[[["易于理解","easyToUnderstand","thumb-up"],["解决了我的问题","solvedMyProblem","thumb-up"],["其他","otherUp","thumb-up"]],[["很难理解","hardToUnderstand","thumb-down"],["信息或示例代码不正确","incorrectInformationOrSampleCode","thumb-down"],["没有我需要的信息/示例","missingTheInformationSamplesINeed","thumb-down"],["翻译问题","translationIssue","thumb-down"],["其他","otherDown","thumb-down"]],["最后更新时间 (UTC):2025-09-04。"],[[["\u003cp\u003eGoogle Distributed Cloud (GDC) air-gapped 1.13.8 is now available, offering new features as detailed in the product overview.\u003c/p\u003e\n"],["\u003cp\u003eThe Ubuntu OS image has been updated to version 20250109, incorporating the latest security patches and updates.\u003c/p\u003e\n"],["\u003cp\u003eNumerous security vulnerabilities have been addressed, including fixes for CVEs ranging from CVE-2021-47001 to CVE-2024-53057.\u003c/p\u003e\n"],["\u003cp\u003eA networking issue where EVPN interconnect session peering IP addresses were incorrectly generated by the Hardware Asset Management System (HAMS) has been resolved.\u003c/p\u003e\n"],["\u003cp\u003eThe Google Distributed Cloud for bare metal version is updated to 1.29.1000-gke.93 to apply the latest security patches and important updates, as per the release notes.\u003c/p\u003e\n"]]],[],null,["# Google Distributed Cloud air-gapped 1.13.8 release notes\n\n\u003cbr /\u003e\n\nFebruary 19, 2025\n-----------------\n\n*** ** * ** ***\n\nGoogle Distributed Cloud (GDC) air-gapped 1.13.8 is available. \nSee the [product overview](/distributed-cloud/hosted/docs/latest/gdch/overview) to learn about the features of Distributed Cloud.\n\n*** ** * ** ***\n\nUpdated the Ubuntu OS image version to 20250109 to apply the latest security patches and important updates.\n\n\u003cbr /\u003e\n\nThe following security vulnerabilities are fixed:\n\n- [CVE-2021-47001](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47001)\n- [CVE-2021-47076](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47076)\n- [CVE-2021-47101](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47101)\n- [CVE-2021-47501](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47501)\n- [CVE-2022-38096](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38096)\n- [CVE-2022-48733](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48733)\n- [CVE-2022-48938](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48938)\n- [CVE-2022-48943](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48943)\n- [CVE-2023-52488](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52488)\n- [CVE-2023-52497](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52497)\n- [CVE-2023-52498](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52498)\n- [CVE-2023-52639](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52639)\n- [CVE-2023-52821](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52821)\n- [CVE-2024-11053](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-11053)\n- [CVE-2024-21820](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21820)\n- [CVE-2024-21853](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21853)\n- [CVE-2024-23918](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23918)\n- [CVE-2024-23984](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23984)\n- [CVE-2024-24968](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24968)\n- [CVE-2024-26947](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26947)\n- [CVE-2024-35904](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35904)\n- [CVE-2024-35951](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35951)\n- [CVE-2024-35963](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35963)\n- [CVE-2024-35965](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35965)\n- [CVE-2024-35966](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35966)\n- [CVE-2024-35967](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35967)\n- [CVE-2024-36938](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36938)\n- [CVE-2024-36952](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36952)\n- [CVE-2024-36953](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36953)\n- [CVE-2024-36968](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36968)\n- [CVE-2024-38538](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38538)\n- [CVE-2024-38553](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38553)\n- [CVE-2024-38597](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38597)\n- [CVE-2024-40910](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40910)\n- [CVE-2024-42068](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42068)\n- [CVE-2024-42077](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42077)\n- [CVE-2024-42156](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42156)\n- [CVE-2024-42240](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42240)\n- [CVE-2024-43892](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43892)\n- [CVE-2024-44942](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44942)\n- [CVE-2024-46724](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46724)\n- [CVE-2024-47537](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47537)\n- [CVE-2024-47538](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47538)\n- [CVE-2024-47539](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47539)\n- [CVE-2024-47540](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47540)\n- [CVE-2024-47541](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47541)\n- [CVE-2024-47542](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47542)\n- [CVE-2024-47543](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47543)\n- [CVE-2024-47544](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47544)\n- [CVE-2024-47545](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47545)\n- [CVE-2024-47546](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47546)\n- [CVE-2024-47596](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47596)\n- [CVE-2024-47597](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47597)\n- [CVE-2024-47598](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47598)\n- [CVE-2024-47599](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47599)\n- [CVE-2024-47600](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47600)\n- [CVE-2024-47601](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47601)\n- [CVE-2024-47602](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47602)\n- [CVE-2024-47603](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47603)\n- [CVE-2024-47606](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47606)\n- [CVE-2024-47607](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47607)\n- [CVE-2024-47613](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47613)\n- [CVE-2024-47615](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47615)\n- [CVE-2024-47774](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47774)\n- [CVE-2024-47775](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47775)\n- [CVE-2024-47776](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47776)\n- [CVE-2024-47777](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47777)\n- [CVE-2024-47778](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47778)\n- [CVE-2024-47834](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47834)\n- [CVE-2024-47835](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47835)\n- [CVE-2024-49967](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49967)\n- [CVE-2024-50264](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50264)\n- [CVE-2024-50602](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50602)\n- [CVE-2024-53057](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53057)\n\n*** ** * ** ***\n\nThe following issues are fixed:\n\n**Networking**:\n\n- Fixed the issue where EVPN interconnect session peering IP addresses that were generated by the Hardware Asset Management System (HAMS) were not correct.\n\n*** ** * ** ***\n\nThe following changes are identified:\n\n**Version updates**:\n\n- The Google Distributed Cloud for bare metal version is updated to 1.29.1000-gke.93 to apply the latest security patches and important updates. \n\n See the [Google Distributed Cloud for bare metal 1.29.1000 release notes](https://cloud.google.com/kubernetes-engine/distributed-cloud/bare-metal/docs/release-notes-ver-2#release_1291000-gke93) for details."]]