-2025-27614, CVE-2025-48384, CVE-2025-48385, CVE-2025-6052
1.33.100-gke.89:
Ubuntu
N/A
1.33.0-gke.799:
gravidade crítica
N/A
1.33.0-gke.799:
Gravidade elevada
CVE-2020-12762, CVE-2020-15114, CVE-2022-3534, CVE-2023-2603, CVE-2023-46565, CVE-2024-5321, CVE-2024-10220, CVE-2025-47273 e GHSA-m425-mq94-257g
1.33.0-gke.799:
SO otimizado para contentores
CVE-2016-1585, CVE-2024-48615, CVE-2024-53427, CVE-2024-58083, CVE-2025-5914, CVE-2025-23266, CVE-2025-23267, CVE-2025-29087, CVE-2025-32414, CVE-2025-32415, CVE-2025-32463 e CVE-2025-48060
1.33.0-gke.799:
Ubuntu
N/A

1,32

1.32.700-gke.64:
gravidade crítica
N/A
1.32.700-gke.64:
gravidade elevada
N/A
1.32.700-gke.64:
SO otimizado para contentores
N/A
1.32.700-gke.64:
Ubuntu
N/A
1.32.600-gke.53:
gravidade crítica
CVE-2025-54349 e CVE-2024-52533
1.32.600-gke.53:
gravidade elevada
CVE-2023-52356, CVE-2025-32414, CVE-2021-33194, CVE-2024-25062, CVE-2025-32415, CVE-2025-27113, CVE-2025-27363, CVE-2022-49043 e CVE-2024-7006
1.32.600-gke.53:
SO otimizado para contentores
N/A
1.32.600-gke.53:
Ubuntu
N/A
1.32.500-gke.48:
gravidade crítica
N/A
1.32.500-gke.48:
gravidade elevada
N/A
1.32.500-gke.48:
SO otimizado para contentores
CVE-2021-33503, CVE-2023-43804, CVE-2024-6174, CVE-2024-52533, CVE-2025-6052, CVE-2025-6965, CVE-2025-7545, CVE-2025-7546, CVE-2025-27614, CVE-2025-48384 e CVE-2025-48385
1.32.500-gke.48:
Ubuntu
N/A
1.32.400-gke.68:
Gravidade crítica
N/A
1.32.400-gke.68:
gravidade elevada
CVE-2020-12762
1.32.400-gke.68:
SO otimizado para contentores
CVE-2025-23266 e CVE-2025-23267
1.32.400-gke.68:
Ubuntu
N/A
1.32.300-gke.85:
gravidade crítica
N/A
1.32.300-gke.85:
Gravidade elevada
N/A
1.32.300-gke.85:
SO otimizado para contentores
CVE-2025-5914, CVE-2025-32463 e CVE-2025-48060
1.32.300-gke.85:
Ubuntu
N/A
1.32.200-gke.104:
gravidade crítica
N/A
1.32.200-gke.104:
gravidade elevada
CVE-2022-3534 e CVE-2023-46565
1.32.200-gke.104:
SO otimizado para contentores
CVE-2016-1585
1.32.200-gke.104:
Ubuntu
N/A
1.32.100-gke.106:
gravidade crítica
N/A
1.32.100-gke.106:
gravidade elevada
CVE-2023-2603
1.32.100-gke.106:
SO otimizado para contentores
CVE-2024-48615, CVE-2024-53427, CVE-2024-58083, CVE-2025-29087, CVE-2025-32414 e CVE-2025-32415
1.32.100-gke.106:
Ubuntu
N/A
1.32.0-gke.1085:
gravidade crítica
CVE-2023-24538,CVE-2023-24540,CVE-2023-29402,CVE-2023-29404,CVE-2023-29405
1.32.0-gke.1085:
gravidade elevada
CVE-2022-41724,CVE-2022-41725,CVE-2023-24534,CVE-2023-24536,CVE-2023-24537,CVE-2023-24539,CVE-2023-29400,CVE-2023-29403,CVE-2023-39323,CVE-2023-45287,CVE-2024-10979,CVE-2024-45338,CVE-2024-7592
