Notas de la versión 1.13.8 de Google Distributed Cloud aislado
Organiza tus páginas con colecciones
Guarda y categoriza el contenido según tus preferencias.
19 de febrero de 2025
Ya está disponible la versión 1.13.8 de Google Distributed Cloud (GDC) aislado.
Consulta la descripción general del producto para obtener información sobre las funciones de Distributed Cloud.
Se actualizó la versión de la imagen de SO Ubuntu a 20250109 para aplicar los parches de seguridad y las actualizaciones importantes más recientes.
Se corrigieron las siguientes vulnerabilidades de seguridad:
Se corrigió el problema por el que las direcciones IP de peering de la sesión de interconexión de EVPN que generaba el Hardware Asset Management System (HAMS) no eran correctas.
Se identificaron los siguientes cambios:
Actualizaciones de versiones:
La versión de Google Distributed Cloud para equipos físicos se actualizó a 1.29.1000-gke.93 para aplicar los parches de seguridad y las actualizaciones importantes más recientes.
[[["Fácil de comprender","easyToUnderstand","thumb-up"],["Resolvió mi problema","solvedMyProblem","thumb-up"],["Otro","otherUp","thumb-up"]],[["Difícil de entender","hardToUnderstand","thumb-down"],["Información o código de muestra incorrectos","incorrectInformationOrSampleCode","thumb-down"],["Faltan la información o los ejemplos que necesito","missingTheInformationSamplesINeed","thumb-down"],["Problema de traducción","translationIssue","thumb-down"],["Otro","otherDown","thumb-down"]],["Última actualización: 2025-09-04 (UTC)"],[[["\u003cp\u003eGoogle Distributed Cloud (GDC) air-gapped 1.13.8 is now available, offering new features as detailed in the product overview.\u003c/p\u003e\n"],["\u003cp\u003eThe Ubuntu OS image has been updated to version 20250109, incorporating the latest security patches and updates.\u003c/p\u003e\n"],["\u003cp\u003eNumerous security vulnerabilities have been addressed, including fixes for CVEs ranging from CVE-2021-47001 to CVE-2024-53057.\u003c/p\u003e\n"],["\u003cp\u003eA networking issue where EVPN interconnect session peering IP addresses were incorrectly generated by the Hardware Asset Management System (HAMS) has been resolved.\u003c/p\u003e\n"],["\u003cp\u003eThe Google Distributed Cloud for bare metal version is updated to 1.29.1000-gke.93 to apply the latest security patches and important updates, as per the release notes.\u003c/p\u003e\n"]]],[],null,["# Google Distributed Cloud air-gapped 1.13.8 release notes\n\n\u003cbr /\u003e\n\nFebruary 19, 2025\n-----------------\n\n*** ** * ** ***\n\nGoogle Distributed Cloud (GDC) air-gapped 1.13.8 is available. \nSee the [product overview](/distributed-cloud/hosted/docs/latest/gdch/overview) to learn about the features of Distributed Cloud.\n\n*** ** * ** ***\n\nUpdated the Ubuntu OS image version to 20250109 to apply the latest security patches and important updates.\n\n\u003cbr /\u003e\n\nThe following security vulnerabilities are fixed:\n\n- [CVE-2021-47001](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47001)\n- [CVE-2021-47076](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47076)\n- [CVE-2021-47101](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47101)\n- [CVE-2021-47501](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47501)\n- [CVE-2022-38096](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38096)\n- [CVE-2022-48733](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48733)\n- [CVE-2022-48938](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48938)\n- [CVE-2022-48943](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48943)\n- [CVE-2023-52488](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52488)\n- [CVE-2023-52497](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52497)\n- [CVE-2023-52498](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52498)\n- [CVE-2023-52639](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52639)\n- [CVE-2023-52821](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52821)\n- [CVE-2024-11053](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-11053)\n- [CVE-2024-21820](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21820)\n- [CVE-2024-21853](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21853)\n- [CVE-2024-23918](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23918)\n- [CVE-2024-23984](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23984)\n- [CVE-2024-24968](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24968)\n- [CVE-2024-26947](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26947)\n- [CVE-2024-35904](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35904)\n- [CVE-2024-35951](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35951)\n- [CVE-2024-35963](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35963)\n- [CVE-2024-35965](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35965)\n- [CVE-2024-35966](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35966)\n- [CVE-2024-35967](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35967)\n- [CVE-2024-36938](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36938)\n- [CVE-2024-36952](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36952)\n- [CVE-2024-36953](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36953)\n- [CVE-2024-36968](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36968)\n- [CVE-2024-38538](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38538)\n- [CVE-2024-38553](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38553)\n- [CVE-2024-38597](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38597)\n- [CVE-2024-40910](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40910)\n- [CVE-2024-42068](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42068)\n- [CVE-2024-42077](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42077)\n- [CVE-2024-42156](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42156)\n- [CVE-2024-42240](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42240)\n- [CVE-2024-43892](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43892)\n- [CVE-2024-44942](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44942)\n- [CVE-2024-46724](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46724)\n- [CVE-2024-47537](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47537)\n- [CVE-2024-47538](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47538)\n- [CVE-2024-47539](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47539)\n- [CVE-2024-47540](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47540)\n- [CVE-2024-47541](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47541)\n- [CVE-2024-47542](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47542)\n- [CVE-2024-47543](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47543)\n- [CVE-2024-47544](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47544)\n- [CVE-2024-47545](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47545)\n- [CVE-2024-47546](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47546)\n- [CVE-2024-47596](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47596)\n- [CVE-2024-47597](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47597)\n- [CVE-2024-47598](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47598)\n- [CVE-2024-47599](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47599)\n- [CVE-2024-47600](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47600)\n- [CVE-2024-47601](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47601)\n- [CVE-2024-47602](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47602)\n- [CVE-2024-47603](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47603)\n- [CVE-2024-47606](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47606)\n- [CVE-2024-47607](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47607)\n- [CVE-2024-47613](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47613)\n- [CVE-2024-47615](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47615)\n- [CVE-2024-47774](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47774)\n- [CVE-2024-47775](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47775)\n- [CVE-2024-47776](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47776)\n- [CVE-2024-47777](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47777)\n- [CVE-2024-47778](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47778)\n- [CVE-2024-47834](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47834)\n- [CVE-2024-47835](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47835)\n- [CVE-2024-49967](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49967)\n- [CVE-2024-50264](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50264)\n- [CVE-2024-50602](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50602)\n- [CVE-2024-53057](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53057)\n\n*** ** * ** ***\n\nThe following issues are fixed:\n\n**Networking**:\n\n- Fixed the issue where EVPN interconnect session peering IP addresses that were generated by the Hardware Asset Management System (HAMS) were not correct.\n\n*** ** * ** ***\n\nThe following changes are identified:\n\n**Version updates**:\n\n- The Google Distributed Cloud for bare metal version is updated to 1.29.1000-gke.93 to apply the latest security patches and important updates. \n\n See the [Google Distributed Cloud for bare metal 1.29.1000 release notes](https://cloud.google.com/kubernetes-engine/distributed-cloud/bare-metal/docs/release-notes-ver-2#release_1291000-gke93) for details."]]