Correções de vulnerabilidades

Fazer upgrade de um cluster para a versão mais recente do Google Distributed Cloud oferece mais recursos e correções ao seu cluster. A cada versão de patch, corrigimos várias vulnerabilidades de segurança, o que torna ainda mais importante fazer upgrade para a versão de patch recomendada mais recente. A atualização é uma responsabilidade compartilhada entre o Google e o cliente. Para mais informações sobre responsabilidades compartilhadas, consulte Modelo de responsabilidade compartilhada.

Esta página é destinada a especialistas em segurança que oferecem suporte à resolução de problemas ou vulnerabilidades de segurança que precisam de assistência estratégica, como incidentes e problemas encaminhados pelo suporte. Para saber mais sobre papéis comuns e exemplos de tarefas que mencionamos no conteúdo do Google Cloud , consulte Funções e tarefas comuns do usuário do GKE.

Como as vulnerabilidades são classificadas

As vulnerabilidades de segurança geralmente são identificadas pelo sistema de Vulnerabilidades e Exposições Comuns (em inglês). A equipe de segurança do GKE classifica as vulnerabilidades de acordo com o sistema de pontuação de vulnerabilidades do Kubernetes. As classificações consideram muitos fatores, incluindo a configuração do GKE e do Google Distributed Cloud e o aumento da proteção de segurança. Devido a esses fatores e aos investimentos que o Google Cloud faz na segurança, essas classificações de vulnerabilidade podem ser diferentes de outras fontes.

Veja na tabela a seguir as categorias de gravidade de vulnerabilidade:

Gravidade Descrição
Crítico Uma vulnerabilidade facilmente explorada em todos os clusters por um invasor remoto não autenticado que leva ao comprometimento total do sistema.
Alta Uma vulnerabilidade fácil de explorar para muitos clusters que levam à perda de confidencialidade, integridade ou disponibilidade.
Média Uma vulnerabilidade que pode ser explorada para alguns clusters em que a perda de confidencialidade, integridade ou disponibilidade é limitada por configurações comuns, dificuldade de exploração, acesso necessário ou interação do usuário.
Baixo Todas as outras vulnerabilidades de contêiner. A exploração é improvável ou as consequências da exploração são limitadas.

Boletins de segurança

A maioria das vulnerabilidades é corrigida nas versões compatíveis do Google Distributed Cloud antes que possam ser exploradas. Quando há incidentes relatados que podem comprometer a segurança dos seus clusters e dados, publicamos boletins de segurança. Um boletim de segurança descreve o problema de segurança e seu impacto, além de fornecer uma mitigação. Para mais informações e uma lista de boletins publicados, consulte a página Boletins de segurança.

Quando um boletim de segurança é publicado para uma vulnerabilidade que afeta o Google Distributed Cloud (somente software) no VMware, publicamos uma nota da versão correspondente com um link para o boletim.

Vulnerabilidades corrigidas pela versão de patch do Google Distributed Cloud

A tabela a seguir lista todas as vulnerabilidades corrigidas a partir de janeiro de 2025. Para correções mais antigas, consulte as notas de lançamento. As correções na tabela a seguir estão listadas por versão e gravidade do lançamento do Google Distributed Cloud:

Leve Patch e gravidade Vulnerabilidades corrigidas

1,33

1.33.0-gke.799:
Gravidade crítica
N/A
1.33.0-gke.799:
Gravidade alta
CVE-2020-12762, CVE-2020-15114, CVE-2022-3534, CVE-2023-2603, CVE-2023-46565, CVE-2024-5321, CVE-2024-10220, CVE-2025-47273, GHSA-m425-mq94-257g
1.33.0-gke.799:
Container-Optimized OS
CVE-2016-1585, CVE-2024-48615, CVE-2024-53427, CVE-2024-58083, CVE-2025-5914, CVE-2025-23266, CVE-2025-23267, CVE-2025-29087, CVE-2025-32414, CVE-2025-32415, CVE-2025-32463, CVE-2025-48060
1.33.0-gke.799:
Ubuntu
N/A

