Correções de vulnerabilidades

A atualização de um cluster para a versão mais recente do Google Distributed Cloud traz funcionalidades e correções adicionais ao seu cluster. Com cada lançamento de patch, corrigimos várias vulnerabilidades de segurança, o que torna a atualização para a versão do patch recomendado mais importante. A atualização é uma responsabilidade partilhada entre a Google e o cliente. Para mais informações sobre responsabilidades partilhadas, consulte o modelo de responsabilidade partilhada

Esta página destina-se a especialistas de segurança que apoiam a resolução de problemas ou vulnerabilidades de segurança que precisam de assistência estratégica, como incidentes e problemas encaminhados do apoio técnico. Para saber mais sobre as funções comuns e os exemplos de tarefas aos quais fazemos referência no Google Cloud conteúdo, consulte o artigo Funções e tarefas comuns de utilizadores do GKE.

Como são classificadas as vulnerabilidades

Normalmente, as vulnerabilidades de segurança são identificadas através do sistema Common Vulnerabilities and Exposures (CVE). A equipa de segurança do GKE classifica as vulnerabilidades de acordo com o sistema de pontuação de vulnerabilidades do Kubernetes. As classificações têm em conta muitos fatores, incluindo a configuração do GKE e do Google Distributed Cloud, bem como o reforço da segurança. Devido a estes fatores e aos investimentos que a Google faz em segurança, estas classificações de vulnerabilidades podem diferir de outras fontes de classificação. Google Cloud

A tabela seguinte descreve as categorias de gravidade das vulnerabilidades:

Gravidade Descrição
Crítico Uma vulnerabilidade facilmente explorável em todos os clusters por um atacante remoto não autenticado que leva ao comprometimento total do sistema.
Alto Uma vulnerabilidade facilmente explorável para muitos clusters que leva à perda de confidencialidade, integridade ou disponibilidade.
Médio Uma vulnerabilidade explorável para alguns clusters em que a perda de confidencialidade, integridade ou disponibilidade é limitada por configurações comuns, dificuldade da própria exploração, acesso necessário ou interação do utilizador.
Baixo Todas as outras vulnerabilidades do contentor. A exploração é improvável ou as consequências da exploração são limitadas.

Boletins de segurança

A maioria das vulnerabilidades é corrigida nas versões suportadas do Google Distributed Cloud antes de poderem ser exploradas. Quando existem incidentes comunicados com o potencial de comprometer a segurança dos seus clusters e dados, publicamos boletins de segurança. Um boletim de segurança descreve o problema de segurança e o respetivo impacto, e fornece uma mitigação. Para mais informações e uma lista de boletins publicados, consulte a página Boletins de segurança.

Quando é publicado um boletim de segurança para uma vulnerabilidade que afeta o Google Distributed Cloud (apenas software) no VMware, publicamos uma nota de lançamento correspondente com um link para o boletim.

Vulnerabilidades corrigidas pela versão de patch do Google Distributed Cloud

A tabela seguinte lista todas as vulnerabilidades que foram corrigidas a partir de janeiro de 2025. Para correções mais antigas, consulte as notas de lançamento. As correções na tabela seguinte estão listadas por versão de lançamento e gravidade do Google Distributed Cloud:

Menor Patches e gravidade Vulnerabilidades corrigidas

1,33

1.33.0-gke.799:
gravidade crítica
N/A
1.33.0-gke.799:
gravidade elevada
CVE-2020-12762, CVE-2020-15114, CVE-2022-3534, CVE-2023-2603, CVE-2023-46565, CVE-2024-5321, CVE-2024-10220, CVE-2025-47273 e GHSA-m425-mq94-257g
1.33.0-gke.799:
SO otimizado para contentores
CVE-2016-1585, CVE-2024-48615, CVE-2024-53427, CVE-2024-58083, CVE-2025-5914, CVE-2025-23266, CVE-2025-23267, CVE-2025-29087, CVE-2025-32414, CVE-2025-32415, CVE-2025-32463 e CVE-2025-48060
1.33.0-gke.799:
Ubuntu
N/A

