<?xml version="1.0" encoding="UTF-8"?>

<!-- AUTOGENERATED FILE. DO NOT EDIT. -->

<feed xmlns="http://www.w3.org/2005/Atom">
  <id>tag:google.com,2016:gke-security-bulletins</id>
  <title>GKE - Security Bulletins</title>
  <link rel="self" href="https://docs.cloud.google.com/feeds/gke-security-bulletins.xml"/>
  <author>
    <name>Google Cloud Documentation</name>
  </author>
  <updated>2026-04-07T17:20:19.252859+00:00</updated>


  <entry>
    <title>GCP-2026-018</title>
    <id>tag:google.com,2016:gke-security-bulletins#gcp-2026-018</id>
    <updated>2026-04-07T00:00:00+00:00</updated>
    <link rel="alternate" href="https://docs.cloud.google.com/kubernetes-engine/security-bulletins#gcp-2026-018"/>
    <content type="html"><![CDATA[<p><strong>Published: </strong>2026-04-07<br/> <strong>Reference:</strong> <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23111">CVE-2026-23111</a></p><devsite-selector>
<section>
<h3 data-text="GKE" id="gcp-2026-018-gke" tabindex="-1">GKE</h3>
<table>
<thead>
<tr>
<th>Description</th>
<th>Severity</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<p>The following vulnerabilities were discovered in the Linux kernel that can lead
          to a privilege escalation on Container-Optimized OS nodes:
          </p><ul>
<li>CVE-2026-23111</li>
</ul>
<p>GKE Standard clusters are impacted. GKE Autopilot clusters in the default configuration are not impacted, but might be vulnerable if you explicitly set the seccomp <code dir="ltr" translate="no">Unconfined</code> profile or allow <a href="https://docs.cloud.google.com/sdk/gcloud/reference/container/clusters/create-auto#--workload-policies"><code dir="ltr" translate="no">CAP_NET_ADMIN</code></a>.</p>
<p>Clusters using <a href="https://docs.cloud.google.com/kubernetes-engine/docs/concepts/sandbox-pods">GKE Sandbox</a> aren't impacted.</p>
<h4 data-text="What should I do?" id="what-should-i-do" tabindex="-1">What should I do?</h4>
<p>The following minor versions are affected.
          <a href="https://docs.cloud.google.com/kubernetes-engine/docs/how-to/upgrading-a-container-cluster">Upgrade</a> your
          Container-Optimized OS node pools to one of the following patch versions or later:</p>
<ul>
<li>1.35.2-gke.1485000</li><li>1.34.5-gke.1153000</li><li>1.33.9-gke.1060000</li><li>1.32.13-gke.1059000</li><li>1.31.14-gke.1599000</li>
</ul>
<p>You can apply patch versions from newer release channels if your cluster runs the same
          minor version in its own release channel. This feature lets you secure your nodes until
          the patch version becomes the default in your release channel. For details, see
          <a href="https://docs.cloud.google.com/kubernetes-engine/docs/concepts/release-channels#newer-patch-versions">Run patch versions from a newer channel</a>.</p>
</td>
<td>High</td>
</tr>
</tbody>
</table>
</section>
<section>
<h3 data-text="GDC (VMware)" id="gcp-2026-018-gdcvmware" tabindex="-1">GDC (VMware)</h3>
<table>
<thead>
<tr>
<th>Description</th>
<th>Severity</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<p>The following vulnerabilities were discovered in the Linux kernel that can lead
            to a privilege escalation on Container-Optimized OS nodes:
            </p><ul>
<li>CVE-2026-23111</li>
</ul>
<h4 data-text="What should I do?" id="what-should-i-do_1" tabindex="-1">What should I do?</h4>
<p><aside class="note"><strong>Note: </strong>Patch versions and a severity assessment for GDC software for VMware are in progress. We'll update this bulletin with that information when it's available.</aside></p>
</td>
<td>Pending</td>
</tr>
</tbody>
</table>
</section>
<section>
<h3 data-text="GKE on AWS" id="gcp-2026-018-gkeaws" tabindex="-1">GKE on AWS</h3>
<table>