1.32

1.32.400-gke.68:
Gravidade crítica
N/A
1.32.400-gke.68:
Gravidade alta
CVE-2020-12762
1.32.400-gke.68:
Container-Optimized OS
CVE-2025-23266, CVE-2025-23267
1.32.400-gke.68:
Ubuntu
N/A
1.32.300-gke.85:
gravidade crítica
N/A
1.32.300-gke.85:
Gravidade alta
N/A
1.32.300-gke.85:
Container-Optimized OS
CVE-2025-5914, CVE-2025-32463, CVE-2025-48060
1.32.300-gke.85:
Ubuntu
N/A
1.32.200-gke.104:
Gravidade crítica
N/A
1.32.200-gke.104:
Gravidade alta
CVE-2022-3534, CVE-2023-46565
1.32.200-gke.104:
Container-Optimized OS
CVE-2016-1585
1.32.200-gke.104:
Ubuntu
N/A
1.32.100-gke.106:
Gravidade crítica
N/A
1.32.100-gke.106:
Gravidade alta
CVE-2023-2603
1.32.100-gke.106:
Container-Optimized OS
CVE-2024-48615, CVE-2024-53427, CVE-2024-58083, CVE-2025-29087, CVE-2025-32414, CVE-2025-32415
1.32.100-gke.106:
Ubuntu
N/A
1.32.0-gke.1085:
Gravidade crítica
CVE-2023-24538,CVE-2023-24540,CVE-2023-29402,CVE-2023-29404,CVE-2023-29405
1.32.0-gke.1085:
Gravidade alta
CVE-2022-41724,CVE-2022-41725,CVE-2023-24534,CVE-2023-24536,CVE-2023-24537,CVE-2023-24539,CVE-2023-29400,CVE-2023-29403,CVE-2023-39323,CVE-2023-45287,CVE-2024-10979,CVE-2024-45338,CVE-2024-7592
1.32.0-gke.1085:
Container-Optimized OS
CVE-2023-45288,CVE-2023-52926,CVE-2023-52927,CVE-2024-0135,CVE-2024-0136,CVE-2024-26982,CVE-2024-40896,CVE-2024-47745,CVE-2024-49861,CVE-2024-49996,CVE-2024-50036,CVE-2024-50047,CVE-2024-50055,CVE-2024-50067,CVE-2024-50115,CVE-2024-50121,CVE-2024-50131,CVE-2024-50143,CVE-2024-50151,CVE-2024-50154,CVE-2024-50164,CVE-2024-50186,CVE-2024-50215,CVE-2024-50228,CVE-2024-50257,CVE-2024-50262,CVE-2024-50264,CVE-2024-50275,CVE-2024-50278,CVE-2024-50279,CVE-2024-50280,CVE-2024-53082,CVE-2024-53099,CVE-2024-53141,CVE-2024-53142,CVE-2024-53164,CVE-2024-53166,CVE-2024-53170,CVE-2024-53173,CVE-2024-53174,CVE-2024-53194,CVE-2024-56558,CVE-2024-56600,CVE-2024-56601,CVE-2024-56606,CVE-2024-56614,CVE-2024-56615,CVE-2024-56658,CVE-2024-56664,CVE-2024-56672,CVE-2024-56675,CVE-2024-56693,CVE-2024-57951,CVE-2024-57979,CVE-2024-9287,CVE-2025-21700,CVE-2025-21726,CVE-2025-21727,CVE-2025-21760,CVE-2025-21762,CVE-2025-21763,CVE-2025-21764,CVE-2025-21785,CVE-2025-21791,CVE-2025-21796,CVE-2025-21812,CVE-2025-21858,CVE-2025-27113
1.32.0-gke.1085:
Ubuntu
CVE-2024-29018,CVE-2024-41110

