Anthos clusters on VMware 1.14.4-gke.54 is now available. To upgrade, see Upgrading Anthos clusters on VMware
Share
Services
## Feature
Anthos clusters on VMware 1.14.4-gke.54 is now available. To upgrade, see [Upgrading Anthos clusters on VMware](https://cloud.google.com/anthos/clusters/docs/on-prem/1.14/how-to/upgrading). Anthos clusters on VMware 1.14.4-gke.54 runs on Kubernetes 1.25.8-gke.1500.
The supported versions offering the latest patches and updates for security vulnerabilities, exposures, and issues impacting Anthos clusters on VMware are 1.14, 1.13, and 1.12.
## Change
Added admin cluster CA certificate validation to the admin cluster upgrade preflight check.
## Fix
* Fixed an issue where the Connect Agent continued using the older image after registry credential update.
* Fixed an issue where the cluster autoscaler did not work when Controlplane V2 was enabled.
* Fixed an issue where a cluster might not be registered when the initial membership creation attempt failed.
* Fixed an issue where ClusterRoleBindings in the admin cluster were accidentally deleted upon user cluster deletion. This fix removes dependency on ClusterRole, ClusterRoleBinding and ServiceAccount objects in the admin cluster.
* Fixed an issue where a preflight check for Seesaw load balancer creation failed if the Seesaw group file already existed.
* Disabled motd news on the ubuntu\_containerd image.
* Fixed an issue where `gkectl check-config` failed at Manual LB slow validation with a nil pointer error.
* Fix an issue where enabling Cloud Audit Logs with `gkectl update` did not work.
## Fix
Fixed the following vulnerabilities:
* High-severity container vulnerabilities:
* [CVE-2023-26604](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-26604)
* [CVE-2023-0361](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0361)
* [CVE-2022-29154](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29154)
* Container-optimized OS vulnerabilities:
* [CVE-2023-0386](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0386)
* [CVE-2023-23916](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23916)
* [CVE-2023-0464](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0464)
* [CVE-2023-27561](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27561)
* [CVE-2022-40320](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40320)
* [CVE-2023-1652](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1652)
* [CVE-2023-28466](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28466)
What else is happening at Google Cloud Platform?
You can now set up AlloyDB clusters using a copy of your Cloud SQL for PostgreSQL backup
about 12 hours ago
Services
Share
If your GKE cluster was created before version 1.26, you can now migrate it to cgroupv2
about 15 hours ago
Services
Share
You can set up AlloyDB clusters using a copy of your Cloud SQL for PostgreSQL backup
about 16 hours ago
Services
Share
Read update
Services
Share