Note di rilascio di Google Distributed Cloud con air gap 1.13.7
Mantieni tutto organizzato con le raccolte
Salva e classifica i contenuti in base alle tue preferenze.
16 gennaio 2025
Google Distributed Cloud (GDC) con air gap 1.13.7 è disponibile.
Consulta la panoramica del prodotto per scoprire le
funzionalità di Distributed Cloud.
È stata aggiornata la versione dell'immagine del sistema operativo Ubuntu alla versione 20241128 per applicare le patch di sicurezza e gli aggiornamenti importanti più recenti.
Sono state corrette le seguenti vulnerabilità di sicurezza:
È stata aggiornata la versione dell'immagine del sistema operativo Rocky alla versione 20241120 per applicare le patch di sicurezza e gli aggiornamenti importanti più recenti.
Per usufruire delle correzioni di bug e vulnerabilità della sicurezza, devi eseguire l'upgrade
di tutti i nodi a ogni release.
Sono state corrette le seguenti vulnerabilità di sicurezza:
HaaS Logger mostra gli errori nel cluster di amministrazione principale.
Il logger santricity non funziona.
I log LoggingTarget vengono inviati a un progetto errato.
Marketplace:
Il pull dell'immagine Prisma Cloud non riesce.
Networking:
La dashboard del control plane Upper Networking non mostra dati a causa della mancanza di metriche.
Upgrade:
Il deployment uporc-root-backend-controller nello spazio dei nomi
uporc-system va in loop di arresto anomalo nel cluster KIND.
Vertex AI:
I servizi preaddestrati di Vertex AI non sono disponibili.
Sono state identificate le seguenti modifiche:
Aggiornamenti delle versioni:
La versione di Google Distributed Cloud per bare metal viene aggiornata alla versione
1.29.900-gke.180 per applicare le patch di sicurezza più recenti e gli aggiornamenti importanti.
[[["Facile da capire","easyToUnderstand","thumb-up"],["Il problema è stato risolto","solvedMyProblem","thumb-up"],["Altra","otherUp","thumb-up"]],[["Difficile da capire","hardToUnderstand","thumb-down"],["Informazioni o codice di esempio errati","incorrectInformationOrSampleCode","thumb-down"],["Mancano le informazioni o gli esempi di cui ho bisogno","missingTheInformationSamplesINeed","thumb-down"],["Problema di traduzione","translationIssue","thumb-down"],["Altra","otherDown","thumb-down"]],["Ultimo aggiornamento 2025-09-04 UTC."],[[["\u003cp\u003eGoogle Distributed Cloud (GDC) air-gapped 1.13.7 is now available, offering new features as detailed in the product overview.\u003c/p\u003e\n"],["\u003cp\u003eThe Ubuntu OS image has been updated to version 20241128, addressing multiple security vulnerabilities, including CVE-2021-47212 through CVE-2024-52533.\u003c/p\u003e\n"],["\u003cp\u003eThe Rocky OS image is updated to version 20241120, fixing security issues ranging from CVE-2007-4559 to CVE-2024-24806.\u003c/p\u003e\n"],["\u003cp\u003eSeveral issues are identified within logging, marketplace, networking, upgrade, and Vertex AI components, some including errors, failures, missing data, or unavailability.\u003c/p\u003e\n"],["\u003cp\u003eGoogle Distributed Cloud for bare metal version has been updated to 1.29.900-gke.180 to improve security and provide new updates.\u003c/p\u003e\n"]]],[],null,["# Google Distributed Cloud air-gapped 1.13.7 release notes\n\n\u003cbr /\u003e\n\nJanuary 16, 2025\n----------------\n\n*** ** * ** ***\n\nGoogle Distributed Cloud (GDC) air-gapped 1.13.7 is available. \nSee the [product overview](/distributed-cloud/hosted/docs/latest/gdch/overview) to learn about the features of Distributed Cloud.\n\n*** ** * ** ***\n\nUpdated the Ubuntu OS image version to 20241128 to apply the latest security patches and important updates.\n\n\u003cbr /\u003e\n\nThe following security vulnerabilities are fixed:\n\n- [CVE-2021-47212](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47212)\n- [CVE-2022-36402](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36402)\n- [CVE-2023-3019](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3019)\n- [CVE-2023-52531](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52531)\n- [CVE-2023-52614](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52614)\n- [CVE-2024-9287](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9287)\n- [CVE-2024-10573](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10573)\n- [CVE-2024-26607](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26607)\n- [CVE-2024-26640](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26640)\n- [CVE-2024-26641](