Google Distributed Cloud (software only) for VMware 1.30.400-gke.133 is now available for download
Share
Services
## Announcement
Google Distributed Cloud (software only) for VMware 1.30.400-gke.133 is now available for [download](https://cloud.google.com/anthos/clusters/docs/on-prem/latest/downloads). To upgrade, see [Upgrade a cluster or a node pool](https://cloud.google.com/anthos/clusters/docs/on-prem/latest/how-to/upgrading). Google Distributed Cloud 1.30.400-gke.133 runs on Kubernetes v1.30.6-gke.300.
If you are using a third-party storage vendor, check the [GDCV Ready storage partners](https://cloud.google.com/anthos/docs/resources/partner-storage) document to make sure the storage vendor has already passed the qualification for this release.
After a release, it takes approximately 7 to 14 days for the version to become available for use with [GKE On-Prem API clients](https://cloud.google.com/kubernetes-engine/distributed-cloud/vmware/docs/how-to/cluster-lifecycle-management-tools): the Google Cloud console, the gcloud CLI, and Terraform.
## Change
Added support for configuring the GKE Identity Service to enforce a minimum transport layer security (TLS) version of 1.2 for HTTPS connections. By default, the GKE Identity Service allows TLS 1.1 and higher connections. If you require enforcement for a minimum of TLS 1.2, reach out to [Cloud Customer Care](https://cloud.google.com/kubernetes-engine/distributed-cloud/bare-metal/docs/getting-support) for assistance.
## Fix
The following vulnerabilities are fixed in 1.30.400-gke.133:
High-severity container vulnerabilities:
* [CVE-2021-33194](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33194)
* [CVE-2023-3676](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3676)
* [CVE-2023-3955](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3955)
* [CVE-2023-5528](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5528)
* [CVE-2024-0793](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0793)
* [CVE-2024-6232](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6232)
Container-optimized OS vulnerabilities:
* [CVE-2024-47682](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47682)
* [CVE-2024-47685](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47685)
* [CVE-2024-47696](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47696)
* [CVE-2024-47701](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47701)
* [CVE-2024-47727](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47727)
* [CVE-2024-47742](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47742)
* [CVE-2024-48957](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-48957)
* [CVE-2024-48958](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-48958)
* [CVE-2024-49860](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49860)
* [CVE-2024-49882](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49882)
* [CVE-2024-49883](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49883)
* [CVE-2024-49884](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49884)
* [CVE-2024-49889](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49889)
* [CVE-2024-49936](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49936)
* [CVE-2024-49967](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49967)
* [CVE-2024-49983](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49983)
* [CVE-2024-50033](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50033)
* [CVE-2024-50035](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50035)
* [CVE-2024-50083](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50083)
* [CVE-2024-50115](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50115)
* [CVE-2024-50131](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50131)
* [CVE-2024-53057](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53057)
Ubuntu vulnerabilities:
* [CVE-2022-48666](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48666)
* [CVE-2023-52889](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52889)
* [CVE-2023-52918](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52918)
* [CVE-2024-25744](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-25744)
* [CVE-2024-26607](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26607)
* [CVE-2024-26661](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26661)
* [CVE-2024-26669](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26669)
* [CVE-2024-26800](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26800)
* [CVE-2024-26893](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26893)
* [CVE-2024-27397](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27397)
* [CVE-2024-36484](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36484)
* [CVE-2024-38577](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38577)
* [CVE-2024-38602](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38602)
* [CVE-2024-38611](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38611)
* [CVE-2024-38630](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38630)
* [CVE-2024-39472](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39472)
* [CVE-2024-40915](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40915)
* [CVE-2024-41011](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41011)
* [CVE-2024-41012](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41012)
* [CVE-2024-41015](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41015)
* [CVE-2024-41017](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41017)
* [CVE-2024-41019](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41019)
* [CVE-2024-41020](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41020)
* [CVE-2024-41022](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41022)
* [CVE-2024-41042](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41042)
* [CVE-2024-41059](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41059)
* [CVE-2024-41060](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41060)
* [CVE-2024-41063](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41063)
* [CVE-2024-41064](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41064)
* [CVE-2024-41065](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41065)
* [CVE-2024-41068](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41068)
* [CVE-2024-41070](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41070)
* [CVE-2024-41071](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41071)
* [CVE-2024-41072](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41072)
* [CVE-2024-41073](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41073)
* [CVE-2024-41077](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41077)
* [CVE-2024-41078](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41078)
* [CVE-2024-41081](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41081)
* [CVE-2024-41090](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41090)
* [CVE-2024-41091](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41091)
* [CVE-2024-41098](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41098)
* [CVE-2024-42114](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42114)
* [CVE-2024-42126](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42126)
* [CVE-2024-42246](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42246)
