Google Distributed Cloud (software only) for VMware 1.29.900-gke.181 is now available for download
Share
Services
## Announcement
Google Distributed Cloud (software only) for VMware 1.29.900-gke.181 is now available for [download](https://cloud.google.com/anthos/clusters/docs/on-prem/latest/downloads). To upgrade, see [Upgrade a cluster or a node pool](https://cloud.google.com/anthos/clusters/docs/on-prem/latest/how-to/upgrading). Google Distributed Cloud 1.29.900-gke.181 runs on Kubernetes v1.29.11-gke.300.
If you are using a third-party storage vendor, check the [GDC Ready storage partners](https://cloud.google.com/anthos/docs/resources/partner-storage) document to make sure the storage vendor has already passed the qualification for this release.
After a release, it takes approximately 7 to 14 days for the version to become available for use with [GKE On-Prem API clients](https://cloud.google.com/kubernetes-engine/distributed-cloud/vmware/docs/how-to/cluster-lifecycle-management-tools): the Google Cloud console, the gcloud CLI, and Terraform.
## Change
Added support for configuring the GKE Identity Service to enforce a minimum transport layer security (TLS) version of 1.2 for HTTPS connections. By default, the GKE Identity Service allows TLS 1.1 and higher connections. If you require enforcement for a minimum of TLS 1.2, reach out to [Cloud Customer Care](https://cloud.google.com/kubernetes-engine/distributed-cloud/bare-metal/docs/getting-support) for assistance.
## Fix
* Fixed an issue where customer workloads with high resource requests triggered irrelevant resource validation warnings.
* Fixed [an issue](https://cloud.google.com/kubernetes-engine/distributed-cloud/vmware/docs/troubleshooting/known-issues#admin-add-on-nodes-stuck-at-notready-during-non-ha-to-ha-admin-cluster-migration) where a race condition during migration caused admin add-on nodes to get stuck at a `NotReady` status.
* Fixed [an issue](https://cloud.google.com/kubernetes-engine/distributed-cloud/vmware/docs/troubleshooting/known-issues#ha-admin-control-plane-node-shows-older-version-after-running-gkectl-repair-admin-master) where the VM template used for the HA admin control plane node repair isn't refreshed in vCenter after an upgrade.
## Fix
The following high-severity container vulnerabilities are fixed in 1.29.900-gke.181:
* High-severity container vulnerabilities:
[CVE-2023-3676](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3676), [CVE-2023-3955](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3955), [CVE-2023-5528](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5528), [CVE-2024-6232](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6232)
* Container-optimized OS vulnerabilities:
[CVE-2024-38538](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38538), [CVE-2024-47696](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47696), [CVE-2024-47701](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47701), [CVE-2024-47742](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47742), [CVE-2024-49860](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49860), [CVE-2024-49882](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49882), [CVE-2024-49883](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49883), [CVE-2024-49884](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49884), [CVE-2024-49889](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49889), [CVE-2024-49936](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49936), [CVE-2024-49967](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49967), [CVE-2024-49983](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49983), [CVE-2024-50033](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50033), [CVE-2024-50035](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50035), [CVE-2024-50036](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50036), [CVE-2024-50083](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50083), [CVE-2024-50131](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50131), [CVE-2024-50143](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50143), [CVE-2024-50151](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50151), [CVE-2024-50154](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50154), [CVE-2024-50186](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50186), [CVE-2024-50228](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50228), [CVE-2024-50257](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50257), [CVE-2024-50262](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50262), [CVE-2024-50264](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50264), [CVE-2024-50278](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50278), [CVE-2024-50279](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50279), [CVE-2024-53057](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53057)
* Ubuntu vulnerabilities:
[CVE-2022-48666](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48666), [CVE-2023-52889](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52889), [CVE-2023-52918](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52918), [CVE-2024-25744](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-25744), [CVE-2024-26607](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26607), [CVE-2024-26661](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26661), [CVE-2024-26669](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26669), [CVE-2024-26800](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26800), [CVE-2024-26893](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26893), [CVE-2024-36484](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36484), [CVE-2024-38577](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38577), [CVE-2024-38602](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38602), [CVE-2024-38611](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38611), [CVE-2024-39472](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39472), [CVE-2024-40915](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40915), [CVE-2024-41011](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41011), [CVE-2024-41012](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41012), [CVE-2024-41015](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41015), [CVE-2024-41017](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41017), [CVE-2024-41019](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41019), [CVE-2024-41020](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41020), [CVE-2024-41022](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41022), [CVE-2024-41042](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41042), [CVE-2024-41059](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41059), [CVE-2024-41060](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41060), [CVE-2024-41063](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41063), [CVE-2024-41064](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41064), [CVE-2024-41065](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41065), [CVE-2024-41068](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41068), [CVE-2024-41070](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41070), [CVE-2024-41071](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41071), [CVE-2024-41072](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41072), [CVE-2024-41073](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41073), [CVE-2