1,32

1.32.400-gke.68:
Gravidade crítica
N/A
1.32.400-gke.68:
gravidade elevada
CVE-2020-12762
1.32.400-gke.68:
SO otimizado para contentores
CVE-2025-23266 e CVE-2025-23267
1.32.400-gke.68:
Ubuntu
N/A
1.32.300-gke.85:
gravidade crítica
N/A
1.32.300-gke.85:
Gravidade elevada
N/A
1.32.300-gke.85:
SO otimizado para contentores
CVE-2025-5914, CVE-2025-32463 e CVE-2025-48060
1.32.300-gke.85:
Ubuntu
N/A
1.32.200-gke.104:
gravidade crítica
N/A
1.32.200-gke.104:
gravidade elevada
CVE-2022-3534 e CVE-2023-46565
1.32.200-gke.104:
SO otimizado para contentores
CVE-2016-1585
1.32.200-gke.104:
Ubuntu
N/A
1.32.100-gke.106:
gravidade crítica
N/A
1.32.100-gke.106:
gravidade elevada
CVE-2023-2603
1.32.100-gke.106:
SO otimizado para contentores
CVE-2024-48615, CVE-2024-53427, CVE-2024-58083, CVE-2025-29087, CVE-2025-32414 e CVE-2025-32415
1.32.100-gke.106:
Ubuntu
N/A
1.32.0-gke.1085:
gravidade crítica
CVE-2023-24538,CVE-2023-24540,CVE-2023-29402,CVE-2023-29404,CVE-2023-29405
1.32.0-gke.1085:
gravidade elevada
CVE-2022-41724,CVE-2022-41725,CVE-2023-24534,CVE-2023-24536,CVE-2023-24537,CVE-2023-24539,CVE-2023-29400,CVE-2023-29403,CVE-2023-39323,CVE-2023-45287,CVE-2024-10979,CVE-2024-45338,CVE-2024-7592
1.32.0-gke.1085:
SO otimizado para contentores
CVE-2023-45288,CVE-2023-52926,CVE-2023-52927,CVE-2024-0135,CVE-2024-0136,CVE-2024-26982,CVE-2024-40896,CVE-2024-47745,CVE-2024-49861,CVE-2024-49996,CVE-2024-50036,CVE-2024-50047,CVE-2024-50055,CVE-2024-50067,CVE-2024-50115,CVE-2024-50121,CVE-2024-50131,CVE-2024-50143,CVE-2024-50151,CVE-2024-50154,CVE-2024-50164,CVE-2024-50186,CVE-2024-50215,CVE-2024-50228,CVE-2024-50257,CVE-2024-50262,CVE-2024-50264,CVE-2024-50275,CVE-2024-50278,CVE-2024-50279,CVE-2024-50280,CVE-2024-53082,CVE-2024-53099,CVE-2024-53141,CVE-2024-53142,CVE-2024-53164,CVE-2024-53166,CVE-2024-53170,CVE-2024-53173,CVE-2024-53174,CVE-2024-53194,CVE-2024-56558,CVE-2024-56600,CVE-2024-56601,CVE-2024-56606,CVE-2024-56614,CVE-2024-56615,CVE-2024-56658,CVE-2024-56664,CVE-2024-56672,CVE-2024-56675,CVE-2024-56693,CVE-2024-57951,CVE-2024-57979,CVE-2024-9287,CVE-2025-21700,CVE-2025-21726,CVE-2025-21727,CVE-2025-21760,CVE-2025-21762,CVE-2025-21763,CVE-2025-21764,CVE-2025-21785,CVE-2025-21791,CVE-2025-21796,CVE-2025-21812,CVE-2025-21858,CVE-2025-27113
1.32.0-gke.1085:
Ubuntu
CVE-2024-29018,CVE-2024-41110