1.31

1.31.800-gke.32:
gravidade crítica
N/A
1.31.800-gke.32:
gravidade alta
N/A
1.31.800-gke.32:
Container-Optimized OS
N/A
1.31.800-gke.32:
Ubuntu
N/A
1.31.700-gke.72:
gravidade crítica
N/A
1.31.700-gke.72:
Gravidade alta
CVE-2025-43971
1.31.700-gke.72:
Container-Optimized OS
CVE-2025-5914, CVE-2025-48060
1.31.700-gke.72:
Ubuntu
N/A
1.31.600-gke.85:
gravidade crítica
N/A
1.31.600-gke.85:
gravidade alta
CVE-2023-46565
1.31.600-gke.85:
Container-Optimized OS
CVE-2024-24786, CVE-2025-32415, CVE-2025-32414
1.31.600-gke.85:
Ubuntu
N/A
1.31.500-gke.68:
gravidade crítica
N/A
1.31.500-gke.68:
gravidade alta
CVE-2022-3534, CVE-2023-2603
1.31.500-gke.68:
Container-Optimized OS
CVE-2024-35866, CVE-2024-48615, CVE-2024-53427, CVE-2024-58083, CVE-2025-21867, CVE-2025-21887, CVE-2025-21919, CVE-2025-21920, CVE-2025-21999, CVE-2025-22056, CVE-2025-22868, CVE-2025-37785
1.31.500-gke.68:
Ubuntu
N/A
1.31.400-gke.110:
gravidade crítica
N/A
1.31.400-gke.110:
Gravidade alta
N/A
1.31.400-gke.110:
Container-Optimized OS
CVE-2023-45288, CVE-2023-52927, CVE-2024-26982, CVE-2024-53166, CVE-2024-57979, CVE-2025-21726, CVE-2025-21727, CVE-2025-21756, CVE-2025-21760, CVE-2025-21762, CVE-2025-21763, CVE-2025-21764, CVE-2025-21785, CVE-2025-21791, CVE-2025-21796, CVE-2025-21812, CVE-2025-21858, CVE-2025-27113
1.31.400-gke.110:
Ubuntu
N/A
1.31.300-gke.81:
gravidade crítica
N/A
1.31.300-gke.81:
Gravidade alta
CVE-2024-7592
1.31.300-gke.81:
Container-Optimized OS
CVE-2024-9287, CVE-2024-40896, CVE-2024-50047, CVE-2024-50164, CVE-2024-53170, CVE-2024-56664, CVE-2024-57951, CVE-2025-21631, CVE-2025-21671
1.31.300-gke.81:
Ubuntu
CVE-2024-29018, CVE-2024-41110
1.31.200-gke.58:
Gravidade crítica
N/A
1.31.200-gke.58:
Gravidade alta
CVE-2023-39323
1.31.200-gke.58:
Container-Optimized OS
CVE-2024-0135, CVE-2024-0136, CVE-2024-47745, CVE-2024-49861, CVE-2024-49996, CVE-2024-50036, CVE-2024-50055, CVE-2024-50067, CVE-2024-50115, CVE-2024-50121, CVE-2024-50131, CVE-2024-50143, CVE-2024-50151, CVE-2024-50154, CVE-2024-50186, CVE-2024-50215, CVE-2024-50228, CVE-2024-50257, CVE-2024-50262, CVE-2024-50264, CVE-2024-50275, CVE-2024-50278, CVE-2024-50279, CVE-2024-53082, CVE-2024-53099, CVE-2024-53141, CVE-2024-53142, CVE-2024-53173, CVE-2024-56600, CVE-2024-56601, CVE-2024-56606, CVE-2024-56614, CVE-2024-56615, CVE-2024-56658, CVE-2024-56672, CVE-2024-56675
1.31.200-gke.58:
Ubuntu
N/A
1.31.100-gke.136:
gravidade crítica
CVE-2023-24538, CVE-2023-24540, CVE-2023-29402, CVE-2023-29404, CVE-2023-29405
1.31.100-gke.136:
Gravidade alta
CVE-2022-41724, CVE-2022-41725, CVE-2023-24534, CVE-2023-24536, CVE-2023-24537, CVE-2023-24539, CVE-2023-29400, CVE-2023-29403, CVE-2023-45287
1.31.100-gke.136:
Container-Optimized OS
N/A
1.31.100-gke.136:
Ubuntu
N/A

