Google Distributed Cloud air-gapped 1.9.19 release notes
Stay organized with collections
Save and categorize content based on your preferences.
November 9, 2024
Google Distributed Cloud air-gapped 1.9.19 is released.
See the product overview to learn about the features of Google Distributed Cloud air-gapped.
Updated the Canonical Ubuntu OS image version to 20241009 to apply the latest
security patches and important updates.
The following security vulnerabilities are fixed:
[[["Easy to understand","easyToUnderstand","thumb-up"],["Solved my problem","solvedMyProblem","thumb-up"],["Other","otherUp","thumb-up"]],[["Hard to understand","hardToUnderstand","thumb-down"],["Incorrect information or sample code","incorrectInformationOrSampleCode","thumb-down"],["Missing the information/samples I need","missingTheInformationSamplesINeed","thumb-down"],["Other","otherDown","thumb-down"]],["Last updated 2025-08-25 UTC."],[[["\u003cp\u003eGoogle Distributed Cloud air-gapped 1.9.19 has been released, and users can find more information about its features in the product overview.\u003c/p\u003e\n"],["\u003cp\u003eThe Canonical Ubuntu OS image has been updated to version 20241009 to address the latest security and critical updates.\u003c/p\u003e\n"],["\u003cp\u003eNumerous security vulnerabilities, including CVE-2016-1585, CVE-2021-46926, CVE-2024-45492, and many others have been patched.\u003c/p\u003e\n"],["\u003cp\u003eAuthentication failures when accessing the GDC console have been reported as a known issue related to identity and access management.\u003c/p\u003e\n"]]],[],null,["# Google Distributed Cloud air-gapped 1.9.19 release notes\n\n\u003cbr /\u003e\n\nNovember 9, 2024\n----------------\n\n*** ** * ** ***\n\nGoogle Distributed Cloud air-gapped 1.9.19 is released.\n\nSee the [product overview](/distributed-cloud/hosted/docs/latest/gdch/overview) to learn about the features of Google Distributed Cloud air-gapped.\n\n*** ** * ** ***\n\n\nUpdated the Canonical Ubuntu OS image version to 20241009 to apply the latest\nsecurity patches and important updates.\nThe following security vulnerabilities are fixed:\n\n- [CVE-2016-1585](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1585)\n- [CVE-2021-46926](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46926)\n- [CVE-2021-47188](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47188)\n- [CVE-2022-48174](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48174)\n- [CVE-2022-48791](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48791)\n- [CVE-2022-48863](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48863)\n- [CVE-2023-27044](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27044)\n- [CVE-2023-40546](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40546)\n- [CVE-2023-40547](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40547)\n- [CVE-2023-40548](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40548)\n- [CVE-2023-40549](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40549)\n- [CVE-2023-40550](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40550)\n- [CVE-2023-40551](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40551)\n- [CVE-2023-42667](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42667)\n- [CVE-2023-49141](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-49141)\n- [CVE-2023-52629](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52629)\n- [CVE-2023-52760](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52760)\n- [CVE-2024-2201](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2201)\n- [CVE-2024-2511](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2511)\n- [CVE-2024-4741](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4741)\n- [CVE-2024-5535](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5535)\n- [CVE-2024-6232](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6232)\n- [CVE-2024-6345](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6345)\n- [CVE-2024-6923](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6923)\n- [CVE-2024-7006](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7006)\n- [CVE-2024-7592](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7592)\n- [CVE-2024-8088](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8088)\n- [CVE-2024-8096](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8096)\n- [CVE-2024-23984](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23984)\n- [CVE-2024-24853](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24853)\n- [CVE-2024-24860](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24860)\n- [CVE-2024-24968](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24968)\n- [CVE-2024-24980](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24980)\n- [CVE-2024-25939](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-25939)\n- [CVE-2024-26677](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26677)\n- [CVE-2024-26787](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26787)\n- [CVE-2024-26830](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26830)\n- [CVE-2024-26830](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26830)\n- [CVE-2024-26921](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26921)\n- [CVE-2024-26929](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26929)\n- [CVE-2024-27012](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27012)\n- [CVE-2024-27012](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27012)\n- [CVE-2024-36901](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36901)\n- [CVE-2024-38570](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38570)\n- [CVE-2024-39484](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39484)\n- [CVE-2024-39494](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39494)\n- [CVE-2024-40897](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40897)\n- [CVE-2024-41957](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41957)\n- [CVE-2024-42160](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42160)\n- [CVE-2024-43374](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43374)\n- [CVE-2024-43802](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43802)\n- [CVE-2024-45490](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45490)\n- [CVE-2024-45491](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45491)\n- [CVE-2024-45492](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45492)\n\n*** ** * ** ***\n\n**Identity and access management**:\n\n- Authentication fails when accessing the GDC console. For more information, see [Known issues](/distributed-cloud/hosted/docs/latest/gdch/resources/known-issues/known-issues-19x#console-auth)."]]