Google Distributed Cloud 오프라인 1.9.6에는 VM 관리자의 역할 기반 액세스 제어 (RBAC) 및 스키마 설정으로 인해 사용자가 VM 백업 및 복원 프로세스를 시작할 수 없는 알려진 문제가 있습니다.
Google Distributed Cloud air-gapped 1.9.6에는 kube-state-metrics 배포가 비정상 종료 루프를 실행하는 알려진 문제가 있습니다.
Google Distributed Cloud 에어 갭 1.9.6에는 업그레이드 후 워커 노드의 균형이 맞지 않는 알려진 문제가 있습니다.
Google Distributed Cloud 에어 갭 1.9.6에는 GPU 기기 플러그인이 시작되지 않는 업그레이드 관련 알려진 문제가 있습니다.
Google Distributed Cloud 오프라인 1.9.6에는 n2-standard-4 워커 노드가 3개인 사용자 클러스터의 업그레이드에 CPU 리소스가 부족한 알려진 문제가 있습니다.
Google Distributed Cloud(에어 갭 적용형) 1.9.6에는 포드를 종료하는 동안 업그레이드가 멈추는 알려진 문제가 있습니다.
Google Distributed Cloud 오프라인 1.9.6에는 사용자 클러스터가 coredns 배포를 다시 시작할 때까지 준비되지 않는 알려진 문제가 있습니다.
116.0.5845.187 이전의 Google Chrome에서 WebP의 힙 버퍼 오버플로 문제가 수정되었습니다. 이 문제로 인해 원격 공격자가 제작된 HTML 페이지를 사용하여 범위를 벗어난 메모리 쓰기를 실행할 수 있었습니다 (Chromium 보안 심각도: 심각). 이 문제는 일반적으로 Electron을 통합하거나 libwebp를 사용하는 다른 코드 라이브러리를 사용하거나 libwebp가 직접 내장된 프레임워크, 코드 라이브러리, OS를 사용하는 모든 항목에 영향을 미칩니다.
[[["이해하기 쉬움","easyToUnderstand","thumb-up"],["문제가 해결됨","solvedMyProblem","thumb-up"],["기타","otherUp","thumb-up"]],[["이해하기 어려움","hardToUnderstand","thumb-down"],["잘못된 정보 또는 샘플 코드","incorrectInformationOrSampleCode","thumb-down"],["필요한 정보/샘플이 없음","missingTheInformationSamplesINeed","thumb-down"],["번역 문제","translationIssue","thumb-down"],["기타","otherDown","thumb-down"]],["최종 업데이트: 2025-09-04(UTC)"],[[["\u003cp\u003eGoogle Distributed Cloud air-gapped 1.9.6 is now available, bringing the latest security patches and updates.\u003c/p\u003e\n"],["\u003cp\u003eThe Google Distributed Cloud version in the Addon Manager component has been updated to 1.14.8 to enhance security and stability.\u003c/p\u003e\n"],["\u003cp\u003eThe Canonical Ubuntu OS image has been updated to version 20230815, fixing a large number of security vulnerabilities, and improving the system's security.\u003c/p\u003e\n"],["\u003cp\u003eSeveral known issues exist in this release, including problems with VM manager RBAC, the \u003ccode\u003ekube-state-metrics\u003c/code\u003e deployment, unbalanced worker nodes, GPU device plugins, insufficient CPU resources, upgrade processes, \u003ccode\u003ecoredns\u003c/code\u003e deployment restarts, and organization system cluster alerts.\u003c/p\u003e\n"],["\u003cp\u003eA critical security vulnerability, CVE-2023-4863dd, related to a Heap buffer overflow in WebP in Google Chrome, has been fixed, addressing a potential out-of-bounds memory write attack vector.\u003c/p\u003e\n"]]],[],null,["# Google Distributed Cloud air-gapped 1.9.6 release notes\n\n\u003cbr /\u003e\n\nOctober 4, 2023 \\[GDC 1.9.6\\]\n-----------------------------\n\n*** ** * ** ***\n\n\nGoogle Distributed Cloud air-gapped 1.9.6 is now released.\n\nSee the [product overview](/distributed-cloud/hosted/docs/latest/gdch/overview) to learn about the features of Google Distributed Cloud air-gapped.\n\n*** ** * ** ***\n\n\nIn the Google Distributed Cloud air-gapped 1.9.6 Addon Manager (ADD)\ncomponent, the Google Distributed Cloud version is updated to\n1.14.8 to apply the latest security patches and important updates.\n\nSee [Google Distributed Cloud 1.14.8 release notes](https://cloud.google.com/anthos/clusters/docs/bare-metal/1.14/release-notes-ver#release_1148) for details.\n\n*** ** * ** ***\n\n\nUpdated Canonical Ubuntu OS image version to 20230815 to apply the latest\nsecurity patches and important updates. The following security vulnerabilities are fixed:\n\n- [CVE-2016-10228](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228)\n- [CVE-2019-25013](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013)\n- [CVE-2020-6096](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096)\n- [CVE-2020-13987](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13987)\n- [CVE-2020-13988](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13988)\n- [CVE-2020-17437](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17437)\n- [CVE-2020-27618](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618)\n- [CVE-2020-29562](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29562)\n- [CVE-2020-36691](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36691)\n- [CVE-2021-3326](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326)\n- [CVE-2021-3999](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999)\n- [CVE-2021-27645](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645)\n- [CVE-2021-33560](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33560)\n- [CVE-2021-35942](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