Google Distributed Cloud (software only) for VMware 1.30.200-gke.101 is now available for download
Share
Services
## Announcement
Google Distributed Cloud (software only) for VMware 1.30.200-gke.101 is now available for [download](https://cloud.google.com/anthos/clusters/docs/on-prem/latest/downloads). To upgrade, see [Upgrade a cluster or a node pool](https://cloud.google.com/anthos/clusters/docs/on-prem/latest/how-to/upgrading). Google Distributed Cloud 1.30.200-gke.101 runs on Kubernetes v1.30.4-gke.1800.
If you are using a third-party storage vendor, check the [GDCV Ready storage partners](https://cloud.google.com/anthos/docs/resources/partner-storage) document to make sure the storage vendor has already passed the qualification for this release.
After a release, it takes approximately 7 to 14 days for the version to become available for use with [GKE On-Prem API clients](https://cloud.google.com/kubernetes-engine/distributed-cloud/vmware/docs/how-to/cluster-lifecycle-management-tools): the Google Cloud console, the gcloud CLI, and Terraform.
## Change
Removed TLS/SSL weak message authentication code cipher suites in the vSphere cloud controller manager.
## Fix
The following issues are fixed in 1.30.200-gke.101:
* Fixed the [known issue](https://cloud.google.com/kubernetes-engine/distributed-cloud/vmware/docs/troubleshooting/known-issues#migrating-a-user-cluster-to-controlplane-v2-fails-if-secrets-encryption-has-ever-been-enabled) that caused migrating a user cluster to Controlplane V2 to fail if secrets encryption had ever been enabled.
* Fixed the [known issue](https://cloud.google.com/kubernetes-engine/distributed-cloud/vmware/docs/troubleshooting/known-issues#migrating-an-admin-cluster-from-non-ha-to-ha-fails-if-secrets-encryption-is-enabled) that caused migrating an admin cluster from non-HA to HA to fail if secret encryption was enabled.
* Fixed the issue that caused the Pre-upgrade tool to block upgrading a user cluster to version 1.30 or higher because of an incorrect storage driver validator check.
The following vulnerabilities are fixed in 1.30.200-gke.101:
Critical container vulnerabilities:
* [CVE-2023-29405](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29405)
* [CVE-2023-29404](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29404)
* [CVE-2023-24538](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-24538)
* [CVE-2023-24540](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-24540)
* [CVE-2021-38297](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38297)
* [CVE-2022-23806](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23806)
* [CVE-2023-29402](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29402)
High-severity container vulnerabilities:
* [CVE-2022-30635](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30635)
* [CVE-2022-23772](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23772)
* [CVE-2022-24921](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24921)
* [CVE-2022-2879](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2879)
* [CVE-2021-39293](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39293)
* [CVE-2022-2880](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2880)
* [CVE-2023-29400](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29400)
* [CVE-2022-30631](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30631)
* [CVE-2022-24675](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24675)
* [CVE-2022-30633](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30633)
* [CVE-2021-41772](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41772)
* [CVE-2023-27561](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27561)
* [CVE-2022-23773](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23773)
* [CVE-2022-32189](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32189)
* [CVE-2022-28327](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28327)
* [CVE-2021-29923](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29923)
* [CVE-2023-24536](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-24536)
* [CVE-2024-1737](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1737)
* [CVE-2024-1975](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1975)
* [CVE-2022-30632](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30632)
* [CVE-2021-44716](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44716)
* [CVE-2023-39323](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39323)
* [CVE-2023-24539](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-24539)
* [CVE-2022-30580](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30580)
* [CVE-2022-41724](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41724)
* [CVE-2022-30630](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30630)
* [CVE-2022-41715](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41715)
* [CVE-2023-29403](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29403)
* [CVE-2023-28642](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28642)
* [CVE-2022-41725](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41725)
* [CVE-2022-28131](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28131)
* [CVE-2023-45287](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45287)
* [CVE-2021-41771](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41771)
* [CVE-2023-24537](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-24537)
* [CVE-2023-24534](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-24534)
Container-optimized OS vulnerabilities:
* [CVE-2024-43873](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43873)
* [CVE-2024-44983](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44983)
* [CVE-2024-45492](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45492)
* [CVE-2024-6232](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6232)
Ubuntu vulnerabilities:
* [CVE-2022-48772](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48772)
* [CVE-2023-52884](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52884)
* [CVE-2023-52887](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52887)
* [CVE-2024-23848](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23848)
* [CVE-2024-25741](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-25741)
* [CVE-2024-31076](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31076)
* [CVE-2024-33621](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33621)
* [CVE-2024-33847](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33847)
* [CVE-2024-34027](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-34027)
* [CVE-2024-34777](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-34777)
* [CVE-2024-35247](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35247)
* [CVE-2024-35927](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35927)
* [CVE-2024-36014](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36014)
* [CVE-2024-36015](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36015)
* [CVE-2024-36032](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36032)
* [CVE-2024-36270](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36270)
* [CVE-2024-36286](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36286)
* [CVE-2024-36489](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36489)
* [CVE-2024-36894](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36894)
* [CVE-2024-36971](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36971)
* [CVE-2024-36972](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36972)
* [CVE-2024-36974](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36974)
* [CVE-2024-36978](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36978)
* [CVE-2024-37078](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37078)
* [CVE-2024-37356](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37356)
* [CVE-2024-38381](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38381)