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26641)\n- [CVE-2024-26668](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26668)\n- [CVE-2024-26669](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26669)\n- [CVE-2024-26800](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26800)\n- [CVE-2024-26885](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26885)\n- [CVE-2024-26891](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26891)\n- [CVE-2024-26960](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26960)\n- [CVE-2024-27051](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27051)\n- [CVE-2024-27397](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27397)\n- [CVE-2024-35848](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35848)\n- [CVE-2024-37891](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37891)\n- [CVE-2024-38602](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38602)\n- [CVE-2024-38611](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38611)\n- [CVE-2024-38630](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38630)\n- [CVE-2024-40929](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40929)\n- [CVE-2024-41071](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41071)\n- [CVE-2024-41073](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41073)\n- [CVE-2024-42229](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42229)\n- [CVE-2024-42244](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42244)\n- [CVE-2024-45016](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45016)\n- [CVE-2024-47814](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47814)\n- [CVE-2024-52530](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-52530)\n- [CVE-2024-52531](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-52531)\n- [CVE-2024-52532](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-52532)\n- [CVE-2024-52533](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-52533)\n\n*** ** * ** ***\n\nUpdated the Rocky OS image version to 20241120 to apply the latest security patches and important updates.\n\n\u003cbr /\u003e\n\nTo take advantage of the bug and security vulnerability fixes, you must upgrade all nodes with each release.\n\nThe following security vulnerabilities are fixed:\n\n- [CVE-2007-4559](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4559)\n- [CVE-2020-10735](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10735)\n- [CVE-2021-28861](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28861)\n- [CVE-2022-44638](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-44638)\n- [CVE-2022-45061](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45061)\n- [CVE-2023-24329](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-24329)\n- [CVE-2023-27043](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27043)\n- [CVE-2023-29491](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29491)\n- [CVE-2023-40217](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40217)\n- [CVE-2024-3596](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3596)\n- [CVE-2024-4032](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4032)\n- [CVE-2024-6232](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6232)\n- [CVE-2024-6923](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6923)\n- [CVE-2024-24806](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24806)\n\n*** ** * ** ***\n\nThe following issues are identified:\n\n**Logging:**\n\n- The HaaS Logger shows errors in the root admin cluster.\n- The santricity logger fails.\n- The `LoggingTarget` logs are sent to an incorrect project.\n\n**Marketplace:**\n\n- The Prisma Cloud image pull fails.\n\n**Networking:**\n\n- The Upper Networking control plane dashboard shows no data due to missing metrics.\n\n**Upgrade:**\n\n- The `uporc-root-backend-controller` deployment under the namespace `uporc-system` crash loops in the KIND cluster.\n\n**Vertex AI:**\n\n- The Vertex AI pre-trained services are unavailable.\n\n*** ** * ** ***\n\nThe following changes are identified:\n\n**Version updates**:\n\n- The Google Distributed Cloud for bare metal version is updated to 1.29.900-gke.180 to apply the latest security patches and important updates. \n\n See the [Google Distributed Cloud for bare metal 1.29.900-gke.180 release notes](https://cloud.google.com/kubernetes-engine/distributed-cloud/bare-metal/docs/release-notes-ver-2#release_129900-gke180) for details."]]