1.32.0-gke.1085:
SO otimizado para contentores
CVE-2023-45288,CVE-2023-52926,CVE-2023-52927,CVE-2024-0135,CVE-2024-0136,CVE-2024-26982,CVE-2024-40896,CVE-2024-47745,CVE-2024-49861,CVE-2024-49996,CVE-2024-50036,CVE-2024-50047,CVE-2024-50055,CVE-2024-50067,CVE-2024-50115,CVE-2024-50121,CVE-2024-50131,CVE-2024-50143,CVE-2024-50151,CVE-2024-50154,CVE-2024-50164,CVE-2024-50186,CVE-2024-50215,CVE-2024-50228,CVE-2024-50257,CVE-2024-50262,CVE-2024-50264,CVE-2024-50275,CVE-2024-50278,CVE-2024-50279,CVE-2024-50280,CVE-2024-53082,CVE-2024-53099,CVE-2024-53141,CVE-2024-53142,CVE-2024-53164,CVE-2024-53166,CVE-2024-53170,CVE-2024-53173,CVE-2024-53174,CVE-2024-53194,CVE-2024-56558,CVE-2024-56600,CVE-2024-56601,CVE-2024-56606,CVE-2024-56614,CVE-2024-56615,CVE-2024-56658,CVE-2024-56664,CVE-2024-56672,CVE-2024-56675,CVE-2024-56693,CVE-2024-57951,CVE-2024-57979,CVE-2024-9287,CVE-2025-21700,CVE-2025-21726,CVE-2025-21727,CVE-2025-21760,CVE-2025-21762,CVE-2025-21763,CVE-2025-21764,CVE-2025-21785,CVE-2025-21791,CVE-2025-21796,CVE-2025-21812,CVE-2025-21858,CVE-2025-27113
1.32.0-gke.1085:
Ubuntu
CVE-2024-29018,CVE-2024-41110

1.31

1.31.1100-gke.40:
gravidade crítica
N/A
1.31.1100-gke.40:
gravidade elevada
N/A
1.31.1100-gke.40:
SO otimizado para contentores
CVE-2024-56201, CVE-2025-11082, CVE-2025-11083, CVE-2025-27516, CVE-2025-39881 e CVE-2025-39883
1.31.1100-gke.40:
Ubuntu
N/A
1.31.1000-gke.44:
gravidade crítica
CVE-2025-54349
1.31.1000-gke.44:
Gravidade elevada
CVE-2021-33194, CVE-2023-52356, CVE-2024-7006, CVE-2024-25062, CVE-2025-27113, CVE-2025-27363, CVE-2025-32414 e CVE-2025-32415
1.31.1000-gke.44:
SO otimizado para contentores
CVE-2021-33503, CVE-2023-43804, CVE-2023-50782, CVE-2024-6174, CVE-2024-26130, CVE-2024-41013, CVE-2024-52533, CVE-2025-6965, CVE-2025-7545, CVE-2025-7546, CVE-2025-23266, CVE-2025-23267, CVE-2025-27614, CVE-2025-32463, CVE-2025-38352, CVE-2025-48384 e CVE-2025-48385
1.31.1000-gke.44:
Ubuntu
N/A
1.31.900-gke.38:
gravidade crítica
N/A
1.31.900-gke.38:
gravidade elevada
CVE-2020-12762
1.31.900-gke.38:
SO otimizado para contentores
N/A
1.31.900-gke.38:
Ubuntu
N/A
1.31.800-gke.32:
gravidade crítica
N/A
1.31.800-gke.32:
gravidade elevada
N/A
1.31.800-gke.32:
SO otimizado para contentores
N/A
1.31.800-gke.32:
Ubuntu
N/A
1.31.700-gke.72:
gravidade crítica
N/A
1.31.700-gke.72:
Gravidade elevada
CVE-2025-43971
1.31.700-gke.72:
SO otimizado para contentores
CVE-2025-5914 e CVE-2025-48060
1.31.700-gke.72:
Ubuntu
N/A
1.31.600-gke.85:
gravidade crítica
N/A
1.31.600-gke.85:
gravidade elevada
