Catatan rilis Google Distributed Cloud dengan air gap 1.14.7
Tetap teratur dengan koleksi
Simpan dan kategorikan konten berdasarkan preferensi Anda.
22 Agustus 2025
Google Distributed Cloud (GDC) dengan air gap 1.14.7 sudah tersedia.
Lihat
ringkasan produk untuk mempelajari fitur Distributed Cloud.
Memperbarui versi image Rocky OS ke 20250710 untuk menerapkan patch keamanan dan update penting terbaru.
Kerentanan keamanan berikut telah diperbaiki:
Masalah berikut telah diperbaiki:
Multi-tenancy:
- Konsol GDC tidak menunjukkan kegagalan pembuatan node pool
Upgrade
Kecuali dinyatakan lain, konten di halaman ini dilisensikan berdasarkan Lisensi Creative Commons Attribution 4.0, sedangkan contoh kode dilisensikan berdasarkan Lisensi Apache 2.0. Untuk mengetahui informasi selengkapnya, lihat Kebijakan Situs Google Developers. Java adalah merek dagang terdaftar dari Oracle dan/atau afiliasinya.
Terakhir diperbarui pada 2025-09-04 UTC.
[[["Mudah dipahami","easyToUnderstand","thumb-up"],["Memecahkan masalah saya","solvedMyProblem","thumb-up"],["Lainnya","otherUp","thumb-up"]],[["Sulit dipahami","hardToUnderstand","thumb-down"],["Informasi atau kode contoh salah","incorrectInformationOrSampleCode","thumb-down"],["Informasi/contoh yang saya butuhkan tidak ada","missingTheInformationSamplesINeed","thumb-down"],["Masalah terjemahan","translationIssue","thumb-down"],["Lainnya","otherDown","thumb-down"]],["Terakhir diperbarui pada 2025-09-04 UTC."],[],[],null,["# Google Distributed Cloud air-gapped 1.14.7 release notes\n\n\u003cbr /\u003e\n\nAugust 22, 2025\n---------------\n\n*** ** * ** ***\n\nGoogle Distributed Cloud (GDC) air-gapped 1.14.7 is available. \nSee the [product overview](/distributed-cloud/hosted/docs/latest/gdch/overview) to learn about the features of Distributed Cloud.\n\n*** ** * ** ***\n\nUpdated the Rocky OS image version to 20250710 to apply the latest security patches and important updates.\n\nThe following security vulnerabilities are fixed:\n\n- [CVE-2019-15505](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15505)\n- [CVE-2020-36558](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36558)\n- [CVE-2021-4204](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4204)\n- [CVE-2021-33631](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33631)\n- [CVE-2021-47461](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47461)\n- [CVE-2022-0500](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0500)\n- [CVE-2022-1158](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1158)\n- [CVE-2022-2503](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2503)\n- [CVE-2022-2639](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2639)\n- [CVE-2022-2873](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2873)\n- [CVE-2022-2964](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2964)\n- [CVE-2022-3564](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3564)\n- [CVE-2022-3565](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3565)\n- [CVE-2022-4269](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4269)\n- [CVE-2022-4378](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4378)\n- [CVE-2022-4744](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4744)\n- [CVE-2022-23222](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23222)\n- [CVE-2022-36879](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36879)\n- [CVE-2022-39188](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39188)\n- [CVE-2022-41222](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41222)\n- [CVE-2022-42896](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42896)\n- [CVE-2022-45884](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45884)\n- [CVE-2022-45886](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45886)\n- [CVE-2022-45919](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45919)\n- [CVE-2022-48929](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48929)\n- [CVE-2022-49669](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49669)\n- [CVE-2022-49803](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49803)\n- [CVE-2022-49846](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49846)\n- [CVE-2022-49907](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49907)\n- [CVE-2022-49910](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49910)\n- [CVE-2022-49921](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49921)\n- [CVE-2022-50066](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50066)\n- [CVE-2023-0266](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0266)\n- [CVE-2023-0461](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0461)\n- [CVE-2023-0590](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0590)\n- [CVE-2023-1095](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1095)\n- [CVE-2023-1206](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1206)\n- [CVE-2023-3390](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3390)\n- [CVE-2023-3567](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3567)\n- [CVE-2023-3611](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3611)\n- [CVE-2023-4244](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4244)\n- [CVE-2023-4623](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4623)\n- [CVE-2023-4921](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4921)\n- [CVE-2023-6546](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6546)\n- [CVE-2023-6622](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6622)\n- [CVE-2023-6817](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6817)\n- [CVE-2023-6931](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6931)\n- [CVE-2023-6932](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6932)\n- [CVE-2023-28464](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28464)\n- [CVE-2023-31436](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31436)\n- [CVE-2023-32233](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32233)\n- [CVE-2023-39198](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39198)\n- [CVE-2023-42753](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42753)\n- [CVE-2023-51042](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51042)\n- [CVE-2023-51779](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51779)\n- [CVE-2023-51780](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51780)\n- [CVE-2023-52581](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52581)\n- [CVE-2023-52707](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52707)\n- [CVE-2023-52922](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52922)\n- [CVE-2024-0562](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0562)\n- [CVE-2024-0565](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0565)\n- [CVE-2024-0646](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0646)\n- [CVE-2024-1086](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1086)\n- [CVE-2024-21785](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21785)\n- [CVE-2024-25742](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-25742)\n- [CVE-2024-26642](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26642)\n- [CVE-2024-26643](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26643)\n- [CVE-2024-26669](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26669)\n- [CVE-2024-26852](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26852)\n- [CVE-2024-26925](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26925)\n- [CVE-2024-27019](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27019)\n- [CVE-2024-27020](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27020)\n- [CVE-2024-27065](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27065)\n- [CVE-2024-27397](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27397)\n- [CVE-2024-35897](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35897)\n- [CVE-2024-35899](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35899)\n- [CVE-2024-35900](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35900)\n- [CVE-2024-36005](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36005)\n- [CVE-2024-36886](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36886)\n- [CVE-2024-36904](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36904)\n- [CVE-2024-36960](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36960)\n- [CVE-2024-36971](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36971)\n- [CVE-2024-39502](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39502)\n- [CVE-2024-41090](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41090)\n- [CVE-2024-41091](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41091)\n- [CVE-2024-53104](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53104)\n- [CVE-2024-53141](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53141)\n- [CVE-2024-53150](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53150)\n- [CVE-2024-56642](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56642)\n- [CVE-2025-6020](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-6020)\n- [CVE-2025-21756](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21756)\n- [CVE-2025-21785](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21785)\n- [CVE-2025-21927](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21927)\n- [CVE-2025-38061](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38061)\n\n*** ** * ** ***\n\nThe following issues are fixed:\n\n**Multi-tenancy**:\n\n- GDC console does not indicate node pool creation failures\n\n**Upgrade**\n\n- The org admin node upgrade is stuck.\n\n- The add-on upgrade is stuck.\n\n- The support report fails."]]