Note di rilascio di Google Distributed Cloud con air gap 1.9.6
Mantieni tutto organizzato con le raccolte
Salva e classifica i contenuti in base alle tue preferenze.
4 ottobre 2023 [GDC 1.9.6]
Google Distributed Cloud con air gap 1.9.6 è ora disponibile.
Consulta la panoramica del prodotto per scoprire le funzionalità di Google Distributed Cloud con air gap.
Nel componente Google Distributed Cloud air-gapped 1.9.6 Addon Manager (ADD), la versione di Google Distributed Cloud viene aggiornata alla versione 1.14.8 per applicare le patch di sicurezza più recenti e gli aggiornamenti importanti.
È stata aggiornata la versione dell'immagine del sistema operativo Canonical Ubuntu alla versione 20230815 per applicare le patch di sicurezza e gli aggiornamenti importanti più recenti. Sono state corrette le seguenti vulnerabilità di sicurezza:
Google Distributed Cloud air-gapped 1.9.6 presenta un problema noto per cui controllo dell'accesso basato sui ruoli (RBAC) e le impostazioni dello schema in VM Manager impediscono agli utenti di avviare i processi di backup e ripristino delle VM.
Google Distributed Cloud con air gap 1.9.6 presenta un problema noto
in cui i loop di arresto anomalo del deployment di kube-state-metrics.
Google Distributed Cloud air-gapped 1.9.6 presenta un problema noto per cui un nodo worker non è bilanciato dopo l'upgrade.
Google Distributed Cloud air-gapped 1.9.6 presenta un problema noto
con l'upgrade in cui il plug-in del dispositivo GPU non viene avviato.
Google Distributed Cloud air-gapped 1.9.6 presenta un problema noto per cui un cluster utente con tre nodi worker n2-standard-4 non dispone di risorse CPU sufficienti per l'upgrade.
Google Distributed Cloud con air gap 1.9.6 presenta un problema noto
per cui l'upgrade si blocca durante la terminazione di un pod.
Google Distributed Cloud air-gapped 1.9.6 presenta un problema noto per cui un cluster utente non diventa pronto in tempo per riavviare il deployment di coredns.
È stato risolto un problema di overflow del buffer heap in WebP in Google Chrome nelle versioni precedenti a
116.0.5845.187. Questo problema ha consentito a un malintenzionato remoto di eseguire
una scrittura di memoria fuori dai limiti utilizzando una pagina HTML creata ad hoc (gravità della sicurezza di Chromium: critica). Questo problema in genere interessa tutto ciò che utilizza framework, librerie di codice e sistemi operativi che incorporano Electron, un'altra libreria di codice che utilizza libwebp o che ha libwebp integrata direttamente.
Google Distributed Cloud air-gapped 1.9.6 presenta un problema noto per cui gli avvisi nei cluster di sistema dell'organizzazione non raggiungono il sistema di gestione dei ticket.
[[["Facile da capire","easyToUnderstand","thumb-up"],["Il problema è stato risolto","solvedMyProblem","thumb-up"],["Altra","otherUp","thumb-up"]],[["Difficile da capire","hardToUnderstand","thumb-down"],["Informazioni o codice di esempio errati","incorrectInformationOrSampleCode","thumb-down"],["Mancano le informazioni o gli esempi di cui ho bisogno","missingTheInformationSamplesINeed","thumb-down"],["Problema di traduzione","translationIssue","thumb-down"],["Altra","otherDown","thumb-down"]],["Ultimo aggiornamento 2025-09-04 UTC."],[[["\u003cp\u003eGoogle Distributed Cloud air-gapped 1.9.6 is now available, bringing the latest security patches and updates.\u003c/p\u003e\n"],["\u003cp\u003eThe Google Distributed Cloud version in the Addon Manager component has been updated to 1.14.8 to enhance security and stability.\u003c/p\u003e\n"],["\u003cp\u003eThe Canonical Ubuntu OS image has been updated to version 20230815, fixing a large number of security vulnerabilities, and improving the system's security.\u003c/p\u003e\n"],["\u003cp\u003eSeveral known issues exist in this release, including problems with VM manager RBAC, the \u003ccode\u003ekube-state-metrics\u003c/code\u003e deployment, unbalanced worker nodes, GPU device plugins, insufficient CPU resources, upgrade processes, \u003ccode\u003ecoredns\u003c/code\u003e deployment restarts, and organization system cluster alerts.\u003c/p\u003e\n"],["\u003cp\u003eA critical security vulnerability, CVE-2023-4863dd, related to a Heap buffer overflow in WebP in Google Chrome, has been fixed, addressing a potential out-of-bounds memory write attack vector.\u003c/p\u003e\n"]]],[],null,["# Google Distributed Cloud air-gapped 1.9.6 release notes\n\n\u003cbr /\u003e\n\nOctober 4, 2023 \\[GDC 1.9.6\\]\n-----------------------------\n\n*** ** * ** ***\n\n\nGoogle Distributed Cloud air-gapped 1.9.6 is now released.\n\nSee the [product overview](/distributed-cloud/hosted/docs/latest/gdch/overview) to learn about the features of Google Distributed Cloud air-gapped.\n\n*** ** * ** ***\n\n\nIn the Google Distributed Cloud air-gapped 1.9.6 Addon Manager (ADD)\ncomponent, the Google Distributed Cloud version is updated to\n1.14.8 to apply the latest security patches and important updates.\n\nSee [Google Distributed Cloud 1.14.8 release notes](https://cloud.google.com/anthos/clusters/docs/bare-metal/1.14/release-notes-ver#release_1148) for details.