Google Distributed Cloud air-gapped 1.9.15 release notes
Stay organized with collections
Save and categorize content based on your preferences.
July 10, 2024
Google Distributed Cloud air-gapped 1.9.15 is released.
See the product overview to learn about the features of Google Distributed Cloud air-gapped.
Updated the Canonical Ubuntu OS image version to 20240616 to apply the latest
security patches and important updates.
The following security vulnerabilities are fixed:
[[["Easy to understand","easyToUnderstand","thumb-up"],["Solved my problem","solvedMyProblem","thumb-up"],["Other","otherUp","thumb-up"]],[["Hard to understand","hardToUnderstand","thumb-down"],["Incorrect information or sample code","incorrectInformationOrSampleCode","thumb-down"],["Missing the information/samples I need","missingTheInformationSamplesINeed","thumb-down"],["Other","otherDown","thumb-down"]],["Last updated 2025-08-29 UTC."],[[["\u003cp\u003eGoogle Distributed Cloud air-gapped 1.9.15 has been released, offering new features that can be explored in the product overview.\u003c/p\u003e\n"],["\u003cp\u003eThe Canonical Ubuntu OS image has been updated to version 20240616, incorporating the latest security patches and essential updates.\u003c/p\u003e\n"],["\u003cp\u003eThis update resolves a total of 19 security vulnerabilities, including CVE-2022-48622, CVE-2023-2861, CVE-2023-22655, and others listed through CVE-2024-34064.\u003c/p\u003e\n"]]],[],null,["# Google Distributed Cloud air-gapped 1.9.15 release notes\n\n\u003cbr /\u003e\n\nJuly 10, 2024\n-------------\n\n*** ** * ** ***\n\nGoogle Distributed Cloud air-gapped 1.9.15 is released.\n\nSee the [product overview](/distributed-cloud/hosted/docs/latest/gdch/overview) to learn about the features of Google Distributed Cloud air-gapped.\n\n*** ** * ** ***\n\n\nUpdated the Canonical Ubuntu OS image version to 20240616 to apply the latest\nsecurity patches and important updates.\nThe following security vulnerabilities are fixed:\n\n- [CVE-2022-48622](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48622)\n- [CVE-2023-2861](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2861)\n- [CVE-2023-22655](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22655)\n- [CVE-2023-28746](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28746)\n- [CVE-2023-38575](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38575)\n- [CVE-2023-39368](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39368)\n- [CVE-2023-43490](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43490)\n- [CVE-2023-45733](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45733)\n- [CVE-2023-45745](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45745)\n- [CVE-2023-46103](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46103)\n- [CVE-2023-47855](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-47855)\n- [CVE-2024-3651](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3651)\n- [CVE-2024-4453](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4453)\n- [CVE-2024-5197](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5197)\n- [CVE-2024-33599](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33599)\n- [CVE-2024-33600](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33600)\n- [CVE-2024-33601](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33601)\n- [CVE-2024-33602](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33602)\n- [CVE-2024-34064](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-34064)"]]