Maintained with ☕️ by
IcePanel logo

Google Distributed Cloud (software only) for VMware 1.30.200-gke.101 is now available for download

Share

Services

## Announcement Google Distributed Cloud (software only) for VMware 1.30.200-gke.101 is now available for [download](https://cloud.google.com/anthos/clusters/docs/on-prem/latest/downloads). To upgrade, see [Upgrade a cluster or a node pool](https://cloud.google.com/anthos/clusters/docs/on-prem/latest/how-to/upgrading). Google Distributed Cloud 1.30.200-gke.101 runs on Kubernetes v1.30.4-gke.1800. If you are using a third-party storage vendor, check the [GDCV Ready storage partners](https://cloud.google.com/anthos/docs/resources/partner-storage) document to make sure the storage vendor has already passed the qualification for this release. After a release, it takes approximately 7 to 14 days for the version to become available for use with [GKE On-Prem API clients](https://cloud.google.com/kubernetes-engine/distributed-cloud/vmware/docs/how-to/cluster-lifecycle-management-tools): the Google Cloud console, the gcloud CLI, and Terraform. ## Change Removed TLS/SSL weak message authentication code cipher suites in the vSphere cloud controller manager. ## Fix The following issues are fixed in 1.30.200-gke.101: * Fixed the [known issue](https://cloud.google.com/kubernetes-engine/distributed-cloud/vmware/docs/troubleshooting/known-issues#migrating-a-user-cluster-to-controlplane-v2-fails-if-secrets-encryption-has-ever-been-enabled) that caused migrating a user cluster to Controlplane V2 to fail if secrets encryption had ever been enabled. * Fixed the [known issue](https://cloud.google.com/kubernetes-engine/distributed-cloud/vmware/docs/troubleshooting/known-issues#migrating-an-admin-cluster-from-non-ha-to-ha-fails-if-secrets-encryption-is-enabled) that caused migrating an admin cluster from non-HA to HA to fail if secret encryption was enabled. * Fixed the issue that caused the Pre-upgrade tool to block upgrading a user cluster to version 1.30 or higher because of an incorrect storage driver validator check. The following vulnerabilities are fixed in 1.30.200-gke.101: Critical container vulnerabilities: * [CVE-2023-29405](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29405) * [CVE-2023-29404](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29404) * [CVE-2023-24538](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-24538) * [CVE-2023-24540](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-24540) * [CVE-2021-38297](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38297) * [CVE-2022-23806](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23806) * [CVE-2023-29402](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29402) High-severity container vulnerabilities: * [CVE-2022-30635](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30635) * [CVE-2022-23772](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23772) * [CVE-2022-24921](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24921) * [CVE-2022-2879](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2879) * [CVE-2021-39293](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39293) * [CVE-2022-2880](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2880) * [CVE-2023-29400](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29400) * [CVE-2022-30631](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30631) * [CVE-2022-24675](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24675) * [CVE-2022-30633](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30633) * [CVE-2021-41772](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41772) * [CVE-2023-27561](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27561) * [CVE-2022-23773](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23773) * [CVE-2022-32189](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32189) * [CVE-2022-28327](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28327) * [CVE-2021-29923](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29923) * [CVE-2023-24536](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-24536) * [CVE-2024-1737](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1737) * [CVE-2024-1975](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1975) * [CVE-2022-30632](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30632) * [CVE-2021-44716](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44716) * [CVE-2023-39323](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39323) * [CVE-2023-24539](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-24539) * [CVE-2022-30580](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30580) * [CVE-2022-41724](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41724) * [CVE-2022-30630](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30630) * [CVE-2022-41715](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41715) * [CVE-2023-29403](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29403) * [CVE-2023-28642](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28642) * [CVE-2022-41725](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41725) * [CVE-2022-28131](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28131) * [CVE-2023-45287](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45287) * [CVE-2021-41771](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41771) * [CVE-2023-24537](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-24537) * [CVE-2023-24534](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-24534) Container-optimized OS vulnerabilities: * [CVE-2024-43873](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43873) * [CVE-2024-44983](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44983) * [CVE-2024-45492](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45492) * [CVE-2024-6232](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6232) Ubuntu vulnerabilities: * [CVE-2022-48772](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48772) * [CVE-2023-52884](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52884) * [CVE-2023-52887](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52887) * [CVE-2024-23848](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23848) * [CVE-2024-25741](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-25741) * [CVE-2024-31076](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31076) * [CVE-2024-33621](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33621) * [CVE-2024-33847](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33847) * [CVE-2024-34027](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-34027) * [CVE-2024-34777](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-34777) * [CVE-2024-35247](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35247) * [CVE-2024-35927](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35927) * [CVE-2024-36014](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36014) * [CVE-2024-36015](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36015) * [CVE-2024-36032](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36032) * [CVE-2024-36270](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36270) * [CVE-2024-36286](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36286) * [CVE-2024-36489](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36489) * [CVE-2024-36894](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36894) * [CVE-2024-36971](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36971) * [CVE-2024-36972](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36972) * [CVE-2024-36974](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36974) * [CVE-2024-36978](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36978) * [CVE-2024-37078](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37078) * [CVE-2024-37356](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37356) * [CVE-2024-38381](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38381) * [CVE-2024-38546](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38546) * [CVE-2024-38547](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38547) * [CVE-2024-38548](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38548) * [CVE-2024-38549](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38549) * [CVE-2024-38550](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38550) * [CVE-2024-38552](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38552) * [CVE-2024-38555](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38555) * [CVE-2024-38558](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38558) * [CVE-2024-38559](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38559) * [CVE-2024-38560](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38560) * [CVE-2024-38565](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38565) * [CVE-2024-38567](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38567) * [CVE-2024-38571](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38571) * [CVE-2024-38573](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38573) * [CVE-2024-38578](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38578) * [CVE-2024-38579](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38579) * [CVE-2024-38580](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38580) * [CVE-2024-38582](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38582) * [CVE-2024-38583](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38583) * [CVE-2024-38586](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38586) * [CVE-2024-38587](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38587) * [CVE-2024-38588](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38588) * [CVE-2024-38589](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38589) * [CVE-2024-38590](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38590) * [CVE-2024-38591](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38591) * [CVE-2024-38596](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38596) * [CVE-2024-38597](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38597) * [CVE-2024-38598](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38598) * [CVE-2024-38599](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38599) * [CVE-2024-38601](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38601) * [CVE-2024-38605](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38605) * [CVE-2024-38607](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38607) * [CVE-2024-38610](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38610) * [CVE-2024-38612](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38612) * [CVE-2024-38613](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38613) * [CVE-2024-38615](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38615) * [CVE-2024-38618](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38618) * [CVE-2024-38619](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38619) * [CVE-2024-38621](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38621) * [CVE-2024-38623](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38623) * [CVE-2024-38624](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38624) * [CVE-2024-38627](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38627) * [CVE-2024-38633](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38633) * [CVE-2024-38634](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38634) * [CVE-2024-38635](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38635) * [CVE-2024-38637](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38637) * [CVE-2024-38659](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38659) * [CVE-2024-38661](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38661) * [CVE-2024-38662](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38662) * [CVE-2024-38780](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38780) * [CVE-2024-39276](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39276) * [CVE-2024-39277](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39277) * [CVE-2024-39301](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39301) * [CVE-2024-39466](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39466) * [CVE-2024-39467](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39467) * [CVE-2024-39468](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39468) * [CVE-2024-39469](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39469) * [CVE-2024-39471](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39471) * [CVE-2024-39475](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39475) * [CVE-2024-39480](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39480) * [CVE-2024-39482](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39482) * [CVE-2024-39487](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39487) * [CVE-2024-39488](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39488) * [CVE-2024-39489](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39489) * [CVE-2024-39490](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39490) * [CVE-2024-39493](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39493) * [CVE-2024-39495](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39495) * [CVE-2024-39499](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39499) * [CVE-2024-39500](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39500) * [CVE-2024-39501](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39501) * [CVE-2024-39502](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39502) * [CVE-2024-39503](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39503) * [CVE-2024-39505](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39505) * [CVE-2024-39506](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39506) * [CVE-2024-39507](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39507) * [CVE-2024-39509](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39509) * [CVE-2024-40901](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40901) * [CVE-2024-40902](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40902) * [CVE-2024-40904](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40904) * [CVE-2024-40905](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40905) * [CVE-2024-40908](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40908) * [CVE-2024-40911](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40911) * [CVE-2024-40912](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40912) * [CVE-2024-40914](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40914) * [CVE-2024-40916](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40916) * [CVE-2024-40927](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40927) * [CVE-2024-40929](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40929) * [CVE-2024-40931](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40931) * [CVE-2024-40932](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40932) * [CVE-2024-40934](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40934) * [CVE-2024-40937](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40937) * [CVE-2024-40941](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40941) * [CVE-2024-40942](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40942) * [CVE-2024-40943](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40943) * [CVE-2024-40945](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40945) * [CVE-2024-40954](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40954) * [CVE-2024-40956](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40956) * [CVE-2024-40957](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40957) * [CVE-2024-40958](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40958) * [CVE-2024-40959](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40959) * [CVE-2024-40960](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40960) * [CVE-2024-40961](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40961) * [CVE-2024-40963](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40963) * [CVE-2024-40967](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40967) * [CVE-2024-40968](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40968) * [CVE-2024-40970](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40970) * [CVE-2024-40971](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40971) * [CVE-2024-40974](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40974) * [CVE-2024-40976](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40976) * [CVE-2024-40978](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40978) * [CVE-2024-40980](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40980) * [CVE-2024-40981](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40981) * [CVE-2024-40983](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40983) * [CVE-2024-40984](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40984) * [CVE-2024-40987](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40987) * [CVE-2024-40988](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40988) * [CVE-2024-40990](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40990) * [CVE-2024-40994](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40994) * [CVE-2024-40995](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40995) * [CVE-2024-41000](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41000) * [CVE-2024-41002](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41002) * [CVE-2024-41004](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41004) * [CVE-2024-41005](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41005) * [CVE-2024-41006](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41006) * [CVE-2024-41007](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41007) * [CVE-2024-41027](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41027) * [CVE-2024-41034](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41034) * [CVE-2024-41035](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41035) * [CVE-2024-41040](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41040) * [CVE-2024-41041](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41041) * [CVE-2024-41044](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41044) * [CVE-2024-41046](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41046) * [CVE-2024-41047](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41047) * [CVE-2024-41048](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41048) * [CVE-2024-41049](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41049) * [CVE-2024-41055](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41055) * [CVE-2024-41087](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41087) * [CVE-2024-41089](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41089) * [CVE-2024-41092](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41092) * [CVE-2024-41093](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41093) * [CVE-2024-41095](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41095) * [CVE-2024-41097](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41097) * [CVE-2024-42068](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42068) * [CVE-2024-42070](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42070) * [CVE-2024-42076](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42076) * [CVE-2024-42077](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42077) * [CVE-2024-42080](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42080) * [CVE-2024-42082](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42082) * [CVE-2024-42084](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42084) * [CVE-2024-42085](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42085) * [CVE-2024-42086](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42086) * [CVE-2024-42087](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42087) * [CVE-2024-42089](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42089) * [CVE-2024-42090](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42090) * [CVE-2024-42092](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42092) * [CVE-2024-42093](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42093) * [CVE-2024-42094](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42094) * [CVE-2024-42095](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42095) * [CVE-2024-42096](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42096) * [CVE-2024-42097](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42097) * [CVE-2024-42098](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42098) * [CVE-2024-42101](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42101) * [CVE-2024-42102](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42102) * [CVE-2024-42104](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42104) * [CVE-2024-42105](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42105) * [CVE-2024-42106](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42106) * [CVE-2024-42109](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42109) * [CVE-2024-42115](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42115) * [CVE-2024-42119](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42119) * [CVE-2024-42120](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42120) * [CVE-2024-42121](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42121) * [CVE-2024-42124](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42124) * [CVE-2024-42127](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42127) * [CVE-2024-42130](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42130) * [CVE-2024-42131](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42131) * [CVE-2024-42137](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42137) * [CVE-2024-42140](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42140) * [CVE-2024-42145](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42145) * [CVE-2024-42148](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42148) * [CVE-2024-42152](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42152) * [CVE-2024-42153](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42153) * [CVE-2024-42154](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42154) * [CVE-2024-42157](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42157) * [CVE-2024-42161](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42161) * [CVE-2024-42223](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42223) * [CVE-2024-42224](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42224) * [CVE-2024-42225](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42225) * [CVE-2024-42229](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42229) * [CVE-2024-42232](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42232) * [CVE-2024-42236](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42236) * [CVE-2024-42240](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42240) * [CVE-2024-42244](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42244) * [CVE-2024-42247](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42247)