Google Distributed Cloud for VMware 1.29.200-gke.245 is now available for
Share
Services
## Announcement
Google Distributed Cloud for VMware 1.29.200-gke.245 is now available for[download](https://cloud.google.com/kubernetes-engine/distributed-cloud/vmware/docs/downloads). To upgrade, see[Upgrade a cluster or a node pool](https://cloud.google.com/kubernetes-engine/distributed-cloud/vmware/docs/how-to/upgrading). Google Distributed Cloud 1.29.200-gke.245 runs on Kubernetes v1.29.5-gke.800\.
If you are using a third-party storage vendor, check the[GDCV Ready storage partners](https://cloud.google.com/kubernetes-engine/enterprise/docs/resources/partner-storage)document to make sure the storage vendor has already passed the qualification for this release.
## Fix
The following vulnerabilities are fixed In 1.29.200-gke.245:
* Container-optimized OS vulnerabilities:
* [CVE-2024-6387](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6387)
* Ubuntu vulnerabilities:
* [CVE-2024-6387](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6387)
## Announcement
Google Distributed Cloud for VMware 1.28.700-gke.151 is now available for[download](https://cloud.google.com/kubernetes-engine/distributed-cloud/vmware/docs/downloads). To upgrade, see[Upgrade a cluster or a node pool](https://cloud.google.com/kubernetes-engine/distributed-cloud/vmware/docs/how-to/upgrading). Google Distributed Cloud 1.28.700-gke.151 runs on Kubernetes v1.28.10-gke.2100\.
If you are using a third-party storage vendor, check the[GDCV Ready storage partners](https://cloud.google.com/kubernetes-engine/enterprise/docs/resources/partner-storage)document to make sure the storage vendor has already passed the qualification for this release.
## Fix
The following issues are fixed in 1.28.700-gke.151:
* Fixed the [known issue](https://cloud.google.com/kubernetes-engine/distributed-cloud/vmware/docs/troubleshooting/known-issues#binary-authorization-webook-blocks-cni-plugin-to-start-causing-one-of-nodepool-failed-to-come-up) where the Binary Authorization webhook blocked the CNI plugin, which caused user cluster creation to stall.
* Fixed the [known issue](https://cloud.google.com/kubernetes-engine/distributed-cloud/vmware/docs/troubleshooting/known-issues#cluster-creation-failure-due-to-control-plane-vip-in-different-subnet) that caused cluster creation to fail because the control plane VIP was in a different subnet from other cluster nodes.
The following vulnerabilities are fixed In 1.28.700-gke.151:
* High-severity container vulnerabilities:
* [CVE-2022-28948](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28948)
* [CVE-2024-0985](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0985)
* [CVE-2024-2961](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2961)
* Container-optimized OS vulnerabilities:
* [CVE-2021-3520](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3520)
* [CVE-2024-6387](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6387)
* [CVE-2024-26256](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26256)
* [CVE-2024-27018](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27018)
* [CVE-2024-27020](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27020)
* [CVE-2024-32004](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-32004)
* [CVE-2024-32465](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-32465)
* [CVE-2024-36971](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36971)
* Ubuntu vulnerabilities:
* [CVE-2023-6270](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6270)
* [CVE-2023-7042](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7042)
* [CVE-2023-52434](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52434)
* [CVE-2023-52447](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52447)
* [CVE-2023-52497](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52497)
* [CVE-2023-52620](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52620)
* [CVE-2023-52640](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52640)
* [CVE-2023-52641](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52641)
* [CVE-2023-52644](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52644)
* [CVE-2023-52645](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52645)
* [CVE-2023-52650](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52650)
* [CVE-2023-52652](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52652)
* [CVE-2023-52656](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52656)
* [CVE-2023-52662](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52662)
* [CVE-2024-0841](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0841)
* [CVE-2024-6387](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6387)
* [CVE-2024-21823](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21823)
* [CVE-2024-22099](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-22099)
* [CVE-2024-26583](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26583)
* [CVE-2024-26584](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26584)
* [CVE-2024-26585](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26585)
* [CVE-2024-26601](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26601)
* [CVE-2024-26603](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26603)
* [CVE-2024-26643](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26643)
* [CVE-2024-26651](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26651)
* [CVE-2024-26659](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26659)
* [CVE-2024-26688](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26688)
* [CVE-2024-26733](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26733)
* [CVE-2024-26735](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26735)
* [CVE-2024-26736](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26736)
* [CVE-2024-26737](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26737)
* [CVE-2024-26743](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26743)
* [CVE-2024-26744](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26744)
* [CVE-2024-26747](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26747)
* [CVE-2024-26748](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26748)
* [CVE-2024-26749](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26749)
* [CVE-2024-26750](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26750)
* [CVE-2024-26751](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26751)
* [CVE-2024-26752](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26752)
* [CVE-2024-26754](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26754)
* [CVE-2024-26763](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26763)
* [CVE-2024-26764](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26764)
* [CVE-2024-26766](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26766)
* [CVE-2024-26769](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26769)
* [CVE-2024-26771](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26771)
* [CVE-2024-26772](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26772)
* [CVE-2024-26773](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26773)
* [CVE-2024-26774](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26774)
* [CVE-2024-26776](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26776)
* [CVE-2024-26777](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26777)
* [CVE-2024-26778](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26778)
* [CVE-2024-26779](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26779)
* [CVE-2024-26782](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26782)
* [CVE-2024-26787](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26787)
* [CVE-2024-26788](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26788)
* [CVE-2024-26790](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26790)
* [CVE-2024-26791](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26791)
* [CVE-2024-26792](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26792)
* [CVE-2024-26793](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26793)
* [CVE-2024-26795](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26795)
* [CVE-2024-26798](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26798)
* [CVE-2024-26801](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26801)
* [CVE-2024-26802](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26802)
* [CVE-2024-26803](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26803)
* [CVE-2024-26804](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26804)
* [CVE-2024-26805](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26805)
