Google Distributed Cloud air-gapped 1.9.6 release notes
Stay organized with collections
Save and categorize content based on your preferences.
October 4, 2023 [GDC 1.9.6]
Google Distributed Cloud air-gapped 1.9.6 is now released.
See the product overview to learn about the features of Google Distributed Cloud air-gapped.
In the Google Distributed Cloud air-gapped 1.9.6 Addon Manager (ADD)
component, the Google Distributed Cloud version is updated to
1.14.8 to apply the latest security patches and important updates.
Updated Canonical Ubuntu OS image version to 20230815 to apply the latest
security patches and important updates. The following security vulnerabilities are fixed:
Google Distributed Cloud air-gapped 1.9.6 has a known issue where role-based access control (RBAC) and schema settings in the VM manager is stopping users from starting VM backup and restore processes.
Google Distributed Cloud air-gapped 1.9.6 has a known
issue where the kube-state-metrics deployment crash loops.
Google Distributed Cloud air-gapped 1.9.6 has a known issue where a worker node is unbalanced after upgrade.
Google Distributed Cloud air-gapped 1.9.6 has a known
issue with the upgrade where the GPU device plugin does not start.
Google Distributed Cloud air-gapped 1.9.6 has a known issue where a user cluster with three n2-standard-4 worker nodes has insufficient CPU resources for upgrade.
Google Distributed Cloud air-gapped 1.9.6 has a known
issue where upgrade is stuck while terminating a pod.
Google Distributed Cloud air-gapped 1.9.6 has a known issue where a user cluster does not become ready in time to restart the coredns deployment.
An issue with a Heap buffer overflow in WebP in Google Chrome prior to
116.0.5845.187 is fixed. This issue allowed a remote attacker to perform
an out of bounds memory write by using a crafted HTML page (Chromium security severity: Critical). This issue usually affects anything that uses frameworks, code libraries, and OSes that incorporate Electron, another code library that uses libwebp, or has libwebp built-in directly.
[[["Easy to understand","easyToUnderstand","thumb-up"],["Solved my problem","solvedMyProblem","thumb-up"],["Other","otherUp","thumb-up"]],[["Hard to understand","hardToUnderstand","thumb-down"],["Incorrect information or sample code","incorrectInformationOrSampleCode","thumb-down"],["Missing the information/samples I need","missingTheInformationSamplesINeed","thumb-down"],["Other","otherDown","thumb-down"]],["Last updated 2025-08-25 UTC."],[[["\u003cp\u003eGoogle Distributed Cloud air-gapped 1.9.6 is now available, bringing the latest security patches and updates.\u003c/p\u003e\n"],["\u003cp\u003eThe Google Distributed Cloud version in the Addon Manager component has been updated to 1.14.8 to enhance security and stability.\u003c/p\u003e\n"],["\u003cp\u003eThe Canonical Ubuntu OS image has been updated to version 20230815, fixing a large number of security vulnerabilities, and improving the system's security.\u003c/p\u003e\n"],["\u003cp\u003eSeveral known issues exist in this release, including problems with VM manager RBAC, the \u003ccode\u003ekube-state-metrics\u003c/code\u003e deployment, unbalanced worker nodes, GPU device plugins, insufficient CPU resources, upgrade processes, \u003ccode\u003ecoredns\u003c/code\u003e deployment restarts, and organization system cluster alerts.\u003c/p\u003e\n"],["\u003cp\u003eA critical security vulnerability, CVE-2023-4863dd, related to a Heap buffer overflow in WebP in Google Chrome, has been fixed, addressing a potential out-of-bounds memory write attack vector.\u003c/p\u003e\n"]]],[],null,["# Google Distributed Cloud air-gapped 1.9.6 release notes\n\n\u003cbr /\u003e\n\nOctober 4, 2023 \\[GDC 1.9.6\\]\n-----------------------------\n\n*** ** * ** ***\n\n\nGoogle Distributed Cloud air-gapped 1.9.6 is now released.\n\nSee the [product overview](/distributed-cloud/hosted/docs/latest/gdch/overview) to learn about the features of Google Distributed Cloud air-gapped.\n\n*** ** * ** ***\n\n\nIn the Google Distributed Cloud air-gapped 1.9.6 Addon Manager (ADD)\ncomponent, the Google Distributed Cloud version is updated to\n1.14.8 to apply the latest security patches and important updates.\n\nSee [Google Distributed Cloud 1.14.8 release notes](https://cloud.google.com/anthos/clusters/docs/bare-metal/1.14/release-notes-ver#release_1148) for details.