1.31

1.31.900-gke.38:
gravidade crítica
N/A
1.31.900-gke.38:
gravidade elevada
CVE-2020-12762
1.31.900-gke.38:
SO otimizado para contentores
N/A
1.31.900-gke.38:
Ubuntu
N/A
1.31.800-gke.32:
gravidade crítica
N/A
1.31.800-gke.32:
gravidade elevada
N/A
1.31.800-gke.32:
SO otimizado para contentores
N/A
1.31.800-gke.32:
Ubuntu
N/A
1.31.700-gke.72:
gravidade crítica
N/A
1.31.700-gke.72:
gravidade elevada
CVE-2025-43971
1.31.700-gke.72:
SO otimizado para contentores
CVE-2025-5914 e CVE-2025-48060
1.31.700-gke.72:
Ubuntu
N/A
1.31.600-gke.85:
gravidade crítica
N/A
1.31.600-gke.85:
gravidade elevada
CVE-2023-46565
1.31.600-gke.85:
SO otimizado para contentores
CVE-2024-24786, CVE-2025-32415 e CVE-2025-32414
1.31.600-gke.85:
Ubuntu
N/A
1.31.500-gke.68:
gravidade crítica
N/A
1.31.500-gke.68:
gravidade elevada
CVE-2022-3534 e CVE-2023-2603
1.31.500-gke.68:
SO otimizado para contentores
CVE-2024-35866, CVE-2024-48615, CVE-2024-53427, CVE-2024-58083, CVE-2025-21867, CVE-2025-21887, CVE-2025-21919, CVE-2025-21920, CVE-2025-21999, CVE-2025-22056, CVE-2025-22868 e CVE-2025-37785
1.31.500-gke.68:
Ubuntu
N/A
1.31.400-gke.110:
gravidade crítica
N/A
1.31.400-gke.110:
Gravidade elevada
N/A
1.31.400-gke.110:
SO otimizado para contentores
CVE-2023-45288, CVE-2023-52927, CVE-2024-26982, CVE-2024-53166, CVE-2024-57979, CVE-2025-21726, CVE-2025-21727, CVE-2025-21756, CVE-2025-21760, CVE-2025-21762, CVE-2025-21763, CVE-2025-21764, CVE-2025-21785, CVE-2025-21791, CVE-2025-21796, CVE-2025-21812, CVE-2025-21858 e CVE-2025-27113
1.31.400-gke.110:
Ubuntu
N/A
1.31.300-gke.81:
Gravidade crítica
N/A
1.31.300-gke.81:
Gravidade elevada
CVE-2024-7592
1.31.300-gke.81:
SO otimizado para contentores
CVE-2024-9287, CVE-2024-40896, CVE-2024-50047, CVE-2024-50164, CVE-2024-53170, CVE-2024-56664, CVE-2024-57951, CVE-2025-21631 e CVE-2025-21671
1.31.300-gke.81:
Ubuntu
CVE-2024-29018 e CVE-2024-41110
1.31.200-gke.58:
gravidade crítica
N/A
1.31.200-gke.58:
gravidade elevada
CVE-2023-39323
1.31.200-gke.58:
SO otimizado para contentores
CVE-2024-0135, CVE-2024-0136, CVE-2024-47745, CVE-2024-49861, CVE-2024-49996, CVE-2024-50036, CVE-2024-50055, CVE-2024-50067, CVE-2024-50115, CVE-2024-50121, CVE-2024-50131, CVE-2024-50143, CVE-2024-50151, CVE-2024-50154, CVE-2024-50186, CVE-2024-50215, CVE-2024-50228, CVE-2024-50257, CVE-2024-50262, CVE-2024-50264, CVE-2024-50275, CVE-2024-50278, CVE-2024-50279, CVE-2024-53082, CVE-2024-53099, CVE-2024-53141, CVE-2024-53142, CVE-2024-53173, CVE-2024-56600, CVE-2024-56601, CVE-2024-56606, CVE-2024-56614, CVE-2024-56615, CVE-2024-56658, CVE-2024-56672 e CVE-2024-56675
1.31.200-gke.58:
Ubuntu
N/A
1.31.100-gke.136:
gravidade crítica
CVE-2023-24538, CVE-2023-24540, CVE-2023-29402, CVE-2023-29404 e CVE-2023-29405
1.31.100-gke.136:
gravidade elevada
CVE-2022-41724, CVE-2022-41725, CVE-2023-24534, CVE-2023-24536, CVE-2023-24537, CVE-2023-24539, CVE-2023-29400, CVE-2023-29403 e CVE-2023-45287
1.31.100-gke.136:
SO otimizado para contentores
N/A
1.31.100-gke.136:
Ubuntu
N/A