<thead>
<tr>
<th>Description</th>
<th>Severity</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<p>The following vulnerabilities were discovered in the Linux kernel that can lead
            to a privilege escalation on Container-Optimized OS nodes:
            </p><ul>
<li>CVE-2026-23111</li>
</ul>
<h4 data-text="What should I do?" id="what-should-i-do_2" tabindex="-1">What should I do?</h4>
<p><aside class="note"><strong>Note: </strong>Patch versions and a severity assessment for GKE on AWS are in progress. We'll update this bulletin with that information when it's available.</aside></p>
</td>
<td>Pending</td>
</tr>
</tbody>
</table>
</section>
<section>
<h3 data-text="GKE on Azure" id="gcp-2026-018-gkeazure" tabindex="-1">GKE on Azure</h3>
<table>
<thead>
<tr>
<th>Description</th>
<th>Severity</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<p>The following vulnerabilities were discovered in the Linux kernel that can lead
            to a privilege escalation on Container-Optimized OS nodes:
            </p><ul>
<li>CVE-2026-23111</li>
</ul>
<h4 data-text="What should I do?" id="what-should-i-do_3" tabindex="-1">What should I do?</h4>
<p><aside class="note"><strong>Note: </strong>Patch versions and a severity assessment for GKE on Azure are in progress. We'll update this bulletin with that information when it's available.</aside></p>
</td>
<td>Pending</td>
</tr>
</tbody>
</table>
</section>
<section>
<h3 data-text="GDC (bare metal)" id="gcp-2026-018-gdcbm" tabindex="-1">GDC (bare metal)</h3>
<table>
<thead>
<tr>
<th>Description</th>
<th>Severity</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<p>The following vulnerabilities were discovered in the Linux kernel that can lead
            to a privilege escalation on Container-Optimized OS nodes:
            </p><ul>
<li>CVE-2026-23111</li>
</ul>
<h4 data-text="What should I do?" id="what-should-i-do_4" tabindex="-1">What should I do?</h4>
<p>There is no action required. GDC software for bare metal isn't affected as it does not bundle an operating system in its distribution.</p>
</td>
<td>None</td>
</tr>
</tbody>
</table>
</section>
</devsite-selector>]]>
    </content>
  </entry>

  <entry>
    <title>GCP-2026-017</title>
    <id>tag:google.com,2016:gke-security-bulletins#gcp-2026-017</id>
    <updated>2026-04-02T00:00:00+00:00</updated>
    <link rel="alternate" href="https://docs.cloud.google.com/kubernetes-engine/security-bulletins#gcp-2026-017"/>
    <content type="html"><![CDATA[<p><strong>Published: </strong>2026-04-02<br/> <strong>Reference:</strong> <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23273">CVE-2026-23273</a></p><devsite-selector>
<section>
<h3 data-text="GKE" id="gcp-2026-017-gke" tabindex="-1">GKE</h3>
<table>
<thead>
<tr>
<th>Description</th>
<th>Severity</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<p>The following vulnerabilities were discovered in the Linux kernel that can lead
          to a privilege escalation on Container-Optimized OS nodes:
          </p><ul>
<li>CVE-2026-23273</li>
</ul>
<p>GKE Standard clusters are impacted. GKE Autopilot clusters in the default configuration are not impacted, but might be vulnerable if you explicitly set the seccomp <code dir="ltr" translate="no">Unconfined</code> profile or allow <a href="https://docs.cloud.google.com/sdk/gcloud/reference/container/clusters/create-auto#--workload-policies"><code dir="ltr" translate="no">CAP_NET_ADMIN</code></a>.</p>
<p>Clusters using <a href="https://docs.cloud.google.com/kubernetes-engine/docs/concepts/sandbox-pods">GKE Sandbox</a> aren't impacted.</p>
<h4 data-text="What should I do?" id="what-should-i-do_5" tabindex="-1">What should I do?</h4>
<p>The following minor versions are affected.
