TST Pages 01

You might also like

Download as pdf
Download as pdf
You are on page 1of 2
379723, 21100 Google Cloud release notes | Documentation Google Cloud release notes The following release notes cover the most recent changes over the last 60 days. For a comprehensive list of product-specific release notes, see the individual product release note pages (/release-notes/all) You can also see and filter all release notes in the Google Cloud console (https://console.cloud.google.com/release-notes) or you can programmatically access release notes in BigQuery (https://console.cloud.google.com/bigquery?p=bigquery-public- data&d=google_cloud_release_notes&t=release_notespage=table) To get the latest product updates delivered to you, add the URL of this page to your feed reader (https://wikipedia.org/wiki/Comparison_of_feed_aggregators), or add the feed URL directly: https: //cloud. google. com/feeds/gcp-release-notes. xml September 01, 2023 Anthos clusters on VMware Anthos clusters on VMware 1.15.4-gke.37 is now available. To upgrade, see Upgrading Anthos clusters on VMware (https://cloud.google.com/anthos/clusters/docs/on-prem/1.1§/how-to/upgrading). Anthos clusters on VMware 1.15.4-gke.37 runs on Kubernetes 1.26.7-gke.2500. The following issues are fixed in 1.15.4-gke.37: + Fixed a known issue (https://cloud.google.com/anthos/clusters/docs/on-prem/1.15/known- issues#seesaw-vm-broken-due-to-disk-space-low) where incorrect log rotation configuration for fluent-bit caused low disk space on the Seesaw VM. * Fixed a known issue (https://cloud. google. com/anthos/clusters/docs/on-prem/1.15/known- issues#garp-teply-sent-by-seesaw-doesnt-set-target-ip) that GARP reply sent by Seesaw doesn't set target IP. itpsicloud.google.comolease-notos +1389 379723, 21100 Google Cloud release notes | Documentation + Fixed an issue where /etc/vsphere/certificate/ca.crt wasnt updated after vsphere CA rotation on the Controlplane v2 user cluster control plane machines. + Fixed a known issue (https://cloud,google.com/anthos/clusters/docs/on-prem/1.15/known- issuesttadmin-ssh-public-key-error-after-admin-cluster-upgrade-or-update) where the admin SSH public key has error after admin cluster upgrade or update. The following vulnerabilities are fixed in 1.15.4-gke.37: + High-severity container vulnerabilities: + CVE-2022-32190 (https://eve.mitre.org/egtbin/evename.cgi?name=CVE-2022-32190) + CVE-2023-29002 (https://cve.mitre.org/egtbin/cvename.cgi?name=CVE-2023-29002) + CVE-2023-38403 (https://eve.mitre.org/egtbin/cvename.cgi?name=CVE-2023-38403) + Container-Optimized OS vulnerabilities: + CVE-2015-8863 (https://eve.mitre.org/egtbin/evename.cgi?name=CVE-2015-8863) CVE-2016-4074 (https://eve.mitre.org/egtbin/evename.cgi?name=CVE-2016-4074) CVE-2018-14647 (https://cve.mitre.org/egtbin/cvename.cgi?name=CVE-2018-14647) CVE-2018-1000802 (https://cve.mitre.org/egt-bin/evename.cgi?name=CVE-2018-1000802) * CVE-2022-28737 (https://eve.mitre.org/egtbin/evename.cgi?name=CVE-2022-28737) CVE-2023-3611 (httpsi//cve.mitre.org/egi-bin/cvename.cgi?name=CVE-2023-3611) hitps cloud google comelease-notes 21349

You might also like