CVE-2023-46565
1.31.600-gke.85:
SO otimizado para contentores
CVE-2024-24786, CVE-2025-32415 e CVE-2025-32414
1.31.600-gke.85:
Ubuntu
N/A
1.31.500-gke.68:
gravidade crítica
N/A
1.31.500-gke.68:
gravidade elevada
CVE-2022-3534 e CVE-2023-2603
1.31.500-gke.68:
SO otimizado para contentores
CVE-2024-35866, CVE-2024-48615, CVE-2024-53427, CVE-2024-58083, CVE-2025-21867, CVE-2025-21887, CVE-2025-21919, CVE-2025-21920, CVE-2025-21999, CVE-2025-22056, CVE-2025-22868 e CVE-2025-37785
1.31.500-gke.68:
Ubuntu
N/A
1.31.400-gke.110:
gravidade crítica
N/A
1.31.400-gke.110:
Gravidade elevada
N/A
1.31.400-gke.110:
SO otimizado para contentores
CVE-2023-45288, CVE-2023-52927, CVE-2024-26982, CVE-2024-53166, CVE-2024-57979, CVE-2025-21726, CVE-2025-21727, CVE-2025-21756, CVE-2025-21760, CVE-2025-21762, CVE-2025-21763, CVE-2025-21764, CVE-2025-21785, CVE-2025-21791, CVE-2025-21796, CVE-2025-21812, CVE-2025-21858 e CVE-2025-27113
1.31.400-gke.110:
Ubuntu
N/A
1.31.300-gke.81:
gravidade crítica
N/A
1.31.300-gke.81:
Gravidade elevada
CVE-2024-7592
1.31.300-gke.81:
SO otimizado para contentores
CVE-2024-9287, CVE-2024-40896, CVE-2024-50047, CVE-2024-50164, CVE-2024-53170, CVE-2024-56664, CVE-2024-57951, CVE-2025-21631 e CVE-2025-21671
1.31.300-gke.81:
Ubuntu
CVE-2024-29018 e CVE-2024-41110
1.31.200-gke.58:
gravidade crítica
N/A
1.31.200-gke.58:
gravidade elevada
CVE-2023-39323
1.31.200-gke.58:
SO otimizado para contentores
CVE-2024-0135, CVE-2024-0136, CVE-2024-47745, CVE-2024-49861, CVE-2024-49996, CVE-2024-50036, CVE-2024-50055, CVE-2024-50067, CVE-2024-50115, CVE-2024-50121, CVE-2024-50131, CVE-2024-50143, CVE-2024-50151, CVE-2024-50154, CVE-2024-50186, CVE-2024-50215, CVE-2024-50228, CVE-2024-50257, CVE-2024-50262, CVE-2024-50264, CVE-2024-50275, CVE-2024-50278, CVE-2024-50279, CVE-2024-53082, CVE-2024-53099, CVE-2024-53141, CVE-2024-53142, CVE-2024-53173, CVE-2024-56600, CVE-2024-56601, CVE-2024-56606, CVE-2024-56614, CVE-2024-56615, CVE-2024-56658, CVE-2024-56672 e CVE-2024-56675
1.31.200-gke.58:
Ubuntu
N/A
1.31.100-gke.136:
gravidade crítica
CVE-2023-24538, CVE-2023-24540, CVE-2023-29402, CVE-2023-29404 e CVE-2023-29405
1.31.100-gke.136:
gravidade elevada
CVE-2022-41724, CVE-2022-41725, CVE-2023-24534, CVE-2023-24536, CVE-2023-24537, CVE-2023-24539, CVE-2023-29400, CVE-2023-29403 e CVE-2023-45287
1.31.100-gke.136:
SO otimizado para contentores
N/A
1.31.100-gke.136:
Ubuntu
N/A

1,30

1.30.1200-gke.63:
gravidade crítica
N/A
1.30.1200-gke.63:
gravidade elevada
N/A
1.30.1200-gke.63:
SO otimizado para contentores