024-41077](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41077), [CVE-2024-41078](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41078), [CVE-2024-41081](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41081), [CVE-2024-41090](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41090), [CVE-2024-41091](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41091), [CVE-2024-41098](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41098), [CVE-2024-42114](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42114), [CVE-2024-42126](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42126), [CVE-2024-42246](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42246), [CVE-2024-42259](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42259), [CVE-2024-42265](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42265), [CVE-2024-42267](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42267), [CVE-2024-42269](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42269), [CVE-2024-42270](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42270), [CVE-2024-42271](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42271), [CVE-2024-42272](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42272), [CVE-2024-42274](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42274), [CVE-2024-42276](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42276), [CVE-2024-42277](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42277), [CVE-2024-42280](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42280), [CVE-2024-42281](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42281), [CVE-2024-42283](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42283), [CVE-2024-42284](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42284), [CVE-2024-42285](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42285), [CVE-2024-42286](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42286), [CVE-2024-42287](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42287), [CVE-2024-42288](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42288), [CVE-2024-42289](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42289), [CVE-2024-42290](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42290), [CVE-2024-42292](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42292), [CVE-2024-42295](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42295), [CVE-2024-42296](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42296), [CVE-2024-42297](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42297), [CVE-2024-42299](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42299), [CVE-2024-42301](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42301), [CVE-2024-42302](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42302), [CVE-2024-42304](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42304), [CVE-2024-42305](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42305), [CVE-2024-42306](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42306), [CVE-2024-42309](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42309), [CVE-2024-42310](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42310), [CVE-2024-42311](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42311), [CVE-2024-42312](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42312), [CVE-2024-42313](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42313), [CVE-2024-42318](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42318), [CVE-2024-43817](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43817), [CVE-2024-43828](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43828), [CVE-2024-43829](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43829), [CVE-2024-43830](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43830), [CVE-2024-43834](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43834), [CVE-2024-43835](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43835), [CVE-2024-43839](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43839), [CVE-2024-43841](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43841), [CVE-2024-43846](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43846), [CVE-2024-43849](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43849), [CVE-2024-43853](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43853), [CVE-2024-43854](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43854), [CVE-2024-43856](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43856), [CVE-2024-43858](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43858), [CVE-2024-43860](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43860), [CVE-2024-43861](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43861), [CVE-2024-43863](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43863), [CVE-2024-43867](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43867), [CVE-2024-43869](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43869), [CVE-2024-43870](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43870), [CVE-2024-43871](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43871), [CVE-2024-43873](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43873), [CVE-2024-43875](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43875), [CVE-2024-43879](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43879), [CVE-2024-43880](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43880), [CVE-2024-43882](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43882), [CVE-2024-43883](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43883), [CVE-2024-43884](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43884), [CVE-2024-43889](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43889), [CVE-2024-43890](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43890), [CVE-2024-43892](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43892), [CVE-2024-43893](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43893), [CVE-2024-43894](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43894), [CVE-2024-43902](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43902), [CVE-2024-43905](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43905), [CVE-2024-43907](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43907), [CVE-2024-43908](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43908), [CVE-2024-43909](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43909), [CVE-2024-43914](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43914), [CVE-2024-44934](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44934), [CVE-2024-44935](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44935), [CVE-2024-44944](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44944), [CVE-2024-44946](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44946), [CVE-2024-44947](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44947), [CVE-2024-44948](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44948), [CVE-2024-44954](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44954), [CVE-2024-44958](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44958), [CVE-2024-44960](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44960), [CVE-2024-44965](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44965), [CVE-2024-44966](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44966), [CVE-2024-44969](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44969), [CVE-2024-44971](