          <a href="https://docs.cloud.google.com/kubernetes-engine/docs/how-to/upgrading-a-container-cluster">Upgrade</a> your
          Container-Optimized OS node pools to one of the following patch versions or later:</p>
<ul>
<li>1.35.2-gke.1485000</li><li>1.34.5-gke.1153000</li><li>1.33.9-gke.1060000</li>
</ul>
<p>You can apply patch versions from newer release channels if your cluster runs the same
          minor version in its own release channel. This feature lets you secure your nodes until
          the patch version becomes the default in your release channel. For details, see
          <a href="https://docs.cloud.google.com/kubernetes-engine/docs/concepts/release-channels#newer-patch-versions">Run patch versions from a newer channel</a>.</p>
</td>
<td>High</td>
</tr>
</tbody>
</table>
</section>
<section>
<h3 data-text="GDC (VMware)" id="gcp-2026-017-gdcvmware" tabindex="-1">GDC (VMware)</h3>
<table>
<thead>
<tr>
<th>Description</th>
<th>Severity</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<p>The following vulnerabilities were discovered in the Linux kernel that can lead
            to a privilege escalation on Container-Optimized OS nodes:
            </p><ul>
<li>CVE-2026-23273</li>
</ul>
<h4 data-text="What should I do?" id="what-should-i-do_6" tabindex="-1">What should I do?</h4>
<p><aside class="note"><strong>Note: </strong>Patch versions and a severity assessment for GDC software for VMware are in progress. We'll update this bulletin with that information when it's available.</aside></p>
</td>
<td>Pending</td>
</tr>
</tbody>
</table>
</section>
<section>
<h3 data-text="GKE on AWS" id="gcp-2026-017-gkeaws" tabindex="-1">GKE on AWS</h3>
<table>
<thead>
<tr>
<th>Description</th>
<th>Severity</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<p>The following vulnerabilities were discovered in the Linux kernel that can lead
            to a privilege escalation on Container-Optimized OS nodes:
            </p><ul>
<li>CVE-2026-23273</li>
</ul>
<h4 data-text="What should I do?" id="what-should-i-do_7" tabindex="-1">What should I do?</h4>
<p><aside class="note"><strong>Note: </strong>Patch versions and a severity assessment for GKE on AWS are in progress. We'll update this bulletin with that information when it's available.</aside></p>
</td>
<td>Pending</td>
</tr>
</tbody>
</table>
</section>
<section>
<h3 data-text="GKE on Azure" id="gcp-2026-017-gkeazure" tabindex="-1">GKE on Azure</h3>
<table>
<thead>
<tr>
<th>Description</th>
<th>Severity</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<p>The following vulnerabilities were discovered in the Linux kernel that can lead
            to a privilege escalation on Container-Optimized OS nodes:
            </p><ul>
<li>CVE-2026-23273</li>
</ul>
<h4 data-text="What should I do?" id="what-should-i-do_8" tabindex="-1">What should I do?</h4>
<p><aside class="note"><strong>Note: </strong>Patch versions and a severity assessment for GKE on Azure are in progress. We'll update this bulletin with that information when it's available.</aside></p>
</td>
<td>Pending</td>
</tr>
</tbody>
</table>
</section>
<section>
<h3 data-text="GDC (bare metal)" id="gcp-2026-017-gdcbm" tabindex="-1">GDC (bare metal)</h3>
<table>
<thead>
<tr>
<th>Description</th>
<th>Severity</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<p>The following vulnerabilities were discovered in the Linux kernel that can lead
            to a privilege escalation on Container-Optimized OS nodes:
            </p><ul>
<li>CVE-2026-23273</li>
</ul>
<h4 data-text="What should I do?" id="what-should-i-do_9" tabindex="-1">What should I do?</h4>
<p>There is no action required. GDC software for bare metal isn't affected as it does not bundle an operating system in its distribution.</p>
</td>
<td>None</td>
</tr>
</tbody>
</table>
</section>
</devsite-selector>]]>
    </content>
  </entry>

  <entry>
