Google Distributed Cloud mit Air Gap 1.9.17 – Versionshinweise
Mit Sammlungen den Überblick behalten
Sie können Inhalte basierend auf Ihren Einstellungen speichern und kategorisieren.
9. September 2024
Google Distributed Cloud mit Air Gap 1.9.17 wurde veröffentlicht.
Weitere Informationen zu den Funktionen von Google Distributed Cloud mit Air Gap finden Sie in der Produktübersicht.
Die Version des Canonical Ubuntu OS-Image wurde auf 20240809 aktualisiert, um die neuesten Sicherheitspatches und wichtigen Updates anzuwenden.
Die folgenden Sicherheitslücken wurden behoben:
[[["Leicht verständlich","easyToUnderstand","thumb-up"],["Mein Problem wurde gelöst","solvedMyProblem","thumb-up"],["Sonstiges","otherUp","thumb-up"]],[["Schwer verständlich","hardToUnderstand","thumb-down"],["Informationen oder Beispielcode falsch","incorrectInformationOrSampleCode","thumb-down"],["Benötigte Informationen/Beispiele nicht gefunden","missingTheInformationSamplesINeed","thumb-down"],["Problem mit der Übersetzung","translationIssue","thumb-down"],["Sonstiges","otherDown","thumb-down"]],["Zuletzt aktualisiert: 2025-09-04 (UTC)."],[[["\u003cp\u003eGoogle Distributed Cloud air-gapped 1.9.17 has been released, offering new features detailed in the product overview.\u003c/p\u003e\n"],["\u003cp\u003eThe Canonical Ubuntu OS image has been updated to version 20240809 to incorporate the latest security patches and updates.\u003c/p\u003e\n"],["\u003cp\u003eThis update addresses numerous security vulnerabilities, including CVE-2022-4968 through CVE-2024-38428, detailed within.\u003c/p\u003e\n"]]],[],null,["# Google Distributed Cloud air-gapped 1.9.17 release notes\n\n\u003cbr /\u003e\n\nSeptember 9, 2024\n-----------------\n\n*** ** * ** ***\n\nGoogle Distributed Cloud air-gapped 1.9.17 is released.\n\nSee the [product overview](/distributed-cloud/hosted/docs/latest/gdch/overview) to learn about the features of Google Distributed Cloud air-gapped.\n\n*** ** * ** ***\n\n\nUpdated the Canonical Ubuntu OS image version to 20240809 to apply the latest\nsecurity patches and important updates.\nThe following security vulnerabilities are fixed:\n\n- [CVE-2022-4968](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4968)\n- [CVE-2022-48655](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48655)\n- [CVE-2022-48674](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48674)\n- [CVE-2023-6270](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6270)\n- [CVE-2023-6597](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6597)\n- [CVE-2023-52752](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52752)\n- [CVE-2024-0397](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0397)\n- [CVE-2024-0450](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0450)\n- [CVE-2024-1724](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1724)\n- [CVE-2024-2201](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2201)\n- [CVE-2024-4032](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4032)\n- [CVE-2024-4032](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4032)\n- [CVE-2024-5569](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5569)\n- [CVE-2024-6655](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6655)\n- [CVE-2024-7264](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7264)\n- [CVE-2024-23307](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23307)\n- [CVE-2024-24861](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24861)\n- [CVE-2024-26583](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26583)\n- [CVE-2024-26584](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26584)\n- [CVE-2024-26585](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26585)\n- [CVE-2024-26586](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26586)\n- [CVE-2024-26642](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26642)\n- [CVE-2024-26643](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26643)\n- [CVE-2024-26828](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26828)\n- [CVE-2024-26886](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26886)\n- [CVE-2024-26889](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26889)\n- [CVE-2024-26907](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26907)\n- [CVE-2024-26922](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26922)\n- [CVE-2024-26923](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26923)\n- [CVE-2024-26925](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26925)\n- [CVE-2024-26926](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26926)\n- [CVE-2024-27019](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27019)\n- [CVE-2024-27019](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27019)\n- [CVE-2024-29068](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-29068)\n- [CVE-2024-29069](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-29069)\n- [CVE-2024-35235](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35235)\n- [CVE-2024-35235](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35235)\n- [CVE-2024-36016](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36016)\n- [CVE-2024-37370](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37370)\n- [CVE-2024-37371](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37371)\n- [CVE-2024-38428](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38428)"]]