[[["Easy to understand","easyToUnderstand","thumb-up"],["Solved my problem","solvedMyProblem","thumb-up"],["Other","otherUp","thumb-up"]],[["Hard to understand","hardToUnderstand","thumb-down"],["Incorrect information or sample code","incorrectInformationOrSampleCode","thumb-down"],["Missing the information/samples I need","missingTheInformationSamplesINeed","thumb-down"],["Other","otherDown","thumb-down"]],["Last updated 2025-08-25 UTC."],[[["\u003cp\u003eGoogle Distributed Cloud (GDC) air-gapped 1.13.7 is now available, offering new features as detailed in the product overview.\u003c/p\u003e\n"],["\u003cp\u003eThe Ubuntu OS image has been updated to version 20241128, addressing multiple security vulnerabilities, including CVE-2021-47212 through CVE-2024-52533.\u003c/p\u003e\n"],["\u003cp\u003eThe Rocky OS image is updated to version 20241120, fixing security issues ranging from CVE-2007-4559 to CVE-2024-24806.\u003c/p\u003e\n"],["\u003cp\u003eSeveral issues are identified within logging, marketplace, networking, upgrade, and Vertex AI components, some including errors, failures, missing data, or unavailability.\u003c/p\u003e\n"],["\u003cp\u003eGoogle Distributed Cloud for bare metal version has been updated to 1.29.900-gke.180 to improve security and provide new updates.\u003c/p\u003e\n"]]],[],null,["# Google Distributed Cloud air-gapped 1.13.7 release notes\n\n\u003cbr /\u003e\n\nJanuary 16, 2025\n----------------\n\n*** ** * ** ***\n\nGoogle Distributed Cloud (GDC) air-gapped 1.13.7 is available. \nSee the [product overview](/distributed-cloud/hosted/docs/latest/gdch/overview) to learn about the features of Distributed Cloud.\n\n*** ** * ** ***\n\nUpdated the Ubuntu OS image version to 20241128 to apply the latest security patches and important updates.\n\n\u003cbr /\u003e\n\nThe following security vulnerabilities are fixed:\n\n- [CVE-2021-47212](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47212)\n- [CVE-2022-36402](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36402)\n- [CVE-2023-3019](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3019)\n- [CVE-2023-52531](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52531)\n- [CVE-2023-52614](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52614)\n- [CVE-2024-9287](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9287)\n- [CVE-2024-10573](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10573)\n- [CVE-2024-26607](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26607)\n- [CVE-2024-26640](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26640)\n- [CVE-2024-26641](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26641)\n- [CVE-2024-26668](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26668)\n- [CVE-2024-26669](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26669)\n- [CVE-2024-26800](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26800)\n- [CVE-2024-26885](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26885)\n- [CVE-2024-26891](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26891)\n- [CVE-2024-26960](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26960)\n- [CVE-2024-27051](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27051)\n- [CVE-2024-27397](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27397)\n- [CVE-2024-35848](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35848)\n- [CVE-2024-37891](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37891)\n- [CVE-2024-38602](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38602)\n- [CVE-2024-38611](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38611)\n- [CVE-2024-38630](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38630)\n- [CVE-2024-40929](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40929)\n- [CVE-2024-41071](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41071)\n- [CVE-2024-41073](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41073)\n- [CVE-2024-42229](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42229)\n- [CVE-2024-42244](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42244)\n- [CVE-2024-45016](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45016)\n- [CVE-2024-47814](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47814)\n- [CVE-2024-52530](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-52530)\n- [CVE-2024-52531](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-52531)\n- [CVE-2024-52532](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-52532)\n- [CVE-2024-52533](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-52533)\n\n*** ** * ** ***\n\nUpdated the Rocky OS image version to 20241120 to apply the latest security patches and important updates.\n\n\u003cbr /\u003e\n\nTo take advantage of the bug and security vulnerability fixes, you must upgrade all nodes with each release.\n\nThe following security vulnerabilities are fixed:\n\n- [CVE-2007-4559](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4559)\n- [CVE-2020-10735](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10735)\n- [CVE-2021-28861](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28861)\n- [CVE-2022-44638](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-44638)\n- [CVE-2022-45061](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45061)\n- [CVE-2023-24329](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-24329)\n- [CVE-2023-27043](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27043)\n- [CVE-2023-29491](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29491)\n- [CVE-2023-40217](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40217)\n- [CVE-2024-3596](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3596)\n- [CVE-2024-4032](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4032)\n- [CVE-2024-6232](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6232)\n- [CVE-2024-6923](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6923)\n- [CVE-2024-24806](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24806)\n\n*** ** * ** ***\n\nThe following issues are identified:\n\n**Logging:**\n\n- The HaaS Logger shows errors in the root admin cluster.\n- The santricity logger fails.\n- The `LoggingTarget` logs are sent to an incorrect project.\n\n**Marketplace:**\n\n- The Prisma Cloud image pull fails.\n\n**Networking:**\n\n- The Upper Networking control plane dashboard shows no data due to missing metrics.\n\n**Upgrade:**\n\n- The `uporc-root-backend-controller` deployment under the namespace `uporc-system` crash loops in the KIND cluster.\n\n**Vertex AI:**\n\n- The Vertex AI pre-trained services are unavailable.\n\n*** ** * ** ***\n\nThe following changes are identified:\n\n**Version updates**:\n\n- The Google Distributed Cloud for bare metal version is updated to 1.29.900-gke.180 to apply the latest security patches and important updates. \n\n See the [Google Distributed Cloud for bare metal 1.29.900-gke.180 release notes](https://cloud.google.com/kubernetes-engine/distributed-cloud/bare-metal/docs/release-notes-ver-2#release_129900-gke180) for details."]]