\n\n*** ** * ** ***\n\n\nUpdated Canonical Ubuntu OS image version to 20230815 to apply the latest\nsecurity patches and important updates. The following security vulnerabilities are fixed:\n\n- [CVE-2016-10228](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228)\n- [CVE-2019-25013](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013)\n- [CVE-2020-6096](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096)\n- [CVE-2020-13987](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13987)\n- [CVE-2020-13988](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13988)\n- [CVE-2020-17437](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17437)\n- [CVE-2020-27618](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618)\n- [CVE-2020-29562](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29562)\n- [CVE-2020-36691](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36691)\n- [CVE-2021-3326](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326)\n- [CVE-2021-3999](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999)\n- [CVE-2021-27645](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645)\n- [CVE-2021-33560](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33560)\n- [CVE-2021-35942](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942)\n- [CVE-2021-40528](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40528)\n- [CVE-2022-0168](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0168)\n- [CVE-2022-1184](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1184)\n- [CVE-2022-2208](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2208)\n- [CVE-2022-2210](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2210)\n- [CVE-2022-2257](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2257)\n- [CVE-2022-2264](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2264)\n- [CVE-2022-2284](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2284)\n- [CVE-2022-2285](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2285)\n- [CVE-2022-2286](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2286)\n- [CVE-2022-2287](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2287)\n- [CVE-2022-2289](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2289)\n- [CVE-2022-4269](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4269)\n- [CVE-2022-23218](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218)\n- [CVE-2022-23219](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219)\n- [CVE-2022-27672](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27672)\n- [CVE-2022-40982](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40982)\n- [CVE-2022-41804](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41804)\n- [CVE-2023-1611](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1611)\n- [CVE-2023-2124](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2124)\n- [CVE-2023-3090](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3090)\n- [CVE-2023-3111](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3111)\n- [CVE-2023-3141](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3141)\n- [CVE-2023-3390](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3390)\n- [CVE-2023-20593](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20593)\n- [CVE-2023-23908](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23908)\n- [CVE-2023-28321](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28321)\n- [CVE-2023-28322](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28322)\n- [CVE-2023-32629](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32629)\n- [CVE-2023-35001](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35001)\n- [CVE-2023-37327](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37327)\n- [CVE-2023-37328](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37328)\n- [CVE-2023-38633](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38633)\n\n*** ** * ** ***\n\n\nGoogle Distributed Cloud air-gapped 1.9.6 has a known issue where role-based access control (RBAC) and schema settings in the VM manager is stopping users from starting VM backup and restore processes.\n\n*** ** * ** ***\n\nGoogle Distributed Cloud air-gapped 1.9.6 has a known\nissue where the `kube-state-metrics` deployment crash loops.\n\n*** ** * ** ***\n\n\nGoogle Distributed Cloud air-gapped 1.9.6 has a known issue where a worker node is unbalanced after upgrade.\n\n*** ** * ** ***\n\nGoogle Distributed Cloud air-gapped 1.9.6 has a known\nissue with the upgrade where the GPU device plugin does not start.\n\n*** ** * ** ***\n\n\nGoogle Distributed Cloud air-gapped 1.9.6 has a known issue where a user cluster with three `n2-standard-4` worker nodes has insufficient CPU resources for upgrade.\n\n*** ** * ** ***\n\nGoogle Distributed Cloud air-gapped 1.9.6 has a known\nissue where upgrade is stuck while terminating a pod.\n\n*** ** * ** ***\n\n\nGoogle Distributed Cloud air-gapped 1.9.6 has a known issue where a user cluster does not become ready in time to restart the `coredns` deployment.\n\n*** ** * ** ***\n\nAn issue with a Heap buffer overflow in WebP in Google Chrome prior to\n116.0.5845.187 is fixed. This issue allowed a remote attacker to perform\nan out of bounds memory write by using a crafted HTML page (Chromium security severity: Critical). This issue usually affects anything that uses frameworks, code libraries, and OSes that incorporate Electron, another code library that uses libwebp, or has libwebp built-in directly.\n\nFor more details, see [CVE-2023-4863dd](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4863dd).\n\n*** ** * ** ***\n\n\nGoogle Distributed Cloud air-gapped 1.9.6 has a known issue where alerts in organization system clusters don't reach the ticketing system."]]