1,30

1.30.1200-gke.63:
Gravidade crítica
N/A
1.30.1200-gke.63:
Gravidade alta
N/A
1.30.1200-gke.63:
Container-Optimized OS
CVE-2025-5914, CVE-2025-23266, CVE-2025-23267, CVE-2025-32463
1.30.1200-gke.63:
Ubuntu
N/A
1.30.1100-gke.67:
Gravidade crítica
N/A
1.30.1100-gke.67:
Gravidade alta
N/A
1.30.1100-gke.67:
Container-Optimized OS
CVE-2025-48060
1.30.1100-gke.67:
Ubuntu
N/A
1.30.1000-gke.83:
gravidade crítica
N/A
1.30.1000-gke.83:
Gravidade alta
CVE-2022-3534
1.30.1000-gke.83:
Container-Optimized OS
CVE-2024-24786, CVE-2024-48615, CVE-2025-29087, CVE-2025-32414, CVE-2025-32415
1.30.1000-gke.83:
Ubuntu
N/A
1.30.900-gke.57:
gravidade crítica
N/A
1.30.900-gke.57:
Gravidade alta
N/A
1.30.900-gke.57:
Container-Optimized OS
CVE-2025-21867, CVE-2025-21887, CVE-2025-22868
1.30.900-gke.57:
Ubuntu
N/A
1.30.800-gke.66:
gravidade crítica
N/A
1.30.800-gke.66:
gravidade alta
N/A
1.30.800-gke.66:
Container-Optimized OS
CVE-2023-45288, CVE-2024-26982, CVE-2024-53166, CVE-2024-56171, CVE-2025-21703, CVE-2025-21785, CVE-2025-21791, CVE-2025-21858, CVE-2025-24928, CVE-2025-27113/A
1.30.800-gke.66:
Ubuntu
N/A
1.30.700-gke.56:
Gravidade crítica
N/A
1.30.700-gke.56:
gravidade alta
CVE-2024-7592
1.30.700-gke.56:
Container-Optimized OS
CVE-2024-9287, CVE-2024-50047, CVE-2024-56664, CVE-2024-57951, CVE-2025-21631, CVE-2025-21671
1.30.700-gke.56:
Ubuntu
CVE-2024-29018, CVE-2024-41110
1.30.600-gke.68:
Gravidade crítica
N/A
1.30.600-gke.68:
gravidade alta
CVE-2023-39323
1.30.600-gke.68:
Container-Optimized OS
CVE-2024-0135, CVE-2024-0136, CVE-2024-40896, CVE-2024-50067, CVE-2024-50121, CVE-2024-50164, CVE-2024-50275, CVE-2024-53141, CVE-2024-53142, CVE-2024-53170, CVE-2024-53173, CVE-2024-53206, CVE-2024-56600, CVE-2024-56601, CVE-2024-56606, CVE-2024-56614, CVE-2024-56615, CVE-2024-56658, CVE-2024-56672, CVE-2024-56675
1.30.600-gke.68:
Ubuntu
N/A
1.30.500-gke.126:
gravidade crítica
CVE-2023-24538, CVE-2023-24540, CVE-2023-29402, CVE-2023-29404, CVE-2023-29405
1.30.500-gke.126:
gravidade alta
CVE-2022-41724, CVE-2022-41725, CVE-2023-24534, CVE-2023-24536, CVE-2023-24537, CVE-2023-24539, CVE-2023-29400, CVE-2023-29403, CVE-2023-45287
1.30.500-gke.126:
Container-Optimized OS
CVE-2024-47745, CVE-2024-49861, CVE-2024-49996, CVE-2024-50036, CVE-2024-50055, CVE-2024-50143, CVE-2024-50151, CVE-2024-50154, CVE-2024-50186, CVE-2024-50228, CVE-2024-50257, CVE-2024-50262, CVE-2024-50264, CVE-2024-50278, CVE-2024-50279, CVE-2024-53082, CVE-2024-53099
1.30.500-gke.126:
Ubuntu
N/A