* [CVE-2024-38546](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38546)
* [CVE-2024-38547](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38547)
* [CVE-2024-38548](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38548)
* [CVE-2024-38549](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38549)
* [CVE-2024-38550](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38550)
* [CVE-2024-38552](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38552)
* [CVE-2024-38555](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38555)
* [CVE-2024-38558](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38558)
* [CVE-2024-38559](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38559)
* [CVE-2024-38560](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38560)
* [CVE-2024-38565](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38565)
* [CVE-2024-38567](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38567)
* [CVE-2024-38571](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38571)
* [CVE-2024-38573](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38573)
* [CVE-2024-38578](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38578)
* [CVE-2024-38579](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38579)
* [CVE-2024-38580](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38580)
* [CVE-2024-38582](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38582)
* [CVE-2024-38583](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38583)
* [CVE-2024-38586](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38586)
* [CVE-2024-38587](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38587)
* [CVE-2024-38588](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38588)
* [CVE-2024-38589](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38589)
* [CVE-2024-38590](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38590)
* [CVE-2024-38591](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38591)
* [CVE-2024-38596](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38596)
* [CVE-2024-38597](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38597)
* [CVE-2024-38598](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38598)
* [CVE-2024-38599](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38599)
* [CVE-2024-38601](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38601)
* [CVE-2024-38605](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38605)
* [CVE-2024-38607](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38607)
* [CVE-2024-38610](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38610)
* [CVE-2024-38612](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38612)
* [CVE-2024-38613](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38613)
* [CVE-2024-38615](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38615)
* [CVE-2024-38618](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38618)
* [CVE-2024-38619](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38619)
* [CVE-2024-38621](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38621)
* [CVE-2024-38623](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38623)
* [CVE-2024-38624](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38624)
* [CVE-2024-38627](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38627)
* [CVE-2024-38633](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38633)
* [CVE-2024-38634](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38634)
* [CVE-2024-38635](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38635)
* [CVE-2024-38637](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38637)
* [CVE-2024-38659](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38659)
* [CVE-2024-38661](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38661)
* [CVE-2024-38662](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38662)
* [CVE-2024-38780](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38780)
* [CVE-2024-39276](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39276)
* [CVE-2024-39277](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39277)
* [CVE-2024-39301](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39301)
* [CVE-2024-39466](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39466)
* [CVE-2024-39467](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39467)
* [CVE-2024-39468](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39468)
* [CVE-2024-39469](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39469)
* [CVE-2024-39471](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39471)
* [CVE-2024-39475](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39475)
* [CVE-2024-39480](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39480)
* [CVE-2024-39482](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39482)
* [CVE-2024-39487](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39487)
* [CVE-2024-39488](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39488)
* [CVE-2024-39489](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39489)
* [CVE-2024-39490](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39490)
* [CVE-2024-39493](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39493)
* [CVE-2024-39495](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39495)
* [CVE-2024-39499](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39499)
* [CVE-2024-39500](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39500)
* [CVE-2024-39501](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39501)
* [CVE-2024-39502](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39502)
* [CVE-2024-39503](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39503)
* [CVE-2024-39505](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39505)
* [CVE-2024-39506](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39506)
* [CVE-2024-39507](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39507)
* [CVE-2024-39509](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39509)
* [CVE-2024-40901](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40901)
* [CVE-2024-40902](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40902)
* [CVE-2024-40904](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40904)
* [CVE-2024-40905](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40905)
* [CVE-2024-40908](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40908)
* [CVE-2024-40911](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40911)
* [CVE-2024-40912](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40912)
* [CVE-2024-40914](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40914)
* [CVE-2024-40916](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40916)
* [CVE-2024-40927](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40927)
* [CVE-2024-40929](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40929)
* [CVE-2024-40931](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40931)
* [CVE-2024-40932](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40932)
* [CVE-2024-40934](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40934)
* [CVE-2024-40937](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40937)
* [CVE-2024-40941](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40941)
* [CVE-2024-40942](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40942)
* [CVE-2024-40943](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40943)
* [CVE-2024-40945](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40945)
* [CVE-2024-40954](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40954)
* [CVE-2024-40956](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40956)
* [CVE-2024-40957](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40957)
* [CVE-2024-40958](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40958)
* [CVE-2024-40959](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40959)