1,30

1.30.1200-gke.63:
gravidade crítica
N/A
1.30.1200-gke.63:
gravidade elevada
N/A
1.30.1200-gke.63:
SO otimizado para contentores
CVE-2025-5914, CVE-2025-23266, CVE-2025-23267 e CVE-2025-32463
1.30.1200-gke.63:
Ubuntu
N/A
1.30.1100-gke.67:
gravidade crítica
N/A
1.30.1100-gke.67:
Gravidade elevada
N/A
1.30.1100-gke.67:
SO otimizado para contentores
CVE-2025-48060
1.30.1100-gke.67:
Ubuntu
N/A
1.30.1000-gke.83:
gravidade crítica
N/A
1.30.1000-gke.83:
gravidade elevada
CVE-2022-3534
1.30.1000-gke.83:
SO otimizado para contentores
CVE-2024-24786, CVE-2024-48615, CVE-2025-29087, CVE-2025-32414 e CVE-2025-32415
1.30.1000-gke.83:
Ubuntu
N/A
1.30.900-gke.57:
Gravidade crítica
N/A
1.30.900-gke.57:
gravidade elevada
N/A
1.30.900-gke.57:
SO otimizado para contentores
CVE-2025-21867, CVE-2025-21887 e CVE-2025-22868
1.30.900-gke.57:
Ubuntu
N/A
1.30.800-gke.66:
gravidade crítica
N/A
1.30.800-gke.66:
gravidade elevada
N/A
1.30.800-gke.66:
SO otimizado para contentores
CVE-2023-45288, CVE-2024-26982, CVE-2024-53166, CVE-2024-56171, CVE-2025-21703, CVE-2025-21785, CVE-2025-21791, CVE-2025-21858, CVE-2025-24928, CVE-2025-27113/A
1.30.800-gke.66:
Ubuntu
N/A
1.30.700-gke.56:
gravidade crítica
N/A
1.30.700-gke.56:
gravidade elevada
CVE-2024-7592
1.30.700-gke.56:
SO otimizado para contentores
CVE-2024-9287, CVE-2024-50047, CVE-2024-56664, CVE-2024-57951, CVE-2025-21631 e CVE-2025-21671
1.30.700-gke.56:
Ubuntu
CVE-2024-29018 e CVE-2024-41110
1.30.600-gke.68:
Gravidade crítica
N/A
1.30.600-gke.68:
gravidade elevada
CVE-2023-39323
1.30.600-gke.68:
SO otimizado para contentores
CVE-2024-0135, CVE-2024-0136, CVE-2024-40896, CVE-2024-50067, CVE-2024-50121, CVE-2024-50164, CVE-2024-50275, CVE-2024-53141, CVE-2024-53142, CVE-2024-53170, CVE-2024-53173, CVE-2024-53206, CVE-2024-56600, CVE-2024-56601, CVE-2024-56606, CVE-2024-56614, CVE-2024-56615, CVE-2024-56658, CVE-2024-56672, CVE-2024-56675
1.30.600-gke.68:
Ubuntu
N/A
1.30.500-gke.126:
gravidade crítica
CVE-2023-24538, CVE-2023-24540, CVE-2023-29402, CVE-2023-29404 e CVE-2023-29405
1.30.500-gke.126:
gravidade elevada
CVE-2022-41724, CVE-2022-41725, CVE-2023-24534, CVE-2023-24536, CVE-2023-24537, CVE-2023-24539, CVE-2023-29400, CVE-2023-29403 e CVE-2023-45287
1.30.500-gke.126:
SO otimizado para contentores
CVE-2024-47745, CVE-2024-49861, CVE-2024-49996, CVE-2024-50036, CVE-2024-50055, CVE-2024-50143, CVE-2024-50151, CVE-2024-50154, CVE-2024-50186, CVE-2024-50228, CVE-2024-50257, CVE-2024-50262, CVE-2024-50264, CVE-2024-50278, CVE-2024-50279, CVE-2024-53082 e CVE-2024-53099
1.30.500-gke.126:
Ubuntu
N/A