1,29

1.29.1200-gke.99:
Gravidade crítica
N/A
1.29.1200-gke.99:
Gravidade alta
N/A
1.29.1200-gke.99:
Container-Optimized OS
CVE-2024-9287, CVE-2024-57951
1.29.1200-gke.99:
Ubuntu
N/A
1.29.1100-gke.82:
Gravidade crítica
N/A
1.29.1100-gke.82:
Gravidade alta
N/A
1.29.1100-gke.82:
Container-Optimized OS
CVE-2024-49996, CVE-2024-50055, CVE-2024-50121, CVE-2024-50275, CVE-2024-53141, CVE-2024-53142, CVE-2024-53173, CVE-2024-53206, CVE-2024-56600, CVE-2024-56601, CVE-2024-56606, CVE-2024-56614, CVE-2024-56615/A
1.29.1100-gke.82:
Ubuntu
N/A
1.29.1000-gke.94:
Gravidade crítica
CVE-2023-24538, CVE-2023-24540, CVE-2023-29402, CVE-2023-29404, CVE-2023-29405
1.29.1000-gke.94:
Gravidade alta
CVE-2022-41724, CVE-2022-41725, CVE-2023-24534, CVE-2023-24536, CVE-2023-24537, CVE-2023-24539, CVE-2023-29400, CVE-2023-29403, CVE-2023-45287
1.29.1000-gke.94:
Container-Optimized OS
CVE-2024-53099
1.29.1000-gke.94:
Ubuntu
N/A
1.29.900-gke.181:
Gravidade crítica
N/A
1.29.900-gke.181:
Gravidade alta
CVE-2023-3676, CVE-2023-3955, CVE-2023-5528, CVE-2024-6232
1.29.900-gke.181:
Container-Optimized OS
CVE-2024-38538, CVE-2024-47696, CVE-2024-47701, CVE-2024-47742, CVE-2024-49860, CVE-2024-49882, CVE-2024-49883, CVE-2024-49884, CVE-2024-49889, CVE-2024-49936, CVE-2024-49967, CVE-2024-49983, CVE-2024-50033, CVE-2024-50035, CVE-2024-50036, CVE-2024-50083, CVE-2024-50131, CVE-2024-50143, CVE-2024-50151, CVE-2024-50154, CVE-2024-50186, CVE-2024-50228, CVE-2024-50257, CVE-2024-50262, CVE-2024-50264, CVE-2024-50278, CVE-2024-50279, CVE-2024-53057
1.29.900-gke.181:
Ubuntu
CVE-2022-48666, CVE-2023-52889, CVE-2023-52918, CVE-2024-25744, CVE-2024-26607, CVE-2024-26661, CVE-2024-26669, CVE-2024-26800, CVE-2024-26893, CVE-2024-36484, CVE-2024-38577, CVE-2024-38602, CVE-2024-38611, CVE-2024-39472, CVE-2024-40915, CVE-2024-41011, CVE-2024-41012, CVE-2024-41015, CVE-2024-41017, CVE-2024-41019, CVE-2024-41020, CVE-2024-41022, CVE-2024-41042, CVE-2024-41059, CVE-2024-41060, CVE-2024-41063, CVE-2024-41064, CVE-2024-41065, CVE-2024-41068, CVE-2024-41070, CVE-2024-41071, CVE-2024-41072, CVE-2024-41073, CVE-2024-41077, CVE-2024-41078, CVE-2024-41081, CVE-2024-41090, CVE-2024-41091, CVE-2024-41098, CVE-2024-42114, CVE-2024-42126, CVE-2024-42246, CVE-2024-42259, CVE-2024-42265, CVE-2024-42267, CVE-2024-42269, CVE-2024-42270, CVE-2024-42271, CVE-2024-42272, CVE-2024-42274, CVE-2024-42276, CVE-2024-42277, CVE-2024-42280, CVE-2024-42281, CVE-2024-42283, CVE-2024-42284, CVE-2024-42285, CVE-2024-42286, CVE-2024-42287, CVE-2024-42288, CVE-2024-42289, CVE-2024-42290, CVE-2024-42292, CVE-2024-42295, CVE-2024-42296, CVE-2024