[[["Easy to understand","easyToUnderstand","thumb-up"],["Solved my problem","solvedMyProblem","thumb-up"],["Other","otherUp","thumb-up"]],[["Hard to understand","hardToUnderstand","thumb-down"],["Incorrect information or sample code","incorrectInformationOrSampleCode","thumb-down"],["Missing the information/samples I need","missingTheInformationSamplesINeed","thumb-down"],["Other","otherDown","thumb-down"]],["Last updated 2025-08-25 UTC."],[[["\u003cp\u003eGoogle Distributed Cloud (GDC) air-gapped 1.13.6 is now available, offering new features as detailed in the product overview.\u003c/p\u003e\n"],["\u003cp\u003eThe Ubuntu OS image has been updated to version 20241021, incorporating the latest security patches and crucial updates.\u003c/p\u003e\n"],["\u003cp\u003eThe Rocky OS image has been updated to version 20241023, ensuring the latest security patches and important updates are applied.\u003c/p\u003e\n"],["\u003cp\u003eVersion 1.29.800-gke.111 of Google Distributed Cloud for bare metal is released, including the most recent security patches and significant updates.\u003c/p\u003e\n"],["\u003cp\u003eSeveral identified issues, including problems with Harbor service, node upgrades, and virtual machine scheduling, are present, while fixes have been implemented for cluster mesh and NodeUpgradeTask issues.\u003c/p\u003e\n"]]],[],null,["# Google Distributed Cloud air-gapped 1.13.6 release notes\n\n\u003cbr /\u003e\n\nDecember 13, 2024\n-----------------\n\n*** ** * ** ***\n\nGoogle Distributed Cloud (GDC) air-gapped 1.13.6 is available. \nSee the [product overview](/distributed-cloud/hosted/docs/latest/gdch/overview) to learn about the features of Distributed Cloud.\n\n*** ** * ** ***\n\nUpdated the Ubuntu OS image version to 20241021 to apply the latest security patches and important updates.\n\n\u003cbr /\u003e\n\nTo take advantage of the bug and security vulnerability fixes, you must upgrade all nodes with each release.\n\nThe following security vulnerabilities are fixed:\n\n- [CVE-2019-15505](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15505)\n- [CVE-2021-33631](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33631)\n- [CVE-2022-36763](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36763)\n- [CVE-2022-36764](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36764)\n- [CVE-2023-0361](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0361)\n- [CVE-2023-3390](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3390)\n- [CVE-2023-3446](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3446)\n- [CVE-2023-3567](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3567)\n- [CVE-2023-5981](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5981)\n- [CVE-2023-6546](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6546)\n- [CVE-2023-6931](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6931)\n- [CVE-2023-6932](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6932)\n- [CVE-2023-28464](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28464)\n- [CVE-2023-32233](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32233)\n- [CVE-2023-39198](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39198)\n- [CVE-2023-45229](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45229)\n- [CVE-2023-45231](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45231)\n- [CVE-2023-45232](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45232)\n- [CVE-2023-45233](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45233)\n- [CVE-2023-45235](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45235)\n- [CVE-2023-51042](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51042)\n- [CVE-2023-51779](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51779)\n- [CVE-2023-51780](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51780)\n- [CVE-2023-52707](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52707)\n- [CVE-2024-0553](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0553)\n- [CVE-2024-0565](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0565)\n- [CVE-2024-1086](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1086)\n- [CVE-2024-25742](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-25742)\n- [CVE-2024-26669](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26669)\n- [CVE-2024-26852](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26852)\n- [CVE-2024-28834](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-28834)\n- [CVE-2024-36886](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36886)\n- [CVE-2024-36904](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36904)\n- [CVE-2024-36960](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36960)\n- [CVE-2024-36971](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36971)\n- [CVE-2024-42472](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42472)\n- [CVE-2024-45490](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45490)\n- [CVE-2024-45491](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45491)\n- [CVE-2024-45492](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45492)\n\n*** ** * ** ***\n\nUpdated the Rocky OS image version to 20241023 to apply the latest security patches and important updates.\n\n\u003cbr /\u003e\n\nTo take advantage of the bug and security vulnerability fixes, you must upgrade all nodes with each release.\n\nThe following security vulnerabilities are fixed:\n\n- [CVE-2019-15505](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15505)\n- [CVE-2021-33631](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33631)\n- [CVE-2022-36763](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36763)\n- [CVE-2022-36764](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36764)\n- [CVE-2023-0361](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0361)\n- [CVE-2023-3390](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3390)\n- [CVE-2023-3446](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3446)\n- [CVE-2023-3567](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3567)\n- [CVE-2023-5981](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5981)\n- [CVE-2023-6546](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6546)\n- [CVE-2023-6931](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6931)\n- [CVE-2023-6932](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6932)\n- [CVE-2023-28464](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28464)\n- [CVE-2023-32233](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32233)\n- [CVE-2023-39198](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39198)\n- [CVE-2023-45229](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45229)\n- [CVE-2023-45231](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45231)\n- [CVE-2023-45232](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45232)\n- [CVE-2023-45233](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45233)\n- [CVE-2023-45235](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45235)\n- [CVE-2023-51042](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51042)\n- [CVE-2023-51779](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51779)\n- [CVE-2023-51780](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51780)\n- [CVE-2023-51779](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51779)\n- [CVE-2023-52707](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52707)\n- [CVE-2024-0565](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0565)\n- [CVE-2024-1086](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1086)\n- [CVE-2024-25742](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-25742)\n- [CVE-2024-26669](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26669)\n- [CVE-2024-26852](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26852)\n- [CVE-2024-28834](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-28834)\n- [CVE-2024-36886](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36886)\n- [CVE-2024-36904](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36904)\n- [CVE-2024-36960](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36960)\n- [CVE-2024-36971](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36971)\n- [CVE-2024-42472](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42472)\n- [CVE-2024-45490](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45490)\n- [CVE-2024-45491](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45491)\n- [CVE-2024-45492](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45492)\n\n*** ** * ** ***\n\nThe following issues are identified:\n\n**Harbor service**:\n\n- Creating a Harbor instance fails due to a namespace mismatch.\n\n**Upgrade**:\n\n- The node upgrade fails at `NodeOSInPlaceUpgradeCompleted`.\n\n**Virtual machines**:\n\n- The shared-service cluster worker VM can't be scheduled.\n\n*** ** * ** ***\n\nThe following issues are fixed:\n\n**Networking**:\n\n- Fixed the issue with the cluster mesh not being configured with zonal\n information, which impacts internal load balancer connectivity.\n\n- Fixed the issue with the `NodeUpgradeTask` custom resource being stuck at the\n `NodeBIOSFirmwareUpgradeCompleted` condition.\n\n*** ** * ** ***\n\nThe following changes are identified:\n\n**Version updates**:\n\n- The Google Distributed Cloud for bare metal version is updated to 1.29.800-gke.111 to apply the latest security patches and important updates. \n\n See the [Google Distributed Cloud for bare metal 1.29.800-gke.111 release notes](https://cloud.google.com/kubernetes-engine/distributed-cloud/bare-metal/docs/release-notes-ver-1#release_129800-gke111) for details."]]