Maintained with ☕️ by
IcePanel logo

GKE on VMware 1.28.500-gke.121 is now available. To upgrade, see

Share

Services

## Announcement GKE on VMware 1.28.500-gke.121 is now available. To upgrade, see[Upgrading GKE on VMware](https://cloud.google.com/anthos/clusters/docs/on-prem/latest/how-to/upgrading). GKE on VMware 1.28.500-gke.121 runs on Kubernetes v1.28.8-gke.2000\. If you are using a third-party storage vendor, check the[GDCV Ready storage partners](https://cloud.google.com/anthos/docs/resources/partner-storage)document to make sure the storage vendor has already passed the qualification for this release of GKE on VMware. ## Fix The following issues are fixed in 1.28.500-gke.121: * Added the CNI binaries back to the OS image, so that clusters using multiple network interfaces with these CNI binaries can continue working. * Fixed the static IP count validator for HA admin clusters. The following vulnerabilities are fixed in1.28.500-gke.121: * Ubuntu vulnerabilities * [CVE-2023-1194](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1194) * [CVE-2023-32254](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32254) * [CVE-2023-32258](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32258) * [CVE-2023-38427](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38427) * [CVE-2023-38430](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38430) * [CVE-2023-38431](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38431) * [CVE-2023-3867](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3867) * [CVE-2023-46838](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46838) * [CVE-2023-52340](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52340) * [CVE-2023-52429](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52429) * [CVE-2023-52436](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52436) * [CVE-2023-52438](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52438) * [CVE-2023-52439](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52439) * [CVE-2023-52441](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52441) * [CVE-2023-52442](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52442) * [CVE-2023-52443](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52443) * [CVE-2023-52444](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52444) * [CVE-2023-52445](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52445) * [CVE-2023-52448](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52448) * [CVE-2023-52449](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52449) * [CVE-2023-52451](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52451) * [CVE-2023-52454](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52454) * [CVE-2023-52456](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52456) * [CVE-2023-52457](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52457) * [CVE-2023-52458](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52458) * [CVE-2023-52462](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52462) * [CVE-2023-52463](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52463) * [CVE-2023-52464](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52464) * [CVE-2023-52467](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52467) * [CVE-2023-52469](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52469) * [CVE-2023-52470](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52470) * [CVE-2023-52480](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52480) * [CVE-2023-52609](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52609) * [CVE-2023-52610](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52610) * [CVE-2023-52612](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52612) * [CVE-2024-22705](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-22705) * [CVE-2024-23850](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23850) * [CVE-2024-23851](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23851) * [CVE-2024-24860](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24860) * [CVE-2024-26586](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26586) * [CVE-2024-26589](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26589) * [CVE-2024-26591](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26591) * [CVE-2024-26597](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26597) * [CVE-2024-26598](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26598) * [CVE-2024-26631](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26631) * [CVE-2024-26633](https://cve.mitre.org/cgi-bin/cvename.cgi?name=%5BCVE-2024-26633)