\n\n*** ** * ** ***\n\n\nUpdated Canonical Ubuntu OS image version to 20230815 to apply the latest\nsecurity patches and important updates. The following security vulnerabilities are fixed:\n\n- [CVE-2016-10228](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228)\n- [CVE-2019-25013](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013)\n- [CVE-2020-6096](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096)\n- [CVE-2020-13987](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13987)\n- [CVE-2020-13988](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13988)\n- [CVE-2020-17437](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17437)\n- [CVE-2020-27618](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618)\n- [CVE-2020-29562](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29562)\n- [CVE-2020-36691](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36691)\n- [CVE-2021-3326](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326)\n- [CVE-2021-3999](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999)\n- [CVE-2021-27645](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645)\n- [CVE-2021-33560](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33560)\n- [CVE-2021-35942](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942)\n- [CVE-2021-40528](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40528)\n- [CVE-2022-0168](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0168)\n- [CVE-2022-1184](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1184)\n- [CVE-2022-2208](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2208)\n- [CVE-2022-2210](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2210)\n- [CVE-2022-2257](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2257)\n- [CVE-2022-2264](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2264)\n- [CVE-2022-2284](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2284)\n- [CVE-2022-2285](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2285)\n- [CVE-2022-2286](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2286)\n- [CVE-2022-2287](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2287)\n- [CVE-2022-2289](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2289)\n- [CVE-2022-4269](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4269)\n- [CVE-2022-23218](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218)\n- [CVE-2022-23219](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219)\n- [CVE-2022-27672](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27672)\n- [CVE-2022-40982](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40982)\n- [CVE-2022-41804](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41804)\n- [CVE-2023-1611](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1611)\n- [CVE-2023-2124](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2124)\n- [CVE-2023-3090](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3090)\n- [CVE-2023-3111](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3111)\n- [CVE-2023-3141](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3141)\n- [CVE-2023-3390](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3390)\n- [CVE-2023-20593](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20593)\n- [CVE-2023-23908](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23908)\n- [CVE-2023-28321](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28321)\n- [CVE-2023-28322](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28322)\n- [CVE-2023-32629](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32629)\n- [CVE-2023-35001](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35001)\n- [CVE-2023-37327](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37327)\n- [CVE-2023-37328](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37328)\n- [CVE-2023-38633](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38633)\n\n*** ** * ** ***\n\n\nGoogle Distributed Cloud air-gapped 1.9.6 has a known issue where role-based access control (RBAC) and schema settings in the VM manager is stopping users from starting VM backup and restore processes.\n\n*** ** * ** ***\n\nGoogle Distributed Cloud air-gapped 1.9.6 has a known\nissue where the `kube-state-metrics` deployment crash loops.\n\n*** ** * ** ***\n\n\nGoogle Distributed Cloud air-gapped 1.9.6 has a known issue where a worker node is unbalanced after upgrade.\n\n*** ** * ** ***\n\nGoogle Distributed Cloud air-gapped 1.9.6 has a known\nissue with the upgrade where the GPU device plugin does not start.\n\n*** ** * ** ***\n\n\nGoogle Distributed Cloud air-gapped 1.9.6 has a known issue where a user cluster with three `n2-standard-4` worker nodes has insufficient CPU resources for upgrade.\n\n*** ** * ** ***\n\nGoogle Distributed Cloud air-gapped 1.9.6 has a known\nissue where upgrade is stuck while terminating a pod.\n\n*** ** * ** ***\n\n\nGoogle Distributed Cloud air-gapped 1.9.6 has a known issue where a user cluster does not become ready in time to restart the `coredns` deployment.\n\n*** ** * ** ***\n\nAn issue with a Heap buffer overflow in WebP in Google Chrome prior to\n116.0.5845.187 is fixed. This issue allowed a remote attacker to perform\nan out of bounds memory write by using a crafted HTML page (Chromium security severity: Critical). This issue usually affects anything that uses frameworks, code libraries, and OSes that incorporate Electron, another code library that uses libwebp, or has libwebp built-in directly.\n\nFor more details, see [CVE-2023-4863dd](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4863dd).\n\n*** ** * ** ***\n\n\nGoogle Distributed Cloud air-gapped 1.9.6 has a known issue where alerts in organization system clusters don't reach the ticketing system."]]