1,29

1.29.1200-gke.99:
gravidade crítica
N/A
1.29.1200-gke.99:
gravidade elevada
N/A
1.29.1200-gke.99:
SO otimizado para contentores
CVE-2024-9287 e CVE-2024-57951
1.29.1200-gke.99:
Ubuntu
N/A
1.29.1100-gke.82:
gravidade crítica
N/A
1.29.1100-gke.82:
gravidade elevada
N/A
1.29.1100-gke.82:
SO otimizado para contentores
CVE-2024-49996, CVE-2024-50055, CVE-2024-50121, CVE-2024-50275, CVE-2024-53141, CVE-2024-53142, CVE-2024-53173, CVE-2024-53206, CVE-2024-56600, CVE-2024-56601, CVE-2024-56606, CVE-2024-56614, CVE-2024-56615/A
1.29.1100-gke.82:
Ubuntu
N/A
1.29.1000-gke.94:
gravidade crítica
CVE-2023-24538, CVE-2023-24540, CVE-2023-29402, CVE-2023-29404 e CVE-2023-29405
1.29.1000-gke.94:
Gravidade elevada
CVE-2022-41724, CVE-2022-41725, CVE-2023-24534, CVE-2023-24536, CVE-2023-24537, CVE-2023-24539, CVE-2023-29400, CVE-2023-29403 e CVE-2023-45287
1.29.1000-gke.94:
SO otimizado para contentores
CVE-2024-53099
1.29.1000-gke.94:
Ubuntu
N/A
1.29.900-gke.181:
gravidade crítica
N/A
1.29.900-gke.181:
gravidade elevada
CVE-2023-3676, CVE-2023-3955, CVE-2023-5528 e CVE-2024-6232
1.29.900-gke.181:
Container-Optimized OS
CVE-2024-38538, CVE-2024-47696, CVE-2024-47701, CVE-2024-47742, CVE-2024-49860, CVE-2024-49882, CVE-2024-49883, CVE-2024-49884, CVE-2024-49889, CVE-2024-49936, CVE-2024-49967, CVE-2024-49983, CVE-2024-50033, CVE-2024-50035, CVE-2024-50036, CVE-2024-50083, CVE-2024-50131, CVE-2024-50143, CVE-2024-50151, CVE-2024-50154, CVE-2024-50186, CVE-2024-50228, CVE-2024-50257, CVE-2024-50262, CVE-2024-50264
1.29.900-gke.181:
Ubuntu
CVE-2022-48666, CVE-2023-52889, CVE-2023-52918, CVE-2024-25744, CVE-2024-26607, CVE-2024-26661, CVE-2024-26669, CVE-2024-26800, CVE-2024-26893, CVE-2024-36484, CVE-2024-38577, CVE-2024-38602, CVE-2024-38611, CVE-2024-39472, CVE-2024-40915, CVE-2024-41011, CVE-2024-41012, CVE-2024-41015, CVE-2024-41017, CVE-2024-41019, CVE-2024-41020, CVE-2024-41022, CVE-2024-41042, CVE-2024-41059, CVE-2024-41060, CVE-2024-41063, CVE-2024-41064, CVE-2024-41065, CVE-2024-41068, CVE-2024-41070, CVE-2024-41071, CVE-2024-41072, CVE-2024-41073, CVE-2024-41077, CVE-2024-41078, CVE-2024-41081, CVE-2024-41090, CVE-2024-41091, CVE-2024-41098, CVE-2024-42114, CVE-2024-42126, CVE-2024-42246, CVE-2024-42259, CVE-2024-42265, CVE-2024-42267, CVE-2024-42269, CVE-2024-42270, CVE-2024-42271, CVE-2024-42272, CVE-2024-42274, CVE-2024-42276, CVE-2024-42277, CVE-2024-42280, CVE-2024-42281, CVE-2024-42283, CVE-2024-42284, CVE-2024-42285, CVE-2024-42286, CVE-2024-42287, CVE-2024-42288, CVE-2024-42289, CVE-2024-42290, CVE-2024-42292, CVE-2024-42295, CVE-2024-42296, CVE-2024-42297, CVE