Maintained with ☕️ by
IcePanel logo

Google Distributed Cloud (software only) for VMware 1.30.300-gke.84 is now available for download

Share

Services

## Announcement Google Distributed Cloud (software only) for VMware 1.30.300-gke.84 is now available for [download](https://cloud.google.com/anthos/clusters/docs/on-prem/latest/downloads). To upgrade, see [Upgrade a cluster or a node pool](https://cloud.google.com/anthos/clusters/docs/on-prem/latest/how-to/upgrading). Google Distributed Cloud 1.30.300-gke.84 runs on Kubernetes v1.30.5-gke.600. If you are using a third-party storage vendor, check the [GDCV Ready storage partners](https://cloud.google.com/anthos/docs/resources/partner-storage) document to make sure the storage vendor has already passed the qualification for this release. After a release, it takes approximately 7 to 14 days for the version to become available for use with [GKE On-Prem API clients](https://cloud.google.com/kubernetes-engine/distributed-cloud/vmware/docs/how-to/cluster-lifecycle-management-tools): the Google Cloud console, the gcloud CLI, and Terraform. ## Fix The following issues are fixed in 1.30.300-gke.84: * Fixed the issue that additional manual steps are needed after disabling always-on secrets encryption with `gkectl update cluster`. * Fixed the [known issue](https://cloud.google.com/kubernetes-engine/distributed-cloud/vmware/docs/troubleshooting/known-issues#gkectl-displays-false-warnings-on-version-skew) that caused `gkectl` to display false warnings on admin cluster version skew. The following vulnerabilities are fixed in 1.30.300-gke.84: High-severity container vulnerabilities: * [CVE-2024-6345](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6345) * [CVE-2024-0567](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0567) * [CVE-2020-22218](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22218) Container-optimized OS vulnerabilities: * [CVE-2024-46738](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46738) * [CVE-2024-46744](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46744) * [CVE-2024-46800](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46800) * [CVE-2024-46743](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46743) * [CVE-2024-44940](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44940)