    <title>GCP-2026-016</title>
    <id>tag:google.com,2016:gke-security-bulletins#gcp-2026-016</id>
    <updated>2026-03-27T00:00:00+00:00</updated>
    <link rel="alternate" href="https://docs.cloud.google.com/kubernetes-engine/security-bulletins#gcp-2026-016"/>
    <content type="html"><![CDATA[<p><strong>Published: </strong>2026-03-27<br/> <strong>Updated: </strong>2026-03-31<br/> <strong>Reference: </strong> <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38616">CVE-2025-38616</a></p><p><strong>2026-03-31 Update: </strong> Added patch versions for Ubuntu nodes with GKE.</p><devsite-selector>
<section>
<h3 data-text="GKE" id="gcp-2026-016-gke" tabindex="-1">GKE</h3>
<p><strong>Updated: </strong>2026-03-31</p>
<table>
<thead>
<tr>
<th>Description</th>
<th>Severity</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<p>The following vulnerabilities were discovered in the Linux kernel that can lead
          to a privilege escalation on Container-Optimized OS nodes:
          </p><ul>
<li>CVE-2025-38616</li>
</ul>
<p>GKE Standard and Autopilot clusters are impacted.</p>
<p>Clusters using <a href="https://docs.cloud.google.com/kubernetes-engine/docs/concepts/sandbox-pods">GKE Sandbox</a> aren't impacted.</p>
<h4 data-text="What should I do?" id="what-should-i-do_10" tabindex="-1">What should I do?</h4>
<p><strong>2026-03-31 Update</strong>: The following versions of GKE are updated with code to fix this vulnerability on Ubuntu. Upgrade your Ubuntu node pools to the following versions or later:</p>
<ul>
<li>1.35.2-gke.1485000</li>
<li>1.34.5-gke.1153000</li>
<li>1.33.9-gke.1117000</li>
<li>1.32.13-gke.1090000</li>
</ul>
<hr/>
<p>The following minor versions are affected.
          <a href="https://docs.cloud.google.com/kubernetes-engine/docs/how-to/upgrading-a-container-cluster">Upgrade</a> your
          Container-Optimized OS node pools to one of the following patch versions or later:</p>
<ul>
<li>1.35.2-gke.1269000</li><li>1.34.4-gke.1193000</li><li>1.33.8-gke.1169000</li><li>1.32.12-gke.1127000</li><li>1.31.14-gke.1376000</li><li>1.30.14-gke.2192000</li>
</ul>
<p>You can apply patch versions from newer release channels if your cluster runs the same
          minor version in its own release channel. This feature lets you secure your nodes until
          the patch version becomes the default in your release channel. For details, see
          <a href="https://docs.cloud.google.com/kubernetes-engine/docs/concepts/release-channels#newer-patch-versions">Run patch versions from a newer channel</a>.</p>
</td>
<td>High</td>
</tr>
</tbody>
</table>
</section>
<section>
<h3 data-text="GDC (VMware)" id="gcp-2026-016-gdcvmware" tabindex="-1">GDC (VMware)</h3>
<table>
<thead>
<tr>
<th>Description</th>
<th>Severity</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<p>The following vulnerabilities were discovered in the Linux kernel that can lead
            to a privilege escalation on Container-Optimized OS nodes:
            </p><ul>
<li>CVE-2025-38616</li>
</ul>
<h4 data-text="What should I do?" id="what-should-i-do_11" tabindex="-1">What should I do?</h4>
<p><aside class="note"><strong>Note: </strong>Patch versions and a severity assessment for GDC software for VMware are in progress. We'll update this bulletin with that information when it's available.</aside></p>
</td>
<td>Pending</td>
</tr>
</tbody>
</table>
</section>
<section>
<h3 data-text="GKE on AWS" id="gcp-2026-016-gkeaws" tabindex="-1">GKE on AWS</h3>
<table>
<thead>
<tr>
<th>Description</th>
<th>Severity</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<p>The following vulnerabilities were discovered in the Linux kernel that can lead
            to a privilege escalation on Container-Optimized OS nodes:
            </p><ul>
<li>CVE-2025-38616</li>
</ul>
<h4 data-text="What should I do?" id="what-should-i-do_12" tabindex="-1">What should I do?</h4>
