Google Distributed Cloud mit Air Gap 1.13.8 – Versionshinweise
Mit Sammlungen den Überblick behalten
Sie können Inhalte basierend auf Ihren Einstellungen speichern und kategorisieren.
19. Februar 2025
Google Distributed Cloud (GDC) mit Air Gap 1.13.8 ist verfügbar.
Weitere Informationen zu den Funktionen von Distributed Cloud finden Sie in der Produktübersicht.
Die Ubuntu-Betriebssystemimage-Version wurde auf 20250109 aktualisiert, um die neuesten Sicherheitspatches und wichtigen Updates anzuwenden.
Das Problem wurde behoben, bei dem die vom Hardware Asset Management System (HAMS) generierten IP-Adressen für das EVPN-Interconnect-Sitzungs-Peering nicht korrekt waren.
Die folgenden Änderungen wurden festgestellt:
Versionsupdates:
Die Version von Google Distributed Cloud for Bare Metal wurde auf 1.29.1000-gke.93 aktualisiert, um die neuesten Sicherheitspatches und wichtigen Updates anzuwenden.
[[["Leicht verständlich","easyToUnderstand","thumb-up"],["Mein Problem wurde gelöst","solvedMyProblem","thumb-up"],["Sonstiges","otherUp","thumb-up"]],[["Schwer verständlich","hardToUnderstand","thumb-down"],["Informationen oder Beispielcode falsch","incorrectInformationOrSampleCode","thumb-down"],["Benötigte Informationen/Beispiele nicht gefunden","missingTheInformationSamplesINeed","thumb-down"],["Problem mit der Übersetzung","translationIssue","thumb-down"],["Sonstiges","otherDown","thumb-down"]],["Zuletzt aktualisiert: 2025-09-04 (UTC)."],[[["\u003cp\u003eGoogle Distributed Cloud (GDC) air-gapped 1.13.8 is now available, offering new features as detailed in the product overview.\u003c/p\u003e\n"],["\u003cp\u003eThe Ubuntu OS image has been updated to version 20250109, incorporating the latest security patches and updates.\u003c/p\u003e\n"],["\u003cp\u003eNumerous security vulnerabilities have been addressed, including fixes for CVEs ranging from CVE-2021-47001 to CVE-2024-53057.\u003c/p\u003e\n"],["\u003cp\u003eA networking issue where EVPN interconnect session peering IP addresses were incorrectly generated by the Hardware Asset Management System (HAMS) has been resolved.\u003c/p\u003e\n"],["\u003cp\u003eThe Google Distributed Cloud for bare metal version is updated to 1.29.1000-gke.93 to apply the latest security patches and important updates, as per the release notes.\u003c/p\u003e\n"]]],[],null,["# Google Distributed Cloud air-gapped 1.13.8 release notes\n\n\u003cbr /\u003e\n\nFebruary 19, 2025\n-----------------\n\n*** ** * ** ***\n\nGoogle Distributed Cloud (GDC) air-gapped 1.13.8 is available. \nSee the [product overview](/distributed-cloud/hosted/docs/latest/gdch/overview) to learn about the features of Distributed Cloud.\n\n*** ** * ** ***\n\nUpdated the Ubuntu OS image version to 20250109 to apply the latest security patches and important updates.\n\n\u003cbr /\u003e\n\nThe following security vulnerabilities are fixed:\n\n- [CVE-2021-47001](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47001)\n- [CVE-2021-47076](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47076)\n- [CVE-2021-47101](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47101)\n- [CVE-2021-47501](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47501)\n- [CVE-2022-38096](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38096)\n- [CVE-2022-48733](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48733)\n- [CVE-2022-48938](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48938)\n- [CVE-2022-48943](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48943)\n- [CVE-2023-52488](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52488)\n- [CVE-2023-52497](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52497)\n- [CVE-2023-52498](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52498)\n- [CVE-2023-52639](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52639)\n- [CVE-2023-52821](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52821)\n- [CVE-2024-11053](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-11053)\n- [CVE-2024-21820](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21820)\n- [CVE-2024-21853](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21853)\n- [CVE-2024-23918](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23918)\n- [CVE-2024-23984](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23984)\n- [CVE-2024-24968](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24968)\n- [CVE-2024-26947](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26947)\n- [CVE-2024-35904](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35904)\n- [CVE-2024-35951](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35951)\n- [CVE-2024-35963](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35963)\n- [CVE-2024-35965](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35965)\n- [CVE-2024-35966](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35966)\n- [CVE-2024-35967](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35967)\n- [CVE-2024-36938](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36938)\n- [CVE-2024-36952](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36952)\n- [CVE-2024-36953](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36953)\n- [CVE-2024-36968](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36968)\n- [CVE-2024-38538](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38538)\n- [CVE-2024-38553](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38553)\n- [CVE-2024-38597](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38597)\n- [CVE-2024-40910](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40910)\n- [CVE-2024-42068](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42068)\n- [CVE-2024-42077](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42077)\n- [CVE-2024-42156](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42156)\n- [CVE-2024-42240](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42240)\n- [CVE-2024-43892](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43892)\n- [CVE-2024-44942](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44942)\n- [CVE-2024-46724](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46724)\n- [CVE-2024-47537](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47537)\n- [CVE-2024-47538](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47538)\n- [CVE-2024-47539](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47539)\n- [CVE-2024-47540](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47540)\n- [CVE-2024-47541](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47541)\n- [CVE-2024-47542](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47542)\n- [CVE-2024-47543](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47543)\n- [CVE-2024-47544](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47544)\n- [CVE-2024-47545](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47545)\n- [CVE-2024-47546](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47546)\n- [CVE-2024-47596](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47596)\n- [CVE-2024-47597](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47597)\n- [CVE-2024-47598](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47598)\n- [CVE-2024-47599](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47599)\n- [CVE-2024-47600](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47600)\n- [CVE-2024-47601](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47601)\n- [CVE-2024-47602](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47602)\n- [CVE-2024-47603](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47603)\n- [CVE-2024-47606](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47606)\n- [CVE-2024-47607](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47607)\n- [CVE-2024-47613](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47613)\n- [CVE-2024-47615](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47615)\n- [CVE-2024-47774](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47774)\n- [CVE-2024-47775](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47775)\n- [CVE-2024-47776](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47776)\n- [CVE-2024-47777](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47777)\n- [CVE-2024-47778](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47778)\n- [CVE-2024-47834](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47834)\n- [CVE-2024-47835](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47835)\n- [CVE-2024-49967](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49967)\n- [CVE-2024-50264](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50264)\n- [CVE-2024-50602](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50602)\n- [CVE-2024-53057](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53057)\n\n*** ** * ** ***\n\nThe following issues are fixed:\n\n**Networking**:\n\n- Fixed the issue where EVPN interconnect session peering IP addresses that were generated by the Hardware Asset Management System (HAMS) were not correct.\n\n*** ** * ** ***\n\nThe following changes are identified:\n\n**Version updates**:\n\n- The Google Distributed Cloud for bare metal version is updated to 1.29.1000-gke.93 to apply the latest security patches and important updates. \n\n See the [Google Distributed Cloud for bare metal 1.29.1000 release notes](https://cloud.google.com/kubernetes-engine/distributed-cloud/bare-metal/docs/release-notes-ver-2#release_1291000-gke93) for details."]]