[[["容易理解","easyToUnderstand","thumb-up"],["確實解決了我的問題","solvedMyProblem","thumb-up"],["其他","otherUp","thumb-up"]],[["難以理解","hardToUnderstand","thumb-down"],["資訊或程式碼範例有誤","incorrectInformationOrSampleCode","thumb-down"],["缺少我需要的資訊/範例","missingTheInformationSamplesINeed","thumb-down"],["翻譯問題","translationIssue","thumb-down"],["其他","otherDown","thumb-down"]],["上次更新時間:2025-09-04 (世界標準時間)。"],[[["\u003cp\u003eGoogle Distributed Cloud air-gapped 1.9.6 is now available, bringing the latest security patches and updates.\u003c/p\u003e\n"],["\u003cp\u003eThe Google Distributed Cloud version in the Addon Manager component has been updated to 1.14.8 to enhance security and stability.\u003c/p\u003e\n"],["\u003cp\u003eThe Canonical Ubuntu OS image has been updated to version 20230815, fixing a large number of security vulnerabilities, and improving the system's security.\u003c/p\u003e\n"],["\u003cp\u003eSeveral known issues exist in this release, including problems with VM manager RBAC, the \u003ccode\u003ekube-state-metrics\u003c/code\u003e deployment, unbalanced worker nodes, GPU device plugins, insufficient CPU resources, upgrade processes, \u003ccode\u003ecoredns\u003c/code\u003e deployment restarts, and organization system cluster alerts.\u003c/p\u003e\n"],["\u003cp\u003eA critical security vulnerability, CVE-2023-4863dd, related to a Heap buffer overflow in WebP in Google Chrome, has been fixed, addressing a potential out-of-bounds memory write attack vector.\u003c/p\u003e\n"]]],[],null,["# Google Distributed Cloud air-gapped 1.9.6 release notes\n\n\u003cbr /\u003e\n\nOctober 4, 2023 \\[GDC 1.9.6\\]\n-----------------------------\n\n*** ** * ** ***\n\n\nGoogle Distributed Cloud air-gapped 1.9.6 is now released.\n\nSee the [product overview](/distributed-cloud/hosted/docs/latest/gdch/overview) to learn about the features of Google Distributed Cloud air-gapped.\n\n*** ** * ** ***\n\n\nIn the Google Distributed Cloud air-gapped 1.9.6 Addon Manager (ADD)\ncomponent, the Google Distributed Cloud version is updated to\n1.14.8 to apply the latest security patches and important updates.\n\nSee [Google Distributed Cloud 1.14.8 release notes](https://cloud.google.com/anthos/clusters/docs/bare-metal/1.14/release-notes-ver#release_1148) for details.\n\n*** ** * ** ***\n\n\nUpdated Canonical Ubuntu OS image version to 20230815 to apply the latest\nsecurity patches and important updates. The following security vulnerabilities are fixed:\n\n- [CVE-2016-10228](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228)\n- [CVE-2019-25013](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013)\n- [CVE-2020-6096](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096)\n- [CVE-2020-13987](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13987)\n- [CVE-2020-13988](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13988)\n- [CVE-2020-17437](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17437)\n- [CVE-2020-27618](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618)\n- [CVE-2020-29562](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29562)\n- [CVE-2020-36691](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36691)\n- [CVE-2021-3326](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326)\n- [CVE-2021-3999](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999)\n- [CVE-2021-27645](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645)\n- [CVE-2021-33560](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33560)\n- [CVE-2021-35942](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942)\n- [CVE-2021-40528](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40528)\n- [CVE-2022-0168](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0168)\n- [CVE-2022-1184](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1184)\n- [CVE-2022-2208](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2208)\n- [CVE-2022-2210](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2210)\n- [CVE-2022-2257](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2257)\n- [CVE-2022-2264](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2264)\n- [CVE-2022-2284](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2284)\n- [CVE-2022-2285](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2285)\n- [CVE-2022-2286](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2286)\n- [CVE-2022-2287](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2287)\n- [CVE-2022-2289](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2289)\n- [CVE-2022-4269](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4269)\n- [CVE-2022-23218](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218)\n- [CVE-2022-23219](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219)\n- [CVE-2022-27672](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27672)\n- [CVE-2022-40982](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40982)\n- [CVE-2022-41804](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41804)\n- [CVE-2023-1611](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1611)\n- [CVE-2023-2124](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2124)\n- [CVE-2023-3090](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3090)\n- [CVE-2023-3111](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3111)\n- [CVE-2023-3141](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3141)\n- [CVE-2023-3390](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3390)\n- [CVE-2023-20593](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20593)\n- [CVE-2023-23908](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23908)\n- [CVE-2023-28321](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28321)\n- [CVE-2023-28322](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28322)\n- [CVE-2023-32629](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32629)\n- [CVE-2023-35001](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35001)\n- [CVE-2023-37327](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37327)\n- [CVE-2023-37328](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37328)\n- [CVE-2023-38633](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38633)\n\n*** ** * ** ***\n\n\nGoogle Distributed Cloud air-gapped 1.9.6 has a known issue where role-based access control (RBAC) and schema settings in the VM manager is stopping users from starting VM backup and restore processes.\n\n*** ** * ** ***\n\nGoogle Distributed Cloud air-gapped 1.9.6 has a known\nissue where the `kube-state-metrics` deployment crash loops.\n\n*** ** * ** ***\n\n\nGoogle Distributed Cloud air-gapped 1.9.6 has a known issue where a worker node is unbalanced after upgrade.\n\n*** ** * ** ***\n\nGoogle Distributed Cloud air-gapped 1.9.6 has a known\nissue with the upgrade where the GPU device plugin does not start.\n\n*** ** * ** ***\n\n\nGoogle Distributed Cloud air-gapped 1.9.6 has a known issue where a user cluster with three `n2-standard-4` worker nodes has insufficient CPU resources for upgrade.\n\n*** ** * ** ***\n\nGoogle Distributed Cloud air-gapped 1.9.6 has a known\nissue where upgrade is stuck while terminating a pod.\n\n*** ** * ** ***\n\n\nGoogle Distributed Cloud air-gapped 1.9.6 has a known issue where a user cluster does not become ready in time to restart the `coredns` deployment.\n\n*** ** * ** ***\n\nAn issue with a Heap buffer overflow in WebP in Google Chrome prior to\n116.0.5845.187 is fixed. This issue allowed a remote attacker to perform\nan out of bounds memory write by using a crafted HTML page (Chromium security severity: Critical). This issue usually affects anything that uses frameworks, code libraries, and OSes that incorporate Electron, another code library that uses libwebp, or has libwebp built-in directly.\n\nFor more details, see [CVE-2023-4863dd](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4863dd).\n\n*** ** * ** ***\n\n\nGoogle Distributed Cloud air-gapped 1.9.6 has a known issue where alerts in organization system clusters don't reach the ticketing system."]]