The following issues are fixed in 1.16.3-gke.45 The following vulnerabilities are fixed in 1.16.3-gke.45
Share
Services
## Fix
The following issues are fixed in 1.16.3-gke.45:
* Fixed a Cilium issue causing egress NAT to erroneously break long-lived connections.
* Fixed the etcd hostname mismatch issue when using a FQDN.
* Fixed the[known issue](https://cloud.google.com/anthos/clusters/docs/on-prem/latest/known-issues#admin-cluster-update-or-upgrade-fails-if-the-projects-or-locations-of-add-on-services-dont-match-each-other)that caused admin cluster updates or upgrades to fail if the projects or locations of add-on services don't match each other.
* Fixed the issue that external cluster snapshot won't be taken after `gkectl update admin` fails.
* Fixed an issue that caused the CSI workload preflight to fail when Istio is enabled.
* Fixed the issue that deleting a user cluster with a volume attached may be stuck forever.
* Fixed the[known issue](https://cloud.google.com/anthos/clusters/docs/on-prem/latest/known-issues#user-cluster-deletion-fails-when-using-a-user-managed-admin-workstation)that caused user cluster deletion to fail when using a user-managed admin workstation.
The following vulnerabilities are fixed in 1.16.3-gke.45:
* Critical container vulnerabilities:
* [CVE-2023-38408](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38408)
* High-severity container vulnerabilities:
* [CVE-2021-20206](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20206)
* [CVE-2022-3064](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3064)
* [GHSA-74fp-r6jw-h4mp](https://github.com/advisories/GHSA-74fp-r6jw-h4mp)
* [CVE-2022-29190](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29190)
* [CVE-2023-28840](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28840)
* [CVE-2023-43787](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43787)
* [CVE-2023-34241](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34241)
* [CVE-2023-3341](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3341)
* Container-optimized OS vulnerabilities:
* [CVE-2022-48560](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48560)
* [CVE-2023-42753](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42753)
* [CVE-2023-38545](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38545)
* Ubuntu vulnerabilities:
* [CVE-2023-38545](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38545)
* [CVE-2023-38546](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38546)
* [CVE-2023-1206](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1206)
* [CVE-2023-20569](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20569)
* [CVE-2023-2156](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2156)
* [CVE-2023-3338](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3338)
* [CVE-2023-38432](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38432)
* [CVE-2023-3863](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3863)
* [CVE-2023-3865](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3865)
* [CVE-2023-3866](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3866)
* [CVE-2023-4132](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4132)
* [CVE-2023-4155](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4155)
* [CVE-2023-4194](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4194)
* [CVE-2023-4273](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4273)
* [CVE-2023-44466](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-44466)
* Windows vulnerabilities:
* [CVE-2022-1996](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1996)
* [CVE-2023-29404](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29404)
* [CVE-2023-24540](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-24540)
* [CVE-2023-29402](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29402)
* [CVE-2023-29405](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29405)
* [CVE-2023-24538](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-24538)
* [CVE-2022-32149](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32149)
* [CVE-2021-38561](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38561)
* [CVE-2022-29190](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29190)
* [CVE-2022-27191](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27191)
* [CVE-2023-39533](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39533)
* [CVE-2023-24539](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-24539)
* [CVE-2023-24534](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-24534)
* [CVE-2023-24536](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-24536)
* [CVE-2022-21698](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21698)
* [CVE-2023-29400](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29400)
* [CVE-2023-29403](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29403)
* [CVE-2021-43565](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43565)
* [CVE-2023-24537](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-24537)
* [CVE-2022-27664](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27664)
* [CVE-2021-33194](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33194)
* [CVE-2022-41723](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41723)
* [CVE-2023-29406](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29406)
* [CVE-2022-29222](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29222)
* [CVE-2023-39319](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39319)
* [CVE-2023-39318](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39318)
* [CVE-2022-29526](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29526)
* [CVE-2023-29409](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29409)
* [CVE-2022-29189](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29189)
* [CVE-2023-24532](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-24532)
What else is happening at Google Cloud Platform?
You can now set up AlloyDB clusters using a copy of your Cloud SQL for PostgreSQL backup
about 16 hours ago
Services
Share
If your GKE cluster was created before version 1.26, you can now migrate it to cgroupv2
about 19 hours ago
Services
Share
You can set up AlloyDB clusters using a copy of your Cloud SQL for PostgreSQL backup
about 20 hours ago
Services
Share
Read update
Services
Share