Notes de version de Google Distributed Cloud sous air gap 1.13.8
Restez organisé à l'aide des collections
Enregistrez et classez les contenus selon vos préférences.
19 février 2025
Google Distributed Cloud (GDC) sous air gap 1.13.8 est disponible.
Consultez la présentation du produit pour en savoir plus sur les fonctionnalités de Distributed Cloud.
La version de l'image de l'OS Ubuntu a été mise à jour vers la version 20250109 pour appliquer les derniers correctifs de sécurité et les mises à jour importantes.
Les failles de sécurité suivantes ont été corrigées :
Correction du problème lié à l'inexactitude des adresses IP de peering de session d'interconnexion EVPN générées par le système de gestion des actifs matériels (HAMS).
Les modifications suivantes ont été identifiées :
Mises à jour des versions :
La version de Google Distributed Cloud pour bare metal est mise à jour vers la version 1.29.1000-gke.93 pour appliquer les derniers correctifs de sécurité et les mises à jour importantes.
Sauf indication contraire, le contenu de cette page est régi par une licence Creative Commons Attribution 4.0, et les échantillons de code sont régis par une licence Apache 2.0. Pour en savoir plus, consultez les Règles du site Google Developers. Java est une marque déposée d'Oracle et/ou de ses sociétés affiliées.
Dernière mise à jour le 2025/09/04 (UTC).
[[["Facile à comprendre","easyToUnderstand","thumb-up"],["J'ai pu résoudre mon problème","solvedMyProblem","thumb-up"],["Autre","otherUp","thumb-up"]],[["Difficile à comprendre","hardToUnderstand","thumb-down"],["Informations ou exemple de code incorrects","incorrectInformationOrSampleCode","thumb-down"],["Il n'y a pas l'information/les exemples dont j'ai besoin","missingTheInformationSamplesINeed","thumb-down"],["Problème de traduction","translationIssue","thumb-down"],["Autre","otherDown","thumb-down"]],["Dernière mise à jour le 2025/09/04 (UTC)."],[[["\u003cp\u003eGoogle Distributed Cloud (GDC) air-gapped 1.13.8 is now available, offering new features as detailed in the product overview.\u003c/p\u003e\n"],["\u003cp\u003eThe Ubuntu OS image has been updated to version 20250109, incorporating the latest security patches and updates.\u003c/p\u003e\n"],["\u003cp\u003eNumerous security vulnerabilities have been addressed, including fixes for CVEs ranging from CVE-2021-47001 to CVE-2024-53057.\u003c/p\u003e\n"],["\u003cp\u003eA networking issue where EVPN interconnect session peering IP addresses were incorrectly generated by the Hardware Asset Management System (HAMS) has been resolved.\u003c/p\u003e\n"],["\u003cp\u003eThe Google Distributed Cloud for bare metal version is updated to 1.29.1000-gke.93 to apply the latest security patches and important updates, as per the release notes.\u003c/p\u003e\n"]]],[],null,["# Google Distributed Cloud air-gapped 1.13.8 release notes\n\n\u003cbr /\u003e\n\nFebruary 19, 2025\n-----------------\n\n*** ** * ** ***\n\nGoogle Distributed Cloud (GDC) air-gapped 1.13.8 is available. \nSee the [product overview](/distributed-cloud/hosted/docs/latest/gdch/overview) to learn about the features of Distributed Cloud.\n\n*** ** * ** ***\n\nUpdated the Ubuntu OS image version to 20250109 to apply the latest security patches and important updates.\n\n\u003cbr /\u003e\n\nThe following security vulnerabilities are fixed:\n\n- [CVE-2021-47001](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47001)\n- [CVE-2021-47076](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47076)\n- [CVE-2021-47101](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47101)\n- [CVE-2021-47501](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47501)\n- [CVE-2022-38096](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38096)\n- [CVE-2022-48733](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48733)\n- [CVE-2022-48938](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48938)\n- [CVE-2022-48943](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48943)\n- [CVE-2023-52488](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52488)\n- [CVE-2023-52497](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52497)\n- [CVE-2023-52498](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52498)\n- [CVE-2023-52639](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52639)\n- [CVE-2023-52821](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52821)\n- [CVE-2024-11053](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-11053)\n- [CVE-2024-21820](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21820)\n- [CVE-2024-21853](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21853)\n- [CVE-2024-23918](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23918)\n- [CVE-2024-23984](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23984)\n- [CVE-2024-24968](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24968)\n- [CVE-2024-26947](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26947)\n- [CVE-2024-35904](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35904)\n- [CVE-2024-35951](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35951)\n- [CVE-2024-35963](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35963)\n- [CVE-2024-35965](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35965)\n- [CVE-2024-35966](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35966)\n- [CVE-2024-35967](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35967)\n- [CVE-2024-36938](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36938)\n- [CVE-2024-36952](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36952)\n- [CVE-2024-36953](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36953)\n- [CVE-2024-36968](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36968)\n- [CVE-2024-38538](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38538)\n- [CVE-2024-38553](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38553)\n- [CVE-2024-38597](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38597)\n- [CVE-2024-40910](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40910)\n- [CVE-2024-42068](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42068)\n- [CVE-2024-42077](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42077)\n- [CVE-2024-42156](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42156)\n- [CVE-2024-42240](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42240)\n- [CVE-2024-43892](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43892)\n- [CVE-2024-44942](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44942)\n- [CVE-2024-46724](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46724)\n- [CVE-2024-47537](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47537)\n- [CVE-2024-47538](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47538)\n- [CVE-2024-47539](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47539)\n- [CVE-2024-47540](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47540)\n- [CVE-2024-47541](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47541)\n- [CVE-2024-47542](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47542)\n- [CVE-2024-47543](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47543)\n- [CVE-2024-47544](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47544)\n- [CVE-2024-47545](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47545)\n- [CVE-2024-47546](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47546)\n- [CVE-2024-47596](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47596)\n- [CVE-2024-47597](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47597)\n- [CVE-2024-47598](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47598)\n- [CVE-2024-47599](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47599)\n- [CVE-2024-47600](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47600)\n- [CVE-2024-47601](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47601)\n- [CVE-2024-47602](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47602)\n- [CVE-2024-47603](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47603)\n- [CVE-2024-47606](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47606)\n- [CVE-2024-47607](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47607)\n- [CVE-2024-47613](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47613)\n- [CVE-2024-47615](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47615)\n- [CVE-2024-47774](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47774)\n- [CVE-2024-47775](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47775)\n- [CVE-2024-47776](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47776)\n- [CVE-2024-47777](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47777)\n- [CVE-2024-47778](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47778)\n- [CVE-2024-47834](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47834)\n- [CVE-2024-47835](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47835)\n- [CVE-2024-49967](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49967)\n- [CVE-2024-50264](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50264)\n- [CVE-2024-50602](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50602)\n- [CVE-2024-53057](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53057)\n\n*** ** * ** ***\n\nThe following issues are fixed:\n\n**Networking**:\n\n- Fixed the issue where EVPN interconnect session peering IP addresses that were generated by the Hardware Asset Management System (HAMS) were not correct.\n\n*** ** * ** ***\n\nThe following changes are identified:\n\n**Version updates**:\n\n- The Google Distributed Cloud for bare metal version is updated to 1.29.1000-gke.93 to apply the latest security patches and important updates. \n\n See the [Google Distributed Cloud for bare metal 1.29.1000 release notes](https://cloud.google.com/kubernetes-engine/distributed-cloud/bare-metal/docs/release-notes-ver-2#release_1291000-gke93) for details."]]