Google Distributed Cloud for VMware 1.29.200-gke.245 is now available for
Share
Services
## Announcement
Google Distributed Cloud for VMware 1.29.200-gke.245 is now available for[download](https://cloud.google.com/kubernetes-engine/distributed-cloud/vmware/docs/downloads). To upgrade, see[Upgrade a cluster or a node pool](https://cloud.google.com/kubernetes-engine/distributed-cloud/vmware/docs/how-to/upgrading). Google Distributed Cloud 1.29.200-gke.245 runs on Kubernetes v1.29.5-gke.800\.
If you are using a third-party storage vendor, check the[GDCV Ready storage partners](https://cloud.google.com/kubernetes-engine/enterprise/docs/resources/partner-storage)document to make sure the storage vendor has already passed the qualification for this release.
## Fix
The following vulnerabilities are fixed In 1.29.200-gke.245:
* Container-optimized OS vulnerabilities:
* [CVE-2024-6387](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6387)
* Ubuntu vulnerabilities:
* [CVE-2024-6387](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6387)
## Announcement
Google Distributed Cloud for VMware 1.28.700-gke.151 is now available for[download](https://cloud.google.com/kubernetes-engine/distributed-cloud/vmware/docs/downloads). To upgrade, see[Upgrade a cluster or a node pool](https://cloud.google.com/kubernetes-engine/distributed-cloud/vmware/docs/how-to/upgrading). Google Distributed Cloud 1.28.700-gke.151 runs on Kubernetes v1.28.10-gke.2100\.
If you are using a third-party storage vendor, check the[GDCV Ready storage partners](https://cloud.google.com/kubernetes-engine/enterprise/docs/resources/partner-storage)document to make sure the storage vendor has already passed the qualification for this release.
## Fix
The following issues are fixed in 1.28.700-gke.151:
* Fixed the [known issue](https://cloud.google.com/kubernetes-engine/distributed-cloud/vmware/docs/troubleshooting/known-issues#binary-authorization-webook-blocks-cni-plugin-to-start-causing-one-of-nodepool-failed-to-come-up) where the Binary Authorization webhook blocked the CNI plugin, which caused user cluster creation to stall.
* Fixed the [known issue](https://cloud.google.com/kubernetes-engine/distributed-cloud/vmware/docs/troubleshooting/known-issues#cluster-creation-failure-due-to-control-plane-vip-in-different-subnet) that caused cluster creation to fail because the control plane VIP was in a different subnet from other cluster nodes.
The following vulnerabilities are fixed In 1.28.700-gke.151:
* High-severity container vulnerabilities:
* [CVE-2022-28948](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28948)
* [CVE-2024-0985](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0985)
* [CVE-2024-2961](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2961)
* Container-optimized OS vulnerabilities:
* [CVE-2021-3520](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3520)
* [CVE-2024-6387](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6387)
* [CVE-2024-26256](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26256)
* [CVE-2024-27018](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27018)
* [CVE-2024-27020](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27020)
* [CVE-2024-32004](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-32004)
* [CVE-2024-32465](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-32465)
* [CVE-2024-36971](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36971)
* Ubuntu vulnerabilities:
* [CVE-2023-6270](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6270)
* [CVE-2023-7042](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7042)
* [CVE-2023-52434](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52434)
* [CVE-2023-52447](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52447)
* [CVE-2023-52497](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52497)
* [CVE-2023-52620](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52620)
* [CVE-2023-52640](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52640)
* [CVE-2023-52641](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52641)
* [CVE-2023-52644](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52644)
* [CVE-2023-52645](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52645)
* [CVE-2023-52650](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52650)
* [CVE-2023-52652](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52652)
* [CVE-2023-52656](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52656)
* [CVE-2023-52662](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52662)
* [CVE-2024-0841](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0841)
* [CVE-2024-6387](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6387)
* [CVE-2024-21823](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21823)
* [CVE-2024-22099](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-22099)
* [CVE-2024-26583](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26583)
* [CVE-2024-26584](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26584)
* [CVE-2024-26585](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26585)
* [CVE-2024-26601](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26601)
* [CVE-2024-26603](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26603)
* [CVE-2024-26643](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26643)
* [CVE-2024-26651](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26651)
* [CVE-2024-26659](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26659)
* [CVE-2024-26688](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26688)
* [CVE-2024-26733](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26733)
* [CVE-2024-26735](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26735)
* [CVE-2024-26736](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26736)
* [CVE-2024-26737](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26737)
* [CVE-2024-26743](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26743)
* [CVE-2024-26744](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26744)
* [CVE-2024-26747](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26747)
* [CVE-2024-26748](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26748)
* [CVE-2024-26749](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26749)
* [CVE-2024-26750](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26750)
* [CVE-2024-26751](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26751)
* [CVE-2024-26752](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26752)
* [CVE-2024-26754](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26754)
* [CVE-2024-26763](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26763)
* [CVE-2024-26764](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26764)
* [CVE-2024-26766](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26766)
* [CVE-2024-26769](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26769)
* [CVE-2024-26771](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26771)
* [CVE-2024-26772](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26772)
* [CVE-2024-26773](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26773)
* [CVE-2024-26774](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26774)
* [CVE-2024-26776](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26776)
* [CVE-2024-26777](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26777)
* [CVE-2024-26778](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26778)
* [CVE-2024-26779](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26779)
* [CVE-2024-26782](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26782)
* [CVE-2024-26787](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26787)
* [CVE-2024-26788](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26788)
* [CVE-2024-26790](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26790)
* [CVE-2024-26791](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26791)
* [CVE-2024-26792](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26792)
* [CVE-2024-26793](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26793)
* [CVE-2024-26795](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26795)
* [CVE-2024-26798](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26798)
* [CVE-2024-26801](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26801)
* [CVE-2024-26802](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26802)
* [CVE-2024-26803](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26803)
* [CVE-2024-26804](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26804)
* [CVE-2024-26805](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26805)
* [CVE-2024-26809](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26809)
* [CVE-2024-26816](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26816)
