Google Distributed Cloud air-gapped 1.9.18 release notes
Stay organized with collections
Save and categorize content based on your preferences.
October 9, 2024
Google Distributed Cloud air-gapped 1.9.18 is released.
See the product overview to learn about the features of Google Distributed Cloud air-gapped.
Updated the Canonical Ubuntu OS image version to 20240827 to apply the latest
security patches and important updates.
The following security vulnerabilities are fixed:
[[["Easy to understand","easyToUnderstand","thumb-up"],["Solved my problem","solvedMyProblem","thumb-up"],["Other","otherUp","thumb-up"]],[["Hard to understand","hardToUnderstand","thumb-down"],["Incorrect information or sample code","incorrectInformationOrSampleCode","thumb-down"],["Missing the information/samples I need","missingTheInformationSamplesINeed","thumb-down"],["Other","otherDown","thumb-down"]],["Last updated 2025-08-25 UTC."],[[["\u003cp\u003eGoogle Distributed Cloud air-gapped 1.9.18 has been released, offering new features detailed in the product overview.\u003c/p\u003e\n"],["\u003cp\u003eThe Canonical Ubuntu OS image has been updated to version 20240827 to incorporate the latest security patches and updates.\u003c/p\u003e\n"],["\u003cp\u003eMultiple security vulnerabilities, including various CVEs from 2021 to 2024, have been addressed in this update.\u003c/p\u003e\n"],["\u003cp\u003eSecurity updates have been implemented to fix vulnerabilities found in the remote Red Hat host for the ticketing system.\u003c/p\u003e\n"]]],[],null,["# Google Distributed Cloud air-gapped 1.9.18 release notes\n\n\u003cbr /\u003e\n\nOctober 9, 2024\n---------------\n\n*** ** * ** ***\n\nGoogle Distributed Cloud air-gapped 1.9.18 is released.\n\nSee the [product overview](/distributed-cloud/hosted/docs/latest/gdch/overview) to learn about the features of Google Distributed Cloud air-gapped.\n\n*** ** * ** ***\n\n\nUpdated the Canonical Ubuntu OS image version to 20240827 to apply the latest\nsecurity patches and important updates.\nThe following security vulnerabilities are fixed:\n\n- [CVE-2021-46926](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46926)\n- [CVE-2023-40546](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40546)\n- [CVE-2023-40547](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40547)\n- [CVE-2023-40548](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40548)\n- [CVE-2023-40540](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40549)\n- [CVE-2023-40550](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40550)\n- [CVE-2023-40551](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40551)\n- [CVE-2023-42667](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42667)\n- [CVE-2023-49141](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-49141)\n- [CVE-2023-52629](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52629)\n- [CVE-2023-52760](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52760)\n- [CVE-2024-2201](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2201)\n- [CVE-2024-24853](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24853)\n- [CVE-2024-24860](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24860)\n- [CVE-2024-24980](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24980)\n- [CVE-2024-25939](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-25939)\n- [CVE-2024-26830](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26830)\n- [CVE-2024-26921](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26921)\n- [CVE-2024-26929](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26929)\n- [CVE-2024-36901](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36901)\n- [CVE-2024-39484](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39484)\n\n*** ** * ** ***\n\n\nFixed vulnerabilities with the remote Red Hat host for the ticketing system\nmissing security updates."]]