Maintained with ☕️ by
IcePanel logo

Google Distributed Cloud for VMware 1.29.200-gke.245 is now available for

Share

Services

## Announcement Google Distributed Cloud for VMware 1.29.200-gke.245 is now available for[download](https://cloud.google.com/kubernetes-engine/distributed-cloud/vmware/docs/downloads). To upgrade, see[Upgrade a cluster or a node pool](https://cloud.google.com/kubernetes-engine/distributed-cloud/vmware/docs/how-to/upgrading). Google Distributed Cloud 1.29.200-gke.245 runs on Kubernetes v1.29.5-gke.800\. If you are using a third-party storage vendor, check the[GDCV Ready storage partners](https://cloud.google.com/kubernetes-engine/enterprise/docs/resources/partner-storage)document to make sure the storage vendor has already passed the qualification for this release. ## Fix The following vulnerabilities are fixed In 1.29.200-gke.245: * Container-optimized OS vulnerabilities: * [CVE-2024-6387](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6387) * Ubuntu vulnerabilities: * [CVE-2024-6387](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6387) ## Announcement Google Distributed Cloud for VMware 1.28.700-gke.151 is now available for[download](https://cloud.google.com/kubernetes-engine/distributed-cloud/vmware/docs/downloads). To upgrade, see[Upgrade a cluster or a node pool](https://cloud.google.com/kubernetes-engine/distributed-cloud/vmware/docs/how-to/upgrading). Google Distributed Cloud 1.28.700-gke.151 runs on Kubernetes v1.28.10-gke.2100\. If you are using a third-party storage vendor, check the[GDCV Ready storage partners](https://cloud.google.com/kubernetes-engine/enterprise/docs/resources/partner-storage)document to make sure the storage vendor has already passed the qualification for this release. ## Fix The following issues are fixed in 1.28.700-gke.151: * Fixed the [known issue](https://cloud.google.com/kubernetes-engine/distributed-cloud/vmware/docs/troubleshooting/known-issues#binary-authorization-webook-blocks-cni-plugin-to-start-causing-one-of-nodepool-failed-to-come-up) where the Binary Authorization webhook blocked the CNI plugin, which caused user cluster creation to stall. * Fixed the [known issue](https://cloud.google.com/kubernetes-engine/distributed-cloud/vmware/docs/troubleshooting/known-issues#cluster-creation-failure-due-to-control-plane-vip-in-different-subnet) that caused cluster creation to fail because the control plane VIP was in a different subnet from other cluster nodes. The following vulnerabilities are fixed In 1.28.700-gke.151: * High-severity container vulnerabilities: * [CVE-2022-28948](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28948) * [CVE-2024-0985](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0985) * [CVE-2024-2961](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2961) * Container-optimized OS vulnerabilities: * [CVE-2021-3520](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3520) * [CVE-2024-6387](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6387) * [CVE-2024-26256](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26256) * [CVE-2024-27018](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27018) * [CVE-2024-27020](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27020) * [CVE-2024-32004](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-32004) * [CVE-2024-32465](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-32465) * [CVE-2024-36971](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36971) * Ubuntu vulnerabilities: * [CVE-2023-6270](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6270) * [CVE-2023-7042](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7042) * [CVE-2023-52434](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52434) * [CVE-2023-52447](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52447) * [CVE-2023-52497](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52497) * [CVE-2023-52620](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52620) * [CVE-2023-52640](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52640) * [CVE-2023-52641](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52641) * [CVE-2023-52644](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52644) * [CVE-2023-52645](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52645) * [CVE-2023-52650](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52650) * [CVE-2023-52652](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52652) * [CVE-2023-52656](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52656) * [CVE-2023-52662](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52662) * [CVE-2024-0841](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0841) * [CVE-2024-6387](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6387) * [CVE-2024-21823](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21823) * [CVE-2024-22099](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-22099) * [CVE-2024-26583](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26583) * [CVE-2024-26584](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26584) * [CVE-2024-26585](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26585) * [CVE-2024-26601](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26601) * [CVE-2024-26603](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26603) * [CVE-2024-26643](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26643) * [CVE-2024-26651](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26651) * [CVE-2024-26659](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26659) * [CVE-2024-26688](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26688) * [CVE-2024-26733](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26733) * [CVE-2024-26735](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26735) * [CVE-2024-26736](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26736) * [CVE-2024-26737](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26737) * [CVE-2024-26743](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26743) * [CVE-2024-26744](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26744) * [CVE-2024-26747](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26747) * [CVE-2024-26748](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26748) * [CVE-2024-26749](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26749) * [CVE-2024-26750](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26750) * [CVE-2024-26751](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26751) * [CVE-2024-26752](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26752) * [CVE-2024-26754](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26754) * [CVE-2024-26763](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26763) * [CVE-2024-26764](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26764) * [CVE-2024-26766](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26766) * [CVE-2024-26769](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26769) * [CVE-2024-26771](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26771) * [CVE-2024-26772](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26772) * [CVE-2024-26773](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26773) * [CVE-2024-26774](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26774) * [CVE-2024-26776](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26776) * [CVE-2024-26777](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26777) * [CVE-2024-26778](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26778) * [CVE-2024-26779](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26779) * [CVE-2024-26782](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26782) * [CVE-2024-26787](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26787) * [CVE-2024-26788](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26788) * [CVE-2024-26790](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26790) * [CVE-2024-26791](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26791) * [CVE-2024-26792](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26792) * [CVE-2024-26793](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26793) * [CVE-2024-26795](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26795) * [CVE-2024-26798](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26798) * [CVE-2024-26801](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26801) * [CVE-2024-26802](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26802) * [CVE-2024-26803](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26803) * [CVE-2024-26804](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26804