* [CVE-2024-42259](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42259)
* [CVE-2024-42265](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42265)
* [CVE-2024-42267](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42267)
* [CVE-2024-42269](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42269)
* [CVE-2024-42270](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42270)
* [CVE-2024-42271](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42271)
* [CVE-2024-42272](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42272)
* [CVE-2024-42274](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42274)
* [CVE-2024-42276](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42276)
* [CVE-2024-42277](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42277)
* [CVE-2024-42280](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42280)
* [CVE-2024-42281](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42281)
* [CVE-2024-42283](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42283)
* [CVE-2024-42284](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42284)
* [CVE-2024-42285](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42285)
* [CVE-2024-42286](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42286)
* [CVE-2024-42287](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42287)
* [CVE-2024-42288](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42288)
* [CVE-2024-42289](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42289)
* [CVE-2024-42290](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42290)
* [CVE-2024-42292](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42292)
* [CVE-2024-42295](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42295)
* [CVE-2024-42296](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42296)
* [CVE-2024-42297](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42297)
* [CVE-2024-42299](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42299)
* [CVE-2024-42301](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42301)
* [CVE-2024-42302](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42302)
* [CVE-2024-42304](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42304)
* [CVE-2024-42305](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42305)
* [CVE-2024-42306](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42306)
* [CVE-2024-42309](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42309)
* [CVE-2024-42310](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42310)
* [CVE-2024-42311](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42311)
* [CVE-2024-42312](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42312)
* [CVE-2024-42313](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42313)
* [CVE-2024-42318](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42318)
* [CVE-2024-43817](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43817)
* [CVE-2024-43828](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43828)
* [CVE-2024-43829](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43829)
* [CVE-2024-43830](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43830)
* [CVE-2024-43834](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43834)
* [CVE-2024-43835](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43835)
* [CVE-2024-43839](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43839)
* [CVE-2024-43841](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43841)
* [CVE-2024-43846](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43846)
* [CVE-2024-43849](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43849)
* [CVE-2024-43853](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43853)
* [CVE-2024-43854](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43854)
* [CVE-2024-43856](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43856)
* [CVE-2024-43858](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43858)
* [CVE-2024-43860](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43860)
* [CVE-2024-43861](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43861)
* [CVE-2024-43863](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43863)
* [CVE-2024-43867](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43867)
* [CVE-2024-43869](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43869)
* [CVE-2024-43870](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43870)
* [CVE-2024-43871](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43871)
* [CVE-2024-43873](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43873)
* [CVE-2024-43875](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43875)
* [CVE-2024-43879](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43879)
* [CVE-2024-43880](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43880)
* [CVE-2024-43882](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43882)
* [CVE-2024-43883](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43883)
* [CVE-2024-43884](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43884)
* [CVE-2024-43889](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43889)
* [CVE-2024-43890](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43890)
* [CVE-2024-43892](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43892)
* [CVE-2024-43893](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43893)
* [CVE-2024-43894](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43894)
* [CVE-2024-43902](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43902)
* [CVE-2024-43905](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43905)
* [CVE-2024-43907](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43907)
* [CVE-2024-43908](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43908)
* [CVE-2024-43909](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43909)
* [CVE-2024-43914](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43914)
* [CVE-2024-44934](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44934)
* [CVE-2024-44935](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44935)
* [CVE-2024-44944](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44944)
* [CVE-2024-44946](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44946)
* [CVE-2024-44947](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44947)
* [CVE-2024-44948](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44948)
* [CVE-2024-44954](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44954)
* [CVE-2024-44958](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44958)
* [CVE-2024-44960](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44960)
* [CVE-2024-44965](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44965)
* [CVE-2024-44966](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44966)
* [CVE-2024-44969](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44969)
* [CVE-2024-44971](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44971)
* [CVE-2024-44974](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44974)
* [CVE-2024-44982](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44982)
* [CVE-2024-44983](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44983)
* [CVE-2024-44985](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44985)
