Catatan rilis Google Distributed Cloud dengan air gap 1.9.15
Tetap teratur dengan koleksi
Simpan dan kategorikan konten berdasarkan preferensi Anda.
10 Juli 2024
Google Distributed Cloud dengan air gap 1.9.15 dirilis.
Lihat ringkasan produk untuk mempelajari fitur Google Distributed Cloud dengan air gap.
Memperbarui versi image OS Canonical Ubuntu ke 20240616 untuk menerapkan patch keamanan dan update penting terbaru.
Kerentanan keamanan berikut telah diperbaiki:
[[["Mudah dipahami","easyToUnderstand","thumb-up"],["Memecahkan masalah saya","solvedMyProblem","thumb-up"],["Lainnya","otherUp","thumb-up"]],[["Sulit dipahami","hardToUnderstand","thumb-down"],["Informasi atau kode contoh salah","incorrectInformationOrSampleCode","thumb-down"],["Informasi/contoh yang saya butuhkan tidak ada","missingTheInformationSamplesINeed","thumb-down"],["Masalah terjemahan","translationIssue","thumb-down"],["Lainnya","otherDown","thumb-down"]],["Terakhir diperbarui pada 2025-09-04 UTC."],[[["\u003cp\u003eGoogle Distributed Cloud air-gapped 1.9.15 has been released, offering new features that can be explored in the product overview.\u003c/p\u003e\n"],["\u003cp\u003eThe Canonical Ubuntu OS image has been updated to version 20240616, incorporating the latest security patches and essential updates.\u003c/p\u003e\n"],["\u003cp\u003eThis update resolves a total of 19 security vulnerabilities, including CVE-2022-48622, CVE-2023-2861, CVE-2023-22655, and others listed through CVE-2024-34064.\u003c/p\u003e\n"]]],[],null,["# Google Distributed Cloud air-gapped 1.9.15 release notes\n\n\u003cbr /\u003e\n\nJuly 10, 2024\n-------------\n\n*** ** * ** ***\n\nGoogle Distributed Cloud air-gapped 1.9.15 is released.\n\nSee the [product overview](/distributed-cloud/hosted/docs/latest/gdch/overview) to learn about the features of Google Distributed Cloud air-gapped.\n\n*** ** * ** ***\n\n\nUpdated the Canonical Ubuntu OS image version to 20240616 to apply the latest\nsecurity patches and important updates.\nThe following security vulnerabilities are fixed:\n\n- [CVE-2022-48622](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48622)\n- [CVE-2023-2861](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2861)\n- [CVE-2023-22655](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22655)\n- [CVE-2023-28746](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28746)\n- [CVE-2023-38575](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38575)\n- [CVE-2023-39368](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39368)\n- [CVE-2023-43490](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43490)\n- [CVE-2023-45733](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45733)\n- [CVE-2023-45745](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45745)\n- [CVE-2023-46103](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46103)\n- [CVE-2023-47855](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-47855)\n- [CVE-2024-3651](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3651)\n- [CVE-2024-4453](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4453)\n- [CVE-2024-5197](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5197)\n- [CVE-2024-33599](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33599)\n- [CVE-2024-33600](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33600)\n- [CVE-2024-33601](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33601)\n- [CVE-2024-33602](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33602)\n- [CVE-2024-34064](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-34064)"]]