[[["이해하기 쉬움","easyToUnderstand","thumb-up"],["문제가 해결됨","solvedMyProblem","thumb-up"],["기타","otherUp","thumb-up"]],[["이해하기 어려움","hardToUnderstand","thumb-down"],["잘못된 정보 또는 샘플 코드","incorrectInformationOrSampleCode","thumb-down"],["필요한 정보/샘플이 없음","missingTheInformationSamplesINeed","thumb-down"],["번역 문제","translationIssue","thumb-down"],["기타","otherDown","thumb-down"]],["최종 업데이트: 2025-09-04(UTC)"],[[["\u003cp\u003eGoogle Distributed Cloud air-gapped 1.9.17 has been released, offering new features detailed in the product overview.\u003c/p\u003e\n"],["\u003cp\u003eThe Canonical Ubuntu OS image has been updated to version 20240809 to incorporate the latest security patches and updates.\u003c/p\u003e\n"],["\u003cp\u003eThis update addresses numerous security vulnerabilities, including CVE-2022-4968 through CVE-2024-38428, detailed within.\u003c/p\u003e\n"]]],[],null,["# Google Distributed Cloud air-gapped 1.9.17 release notes\n\n\u003cbr /\u003e\n\nSeptember 9, 2024\n-----------------\n\n*** ** * ** ***\n\nGoogle Distributed Cloud air-gapped 1.9.17 is released.\n\nSee the [product overview](/distributed-cloud/hosted/docs/latest/gdch/overview) to learn about the features of Google Distributed Cloud air-gapped.\n\n*** ** * ** ***\n\n\nUpdated the Canonical Ubuntu OS image version to 20240809 to apply the latest\nsecurity patches and important updates.\nThe following security vulnerabilities are fixed:\n\n- [CVE-2022-4968](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4968)\n- [CVE-2022-48655](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48655)\n- [CVE-2022-48674](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48674)\n- [CVE-2023-6270](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6270)\n- [CVE-2023-6597](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6597)\n- [CVE-2023-52752](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52752)\n- [CVE-2024-0397](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0397)\n- [CVE-2024-0450](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0450)\n- [CVE-2024-1724](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1724)\n- [CVE-2024-2201](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2201)\n- [CVE-2024-4032](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4032)\n- [CVE-2024-4032](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4032)\n- [CVE-2024-5569](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5569)\n- [CVE-2024-6655](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6655)\n- [CVE-2024-7264](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7264)\n- [CVE-2024-23307](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23307)\n- [CVE-2024-24861](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24861)\n- [CVE-2024-26583](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26583)\n- [CVE-2024-26584](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26584)\n- [CVE-2024-26585](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26585)\n- [CVE-2024-26586](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26586)\n- [CVE-2024-26642](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26642)\n- [CVE-2024-26643](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26643)\n- [CVE-2024-26828](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26828)\n- [CVE-2024-26886](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26886)\n- [CVE-2024-26889](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26889)\n- [CVE-2024-26907](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26907)\n- [CVE-2024-26922](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26922)\n- [CVE-2024-26923](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26923)\n- [CVE-2024-26925](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26925)\n- [CVE-2024-26926](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26926)\n- [CVE-2024-27019](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27019)\n- [CVE-2024-27019](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27019)\n- [CVE-2024-29068](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-29068)\n- [CVE-2024-29069](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-29069)\n- [CVE-2024-35235](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35235)\n- [CVE-2024-35235](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35235)\n- [CVE-2024-36016](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36016)\n- [CVE-2024-37370](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37370)\n- [CVE-2024-37371](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37371)\n- [CVE-2024-38428](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38428)"]]