GKE on VMware 1.28.500-gke.121 is now available. To upgrade, see
Share
Services
## Announcement
GKE on VMware 1.28.500-gke.121 is now available. To upgrade, see[Upgrading GKE on VMware](https://cloud.google.com/anthos/clusters/docs/on-prem/latest/how-to/upgrading). GKE on VMware 1.28.500-gke.121 runs on Kubernetes v1.28.8-gke.2000\.
If you are using a third-party storage vendor, check the[GDCV Ready storage partners](https://cloud.google.com/anthos/docs/resources/partner-storage)document to make sure the storage vendor has already passed the qualification for this release of GKE on VMware.
## Fix
The following issues are fixed in 1.28.500-gke.121:
* Added the CNI binaries back to the OS image, so that clusters using multiple network interfaces with these CNI binaries can continue working.
* Fixed the static IP count validator for HA admin clusters.
The following vulnerabilities are fixed in1.28.500-gke.121:
* Ubuntu vulnerabilities
* [CVE-2023-1194](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1194)
* [CVE-2023-32254](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32254)
* [CVE-2023-32258](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32258)
* [CVE-2023-38427](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38427)
* [CVE-2023-38430](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38430)
* [CVE-2023-38431](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38431)
* [CVE-2023-3867](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3867)
* [CVE-2023-46838](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46838)
* [CVE-2023-52340](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52340)
* [CVE-2023-52429](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52429)
* [CVE-2023-52436](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52436)
* [CVE-2023-52438](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52438)
* [CVE-2023-52439](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52439)
* [CVE-2023-52441](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52441)
* [CVE-2023-52442](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52442)
* [CVE-2023-52443](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52443)
* [CVE-2023-52444](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52444)
* [CVE-2023-52445](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52445)
* [CVE-2023-52448](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52448)
* [CVE-2023-52449](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52449)
* [CVE-2023-52451](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52451)
* [CVE-2023-52454](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52454)
* [CVE-2023-52456](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52456)
* [CVE-2023-52457](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52457)
* [CVE-2023-52458](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52458)
* [CVE-2023-52462](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52462)
* [CVE-2023-52463](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52463)
* [CVE-2023-52464](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52464)
* [CVE-2023-52467](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52467)
* [CVE-2023-52469](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52469)
* [CVE-2023-52470](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52470)
* [CVE-2023-52480](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52480)
* [CVE-2023-52609](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52609)
* [CVE-2023-52610](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52610)
* [CVE-2023-52612](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52612)
* [CVE-2024-22705](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-22705)
* [CVE-2024-23850](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23850)
* [CVE-2024-23851](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23851)
* [CVE-2024-24860](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24860)
* [CVE-2024-26586](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26586)
* [CVE-2024-26589](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26589)
* [CVE-2024-26591](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26591)
* [CVE-2024-26597](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26597)
* [CVE-2024-26598](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26598)
* [CVE-2024-26631](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26631)
* [CVE-2024-26633](https://cve.mitre.org/cgi-bin/cvename.cgi?name=%5BCVE-2024-26633)