-42297, CVE-2024-42299, CVE-2024-42301, CVE-2024-42302, CVE-2024-42304, CVE-2024-42305, CVE-2024-42306, CVE-2024-42309, CVE-2024-42310, CVE-2024-42311, CVE-2024-42312, CVE-2024-42313, CVE-2024-42318, CVE-2024-43817, CVE-2024-43828, CVE-2024-43829, CVE-2024-43830, CVE-2024-43834, CVE-2024-43835, CVE-2024-43839, CVE-2024-43841, CVE-2024-43846, CVE-2024-43849, CVE-2024-43853, CVE-2024-43854, CVE-2024-43856, CVE-2024-43858, CVE-2024-43860, CVE-2024-43861, CVE-2024-43863, CVE-2024-43867, CVE-2024-43869, CVE-2024-43870, CVE-2024-43871, CVE-2024-43873, CVE-2024-43875, CVE-2024-43879, CVE-2024-43880, CVE-2024-43882, CVE-2024-43883, CVE-2024-43884, CVE-2024-43889, CVE-2024-43890, CVE-2024-43892, CVE-2024-43893, CVE-2024-43894, CVE-2024-43902, CVE-2024-43905, CVE-2024-43907, CVE-2024-43908, CVE-2024-43909, CVE-2024-43914, CVE-2024-44934, CVE-2024-44935, CVE-2024-44944, CVE-2024-44946, CVE-2024-44947, CVE-2024-44948, CVE-2024-44954, CVE-2024-44958, CVE-2024-44960, CVE-2024-44965, CVE-2024-44966, CVE-2024-44969, CVE-2024-44971, CVE-2024-44974, CVE-2024-44982, CVE-2024-44983, CVE-2024-44985, CVE-2024-44986, CVE-2024-44987, CVE-2024-44988, CVE-2024-44989, CVE-2024-44990, CVE-2024-44995, CVE-2024-44998, CVE-2024-44999, CVE-2024-45003, CVE-2024-45006, CVE-2024-45007, CVE-2024-45008, CVE-2024-45009, CVE-2024-45011, CVE-2024-45018, CVE-2024-45021, CVE-2024-45025, CVE-2024-45026, CVE-2024-45028, CVE-2024-46673, CVE-2024-46675, CVE-2024-46676, CVE-2024-46677, CVE-2024-46679, CVE-2024-46685, CVE-2024-46689, CVE-2024-46702, CVE-2024-46707, CVE-2024-46713, CVE-2024-46714, CVE-2024-46719, CVE-2024-46721, CVE-2024-46722, CVE-2024-46723, CVE-2024-46724, CVE-2024-46725, CVE-2024-46731, CVE-2024-46732, CVE-2024-46737, CVE-2024-46738, CVE-2024-46739, CVE-2024-46740, CVE-2024-46743, CVE-2024-46744, CVE-2024-46745, CVE-2024-46746, CVE-2024-46747, CVE-2024-46750, CVE-2024-46752, CVE-2024-46755, CVE-2024-46756, CVE-2024-46757, CVE-2024-46758, CVE-2024-46759, CVE-2024-46761, CVE-2024-46763, CVE-2024-46771, CVE-2024-46777, CVE-2024-46780, CVE-2024-46781, CVE-2024-46782, CVE-2024-46783, CVE-2024-46791, CVE-2024-46795, CVE-2024-46798, CVE-2024-46800, CVE-2024-46804, CVE-2024-46805, CVE-2024-46807, CVE-2024-46810, CVE-2024-46814, CVE-2024-46815, CVE-2024-46817, CVE-2024-46818, CVE-2024-46819, CVE-2024-46822, CVE-2024-46828, CVE-2024-46829, CVE-2024-46832, CVE-2024-46840, CVE-2024-46844, CVE-2024-47659, CVE-2024-47660, CVE-2024-47663, CVE-2024-47665, CVE-2024-47667, CVE-2024-47668, CVE-2024-47669

Para mais informações sobre correções e mudanças em uma versão específica, consulte as notas da versão.