Envie comentários
Notas da versão 1.14.7 do Google Distributed Cloud com isolamento físico
Mantenha tudo organizado com as coleções
Salve e categorize o conteúdo com base nas suas preferências.
22 de agosto de 2025
O Google Distributed Cloud (GDC) com isolamento físico 1.14.7 está disponível.
Consulte a
visão geral do produto para saber mais sobre os
recursos do Distributed Cloud.
Atualizamos a versão da imagem do Rocky OS para 20250710 para aplicar os patches de segurança e as atualizações importantes mais recentes.
As seguintes vulnerabilidades de segurança foram corrigidas:
Os seguintes problemas foram corrigidos:
Multilocação :
O console do GDC não indica falhas na criação de pool de nós
Fazer upgrade
O upgrade do nó de administrador da organização está travado.
O upgrade do complemento está travado.
O relatório de suporte falha.
Envie comentários
Exceto em caso de indicação contrária, o conteúdo desta página é licenciado de acordo com a Licença de atribuição 4.0 do Creative Commons , e as amostras de código são licenciadas de acordo com a Licença Apache 2.0 . Para mais detalhes, consulte as políticas do site do Google Developers . Java é uma marca registrada da Oracle e/ou afiliadas.
Última atualização 2025-09-04 UTC.
Quer enviar seu feedback?
[[["Fácil de entender","easyToUnderstand","thumb-up"],["Meu problema foi resolvido","solvedMyProblem","thumb-up"],["Outro","otherUp","thumb-up"]],[["Difícil de entender","hardToUnderstand","thumb-down"],["Informações incorretas ou exemplo de código","incorrectInformationOrSampleCode","thumb-down"],["Não contém as informações/amostras de que eu preciso","missingTheInformationSamplesINeed","thumb-down"],["Problema na tradução","translationIssue","thumb-down"],["Outro","otherDown","thumb-down"]],["Última atualização 2025-09-04 UTC."],[],[],null,["# Google Distributed Cloud air-gapped 1.14.7 release notes\n\n\u003cbr /\u003e\n\nAugust 22, 2025\n---------------\n\n*** ** * ** ***\n\nGoogle Distributed Cloud (GDC) air-gapped 1.14.7 is available. \nSee the [product overview](/distributed-cloud/hosted/docs/latest/gdch/overview) to learn about the features of Distributed Cloud.\n\n*** ** * ** ***\n\nUpdated the Rocky OS image version to 20250710 to apply the latest security patches and important updates.\n\nThe following security vulnerabilities are fixed:\n\n- [CVE-2019-15505](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15505)\n- [CVE-2020-36558](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36558)\n- [CVE-2021-4204](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4204)\n- [CVE-2021-33631](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33631)\n- [CVE-2021-47461](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47461)\n- [CVE-2022-0500](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0500)\n- [CVE-2022-1158](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1158)\n- [CVE-2022-2503](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2503)\n- [CVE-2022-2639](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2639)\n- [CVE-2022-2873](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2873)\n- [CVE-2022-2964](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2964)\n- [CVE-2022-3564](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3564)\n- [CVE-2022-3565](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3565)\n- [CVE-2022-4269](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4269)\n- [CVE-2022-4378](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4378)\n- [CVE-2022-4744](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4744)\n- [CVE-2022-23222](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23222)\n- [CVE-2022-36879](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36879)\n- [CVE-2022-39188](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39188)\n- [CVE-2022-41222](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41222)\n- [CVE-2022-42896](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42896)\n- [CVE-2022-45884](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45884)\n- [CVE-2022-45886](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45886)\n- [CVE-2022-45919](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45919)\n- [CVE-2022-48929](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48929)\n- [CVE-2022-49669](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49669)\n- [CVE-2022-49803](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49803)\n- [CVE-2022-49846](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49846)\n- [CVE-2022-49907](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49907)\n- [CVE-2022-49910](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49910)\n- [CVE-2022-49921](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49921)\n- [CVE-2022-50066](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50066)\n- [CVE-2023-0266](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0266)\n- [CVE-2023-0461](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0461)\n- [CVE-2023-0590](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0590)\n- [CVE-2023-1095](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1095)\n- [CVE-2023-1206](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1206)\n- [CVE-2023-3390](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3390)\n- [CVE-2023-3567](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3567)\n- [CVE-2023-3611](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3611)\n- [CVE-2023-4244](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4244)\n- [CVE-2023-4623](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4623)\n- [CVE-2023-4921](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4921)\n- [CVE-2023-6546](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6546)\n- [CVE-2023-6622](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6622)\n- [CVE-2023-6817](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6817)\n- [CVE-2023-6931](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6931)\n- [CVE-2023-6932](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6932)\n- [CVE-2023-28464](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28464)\n- [CVE-2023-31436](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31436)\n- [CVE-2023-32233](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32233)\n- [CVE-2023-39198](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39198)\n- [CVE-2023-42753](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42753)\n- [CVE-2023-51042](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51042)\n- [CVE-2023-51779](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51779)\n- [CVE-2023-51780](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51780)\n- [CVE-2023-52581](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52581)\n- [CVE-2023-52707](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52707)\n- [CVE-2023-52922](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52922)\n- [CVE-2024-0562](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0562)\n- [CVE-2024-0565](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0565)\n- [CVE-2024-0646](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0646)\n- [CVE-2024-1086](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1086)\n- [CVE-2024-21785](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21785)\n- [CVE-2024-25742](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-25742)\n- [CVE-2024-26642](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26642)\n- [CVE-2024-26643](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26643)\n- [CVE-2024-26669](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26669)\n- [CVE-2024-26852](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26852)\n- [CVE-2024-26925](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26925)\n- [CVE-2024-27019](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27019)\n- [CVE-2024-27020](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27020)\n- [CVE-2024-27065](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27065)\n- [CVE-2024-27397](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27397)\n- [CVE-2024-35897](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35897)\n- [CVE-2024-35899](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35899)\n- [CVE-2024-35900](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35900)\n- [CVE-2024-36005](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36005)\n- [CVE-2024-36886](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36886)\n- [CVE-2024-36904](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36904)\n- [CVE-2024-36960](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36960)\n- [CVE-2024-36971](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36971)\n- [CVE-2024-39502](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39502)\n- [CVE-2024-41090](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41090)\n- [CVE-2024-41091](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41091)\n- [CVE-2024-53104](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53104)\n- [CVE-2024-53141](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53141)\n- [CVE-2024-53150](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53150)\n- [CVE-2024-56642](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56642)\n- [CVE-2025-6020](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-6020)\n- [CVE-2025-21756](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21756)\n- [CVE-2025-21785](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21785)\n- [CVE-2025-21927](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21927)\n- [CVE-2025-38061](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38061)\n\n*** ** * ** ***\n\nThe following issues are fixed:\n\n**Multi-tenancy**:\n\n- GDC console does not indicate node pool creation failures\n\n**Upgrade**\n\n- The org admin node upgrade is stuck.\n\n- The add-on upgrade is stuck.\n\n- The support report fails."]]