942)\n- [CVE-2021-40528](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40528)\n- [CVE-2022-0168](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0168)\n- [CVE-2022-1184](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1184)\n- [CVE-2022-2208](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2208)\n- [CVE-2022-2210](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2210)\n- [CVE-2022-2257](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2257)\n- [CVE-2022-2264](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2264)\n- [CVE-2022-2284](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2284)\n- [CVE-2022-2285](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2285)\n- [CVE-2022-2286](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2286)\n- [CVE-2022-2287](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2287)\n- [CVE-2022-2289](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2289)\n- [CVE-2022-4269](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4269)\n- [CVE-2022-23218](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218)\n- [CVE-2022-23219](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219)\n- [CVE-2022-27672](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27672)\n- [CVE-2022-40982](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40982)\n- [CVE-2022-41804](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41804)\n- [CVE-2023-1611](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1611)\n- [CVE-2023-2124](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2124)\n- [CVE-2023-3090](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3090)\n- [CVE-2023-3111](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3111)\n- [CVE-2023-3141](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3141)\n- [CVE-2023-3390](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3390)\n- [CVE-2023-20593](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20593)\n- [CVE-2023-23908](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23908)\n- [CVE-2023-28321](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28321)\n- [CVE-2023-28322](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28322)\n- [CVE-2023-32629](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32629)\n- [CVE-2023-35001](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35001)\n- [CVE-2023-37327](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37327)\n- [CVE-2023-37328](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37328)\n- [CVE-2023-38633](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38633)\n\n*** ** * ** ***\n\n\nGoogle Distributed Cloud air-gapped 1.9.6 has a known issue where role-based access control (RBAC) and schema settings in the VM manager is stopping users from starting VM backup and restore processes.\n\n*** ** * ** ***\n\nGoogle Distributed Cloud air-gapped 1.9.6 has a known\nissue where the `kube-state-metrics` deployment crash loops.\n\n*** ** * ** ***\n\n\nGoogle Distributed Cloud air-gapped 1.9.6 has a known issue where a worker node is unbalanced after upgrade.\n\n*** ** * ** ***\n\nGoogle Distributed Cloud air-gapped 1.9.6 has a known\nissue with the upgrade where the GPU device plugin does not start.\n\n*** ** * ** ***\n\n\nGoogle Distributed Cloud air-gapped 1.9.6 has a known issue where a user cluster with three `n2-standard-4` worker nodes has insufficient CPU resources for upgrade.\n\n*** ** * ** ***\n\nGoogle Distributed Cloud air-gapped 1.9.6 has a known\nissue where upgrade is stuck while terminating a pod.\n\n*** ** * ** ***\n\n\nGoogle Distributed Cloud air-gapped 1.9.6 has a known issue where a user cluster does not become ready in time to restart the `coredns` deployment.\n\n*** ** * ** ***\n\nAn issue with a Heap buffer overflow in WebP in Google Chrome prior to\n116.0.5845.187 is fixed. This issue allowed a remote attacker to perform\nan out of bounds memory write by using a crafted HTML page (Chromium security severity: Critical). This issue usually affects anything that uses frameworks, code libraries, and OSes that incorporate Electron, another code library that uses libwebp, or has libwebp built-in directly.\n\nFor more details, see [CVE-2023-4863dd](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4863dd).\n\n*** ** * ** ***\n\n\nGoogle Distributed Cloud air-gapped 1.9.6 has a known issue where alerts in organization system clusters don't reach the ticketing system."]]