* [CVE-2024-26809](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26809)
* [CVE-2024-26816](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26816)
* [CVE-2024-26820](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26820)
* [CVE-2024-26833](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26833)
* [CVE-2024-26835](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26835)
* [CVE-2024-26838](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26838)
* [CVE-2024-26839](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26839)
* [CVE-2024-26840](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26840)
* [CVE-2024-26843](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26843)
* [CVE-2024-26845](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26845)
* [CVE-2024-26846](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26846)
* [CVE-2024-26851](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26851)
* [CVE-2024-26852](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26852)
* [CVE-2024-26855](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26855)
* [CVE-2024-26856](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26856)
* [CVE-2024-26857](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26857)
* [CVE-2024-26859](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26859)
* [CVE-2024-26861](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26861)
* [CVE-2024-26862](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26862)
* [CVE-2024-26863](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26863)
* [CVE-2024-26870](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26870)
* [CVE-2024-26872](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26872)
* [CVE-2024-26874](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26874)
* [CVE-2024-26875](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26875)
* [CVE-2024-26877](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26877)
* [CVE-2024-26878](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26878)
* [CVE-2024-26879](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26879)
* [CVE-2024-26880](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26880)
* [CVE-2024-26881](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26881)
* [CVE-2024-26882](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26882)
* [CVE-2024-26883](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26883)
* [CVE-2024-26884](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26884)
* [CVE-2024-26885](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26885)
* [CVE-2024-26889](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26889)
* [CVE-2024-26891](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26891)
* [CVE-2024-26894](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26894)
* [CVE-2024-26895](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26895)
* [CVE-2024-26897](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26897)
* [CVE-2024-26898](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26898)
* [CVE-2024-26901](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26901)
* [CVE-2024-26903](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26903)
* [CVE-2024-26906](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26906)
* [CVE-2024-26907](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26907)
* [CVE-2024-26915](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26915)
* [CVE-2024-26924](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26924)
* [CVE-2024-27024](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27024)
* [CVE-2024-27028](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27028)
* [CVE-2024-27030](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27030)
* [CVE-2024-27034](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27034)
* [CVE-2024-27037](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27037)
* [CVE-2024-27038](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27038)
* [CVE-2024-27039](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27039)
* [CVE-2024-27043](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27043)
* [CVE-2024-27044](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27044)
* [CVE-2024-27045](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27045)
* [CVE-2024-27046](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27046)
* [CVE-2024-27047](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27047)
* [CVE-2024-27051](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27051)
* [CVE-2024-27052](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27052)
* [CVE-2024-27053](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27053)
* [CVE-2024-27054](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27054)
* [CVE-2024-27065](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27065)
* [CVE-2024-27073](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27073)
* [CVE-2024-27074](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27074)
* [CVE-2024-27075](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27075)
* [CVE-2024-27076](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27076)
* [CVE-2024-27077](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27077)
* [CVE-2024-27078](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27078)
* [CVE-2024-27388](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27388)
* [CVE-2024-27390](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27390)
* [CVE-2024-27403](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27403)
* [CVE-2024-27405](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27405)
* [CVE-2024-27410](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27410)
* [CVE-2024-27412](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27412)
* [CVE-2024-27413](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27413)
* [CVE-2024-27414](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27414)
* [CVE-2024-27415](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27415)
* [CVE-2024-27416](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27416)
* [CVE-2024-27417](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27417)
* [CVE-2024-27419](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27419)
* [CVE-2024-27431](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27431)
* [CVE-2024-27432](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27432)
* [CVE-2024-27436](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27436)
* [CVE-2024-35811](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35811)
* [CVE-2024-35828](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35828)
* [CVE-2024-35829](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35829)
* [CVE-2024-35830](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35830)
* [CVE-2024-35844](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35844)
* [CVE-2024-35845](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35845)
## Announcement
Google Distributed Cloud for VMware 1.16.10-gke.36 is now available for[download](https://cloud.google.com/kubernetes-engine/distributed-cloud/vmware/docs/downloads). To upgrade, see[Upgrade a cluster or a node pool](https://cloud.google.com/kubernetes-engine/distributed-cloud/vmware/docs/how-to/upgrading). Google Distributed Cloud 1.16.10-gke.36 runs on Kubernetes v1.27.14-gke.1600\.
If you are using a third-party storage vendor, check the[GDCV Ready storage partners](https://cloud.google.com/kubernetes-engine/enterprise/docs/resources/partner-storage)document to make sure the storage vendor has already passed the qualification for this release.
## Fix
The following vulnerabilities are fixed In 1.16.10-gke.36:
* High-severity container vulnerabilities:
* [CVE-2022-28948](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28948)
* [CVE-2024-0985](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0985)
* [CVE-2024-2961](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2961)
* [CVE-2024-33599](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33599)
* Container-optimized OS vulnerabilities:
* [CVE-2021-3520](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3520)
* [CVE-2024-6387](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6387)
* [CVE-2024-27018](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27018)
* [CVE-2024-32004](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-32004)
* [CVE-2024-32465](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-32465)
What else is happening at Google Cloud Platform?
Toxic combination findings are generally available. This includes the following updates
October 16th, 2024
Services
Share