-2024-42299, CVE-2024-42301, CVE-2024-42302, CVE-2024-42304, CVE-2024-42305, CVE-2024-42306, CVE-2024-42309, CVE-2024-42310, CVE-2024-42311, CVE-2024-42312, CVE-2024-42313, CVE-2024-42318, CVE-2024-43817, CVE-2024-43828, CVE-2024-43829, CVE-2024-43830, CVE-2024-43834, CVE-2024-43835, CVE-2024-43839, CVE-2024-43841, CVE-2024-43846, CVE-2024-43849, CVE-2024-43853, CVE-2024-43854, CVE-2024-43856, CVE-2024-43858, CVE-2024-43860, CVE-2024-43861, CVE-2024-43863, CVE-2024-43867, CVE-2024-43869, CVE-2024-43870, CVE-2024-43871, CVE-2024-43873, CVE-2024-43875, CVE-2024-43879, CVE-2024-43880, CVE-2024-43882, CVE-2024-43883, CVE-2024-43884, CVE-2024-43889, CVE-2024-43890, CVE-2024-43892, CVE-2024-43893, CVE-2024-43894, CVE-2024-43902, CVE-2024-43905, CVE-2024-43907, CVE-2024-43908, CVE-2024-43909, CVE-2024-43914, CVE-2024-44934, CVE-2024-44935, CVE-2024-44944, CVE-2024-44946, CVE-2024-44947, CVE-2024-44948, CVE-2024-44954, CVE-2024-44958, CVE-2024-44960, CVE-2024-44965, CVE-2024-44966, CVE-2024-44969, CVE-2024-44971, CVE-2024-44974, CVE-2024-44982, CVE-2024-44983, CVE-2024-44985, CVE-2024-44986, CVE-2024-44987, CVE-2024-44988, CVE-2024-44989, CVE-2024-44990, CVE-2024-44995, CVE-2024-44998, CVE-2024-44999, CVE-2024-45003, CVE-2024-45006, CVE-2024-45007, CVE-2024-45008, CVE-2024-45009, CVE-2024-45011, CVE-2024-45018, CVE-2024-45021, CVE-2024-45025, CVE-2024-45026, CVE-2024-45028, CVE-2024-46673, CVE-2024-46675, CVE-2024-46676, CVE-2024-46677, CVE-2024-46679, CVE-2024-46685, CVE-2024-46689, CVE-2024-46702, CVE-2024-46707, CVE-2024-46713, CVE-2024-46714, CVE-2024-46719, CVE-2024-46721, CVE-2024-46722, CVE-2024-46723, CVE-2024-46724, CVE-2024-46725, CVE-2024-46731, CVE-2024-46732, CVE-2024-46737, CVE-2024-46738, CVE-2024-46739, CVE-2024-46740, CVE-2024-46743, CVE-2024-46744, CVE-2024-46745, CVE-2024-46746, CVE-2024-46747, CVE-2024-46750, CVE-2024-46752, CVE-2024-46755, CVE-2024-46756, CVE-2024-46757, CVE-2024-46758, CVE-2024-46759, CVE-2024-46761, CVE-2024-46763, CVE-2024-46771, CVE-2024-46777, CVE-2024-46780, CVE-2024-46781, CVE-2024-46782, CVE-2024-46783, CVE-2024-46791, CVE-2024-46795, CVE-2024-46798, CVE-2024-46800, CVE-2024-46804, CVE-2024-46805, CVE-2024-46807, CVE-2024-46810, CVE-2024-46814, CVE-2024-46815, CVE-2024-46817, CVE-2024-46818, CVE-2024-46819, CVE-2024-46822, CVE-2024-46828, CVE-2024-46829, CVE-2024-46832, CVE-2024-46840, CVE-2024-46844, CVE-2024-47659, CVE-2024-47660, CVE-2024-47663, CVE-2024-47665, CVE-2024-47667, CVE-2024-47668, CVE-2024-47669

Para mais informações sobre correções e alterações para um determinado lançamento, consulte as notas de lançamento.