<p><aside class="note"><strong>Note: </strong>Patch versions and a severity assessment for GKE on AWS are in progress. We'll update this bulletin with that information when it's available.</aside></p>
</td>
<td>Pending</td>
</tr>
</tbody>
</table>
</section>
<section>
<h3 data-text="GKE on Azure" id="gcp-2026-016-gkeazure" tabindex="-1">GKE on Azure</h3>
<table>
<thead>
<tr>
<th>Description</th>
<th>Severity</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<p>The following vulnerabilities were discovered in the Linux kernel that can lead
            to a privilege escalation on Container-Optimized OS nodes:
            </p><ul>
<li>CVE-2025-38616</li>
</ul>
<h4 data-text="What should I do?" id="what-should-i-do_13" tabindex="-1">What should I do?</h4>
<p><aside class="note"><strong>Note: </strong>Patch versions and a severity assessment for GKE on Azure are in progress. We'll update this bulletin with that information when it's available.</aside></p>
</td>
<td>Pending</td>
</tr>
</tbody>
</table>
</section>
<section>
<h3 data-text="GDC (bare metal)" id="gcp-2026-016-gdcbm" tabindex="-1">GDC (bare metal)</h3>
<table>
<thead>
<tr>
<th>Description</th>
<th>Severity</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<p>The following vulnerabilities were discovered in the Linux kernel that can lead
            to a privilege escalation on Container-Optimized OS nodes:
            </p><ul>
<li>CVE-2025-38616</li>
</ul>
<h4 data-text="What should I do?" id="what-should-i-do_14" tabindex="-1">What should I do?</h4>
<p>There is no action required. GDC software for bare metal isn't affected as it does not bundle an operating system in its distribution.</p>
</td>
<td>None</td>
</tr>
</tbody>
</table>
</section>
</devsite-selector>]]>
    </content>
  </entry>

  <entry>
    <title>GCP-2026-014</title>
    <id>tag:google.com,2016:gke-security-bulletins#gcp-2026-014</id>
    <updated>2026-03-14T00:00:00+00:00</updated>
    <link rel="alternate" href="https://docs.cloud.google.com/kubernetes-engine/security-bulletins#gcp-2026-014"/>
    <content type="html"><![CDATA[<p><strong>Published: </strong>2026-03-14<br/> <strong>Updated: </strong>2026-03-25<br/> <strong>Reference:</strong> <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38678">CVE-2025-38678</a></p><p><strong>2026-03-25 Update: </strong> Added patch versions for Ubuntu nodes with GKE.</p><devsite-selector>
<section>
<h3 data-text="GKE" id="gcp-2026-014-gke" tabindex="-1">GKE</h3>
<p><strong>Updated: </strong>2026-03-25</p>
<table>
<thead>
<tr>
<th>Description</th>
<th>Severity</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<p>The following vulnerabilities were discovered in the Linux kernel that can lead
          to a privilege escalation on Container-Optimized OS nodes:
          </p><ul>
<li>CVE-2025-38678</li>
</ul>
<p>GKE Standard clusters are impacted. GKE Autopilot clusters in the default configuration are not impacted, but might be vulnerable if you explicitly set the seccomp <code dir="ltr" translate="no">Unconfined</code> profile or allow <a href="https://docs.cloud.google.com/sdk/gcloud/reference/container/clusters/create-auto#--workload-policies"><code dir="ltr" translate="no">CAP_NET_ADMIN</code></a>.</p>
<p>Clusters using <a href="https://docs.cloud.google.com/kubernetes-engine/docs/concepts/sandbox-pods">GKE Sandbox</a> aren't impacted.</p>
<h4 data-text="What should I do?" id="what-should-i-do_15" tabindex="-1">What should I do?</h4>
<p><strong>2026-03-25 Update</strong>: The following versions of GKE are updated with code to fix this vulnerability on Ubuntu. Upgrade your Ubuntu node pools to the following versions or later:</p>
<ul>
<li>1.35.2-gke.1485000</li>
<li>1.34.5-gke.1076000</li>
<li>1.33.9-gke.1060000</li>
<li>1.32.13-gke.1059000</li>
<li>1.31.14-gke.1476000</li>
<li>1.30.14-gke.2117000</li>
</ul>
<hr/>
<p>The following minor versions are affected.
