The following issues are fixed in 1.16.3-gke.45 The following vulnerabilities are fixed in 1.16.3-gke.45
Share
Services
## Fix
The following issues are fixed in 1.16.3-gke.45:
* Fixed a Cilium issue causing egress NAT to erroneously break long-lived connections.
* Fixed the etcd hostname mismatch issue when using a FQDN.
* Fixed the[known issue](https://cloud.google.com/anthos/clusters/docs/on-prem/latest/known-issues#admin-cluster-update-or-upgrade-fails-if-the-projects-or-locations-of-add-on-services-dont-match-each-other)that caused admin cluster updates or upgrades to fail if the projects or locations of add-on services don't match each other.
* Fixed the issue that external cluster snapshot won't be taken after `gkectl update admin` fails.
* Fixed an issue that caused the CSI workload preflight to fail when Istio is enabled.
* Fixed the issue that deleting a user cluster with a volume attached may be stuck forever.
* Fixed the[known issue](https://cloud.google.com/anthos/clusters/docs/on-prem/latest/known-issues#user-cluster-deletion-fails-when-using-a-user-managed-admin-workstation)that caused user cluster deletion to fail when using a user-managed admin workstation.
The following vulnerabilities are fixed in 1.16.3-gke.45:
* Critical container vulnerabilities:
* [CVE-2023-38408](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38408)
* High-severity container vulnerabilities:
* [CVE-2021-20206](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20206)
* [CVE-2022-3064](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3064)
* [GHSA-74fp-r6jw-h4mp](https://github.com/advisories/GHSA-74fp-r6jw-h4mp)
* [CVE-2022-29190](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29190)
* [CVE-2023-28840](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28840)
* [CVE-2023-43787](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43787)
* [CVE-2023-34241](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34241)
* [CVE-2023-3341](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3341)
* Container-optimized OS vulnerabilities:
* [CVE-2022-48560](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48560)
* [CVE-2023-42753](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42753)
* [CVE-2023-38545](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38545)
* Ubuntu vulnerabilities:
* [CVE-2023-38545](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38545)
* [CVE-2023-38546](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38546)
* [CVE-2023-1206](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1206)
* [CVE-2023-20569](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20569)
* [CVE-2023-2156](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2156)
* [CVE-2023-3338](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3338)
* [CVE-2023-38432](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38432)
* [CVE-2023-3863](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3863)
* [CVE-2023-3865](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3865)
* [CVE-2023-3866](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3866)
* [CVE-2023-4132](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4132)
* [CVE-2023-4155](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4155)
* [CVE-2023-4194](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4194)
* [CVE-2023-4273](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4273)
* [CVE-2023-44466](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-44466)
* Windows vulnerabilities:
* [CVE-2022-1996](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1996)
* [CVE-2023-29404](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29404)
* [CVE-2023-24540](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-24540)
* [CVE-2023-29402](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29402)
* [CVE-2023-29405](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29405)
* [CVE-2023-24538](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-24538)
* [CVE-2022-32149](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32149)
* [CVE-2021-38561](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38561)
* [CVE-2022-29190](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29190)
* [CVE-2022-27191](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27191)
* [CVE-2023-39533](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39533)
* [CVE-2023-24539](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-24539)
* [CVE-2023-24534](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-24534)
* [CVE-2023-24536](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-24536)
* [CVE-2022-21698](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21698)
* [CVE-2023-29400](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29400)
* [CVE-2023-29403](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29403)
* [CVE-2021-43565](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43565)
* [CVE-2023-24537](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-24537)
* [CVE-2022-27664](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27664)
* [CVE-2021-33194](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33194)
* [CVE-2022-41723](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41723)
* [CVE-2023-29406](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29406)
* [CVE-2022-29222](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29222)
* [CVE-2023-39319](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39319)
* [CVE-2023-39318](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39318)
* [CVE-2022-29526](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29526)
* [CVE-2023-29409](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29409)
* [CVE-2022-29189](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29189)
* [CVE-2023-24532](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-24532)
What else is happening at Google Cloud Platform?
The CPU allocation setting has been renamed to Billing in the Google Cloud console for Cloud Run services
December 13th, 2024
Services
Share
Google Kubernetes Engine (GKE) - December 13th, 2024 [Feature]
December 13th, 2024
Services
Share