379723, 21100 Google Cloud release notes | Documentation
Google Cloud release notes
The following release notes cover the most recent changes over the last 60 days. For a
comprehensive list of product-specific release notes, see the individual product release note
pages (/release-notes/all)
You can also see and filter all release notes in the Google Cloud console
(https://console.cloud.google.com/release-notes) or you can programmatically access release
notes in BigQuery
(https://console.cloud.google.com/bigquery?p=bigquery-public-
data&d=google_cloud_release_notes&t=release_notespage=table)
To get the latest product updates delivered to you, add the URL of this page to your feed reader
(https://wikipedia.org/wiki/Comparison_of_feed_aggregators), or add the feed URL directly:
https: //cloud. google. com/feeds/gcp-release-notes. xml
September 01, 2023
Anthos clusters on VMware
Anthos clusters on VMware 1.15.4-gke.37 is now available. To upgrade, see
Upgrading Anthos clusters on VMware
(https://cloud.google.com/anthos/clusters/docs/on-prem/1.1§/how-to/upgrading).
Anthos clusters on VMware 1.15.4-gke.37 runs on Kubernetes 1.26.7-gke.2500.
The following issues are fixed in 1.15.4-gke.37:
+ Fixed a known issue
(https://cloud.google.com/anthos/clusters/docs/on-prem/1.15/known-
issues#seesaw-vm-broken-due-to-disk-space-low)
where incorrect log rotation configuration for fluent-bit caused low disk
space on the Seesaw VM.
* Fixed a known issue
(https://cloud. google. com/anthos/clusters/docs/on-prem/1.15/known-
issues#garp-teply-sent-by-seesaw-doesnt-set-target-ip)
that GARP reply sent by Seesaw doesn't set target IP.
itpsicloud.google.comolease-notos +1389379723, 21100 Google Cloud release notes | Documentation
+ Fixed an issue where /etc/vsphere/certificate/ca.crt wasnt
updated after vsphere CA rotation on the Controlplane v2 user cluster
control plane machines.
+ Fixed a known issue
(https://cloud,google.com/anthos/clusters/docs/on-prem/1.15/known-
issuesttadmin-ssh-public-key-error-after-admin-cluster-upgrade-or-update)
where the admin SSH public key has error after admin cluster upgrade or
update.
The following vulnerabilities are fixed in 1.15.4-gke.37:
+ High-severity container vulnerabilities:
+ CVE-2022-32190
(https://eve.mitre.org/egtbin/evename.cgi?name=CVE-2022-32190)
+ CVE-2023-29002
(https://cve.mitre.org/egtbin/cvename.cgi?name=CVE-2023-29002)
+ CVE-2023-38403
(https://eve.mitre.org/egtbin/cvename.cgi?name=CVE-2023-38403)
+ Container-Optimized OS vulnerabilities:
+ CVE-2015-8863
(https://eve.mitre.org/egtbin/evename.cgi?name=CVE-2015-8863)
CVE-2016-4074
(https://eve.mitre.org/egtbin/evename.cgi?name=CVE-2016-4074)
CVE-2018-14647
(https://cve.mitre.org/egtbin/cvename.cgi?name=CVE-2018-14647)
CVE-2018-1000802
(https://cve.mitre.org/egt-bin/evename.cgi?name=CVE-2018-1000802)
* CVE-2022-28737
(https://eve.mitre.org/egtbin/evename.cgi?name=CVE-2022-28737)
CVE-2023-3611
(httpsi//cve.mitre.org/egi-bin/cvename.cgi?name=CVE-2023-3611)
hitps cloud google comelease-notes 21349