* [CVE-2024-26820](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26820)
* [CVE-2024-26833](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26833)
* [CVE-2024-26835](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26835)
* [CVE-2024-26838](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26838)
* [CVE-2024-26839](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26839)
* [CVE-2024-26840](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26840)
* [CVE-2024-26843](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26843)
* [CVE-2024-26845](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26845)
* [CVE-2024-26846](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26846)
* [CVE-2024-26851](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26851)
* [CVE-2024-26852](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26852)
* [CVE-2024-26855](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26855)
* [CVE-2024-26856](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26856)
* [CVE-2024-26857](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26857)
* [CVE-2024-26859](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26859)
* [CVE-2024-26861](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26861)
* [CVE-2024-26862](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26862)
* [CVE-2024-26863](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26863)
* [CVE-2024-26870](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26870)
* [CVE-2024-26872](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26872)
* [CVE-2024-26874](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26874)
* [CVE-2024-26875](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26875)
* [CVE-2024-26877](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26877)
* [CVE-2024-26878](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26878)
* [CVE-2024-26879](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26879)
* [CVE-2024-26880](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26880)
* [CVE-2024-26881](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26881)
* [CVE-2024-26882](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26882)
* [CVE-2024-26883](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26883)
* [CVE-2024-26884](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26884)
* [CVE-2024-26885](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26885)
* [CVE-2024-26889](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26889)
* [CVE-2024-26891](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26891)
* [CVE-2024-26894](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26894)
* [CVE-2024-26895](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26895)
* [CVE-2024-26897](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26897)
* [CVE-2024-26898](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26898)
* [CVE-2024-26901](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26901)
* [CVE-2024-26903](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26903)
* [CVE-2024-26906](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26906)
* [CVE-2024-26907](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26907)
* [CVE-2024-26915](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26915)
* [CVE-2024-26924](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26924)
* [CVE-2024-27024](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27024)
* [CVE-2024-27028](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27028)
* [CVE-2024-27030](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27030)
* [CVE-2024-27034](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27034)
* [CVE-2024-27037](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27037)
* [CVE-2024-27038](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27038)
* [CVE-2024-27039](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27039)
* [CVE-2024-27043](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27043)
* [CVE-2024-27044](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27044)
* [CVE-2024-27045](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27045)
* [CVE-2024-27046](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27046)
* [CVE-2024-27047](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27047)
* [CVE-2024-27051](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27051)
* [CVE-2024-27052](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27052)
* [CVE-2024-27053](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27053)
* [CVE-2024-27054](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27054)
* [CVE-2024-27065](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27065)
* [CVE-2024-27073](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27073)
* [CVE-2024-27074](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27074)
* [CVE-2024-27075](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27075)
* [CVE-2024-27076](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27076)
* [CVE-2024-27077](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27077)
* [CVE-2024-27078](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27078)
* [CVE-2024-27388](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27388)
* [CVE-2024-27390](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27390)
* [CVE-2024-27403](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27403)
* [CVE-2024-27405](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27405)
* [CVE-2024-27410](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27410)
* [CVE-2024-27412](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27412)
* [CVE-2024-27413](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27413)
* [CVE-2024-27414](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27414)
* [CVE-2024-27415](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27415)
* [CVE-2024-27416](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27416)
* [CVE-2024-27417](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27417)
* [CVE-2024-27419](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27419)
* [CVE-2024-27431](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27431)
* [CVE-2024-27432](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27432)
* [CVE-2024-27436](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27436)
* [CVE-2024-35811](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35811)
* [CVE-2024-35828](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35828)
* [CVE-2024-35829](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35829)
* [CVE-2024-35830](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35830)
* [CVE-2024-35844](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35844)
* [CVE-2024-35845](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35845)
## Announcement
Google Distributed Cloud for VMware 1.16.10-gke.36 is now available for[download](https://cloud.google.com/kubernetes-engine/distributed-cloud/vmware/docs/downloads). To upgrade, see[Upgrade a cluster or a node pool](https://cloud.google.com/kubernetes-engine/distributed-cloud/vmware/docs/how-to/upgrading). Google Distributed Cloud 1.16.10-gke.36 runs on Kubernetes v1.27.14-gke.1600\.
If you are using a third-party storage vendor, check the[GDCV Ready storage partners](https://cloud.google.com/kubernetes-engine/enterprise/docs/resources/partner-storage)document to make sure the storage vendor has already passed the qualification for this release.
## Fix
The following vulnerabilities are fixed In 1.16.10-gke.36:
* High-severity container vulnerabilities:
* [CVE-2022-28948](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28948)
* [CVE-2024-0985](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0985)
* [CVE-2024-2961](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2961)
* [CVE-2024-33599](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33599)
* Container-optimized OS vulnerabilities:
* [CVE-2021-3520](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3520)
* [CVE-2024-6387](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6387)
* [CVE-2024-27018](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27018)
* [CVE-2024-32004](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-32004)
* [CVE-2024-32465](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-32465)
What else is happening at Google Cloud Platform?
A weekly digest of client library updates from across the Cloud SDK
about 11 hours ago
Services
Share
Deletion protection is now generally available for Filestore instances
about 13 hours ago
Services
Share
A weekly digest of client library updates from across the Cloud SDK
about 15 hours ago
Services
Share
A weekly digest of client library updates from across the Cloud SDK
about 16 hours ago
Services
Share