CVE-2025-5914, CVE-2025-23266, CVE-2025-23267 e CVE-2025-32463
1.30.1200-gke.63:
Ubuntu
N/A
1.30.1100-gke.67:
gravidade crítica
N/A
1.30.1100-gke.67:
Gravidade elevada
N/A
1.30.1100-gke.67:
SO otimizado para contentores
CVE-2025-48060
1.30.1100-gke.67:
Ubuntu
N/A
1.30.1000-gke.83:
gravidade crítica
N/A
1.30.1000-gke.83:
gravidade elevada
CVE-2022-3534
1.30.1000-gke.83:
SO otimizado para contentores
CVE-2024-24786, CVE-2024-48615, CVE-2025-29087, CVE-2025-32414 e CVE-2025-32415
1.30.1000-gke.83:
Ubuntu
N/A
1.30.900-gke.57:
gravidade crítica
N/A
1.30.900-gke.57:
gravidade elevada
N/A
1.30.900-gke.57:
SO otimizado para contentores
CVE-2025-21867, CVE-2025-21887 e CVE-2025-22868
1.30.900-gke.57:
Ubuntu
N/A
1.30.800-gke.66:
gravidade crítica
N/A
1.30.800-gke.66:
gravidade elevada
N/A
1.30.800-gke.66:
SO otimizado para contentores
CVE-2023-45288, CVE-2024-26982, CVE-2024-53166, CVE-2024-56171, CVE-2025-21703, CVE-2025-21785, CVE-2025-21791, CVE-2025-21858, CVE-2025-24928, CVE-2025-27113/A
1.30.800-gke.66:
Ubuntu
N/A
1.30.700-gke.56:
gravidade crítica
N/A
1.30.700-gke.56:
gravidade elevada
CVE-2024-7592
1.30.700-gke.56:
SO otimizado para contentores
CVE-2024-9287, CVE-2024-50047, CVE-2024-56664, CVE-2024-57951, CVE-2025-21631 e CVE-2025-21671
1.30.700-gke.56:
Ubuntu
CVE-2024-29018 e CVE-2024-41110
1.30.600-gke.68:
Gravidade crítica
N/A
1.30.600-gke.68:
gravidade elevada
CVE-2023-39323
1.30.600-gke.68:
SO otimizado para contentores
CVE-2024-0135, CVE-2024-0136, CVE-2024-40896, CVE-2024-50067, CVE-2024-50121, CVE-2024-50164, CVE-2024-50275, CVE-2024-53141, CVE-2024-53142, CVE-2024-53170, CVE-2024-53173, CVE-2024-53206, CVE-2024-56600, CVE-2024-56601, CVE-2024-56606, CVE-2024-56614, CVE-2024-56615, CVE-2024-56658, CVE-2024-56672, CVE-2024-56675
1.30.600-gke.68:
Ubuntu
N/A
1.30.500-gke.126:
gravidade crítica
CVE-2023-24538, CVE-2023-24540, CVE-2023-29402, CVE-2023-29404 e CVE-2023-29405
1.30.500-gke.126:
gravidade elevada
CVE-2022-41724, CVE-2022-41725, CVE-2023-24534, CVE-2023-24536, CVE-2023-24537, CVE-2023-24539, CVE-2023-29400, CVE-2023-29403 e CVE-2023-45287
1.30.500-gke.126:
SO otimizado para contentores
CVE-2024-47745, CVE-2024-49861, CVE-2024-49996, CVE-2024-50036, CVE-2024-50055, CVE-2024-50143, CVE-2024-50151, CVE-2024-50154, CVE-2024-50186, CVE-2024-50228, CVE-2024-50257, CVE-2024-50262, CVE-2024-50264, CVE-2024-50278, CVE-2024-50279, CVE-2024-53082 e CVE-2024-53099
1.30.500-gke.126:
Ubuntu
N/A

1,29

1.29.1200-gke.99:
gravidade crítica
N/A
1.29.1200-gke.99:
gravidade elevada
N/A
1.29.1200-gke.99:
SO otimizado para contentores