* [CVE-2024-44986](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44986)
* [CVE-2024-44987](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44987)
* [CVE-2024-44988](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44988)
* [CVE-2024-44989](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44989)
* [CVE-2024-44990](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44990)
* [CVE-2024-44995](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44995)
* [CVE-2024-44998](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44998)
* [CVE-2024-44999](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44999)
* [CVE-2024-45003](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45003)
* [CVE-2024-45006](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45006)
* [CVE-2024-45007](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45007)
* [CVE-2024-45008](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45008)
* [CVE-2024-45009](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45009)
* [CVE-2024-45011](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45011)
* [CVE-2024-45016](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45016)
* [CVE-2024-45018](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45018)
* [CVE-2024-45021](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45021)
* [CVE-2024-45025](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45025)
* [CVE-2024-45026](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45026)
* [CVE-2024-45028](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45028)
* [CVE-2024-46673](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46673)
* [CVE-2024-46675](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46675)
* [CVE-2024-46676](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46676)
* [CVE-2024-46677](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46677)
* [CVE-2024-46679](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46679)
* [CVE-2024-46685](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46685)
* [CVE-2024-46689](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46689)
* [CVE-2024-46702](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46702)
* [CVE-2024-46707](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46707)
* [CVE-2024-46713](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46713)
* [CVE-2024-46714](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46714)
* [CVE-2024-46719](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46719)
* [CVE-2024-46721](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46721)
* [CVE-2024-46722](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46722)
* [CVE-2024-46723](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46723)
* [CVE-2024-46724](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46724)
* [CVE-2024-46725](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46725)
* [CVE-2024-46731](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46731)
* [CVE-2024-46732](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46732)
* [CVE-2024-46737](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46737)
* [CVE-2024-46738](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46738)
* [CVE-2024-46739](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46739)
* [CVE-2024-46740](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46740)
* [CVE-2024-46743](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46743)
* [CVE-2024-46744](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46744)
* [CVE-2024-46745](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46745)
* [CVE-2024-46746](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46746)
* [CVE-2024-46747](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46747)
* [CVE-2024-46750](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46750)
* [CVE-2024-46752](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46752)
* [CVE-2024-46755](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46755)
* [CVE-2024-46756](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46756)
* [CVE-2024-46757](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46757)
* [CVE-2024-46758](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46758)
* [CVE-2024-46759](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46759)
* [CVE-2024-46761](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46761)
* [CVE-2024-46763](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46763)
* [CVE-2024-46771](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46771)
* [CVE-2024-46777](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46777)
* [CVE-2024-46780](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46780)
* [CVE-2024-46781](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46781)
* [CVE-2024-46782](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46782)
* [CVE-2024-46783](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46783)
* [CVE-2024-46791](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46791)
* [CVE-2024-46795](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46795)
* [CVE-2024-46798](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46798)
* [CVE-2024-46800](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46800)
* [CVE-2024-46804](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46804)
* [CVE-2024-46805](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46805)
* [CVE-2024-46807](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46807)
* [CVE-2024-46810](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46810)
* [CVE-2024-46814](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46814)
* [CVE-2024-46815](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46815)
* [CVE-2024-46817](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46817)
* [CVE-2024-46818](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46818)
* [CVE-2024-46819](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46819)
* [CVE-2024-46822](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46822)
* [CVE-2024-46828](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46828)
* [CVE-2024-46829](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46829)
* [CVE-2024-46832](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46832)
* [CVE-2024-46840](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46840)
* [CVE-2024-46844](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46844)
* [CVE-2024-47659](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47659)
* [CVE-2024-47660](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47660)
* [CVE-2024-47663](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47663)
* [CVE-2024-47665](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47665)
* [CVE-2024-47667](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47667)
* [CVE-2024-47668](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47668)
* [CVE-2024-47669](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47669)
What else is happening at Google Cloud Platform?
The CPU allocation setting has been renamed to Billing in the Google Cloud console for Cloud Run services
December 13th, 2024
Services
Share
Google Kubernetes Engine (GKE) - December 13th, 2024 [Feature]
December 13th, 2024
Services
Share