) * [CVE-2024-26805](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26805) * [CVE-2024-26809](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26809) * [CVE-2024-26816](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26816) * [CVE-2024-26820](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26820) * [CVE-2024-26833](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26833) * [CVE-2024-26835](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26835) * [CVE-2024-26838](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26838) * [CVE-2024-26839](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26839) * [CVE-2024-26840](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26840) * [CVE-2024-26843](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26843) * [CVE-2024-26845](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26845) * [CVE-2024-26846](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26846) * [CVE-2024-26851](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26851) * [CVE-2024-26852](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26852) * [CVE-2024-26855](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26855) * [CVE-2024-26856](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26856) * [CVE-2024-26857](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26857) * [CVE-2024-26859](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26859) * [CVE-2024-26861](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26861) * [CVE-2024-26862](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26862) * [CVE-2024-26863](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26863) * [CVE-2024-26870](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26870) * [CVE-2024-26872](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26872) * [CVE-2024-26874](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26874) * [CVE-2024-26875](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26875) * [CVE-2024-26877](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26877) * [CVE-2024-26878](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26878) * [CVE-2024-26879](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26879) * [CVE-2024-26880](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26880) * [CVE-2024-26881](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26881) * [CVE-2024-26882](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26882) * [CVE-2024-26883](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26883) * [CVE-2024-26884](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26884) * [CVE-2024-26885](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26885) * [CVE-2024-26889](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26889) * [CVE-2024-26891](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26891) * [CVE-2024-26894](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26894) * [CVE-2024-26895](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26895) * [CVE-2024-26897](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26897) * [CVE-2024-26898](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26898) * [CVE-2024-26901](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26901) * [CVE-2024-26903](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26903) * [CVE-2024-26906](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26906) * [CVE-2024-26907](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26907) * [CVE-2024-26915](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26915) * [CVE-2024-26924](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26924) * [CVE-2024-27024](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27024) * [CVE-2024-27028](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27028) * [CVE-2024-27030](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27030) * [CVE-2024-27034](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27034) * [CVE-2024-27037](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27037) * [CVE-2024-27038](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27038) * [CVE-2024-27039](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27039) * [CVE-2024-27043](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27043) * [CVE-2024-27044](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27044) * [CVE-2024-27045](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27045) * [CVE-2024-27046](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27046) * [CVE-2024-27047](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27047) * [CVE-2024-27051](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27051) * [CVE-2024-27052](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27052) * [CVE-2024-27053](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27053) * [CVE-2024-27054](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27054) * [CVE-2024-27065](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27065) * [CVE-2024-27073](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27073) * [CVE-2024-27074](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27074) * [CVE-2024-27075](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27075) * [CVE-2024-27076](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27076) * [CVE-2024-27077](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27077) * [CVE-2024-27078](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27078) * [CVE-2024-27388](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27388) * [CVE-2024-27390](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27390) * [CVE-2024-27403](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27403) * [CVE-2024-27405](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27405) * [CVE-2024-27410](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27410) * [CVE-2024-27412](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27412) * [CVE-2024-27413](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27413) * [CVE-2024-27414](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27414) * [CVE-2024-27415](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27415) * [CVE-2024-27416](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27416) * [CVE-2024-27417](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27417) * [CVE-2024-27419](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27419) * [CVE-2024-27431](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27431) * [CVE-2024-27432](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27432) * [CVE-2024-27436](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27436) * [CVE-2024-35811](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35811) * [CVE-2024-35828](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35828) * [CVE-2024-35829](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35829) * [CVE-2024-35830](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35830) * [CVE-2024-35844](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35844) * [CVE-2024-35845](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35845) ## Announcement Google Distributed Cloud for VMware 1.16.10-gke.36 is now available for[download](https://cloud.google.com/kubernetes-engine/distributed-cloud/vmware/docs/downloads). To upgrade, see[Upgrade a cluster or a node pool](https://cloud.google.com/kubernetes-engine/distributed-cloud/vmware/docs/how-to/upgrading). Google Distributed Cloud 1.16.10-gke.36 runs on Kubernetes v1.27.14-gke.1600\. If you are using a third-party storage vendor, check the[GDCV Ready storage partners](https://cloud.google.com/kubernetes-engine/enterprise/docs/resources/partner-storage)document to make sure the storage vendor has already passed the qualification for this release. ## Fix The following vulnerabilities are fixed In 1.16.10-gke.36: * High-severity container vulnerabilities: * [CVE-2022-28948](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28948) * [CVE-2024-0985](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0985) * [CVE-2024-2961](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2961) * [CVE-2024-33599](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33599) * Container-optimized OS vulnerabilities: * [CVE-2021-3520](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3520) * [CVE-2024-6387](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6387) * [CVE-2024-27018](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27018) * [CVE-2024-32004](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-32004) * [CVE-2024-32465](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-32465)