Maintained with ☕️ by
IcePanel logo

The following issues are fixed in 1.16.3-gke.45 The following vulnerabilities are fixed in 1.16.3-gke.45

Share

Services

## Fix The following issues are fixed in 1.16.3-gke.45: * Fixed a Cilium issue causing egress NAT to erroneously break long-lived connections. * Fixed the etcd hostname mismatch issue when using a FQDN. * Fixed the[known issue](https://cloud.google.com/anthos/clusters/docs/on-prem/latest/known-issues#admin-cluster-update-or-upgrade-fails-if-the-projects-or-locations-of-add-on-services-dont-match-each-other)that caused admin cluster updates or upgrades to fail if the projects or locations of add-on services don't match each other. * Fixed the issue that external cluster snapshot won't be taken after `gkectl update admin` fails. * Fixed an issue that caused the CSI workload preflight to fail when Istio is enabled. * Fixed the issue that deleting a user cluster with a volume attached may be stuck forever. * Fixed the[known issue](https://cloud.google.com/anthos/clusters/docs/on-prem/latest/known-issues#user-cluster-deletion-fails-when-using-a-user-managed-admin-workstation)that caused user cluster deletion to fail when using a user-managed admin workstation. The following vulnerabilities are fixed in 1.16.3-gke.45: * Critical container vulnerabilities: * [CVE-2023-38408](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38408) * High-severity container vulnerabilities: * [CVE-2021-20206](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20206) * [CVE-2022-3064](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3064) * [GHSA-74fp-r6jw-h4mp](https://github.com/advisories/GHSA-74fp-r6jw-h4mp) * [CVE-2022-29190](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29190) * [CVE-2023-28840](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28840) * [CVE-2023-43787](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43787) * [CVE-2023-34241](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34241) * [CVE-2023-3341](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3341) * Container-optimized OS vulnerabilities: * [CVE-2022-48560](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48560) * [CVE-2023-42753](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42753) * [CVE-2023-38545](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38545) * Ubuntu vulnerabilities: * [CVE-2023-38545](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38545) * [CVE-2023-38546](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38546) * [CVE-2023-1206](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1206) * [CVE-2023-20569](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20569) * [CVE-2023-2156](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2156) * [CVE-2023-3338](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3338) * [CVE-2023-38432](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38432) * [CVE-2023-3863](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3863) * [CVE-2023-3865](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3865) * [CVE-2023-3866](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3866) * [CVE-2023-4132](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4132) * [CVE-2023-4155](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4155) * [CVE-2023-4194](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4194) * [CVE-2023-4273](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4273) * [CVE-2023-44466](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-44466) * Windows vulnerabilities: * [CVE-2022-1996](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1996) * [CVE-2023-29404](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29404) * [CVE-2023-24540](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-24540) * [CVE-2023-29402](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29402) * [CVE-2023-29405](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29405) * [CVE-2023-24538](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-24538) * [CVE-2022-32149](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32149) * [CVE-2021-38561](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38561) * [CVE-2022-29190](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29190) * [CVE-2022-27191](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27191) * [CVE-2023-39533](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39533) * [CVE-2023-24539](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-24539) * [CVE-2023-24534](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-24534) * [CVE-2023-24536](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-24536) * [CVE-2022-21698](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21698) * [CVE-2023-29400](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29400) * [CVE-2023-29403](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29403) * [CVE-2021-43565](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43565) * [CVE-2023-24537](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-24537) * [CVE-2022-27664](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27664) * [CVE-2021-33194](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33194) * [CVE-2022-41723](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41723) * [CVE-2023-29406](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29406) * [CVE-2022-29222](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29222) * [CVE-2023-39319](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39319) * [CVE-2023-39318](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39318) * [CVE-2022-29526](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29526) * [CVE-2023-29409](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29409) * [CVE-2022-29189](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29189) * [CVE-2023-24532](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-24532)