Maintained with ☕️ by
IcePanel logo

Google Distributed Cloud for bare metal 1.30.400-gke.133 is now available for download

Share

Services

## Announcement ### Release 1.30.400-gke.133 Google Distributed Cloud for bare metal 1.30.400-gke.133 is now available for [download](https://cloud.google.com/kubernetes-engine/distributed-cloud/bare-metal/docs/downloads). To upgrade, see [Upgrade clusters](https://cloud.google.com/kubernetes-engine/distributed-cloud/bare-metal/docs/how-to/upgrade). Google Distributed Cloud for bare metal 1.30.400-gke.133 runs on Kubernetes 1.30. After a release, it takes approximately 7 to 14 days for the version to become available for installations or upgrades with the [GKE On-Prem API clients](https://cloud.google.com/kubernetes-engine/distributed-cloud/bare-metal/docs/installing/cluster-lifecycle-management-tools): the Google Cloud console, the gcloud CLI, and Terraform. If you use a third-party storage vendor, check the [Ready storage partners](https://cloud.google.com/anthos/docs/resources/partner-storage) document to make sure the storage vendor has already passed the qualification for this release of Google Distributed Cloud for bare metal. ## Change **Functionality changes:** * Updated snapshots to include new information, including: kubelet config, CPU manager state, and memory manager state. * Updated the `bmctl push images` command to check for the existence of an image digest to determine whether or not to push an image. * Added support for configuring the GKE Identity Service to enforce a minimum transport layer security (TLS) version of 1.2 for HTTPS connections. By default, the GKE Identity Service allows TLS 1.1 and higher connections. If you require enforcement for a minimum of TLS 1.2, reach out to [Cloud Customer Care](https://cloud.google.com/kubernetes-engine/distributed-cloud/bare-metal/docs/getting-support) for assistance. ## Fix **Fixes:** * Fixed the [issue](https://cloud.google.com/kubernetes-engine/distributed-cloud/bare-metal/docs/troubleshooting/known-issues#non-root-users-cant-run-bmctl-restore-to-restore-quorum) where non-root users can't run `bmctl restore` to restore quorum. * Fixed an issue where CronJob specs for periodic health checks weren't updated to reflect cluster annotation changes. * Fixed an [issue that blocked **user cluster** create and upgrade operations](https://cloud.google.com/kubernetes-engine/distributed-cloud/bare-metal/docs/troubleshooting/known-issues#user-cluster-creation-or-upgrade-operations-might-not-succeed) to patch versions 1.30.100, 1.30.200, or 1.30.300\. This issue applies only when `kubectl` or a GKE On-Prem API client (console, gcloud CLI, or Terraform) is used for user cluster creation and upgrades. ## Fix The following container image security vulnerabilities have been fixed in 1.30.400-gke.133: * Critical container vulnerabilities: * [CVE-2022-36227](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36227) * [CVE-2024-45491](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45491) * [CVE-2024-45492](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45492) * High-severity container vulnerabilities: * [CVE-2020-16156](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156) * [CVE-2021-33194](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33194) * [CVE-2022-1304](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1304) * [CVE-2022-27664](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27664) * [CVE-2022-41723](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41723) * [CVE-2022-48733](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48733) * [CVE-2023-3676](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3676) * [CVE-2023-3955](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3955) * [CVE-2023-5528](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5528) * [CVE-2023-7104](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7104) * [CVE-2023-39325](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39325) * [CVE-2023-49083](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-49083) * [CVE-2023-52425](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52425) * [CVE-2024-0743](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0743) * [CVE-2024-0793](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0793) * [CVE-2024-6609](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6609) * [CVE-2024-20696](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20696) * [CVE-2024-38577](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38577) * [CVE-2024-41011](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41011) * [CVE-2024-42228](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42228) * [CVE-2024-42280](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42280) * [CVE-2024-42284](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42284) * [CVE-2024-42285](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42285) * [CVE-2024-42301](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42301) * [CVE-2024-42302](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42302) * [CVE-2024-42313](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42313) * [CVE-2024-43839](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43839) * [CVE-2024-43858](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43858) * [CVE-2024-43882](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43882) * [CVE-2024-44974](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44974) * [CVE-2024-44987](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44987) * [CVE-2024-44998](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44998) * [CVE-2024-44999](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44999) * [CVE-2024-45490](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45490) * [CVE-2024-46673](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46673) * [CVE-2024-46674](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46674) * [CVE-2024-46722](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46722) * [CVE-2024-46723](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46723) * [CVE-2024-46724](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46724) * [CVE-2024-46725](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46725) * [CVE-2024-46731](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46731) * [CVE-2024-46738](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46738) * [CVE-2024-46740](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46740) * [CVE-2024-46743](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46743) * [CVE-2024-46744](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46744) * [CVE-2024-46747](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46747) * [CVE-2024-46756](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46756) * [CVE-2024-46757](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46757) * [CVE-2024-46758](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46758) * [CVE-2024-46759](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46759) * [CVE-2024-46782](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46782) * [CVE-2024-46798](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46798) * [CVE-2024-46800](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46800) * [CVE-2024-46804](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46804) * [CVE-2024-46814](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46814) * [CVE-2024-46815](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46815) * [CVE-2024-46818](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46818) * [CVE-2024-46828](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46828) * [CVE-2024-46844](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46844) * [GHSA-m425-mq94-257g](https://github.com/advisories/GHSA-m425-mq94-257g) * Medium-severity container vulnerabilities: * [CVE-2021-31525](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31525) * [CVE-2021-3669](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3669) * [CVE-2021-36976](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36976) * [CVE-2022-26280](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26280) * [CVE-2022-41717](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41717) * [CVE-2023-2431](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2431) * [CVE-2023-2727](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2727) * [CVE-2023-2728](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2728) * [CVE-2023-3978](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3978) * [CVE-2023-23931](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23931) * [CVE-2023-31083](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31083) * [CVE-2023-44487](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-44487) * [CVE-2023-52889](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52889) * [CVE-2024-24557](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24557) * [CVE-2024-29018](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-29018) * [CVE-2024-41098](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41098) * [CVE-2024-42114](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42114) * [CVE-2024-42246](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42246) * [CVE-2024-42259](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42259) * [CVE-2024-42272](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42272) * [CVE-2024-42283](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42283) * [CVE-2024-42286](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42286) * [CVE-2024-42287](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42287) * [CVE-2024-42288](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42288) * [CVE-2024-42289](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42289) * [CVE-2024-42297](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42297) * [CVE-2024-42309](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42309) * [CVE-2024-42310](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42310) * [CVE-2024-42311](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42311) * [CVE-2024-43828](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43828) * [CVE-2024-43829](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43829) * [CVE-2024-43834](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43834) * [CVE-2024-43835](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43835) * [CVE-2024-43846](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43846) * [CVE-2024-43849](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43849) * [CVE-2024-43853](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43853) * [CVE-2024-43854](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43854) * [CVE-2024-43856](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43856) * [CVE-2024-43860](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43860) * [CVE-2024-43861](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43861) * [CVE-2024-43871](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43871) * [CVE-2024-43884](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43884) * [CVE-2024-43889](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43889) * [CVE-2024-43890](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43890) * [CVE-2024-43892](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43892) * [CVE-2024-43893](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43893) * [CVE-2024-43894](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43894) * [CVE-2024-43905](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43905) * [CVE-2024-43907](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43907) * [CVE-2024-43908](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43908) * [CVE-2024-43914](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43914) * [CVE-2024-44935](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44935) * [CVE-2024-44944](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44944) * [CVE-2024-44946](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44946) * [CVE-2024-44947](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44947) * [CVE-2024-44954](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44954) * [CVE-2024-44960](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44960) * [CVE-2024-44965](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44965) * [CVE-2024-44968](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44968) * [CVE-2024-44971](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44971) * [CVE-2024-44988](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44988) * [CVE-2024-44989](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44989) * [CVE-2024-44990](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44990) * [CVE-2024-44995](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44995) * [CVE-2024-45003](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45003) * [CVE-2024-45006](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45006) * [CVE-2024-45016](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45016) * [CVE-2024-45018](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45018) * [CVE-2024-45021](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45021) * [CVE-2024-45025](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45025) * [CVE-2024-45028](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45028) * [CVE-2024-46675](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46675) * [CVE-2024-46676](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46676) * [CVE-2024-46677](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46677) * [CVE-2024-46679](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46679) * [CVE-2024-46685](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46685) * [CVE-2024-46689](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46689) * [CVE-2024-46702](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46702) * [CVE-2024-46707](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46707) * [CVE-2024-46714](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46714) * [CVE-2024-46719](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46719) * [CVE-2024-46721](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46721) * [CVE-2024-46737](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46737) * [CVE-2024-46739](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46739) * [CVE-2024-46750](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46750) * [CVE-2024-46755](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46755) * [CVE-2024-46763](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46763) * [CVE-2024-46771](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46771) * [CVE-2024-46777](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46777) * [CVE-2024-46780](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46780) * [CVE-2024-46781](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46781) * [CVE-2024-46783](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46783) * [CVE-2024-46791](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46791) * [CVE-2024-46817](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46817) * [CVE-2024-46819](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46819) * [CVE-2024-46822](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46822) * [CVE-2024-46829](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46829) * [CVE-2024-46840](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46840) * [CVE-2024-47663](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47663) * [GHSA-jq35-85cj-fj4p](https://github.com/advisories/GHSA-jq35-85cj-fj4p) * Low-severity container vulnerabilities: * [CVE-2024-3177](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3177) * [CVE-2021-36084](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36084) * [CVE-2021-36085](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36085) * [CVE-2021-36086](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36086) * [CVE-2021-36087](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36087) * [CVE-2021-36690](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36690) * [CVE-2024-43841](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43841) ## Issue **Known issues:** For information about the latest known issues, see [Google Distributed Cloud for bare metal known issues](https://cloud.google.com/kubernetes-engine/distributed-cloud/bare-metal/docs/troubleshooting/known-issues) in the Troubleshooting section.