Notas de la versión 1.13.7 de Google Distributed Cloud aislado
Organiza tus páginas con colecciones
Guarda y categoriza el contenido según tus preferencias.
16 de enero de 2025
Ya está disponible la versión 1.13.7 de Google Distributed Cloud (GDC) aislado.
Consulta la descripción general del producto para obtener información sobre las funciones de Distributed Cloud.
Se actualizó la versión de la imagen de SO Ubuntu a 20241128 para aplicar los parches de seguridad y las actualizaciones importantes más recientes.
Se corrigieron las siguientes vulnerabilidades de seguridad:
El registrador de HaaS muestra errores en el clúster de administrador raíz.
Falla el registrador de santricidad.
Los registros de LoggingTarget se envían a un proyecto incorrecto.
Marketplace:
Falla la extracción de la imagen de Prisma Cloud.
Establecimiento de contactos:
El panel de control de Upper Networking no muestra datos debido a la falta de métricas.
Actualización:
La implementación de uporc-root-backend-controller en el espacio de nombres uporc-system se bloquea en un bucle en el clúster de KIND.
Vertex AI:
Los servicios ya entrenados de Vertex AI no están disponibles.
Se identificaron los siguientes cambios:
Actualizaciones de versiones:
La versión de Google Distributed Cloud para equipos físicos se actualizó a la versión 1.29.900-gke.180 para aplicar los parches de seguridad y las actualizaciones importantes más recientes.
[[["Fácil de comprender","easyToUnderstand","thumb-up"],["Resolvió mi problema","solvedMyProblem","thumb-up"],["Otro","otherUp","thumb-up"]],[["Difícil de entender","hardToUnderstand","thumb-down"],["Información o código de muestra incorrectos","incorrectInformationOrSampleCode","thumb-down"],["Faltan la información o los ejemplos que necesito","missingTheInformationSamplesINeed","thumb-down"],["Problema de traducción","translationIssue","thumb-down"],["Otro","otherDown","thumb-down"]],["Última actualización: 2025-09-04 (UTC)"],[[["\u003cp\u003eGoogle Distributed Cloud (GDC) air-gapped 1.13.7 is now available, offering new features as detailed in the product overview.\u003c/p\u003e\n"],["\u003cp\u003eThe Ubuntu OS image has been updated to version 20241128, addressing multiple security vulnerabilities, including CVE-2021-47212 through CVE-2024-52533.\u003c/p\u003e\n"],["\u003cp\u003eThe Rocky OS image is updated to version 20241120, fixing security issues ranging from CVE-2007-4559 to CVE-2024-24806.\u003c/p\u003e\n"],["\u003cp\u003eSeveral issues are identified within logging, marketplace, networking, upgrade, and Vertex AI components, some including errors, failures, missing data, or unavailability.\u003c/p\u003e\n"],["\u003cp\u003eGoogle Distributed Cloud for bare metal version has been updated to 1.29.900-gke.180 to improve security and provide new updates.\u003c/p\u003e\n"]]],[],null,["# Google Distributed Cloud air-gapped 1.13.7 release notes\n\n\u003cbr /\u003e\n\nJanuary 16, 2025\n----------------\n\n*** ** * ** ***\n\nGoogle Distributed Cloud (GDC) air-gapped 1.13.7 is available. \nSee the [product overview](/distributed-cloud/hosted/docs/latest/gdch/overview) to learn about the features of Distributed Cloud.\n\n*** ** * ** ***\n\nUpdated the Ubuntu OS image version to 20241128 to apply the latest security patches and important updates.\n\n\u003cbr /\u003e\n\nThe following security vulnerabilities are fixed:\n\n- [CVE-2021-47212](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47212)\n- [CVE-2022-36402](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36402)\n- [CVE-2023-3019](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3019)\n- [CVE-2023-52531](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52531)\n- [CVE-2023-52614](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52614)\n- [CVE-2024-9287](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9287)\n- [CVE-2024-10573](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10573)\n- [CVE-2024-26607](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26607)\n- [CVE-2024-26640](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26640)\n- [CVE-2024-26641](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26641)\n- [CVE-2024-26668](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26668)\n- [CVE-2024-26669](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26669)\n- [CVE-2024-26800](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26800)\n- [CVE-2024-26885](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26885)\n- [CVE-2024-26891](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26891)\n- [CVE-2024-26960](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26960)\n- [CVE-2024-27051](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27051)\n- [CVE-2024-27397](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27397)\n- [CVE-2024-35848](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35848)\n- [CVE-2024-37891](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37891)\n- [CVE-2024-38602](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38602)\n- [CVE-2024-38611](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38611)\n- [CVE-2024-38630](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38630)\n- [CVE-2024-40929](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40929)\n- [CVE-2024-41071](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41071)\n- [CVE-2024-41073](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41073)\n- [CVE-2024-42229](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42229)\n- [CVE-2024-42244](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42244)\n- [CVE-2024-45016](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45016)\n- [CVE-2024-47814](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47814)\n- [CVE-2024-52530](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-52530)\n- [CVE-2024-52531](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-52531)\n- [CVE-2024-52532](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-52532)\n- [CVE-2024-52533](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-52533)\n\n*** ** * ** ***\n\nUpdated the Rocky OS image version to 20241120 to apply the latest security patches and important updates.\n\n\u003cbr /\u003e\n\nTo take advantage of the bug and security vulnerability fixes, you must upgrade all nodes with each release.\n\nThe following security vulnerabilities are fixed:\n\n- [CVE-2007-4559](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4559)\n- [CVE-2020-10735](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10735)\n- [CVE-2021-28861](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28861)\n- [CVE-2022-44638](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-44638)\n- [CVE-2022-45061](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45061)\n- [CVE-2023-24329](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-24329)\n- [CVE-2023-27043](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27043)\n- [CVE-2023-29491](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29491)\n- [CVE-2023-40217](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40217)\n- [CVE-2024-3596](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3596)\n- [CVE-2024-4032](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4032)\n- [CVE-2024-6232](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6232)\n- [CVE-2024-6923](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6923)\n- [CVE-2024-24806](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24806)\n\n*** ** * ** ***\n\nThe following issues are identified:\n\n**Logging:**\n\n- The HaaS Logger shows errors in the root admin cluster.\n- The santricity logger fails.\n- The `LoggingTarget` logs are sent to an incorrect project.\n\n**Marketplace:**\n\n- The Prisma Cloud image pull fails.\n\n**Networking:**\n\n- The Upper Networking control plane dashboard shows no data due to missing metrics.\n\n**Upgrade:**\n\n- The `uporc-root-backend-controller` deployment under the namespace `uporc-system` crash loops in the KIND cluster.\n\n**Vertex AI:**\n\n- The Vertex AI pre-trained services are unavailable.\n\n*** ** * ** ***\n\nThe following changes are identified:\n\n**Version updates**:\n\n- The Google Distributed Cloud for bare metal version is updated to 1.29.900-gke.180 to apply the latest security patches and important updates. \n\n See the [Google Distributed Cloud for bare metal 1.29.900-gke.180 release notes](https://cloud.google.com/kubernetes-engine/distributed-cloud/bare-metal/docs/release-notes-ver-2#release_129900-gke180) for details."]]