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44971), [CVE-2024-44974](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44974), [CVE-2024-44982](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44982), [CVE-2024-44983](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44983), [CVE-2024-44985](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44985), [CVE-2024-44986](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44986), [CVE-2024-44987](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44987), [CVE-2024-44988](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44988), [CVE-2024-44989](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44989), [CVE-2024-44990](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44990), [CVE-2024-44995](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44995), [CVE-2024-44998](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44998), [CVE-2024-44999](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44999), [CVE-2024-45003](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45003), [CVE-2024-45006](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45006), [CVE-2024-45007](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45007), [CVE-2024-45008](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45008), [CVE-2024-45009](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45009), [CVE-2024-45011](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45011), [CVE-2024-45018](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45018), [CVE-2024-45021](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45021), [CVE-2024-45025](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45025), [CVE-2024-45026](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45026), [CVE-2024-45028](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45028), [CVE-2024-46673](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46673), [CVE-2024-46675](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46675), [CVE-2024-46676](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46676), [CVE-2024-46677](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46677), [CVE-2024-46679](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46679), [CVE-2024-46685](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46685), [CVE-2024-46689](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46689), [CVE-2024-46702](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46702), [CVE-2024-46707](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46707), [CVE-2024-46713](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46713), [CVE-2024-46714](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46714), [CVE-2024-46719](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46719), [CVE-2024-46721](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46721), [CVE-2024-46722](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46722), [CVE-2024-46723](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46723), [CVE-2024-46724](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46724), [CVE-2024-46725](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46725), [CVE-2024-46731](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46731), [CVE-2024-46732](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46732), [CVE-2024-46737](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46737), [CVE-2024-46738](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46738), [CVE-2024-46739](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46739), [CVE-2024-46740](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46740), [CVE-2024-46743](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46743), [CVE-2024-46744](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46744), [CVE-2024-46745](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46745), [CVE-2024-46746](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46746), [CVE-2024-46747](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46747), [CVE-2024-46750](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46750), [CVE-2024-46752](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46752), [CVE-2024-46755](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46755), [CVE-2024-46756](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46756), [CVE-2024-46757](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46757), [CVE-2024-46758](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46758), [CVE-2024-46759](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46759), [CVE-2024-46761](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46761), [CVE-2024-46763](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46763), [CVE-2024-46771](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46771), [CVE-2024-46777](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46777), [CVE-2024-46780](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46780), [CVE-2024-46781](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46781), [CVE-2024-46782](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46782), [CVE-2024-46783](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46783), [CVE-2024-46791](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46791), [CVE-2024-46795](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46795), [CVE-2024-46798](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46798), [CVE-2024-46800](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46800), [CVE-2024-46804](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46804), [CVE-2024-46805](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46805), [CVE-2024-46807](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46807), [CVE-2024-46810](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46810), [CVE-2024-46814](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46814), [CVE-2024-46815](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46815), [CVE-2024-46817](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46817), [CVE-2024-46818](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46818), [CVE-2024-46819](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46819), [CVE-2024-46822](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46822), [CVE-2024-46828](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46828), [CVE-2024-46829](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46829), [CVE-2024-46832](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46832), [CVE-2024-46840](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46840), [CVE-2024-46844](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46844), [CVE-2024-47659](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47659), [CVE-2024-47660](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47660), [CVE-2024-47663](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47663), [CVE-2024-47665](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47665), [CVE-2024-47667](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47667), [CVE-2024-47668](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47668), [CVE-2024-47669](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47669)
What else is happening at Google Cloud Platform?
GKE cluster versions have been updated. New versions available for upgrades and new clusters
about 16 hours ago
Services
Share
Cloud Composer 2 is no longer available in Mexico (northamerica-south1)
about 19 hours ago
Services
Share
Read update
Services
Share