Note di rilascio di Google Distributed Cloud con air gap 1.9.14
Mantieni tutto organizzato con le raccolte
Salva e classifica i contenuti in base alle tue preferenze.
10 giugno 2024
È stata rilasciata la versione 1.9.14 di Google Distributed Cloud con air gap.
Consulta la panoramica del prodotto per scoprire le funzionalità di Google Distributed Cloud con air gap.
È stata aggiornata la versione dell'immagine del sistema operativo Canonical Ubuntu alla versione 20240515 per applicare le patch di sicurezza e gli aggiornamenti importanti più recenti.
Sono state corrette le seguenti vulnerabilità di sicurezza:
[[["Facile da capire","easyToUnderstand","thumb-up"],["Il problema è stato risolto","solvedMyProblem","thumb-up"],["Altra","otherUp","thumb-up"]],[["Difficile da capire","hardToUnderstand","thumb-down"],["Informazioni o codice di esempio errati","incorrectInformationOrSampleCode","thumb-down"],["Mancano le informazioni o gli esempi di cui ho bisogno","missingTheInformationSamplesINeed","thumb-down"],["Problema di traduzione","translationIssue","thumb-down"],["Altra","otherDown","thumb-down"]],["Ultimo aggiornamento 2025-09-04 UTC."],[[["\u003cp\u003eGoogle Distributed Cloud air-gapped 1.9.14 has been officially released, introducing new features that can be explored in the product overview.\u003c/p\u003e\n"],["\u003cp\u003eThe Canonical Ubuntu OS image has been updated to version 20240515, incorporating the latest security patches and updates.\u003c/p\u003e\n"],["\u003cp\u003eThis update resolves numerous security vulnerabilities, including CVE-2015-1197, CVE-2016-9840, CVE-2016-9841, and many others, culminating with CVE-2024-34397.\u003c/p\u003e\n"]]],[],null,["# Google Distributed Cloud air-gapped 1.9.14 release notes\n\n\u003cbr /\u003e\n\nJune 10, 2024\n-------------\n\n*** ** * ** ***\n\nGoogle Distributed Cloud air-gapped 1.9.14 is released.\n\nSee the [product overview](/distributed-cloud/hosted/docs/latest/gdch/overview) to learn about the features of Google Distributed Cloud air-gapped.\n\n*** ** * ** ***\n\n\nUpdated the Canonical Ubuntu OS image version to 20240515 to apply the latest\nsecurity patches and important updates.\nThe following security vulnerabilities are fixed:\n\n- [CVE-2015-1197](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1197)\n- [CVE-2016-9840](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9840)\n- [CVE-2016-9841](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9841)\n- [CVE-2018-25032](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25032)\n- [CVE-2022-37434](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-37434)\n- [CVE-2023-4421](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4421)\n- [CVE-2023-5388](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5388)\n- [CVE-2023-6135](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6135)\n- [CVE-2023-7207](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7207)\n- [CVE-2023-24023](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-24023)\n- [CVE-2023-46838](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46838)\n- [CVE-2023-47233](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-47233)\n- [CVE-2023-52530](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52530)\n- [CVE-2023-52600](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52600)\n- [CVE-2023-52603](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52603)\n- [CVE-2024-0607](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0607)\n- [CVE-2024-1086](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1086)\n- [CVE-2024-1441](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1441)\n- [CVE-2024-2494](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2494)\n- [CVE-2024-2496](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2496)\n- [CVE-2024-2961](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2961)\n- [CVE-2024-3094](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3094)\n- [CVE-2024-23851](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23851)\n- [CVE-2024-24806](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24806)\n- [CVE-2024-26581](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26581)\n- [CVE-2024-26589](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26589)\n- [CVE-2024-26614](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26614)\n- [CVE-2024-26622](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26622)\n- [CVE-2024-28182](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-28182)\n- [CVE-2024-28834](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-28834)\n- [CVE-2024-34397](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-34397)"]]