          <a href="https://docs.cloud.google.com/kubernetes-engine/docs/how-to/upgrading-a-container-cluster">Upgrade</a> your
          Container-Optimized OS node pools to one of the following patch versions or later:</p>
<ul>
<li>1.35.2-gke.1269000</li><li>1.34.4-gke.1193000</li><li>1.33.8-gke.1169000</li><li>1.32.12-gke.1127000</li><li>1.31.14-gke.1376000</li><li>1.30.14-gke.2192000</li>
</ul>
<p>You can apply patch versions from newer release channels if your cluster runs the same
          minor version in its own release channel. This feature lets you secure your nodes until
          the patch version becomes the default in your release channel. For details, see
          <a href="https://docs.cloud.google.com/kubernetes-engine/docs/concepts/release-channels#newer-patch-versions">Run patch versions from a newer channel</a>.</p>
</td>
<td>High</td>
</tr>
</tbody>
</table>
</section>
<section>
<h3 data-text="GDC (VMware)" id="gcp-2026-014-gdcvmware" tabindex="-1">GDC (VMware)</h3>
<table>
<thead>
<tr>
<th>Description</th>
<th>Severity</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<p>The following vulnerabilities were discovered in the Linux kernel that can lead
            to a privilege escalation on Container-Optimized OS nodes:
            </p><ul>
<li>CVE-2025-38678</li>
</ul>
<h4 data-text="What should I do?" id="what-should-i-do_16" tabindex="-1">What should I do?</h4>
<p><aside class="note"><strong>Note: </strong>Patch versions and a severity assessment for GDC software for VMware are in progress. We'll update this bulletin with that information when it's available.</aside></p>
</td>
<td>Pending</td>
</tr>
</tbody>
</table>
</section>
<section>
<h3 data-text="GKE on AWS" id="gcp-2026-014-gkeaws" tabindex="-1">GKE on AWS</h3>
<table>
<thead>
<tr>
<th>Description</th>
<th>Severity</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<p>The following vulnerabilities were discovered in the Linux kernel that can lead
            to a privilege escalation on Container-Optimized OS nodes:
            </p><ul>
<li>CVE-2025-38678</li>
</ul>
<h4 data-text="What should I do?" id="what-should-i-do_17" tabindex="-1">What should I do?</h4>
<p><aside class="note"><strong>Note: </strong>Patch versions and a severity assessment for GKE on AWS are in progress. We'll update this bulletin with that information when it's available.</aside></p>
</td>
<td>Pending</td>
</tr>
</tbody>
</table>
</section>
<section>
<h3 data-text="GKE on Azure" id="gcp-2026-014-gkeazure" tabindex="-1">GKE on Azure</h3>
<table>
<thead>
<tr>
<th>Description</th>
<th>Severity</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<p>The following vulnerabilities were discovered in the Linux kernel that can lead
            to a privilege escalation on Container-Optimized OS nodes:
            </p><ul>
<li>CVE-2025-38678</li>
</ul>
<h4 data-text="What should I do?" id="what-should-i-do_18" tabindex="-1">What should I do?</h4>
<p><aside class="note"><strong>Note: </strong>Patch versions and a severity assessment for GKE on Azure are in progress. We'll update this bulletin with that information when it's available.</aside></p>
</td>
<td>Pending</td>
</tr>
</tbody>
</table>
</section>
<section>
<h3 data-text="GDC (bare metal)" id="gcp-2026-014-gdcbm" tabindex="-1">GDC (bare metal)</h3>
<table>
<thead>
<tr>
<th>Description</th>
<th>Severity</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<p>The following vulnerabilities were discovered in the Linux kernel that can lead
            to a privilege escalation on Container-Optimized OS nodes:
            </p><ul>
<li>CVE-2025-38678</li>
</ul>
<h4 data-text="What should I do?" id="what-should-i-do_19" tabindex="-1">What should I do?</h4>
<p>There is no action required. GDC software for bare metal isn't affected as it does not bundle an operating system in its distribution.</p>
</td>
<td>None</td>
</tr>