CVE-2024-9287 e CVE-2024-57951
1.29.1200-gke.99:
Ubuntu
N/A
1.29.1100-gke.82:
Gravidade crítica
N/A
1.29.1100-gke.82:
gravidade elevada
N/A
1.29.1100-gke.82:
SO otimizado para contentores
CVE-2024-49996, CVE-2024-50055, CVE-2024-50121, CVE-2024-50275, CVE-2024-53141, CVE-2024-53142, CVE-2024-53173, CVE-2024-53206, CVE-2024-56600, CVE-2024-56601, CVE-2024-56606, CVE-2024-56614, CVE-2024-56615/A
1.29.1100-gke.82:
Ubuntu
N/A
1.29.1000-gke.94:
gravidade crítica
CVE-2023-24538, CVE-2023-24540, CVE-2023-29402, CVE-2023-29404 e CVE-2023-29405
1.29.1000-gke.94:
Gravidade elevada
CVE-2022-41724, CVE-2022-41725, CVE-2023-24534, CVE-2023-24536, CVE-2023-24537, CVE-2023-24539, CVE-2023-29400, CVE-2023-29403 e CVE-2023-45287
1.29.1000-gke.94:
Container-Optimized OS
CVE-2024-53099
1.29.1000-gke.94:
Ubuntu
N/A
1.29.900-gke.181:
gravidade crítica
N/A
1.29.900-gke.181:
gravidade elevada
CVE-2023-3676, CVE-2023-3955, CVE-2023-5528 e CVE-2024-6232
1.29.900-gke.181:
Container-Optimized OS
CVE-2024-38538, CVE-2024-47696, CVE-2024-47701, CVE-2024-47742, CVE-2024-49860, CVE-2024-49882, CVE-2024-49883, CVE-2024-49884, CVE-2024-49889, CVE-2024-49936, CVE-2024-49967, CVE-2024-49983, CVE-2024-50033, CVE-2024-50035, CVE-2024-50036, CVE-2024-50083, CVE-2024-50131, CVE-2024-50143, CVE-2024-50151, CVE-2024-50154, CVE-2024-50186, CVE-2024-50228, CVE-2024-50257, CVE-2024-50262, CVE-2024-50264, CVE-2024-50278, CVE-2024-50279 e CVE-2024-53057
1.29.900-gke.181:
Ubuntu
CVE-2022-48666, CVE-2023-52889, CVE-2023-52918, CVE-2024-25744, CVE-2024-26607, CVE-2024-26661, CVE-2024-26669, CVE-2024-26800, CVE-2024-26893, CVE-2024-36484, CVE-2024-38577, CVE-2024-38602, CVE-2024-38611, CVE-2024-39472, CVE-2024-40915, CVE-2024-41011, CVE-2024-41012, CVE-2024-41015, CVE-2024-41017, CVE-2024-41019, CVE-2024-41020, CVE-2024-41022, CVE-2024-41042, CVE-2024-41059, CVE-2024-41060, CVE-2024-41063, CVE-2024-41064, CVE-2024-41065, CVE-2024-41068, CVE-2024-41070, CVE-2024-41071, CVE-2024-41072, CVE-2024-41073, CVE-2024-41077, CVE-2024-41078, CVE-2024-41081, CVE-2024-41090, CVE-2024-41091, CVE-2024-41098, CVE-2024-42114, CVE-2024-42126, CVE-2024-42246, CVE-2024-42259, CVE-2024-42265, CVE-2024-42267, CVE-2024-42269, CVE-2024-42270, CVE-2024-42271, CVE-2024-42272, CVE-2024-42274, CVE-2024-42276, CVE-2024-42277, CVE-2024-42280, CVE-2024-42281, CVE-2024-42283, CVE-2024-42284, CVE-2024-42285, CVE-2024-42286, CVE-2024-42287, CVE-2024-42288, CVE-2024-42289, CVE-2024-42290, CVE-2024-42292, CVE-2024-42295, CVE-2024-42296, CVE-2024-42297, CVE-2024-42299, CVE-2024-42301, CVE-2024-42302, CVE-2024