Maintained with ☕️ by
IcePanel logo

Anthos clusters on VMware 1.14.4-gke.54 is now available. To upgrade, see Upgrading Anthos clusters on VMware

Share

Services

## Feature Anthos clusters on VMware 1.14.4-gke.54 is now available. To upgrade, see [Upgrading Anthos clusters on VMware](https://cloud.google.com/anthos/clusters/docs/on-prem/1.14/how-to/upgrading). Anthos clusters on VMware 1.14.4-gke.54 runs on Kubernetes 1.25.8-gke.1500. The supported versions offering the latest patches and updates for security vulnerabilities, exposures, and issues impacting Anthos clusters on VMware are 1.14, 1.13, and 1.12. ## Change Added admin cluster CA certificate validation to the admin cluster upgrade preflight check. ## Fix * Fixed an issue where the Connect Agent continued using the older image after registry credential update. * Fixed an issue where the cluster autoscaler did not work when Controlplane V2 was enabled. * Fixed an issue where a cluster might not be registered when the initial membership creation attempt failed. * Fixed an issue where ClusterRoleBindings in the admin cluster were accidentally deleted upon user cluster deletion. This fix removes dependency on ClusterRole, ClusterRoleBinding and ServiceAccount objects in the admin cluster. * Fixed an issue where a preflight check for Seesaw load balancer creation failed if the Seesaw group file already existed. * Disabled motd news on the ubuntu\_containerd image. * Fixed an issue where `gkectl check-config` failed at Manual LB slow validation with a nil pointer error. * Fix an issue where enabling Cloud Audit Logs with `gkectl update` did not work. ## Fix Fixed the following vulnerabilities: * High-severity container vulnerabilities: * [CVE-2023-26604](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-26604) * [CVE-2023-0361](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0361) * [CVE-2022-29154](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29154) * Container-optimized OS vulnerabilities: * [CVE-2023-0386](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0386) * [CVE-2023-23916](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23916) * [CVE-2023-0464](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0464) * [CVE-2023-27561](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27561) * [CVE-2022-40320](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40320) * [CVE-2023-1652](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1652) * [CVE-2023-28466](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28466)