</tbody>
</table>
</section>
</devsite-selector>]]>
    </content>
  </entry>

  <entry>
    <title>GCP-2026-007</title>
    <id>tag:google.com,2016:gke-security-bulletins#gcp-2026-007</id>
    <updated>2026-02-09T00:00:00+00:00</updated>
    <link rel="alternate" href="https://docs.cloud.google.com/kubernetes-engine/security-bulletins#gcp-2026-007"/>
    <content type="html"><![CDATA[<p><strong>Published: </strong>2026-02-09<br/> <strong>Updated: </strong>2026-03-25<br/> <strong>Reference:</strong> <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40297">CVE-2025-40297</a></p><p><strong>2026-03-25 Update: </strong> Added patch versions for Ubuntu nodes with GKE.</p><devsite-selector>
<section>
<h3 data-text="GKE" id="gcp-2026-007-gke" tabindex="-1">GKE</h3>
<p><strong>Updated: </strong>2026-03-25</p>
<table>
<thead>
<tr>
<th>Description</th>
<th>Severity</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<p>The following vulnerabilities were discovered in the Linux kernel that can lead
          to a privilege escalation on Container-Optimized OS nodes:
          </p><ul>
<li>CVE-2025-40297</li>
</ul>
<p>GKE Standard clusters are impacted. GKE Autopilot clusters in the default configuration are not impacted, but might be vulnerable if you explicitly set the seccomp <code dir="ltr" translate="no">Unconfined</code> profile or allow <a href="https://docs.cloud.google.com/sdk/gcloud/reference/container/clusters/create-auto#--workload-policies"><code dir="ltr" translate="no">CAP_NET_ADMIN</code></a>.</p>
<p>Clusters using <a href="https://docs.cloud.google.com/kubernetes-engine/docs/concepts/sandbox-pods">GKE Sandbox</a> aren't impacted.</p>
<h4 data-text="What should I do?" id="what-should-i-do_20" tabindex="-1">What should I do?</h4>
<p><strong>2026-03-25 Update</strong>: The following versions of GKE are updated with code to fix this vulnerability on Ubuntu. Upgrade your Ubuntu node pools to the following versions or later:</p>
<ul>
<li>1.35.2-gke.1269000</li>
<li>1.34.4-gke.1193000</li>
<li>1.33.8-gke.1169000</li>
<li>1.32.13-gke.1059000</li>
</ul>
<hr/>
<p>The following minor versions are affected.
          <a href="https://docs.cloud.google.com/kubernetes-engine/docs/how-to/upgrading-a-container-cluster">Upgrade</a> your
          Container-Optimized OS node pools to one of the following patch versions or later:</p>
<ul>
<li>1.35.0-gke.2398000</li><li>1.32.11-gke.1174000</li><li>1.33.5-gke.2392000</li><li>1.34.3-gke.1318000</li><li>1.31.14-gke.1243000</li><li>1.30.14-gke.1922000</li>
</ul>
<p>You can apply patch versions from newer release channels if your cluster runs the same
          minor version in its own release channel. This feature lets you secure your nodes until
          the patch version becomes the default in your release channel. For details, see
          <a href="https://docs.cloud.google.com/kubernetes-engine/docs/concepts/release-channels#newer-patch-versions">Run patch versions from a newer channel</a>.</p>
</td>
<td>High</td>
</tr>
</tbody>
</table>
</section>
<section>
<h3 data-text="GDC (VMware)" id="gcp-2026-007-gdcvmware" tabindex="-1">GDC (VMware)</h3>
<table>
<thead>
<tr>
<th>Description</th>
<th>Severity</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<p>The following vulnerabilities were discovered in the Linux kernel that can lead
            to a privilege escalation on Container-Optimized OS nodes:
            </p><ul>
<li>CVE-2025-40297</li>
</ul>
<h4 data-text="What should I do?" id="what-should-i-do_21" tabindex="-1">What should I do?</h4>
<p><aside class="note"><strong>Note: </strong>Patch versions and a severity assessment for GDC software for VMware are in progress. We'll update this bulletin with that information when it's available.</aside></p>
</td>
<td>Pending</td>
</tr>
</tbody>
</table>
</section>
<section>
<h3 data-text="GKE on AWS" id="gcp-2026-007-gkeaws" tabindex="-1">GKE on AWS</h3>