-42304, CVE-2024-42305, CVE-2024-42306, CVE-2024-42309, CVE-2024-42310, CVE-2024-42311, CVE-2024-42312, CVE-2024-42313, CVE-2024-42318, CVE-2024-43817, CVE-2024-43828, CVE-2024-43829, CVE-2024-43830, CVE-2024-43834, CVE-2024-43835, CVE-2024-43839, CVE-2024-43841, CVE-2024-43846, CVE-2024-43849, CVE-2024-43853, CVE-2024-43854, CVE-2024-43856, CVE-2024-43858, CVE-2024-43860, CVE-2024-43861, CVE-2024-43863, CVE-2024-43867, CVE-2024-43869, CVE-2024-43870, CVE-2024-43871, CVE-2024-43873, CVE-2024-43875, CVE-2024-43879, CVE-2024-43880, CVE-2024-43882, CVE-2024-43883, CVE-2024-43884, CVE-2024-43889, CVE-2024-43890, CVE-2024-43892, CVE-2024-43893, CVE-2024-43894, CVE-2024-43902, CVE-2024-43905, CVE-2024-43907, CVE-2024-43908, CVE-2024-43909, CVE-2024-43914, CVE-2024-44934, CVE-2024-44935, CVE-2024-44944, CVE-2024-44946, CVE-2024-44947, CVE-2024-44948, CVE-2024-44954, CVE-2024-44958, CVE-2024-44960, CVE-2024-44965, CVE-2024-44966, CVE-2024-44969, CVE-2024-44971, CVE-2024-44974, CVE-2024-44982, CVE-2024-44983, CVE-2024-44985, CVE-2024-44986, CVE-2024-44987, CVE-2024-44988, CVE-2024-44989, CVE-2024-44990, CVE-2024-44995, CVE-2024-44998, CVE-2024-44999, CVE-2024-45003, CVE-2024-45006, CVE-2024-45007, CVE-2024-45008, CVE-2024-45009, CVE-2024-45011, CVE-2024-45018, CVE-2024-45021, CVE-2024-45025, CVE-2024-45026, CVE-2024-45028, CVE-2024-46673, CVE-2024-46675, CVE-2024-46676, CVE-2024-46677, CVE-2024-46679, CVE-2024-46685, CVE-2024-46689, CVE-2024-46702, CVE-2024-46707, CVE-2024-46713, CVE-2024-46714, CVE-2024-46719, CVE-2024-46721, CVE-2024-46722, CVE-2024-46723, CVE-2024-46724, CVE-2024-46725, CVE-2024-46731, CVE-2024-46732, CVE-2024-46737, CVE-2024-46738, CVE-2024-46739, CVE-2024-46740, CVE-2024-46743, CVE-2024-46744, CVE-2024-46745, CVE-2024-46746, CVE-2024-46747, CVE-2024-46750, CVE-2024-46752, CVE-2024-46755, CVE-2024-46756, CVE-2024-46757, CVE-2024-46758, CVE-2024-46759, CVE-2024-46761, CVE-2024-46763, CVE-2024-46771, CVE-2024-46777, CVE-2024-46780, CVE-2024-46781, CVE-2024-46782, CVE-2024-46783, CVE-2024-46791, CVE-2024-46795, CVE-2024-46798, CVE-2024-46800, CVE-2024-46804, CVE-2024-46805, CVE-2024-46807, CVE-2024-46810, CVE-2024-46814, CVE-2024-46815, CVE-2024-46817, CVE-2024-46818, CVE-2024-46819, CVE-2024-46822, CVE-2024-46828, CVE-2024-46829, CVE-2024-46832, CVE-2024-46840, CVE-2024-46844, CVE-2024-47659, CVE-2024-47660, CVE-2024-47663, CVE-2024-47665, CVE-2024-47667, CVE-2024-47668, CVE-2024-47669

Para mais informações sobre correções e alterações para um determinado lançamento, consulte as notas de lançamento.