Note di rilascio di Google Distributed Cloud con air gap 1.13.8
Mantieni tutto organizzato con le raccolte
Salva e classifica i contenuti in base alle tue preferenze.
19 febbraio 2025
Google Distributed Cloud (GDC) con air gap 1.13.8 è disponibile.
Consulta la panoramica del prodotto per scoprire le
funzionalità di Distributed Cloud.
È stata aggiornata la versione dell'immagine del sistema operativo Ubuntu alla versione 20250109 per applicare le patch di sicurezza e gli aggiornamenti importanti più recenti.
Sono state corrette le seguenti vulnerabilità di sicurezza:
Risolto il problema per cui gli indirizzi IP di peering della sessione di interconnessione EVPN generati da Hardware Asset Management System (HAMS) non erano corretti.
Sono state identificate le seguenti modifiche:
Aggiornamenti delle versioni:
La versione di Google Distributed Cloud per bare metal viene aggiornata alla versione
1.29.1000-gke.93 per applicare le patch di sicurezza più recenti e gli aggiornamenti importanti.
[[["Facile da capire","easyToUnderstand","thumb-up"],["Il problema è stato risolto","solvedMyProblem","thumb-up"],["Altra","otherUp","thumb-up"]],[["Difficile da capire","hardToUnderstand","thumb-down"],["Informazioni o codice di esempio errati","incorrectInformationOrSampleCode","thumb-down"],["Mancano le informazioni o gli esempi di cui ho bisogno","missingTheInformationSamplesINeed","thumb-down"],["Problema di traduzione","translationIssue","thumb-down"],["Altra","otherDown","thumb-down"]],["Ultimo aggiornamento 2025-09-04 UTC."],[[["\u003cp\u003eGoogle Distributed Cloud (GDC) air-gapped 1.13.8 is now available, offering new features as detailed in the product overview.\u003c/p\u003e\n"],["\u003cp\u003eThe Ubuntu OS image has been updated to version 20250109, incorporating the latest security patches and updates.\u003c/p\u003e\n"],["\u003cp\u003eNumerous security vulnerabilities have been addressed, including fixes for CVEs ranging from CVE-2021-47001 to CVE-2024-53057.\u003c/p\u003e\n"],["\u003cp\u003eA networking issue where EVPN interconnect session peering IP addresses were incorrectly generated by the Hardware Asset Management System (HAMS) has been resolved.\u003c/p\u003e\n"],["\u003cp\u003eThe Google Distributed Cloud for bare metal version is updated to 1.29.1000-gke.93 to apply the latest security patches and important updates, as per the release notes.\u003c/p\u003e\n"]]],[],null,["# Google Distributed Cloud air-gapped 1.13.8 release notes\n\n\u003cbr /\u003e\n\nFebruary 19, 2025\n-----------------\n\n*** ** * ** ***\n\nGoogle Distributed Cloud (GDC) air-gapped 1.13.8 is available. \nSee the [product overview](/distributed-cloud/hosted/docs/latest/gdch/overview) to learn about the features of Distributed Cloud.\n\n*** ** * ** ***\n\nUpdated the Ubuntu OS image version to 20250109 to apply the latest security patches and important updates.\n\n\u003cbr /\u003e\n\nThe following security vulnerabilities are fixed:\n\n- [CVE-2021-47001](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47001)\n- [CVE-2021-47076](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47076)\n- [CVE-2021-47101](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47101)\n- [CVE-2021-47501](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47501)\n- [CVE-2022-38096](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38096)\n- [CVE-2022-48733](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48733)\n- [CVE-2022-48938](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48938)\n- [CVE-2022-48943](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48943)\n- [CVE-2023-52488](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52488)\n- [CVE-2023-52497](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52497)\n- [CVE-2023-52498](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52498)\n- [CVE-2023-52639](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52639)\n- [CVE-2023-52821](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52821)\n- [CVE-2024-11053](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-11053)\n- [CVE-2024-21820](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21820)\n- [CVE-2024-21853](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21853)\n- [CVE-2024-23918](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23918)\n- [CVE-2024-23984](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23984)\n- [CVE-2024-24968](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24968)\n- [CVE-2024-26947](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26947)\n- [CVE-2024-35904](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35904)\n- [CVE-2024-35951](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35951)\n- [CVE-2024-35963](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35963)\n- [CVE-2024-35965](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35965)\n- [CVE-2024-35966](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35966)\n- [CVE-2024-35967](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35967)\n- [CVE-2024-36938](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36938)\n- [CVE-2024-36952](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36952)\n- [CVE-2024-36953](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36953)\n- [CVE-2024-36968](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36968)\n- [CVE-2024-38538](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38538)\n- [CVE-2024-38553](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38553)\n- [CVE-2024-38597](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38597)\n- [CVE-2024-40910](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40910)\n- [CVE-2024-42068](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42068)\n- [CVE-2024-42077](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42077)\n- [CVE-2024-42156](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42156)\n- [CVE-2024-42240](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42240)\n- [CVE-2024-43892](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43892)\n- [CVE-2024-44942](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44942)\n- [CVE-2024-46724](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46724)\n- [CVE-2024-47537](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47537)\n- [CVE-2024-47538](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47538)\n- [CVE-2024-47539](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47539)\n- [CVE-2024-47540](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47540)\n- [CVE-2024-47541](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47541)\n- [CVE-2024-47542](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47542)\n- [CVE-2024-47543](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47543)\n- [CVE-2024-47544](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47544)\n- [CVE-2024-47545](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47545)\n- [CVE-2024-47546](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47546)\n- [CVE-2024-47596](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47596)\n- [CVE-2024-47597](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47597)\n- [CVE-2024-47598](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47598)\n- [CVE-2024-47599](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47599)\n- [CVE-2024-47600](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47600)\n- [CVE-2024-47601](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47601)\n- [CVE-2024-47602](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47602)\n- [CVE-2024-47603](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47603)\n- [CVE-2024-47606](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47606)\n- [CVE-2024-47607](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47607)\n- [CVE-2024-47613](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47613)\n- [CVE-2024-47615](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47615)\n- [CVE-2024-47774](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47774)\n- [CVE-2024-47775](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47775)\n- [CVE-2024-47776](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47776)\n- [CVE-2024-47777](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47777)\n- [CVE-2024-47778](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47778)\n- [CVE-2024-47834](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47834)\n- [CVE-2024-47835](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47835)\n- [CVE-2024-49967](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49967)\n- [CVE-2024-50264](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50264)\n- [CVE-2024-50602](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50602)\n- [CVE-2024-53057](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53057)\n\n*** ** * ** ***\n\nThe following issues are fixed:\n\n**Networking**:\n\n- Fixed the issue where EVPN interconnect session peering IP addresses that were generated by the Hardware Asset Management System (HAMS) were not correct.\n\n*** ** * ** ***\n\nThe following changes are identified:\n\n**Version updates**:\n\n- The Google Distributed Cloud for bare metal version is updated to 1.29.1000-gke.93 to apply the latest security patches and important updates. \n\n See the [Google Distributed Cloud for bare metal 1.29.1000 release notes](https://cloud.google.com/kubernetes-engine/distributed-cloud/bare-metal/docs/release-notes-ver-2#release_1291000-gke93) for details."]]