* [CVE-2024-40960](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40960)
* [CVE-2024-40961](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40961)
* [CVE-2024-40963](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40963)
* [CVE-2024-40967](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40967)
* [CVE-2024-40968](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40968)
* [CVE-2024-40970](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40970)
* [CVE-2024-40971](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40971)
* [CVE-2024-40974](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40974)
* [CVE-2024-40976](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40976)
* [CVE-2024-40978](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40978)
* [CVE-2024-40980](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40980)
* [CVE-2024-40981](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40981)
* [CVE-2024-40983](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40983)
* [CVE-2024-40984](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40984)
* [CVE-2024-40987](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40987)
* [CVE-2024-40988](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40988)
* [CVE-2024-40990](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40990)
* [CVE-2024-40994](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40994)
* [CVE-2024-40995](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40995)
* [CVE-2024-41000](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41000)
* [CVE-2024-41002](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41002)
* [CVE-2024-41004](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41004)
* [CVE-2024-41005](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41005)
* [CVE-2024-41006](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41006)
* [CVE-2024-41007](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41007)
* [CVE-2024-41027](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41027)
* [CVE-2024-41034](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41034)
* [CVE-2024-41035](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41035)
* [CVE-2024-41040](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41040)
* [CVE-2024-41041](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41041)
* [CVE-2024-41044](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41044)
* [CVE-2024-41046](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41046)
* [CVE-2024-41047](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41047)
* [CVE-2024-41048](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41048)
* [CVE-2024-41049](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41049)
* [CVE-2024-41055](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41055)
* [CVE-2024-41087](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41087)
* [CVE-2024-41089](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41089)
* [CVE-2024-41092](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41092)
* [CVE-2024-41093](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41093)
* [CVE-2024-41095](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41095)
* [CVE-2024-41097](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41097)
* [CVE-2024-42068](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42068)
* [CVE-2024-42070](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42070)
* [CVE-2024-42076](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42076)
* [CVE-2024-42077](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42077)
* [CVE-2024-42080](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42080)
* [CVE-2024-42082](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42082)
* [CVE-2024-42084](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42084)
* [CVE-2024-42085](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42085)
* [CVE-2024-42086](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42086)
* [CVE-2024-42087](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42087)
* [CVE-2024-42089](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42089)
* [CVE-2024-42090](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42090)
* [CVE-2024-42092](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42092)
* [CVE-2024-42093](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42093)
* [CVE-2024-42094](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42094)
* [CVE-2024-42095](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42095)
* [CVE-2024-42096](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42096)
* [CVE-2024-42097](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42097)
* [CVE-2024-42098](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42098)
* [CVE-2024-42101](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42101)
* [CVE-2024-42102](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42102)
* [CVE-2024-42104](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42104)
* [CVE-2024-42105](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42105)
* [CVE-2024-42106](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42106)
* [CVE-2024-42109](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42109)
* [CVE-2024-42115](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42115)
* [CVE-2024-42119](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42119)
* [CVE-2024-42120](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42120)
* [CVE-2024-42121](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42121)
* [CVE-2024-42124](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42124)
* [CVE-2024-42127](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42127)
* [CVE-2024-42130](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42130)
* [CVE-2024-42131](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42131)
* [CVE-2024-42137](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42137)
* [CVE-2024-42140](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42140)
* [CVE-2024-42145](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42145)
* [CVE-2024-42148](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42148)
* [CVE-2024-42152](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42152)
* [CVE-2024-42153](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42153)
* [CVE-2024-42154](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42154)
* [CVE-2024-42157](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42157)
* [CVE-2024-42161](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42161)
* [CVE-2024-42223](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42223)
* [CVE-2024-42224](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42224)
* [CVE-2024-42225](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42225)
* [CVE-2024-42229](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42229)
* [CVE-2024-42232](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42232)
* [CVE-2024-42236](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42236)
* [CVE-2024-42240](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42240)
* [CVE-2024-42244](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42244)
* [CVE-2024-42247](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42247)
What else is happening at Google Cloud Platform?
If your GKE cluster was created before version 1.26, you can now migrate it to cgroupv2
about 1 hour ago
Services
Share
Model endpoint management is generally available (GA) for both AlloyDB and AlloyDB Omni
about 2 hours ago
Services
Share
Read update
Services
Share
You can now automatically promote releases across targets at scheduled times, in preview
about 20 hours ago
Services
Share
Artifact Registry is available in the northamerica-south1 region (Queretaro, Mexico, North America)
about 21 hours ago
Services
Share
Read update
Services
Share