<table>
<thead>
<tr>
<th>Description</th>
<th>Severity</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<p>The following vulnerabilities were discovered in the Linux kernel that can lead
            to a privilege escalation on Container-Optimized OS nodes:
            </p><ul>
<li>CVE-2025-40297</li>
</ul>
<h4 data-text="What should I do?" id="what-should-i-do_22" tabindex="-1">What should I do?</h4>
<p><aside class="note"><strong>Note: </strong>Patch versions and a severity assessment for GKE on AWS are in progress. We'll update this bulletin with that information when it's available.</aside></p>
</td>
<td>Pending</td>
</tr>
</tbody>
</table>
</section>
<section>
<h3 data-text="GKE on Azure" id="gcp-2026-007-gkeazure" tabindex="-1">GKE on Azure</h3>
<table>
<thead>
<tr>
<th>Description</th>
<th>Severity</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<p>The following vulnerabilities were discovered in the Linux kernel that can lead
            to a privilege escalation on Container-Optimized OS nodes:
            </p><ul>
<li>CVE-2025-40297</li>
</ul>
<h4 data-text="What should I do?" id="what-should-i-do_23" tabindex="-1">What should I do?</h4>
<p><aside class="note"><strong>Note: </strong>Patch versions and a severity assessment for GKE on Azure are in progress. We'll update this bulletin with that information when it's available.</aside></p>
</td>
<td>Pending</td>
</tr>
</tbody>
</table>
</section>
<section>
<h3 data-text="GDC (bare metal)" id="gcp-2026-007-gdcbm" tabindex="-1">GDC (bare metal)</h3>
<table>
<thead>
<tr>
<th>Description</th>
<th>Severity</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<p>The following vulnerabilities were discovered in the Linux kernel that can lead
            to a privilege escalation on Container-Optimized OS nodes:
            </p><ul>
<li>CVE-2025-40297</li>
</ul>
<h4 data-text="What should I do?" id="what-should-i-do_24" tabindex="-1">What should I do?</h4>
<p>There is no action required. GDC software for bare metal isn't affected as it does not bundle an operating system in its distribution.</p>
</td>
<td>None</td>
</tr>
</tbody>
</table>
</section>
</devsite-selector>]]>
    </content>
  </entry>

  <entry>
    <title>GCP-2026-006</title>
    <id>tag:google.com,2016:gke-security-bulletins#gcp-2026-006</id>
    <updated>2026-01-29T00:00:00+00:00</updated>
    <link rel="alternate" href="https://docs.cloud.google.com/kubernetes-engine/security-bulletins#gcp-2026-006"/>
    <content type="html"><![CDATA[<p><strong>Published: </strong>2026-01-29</p><p><strong>Updated: </strong>2026-02-20</p><strong>Reference: </strong><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15467">CVE-2025-15467</a><p><strong>2026-02-20 Update: </strong> Added patch versions for GKE.</p><devsite-selector>
<section>
<h3 data-text="GKE" id="gcp-2026-006-gke" tabindex="-1">GKE</h3>
<p><strong>Updated: </strong>2026-02-20</p>
<table>
<thead>
<tr>
<th>Description</th>
<th>Severity</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<p>Multiple security vulnerabilities have been identified in the OpenSSL library. The most significant finding is CVE-2025-15467, a critical vulnerability that might allow for remote code execution (RCE) or denial of service (DoS) attacks via network-based vectors.</p>
<p>GKE control plane and infrastructure is not vulnerable. GKE core infrastructure, including the Kubernetes API Server and Kubelet, remains unaffected. These services use <a href="https://github.com/boringcrypto">BoringCrypto</a> (a security-hardened module derived from <a href="https://boringssl.googlesource.com/boringssl/+/fed35d32245ee4563691d21f55c12b4f8dac840a/crypto/fipsmodule/FIPS.md">BoringSSL</a>), which does not contain the vulnerable code found in the standard OpenSSL distribution.</p>
<p>GKE Nodes: The <a href="https://www.openssl.org/">OpenSSL</a> library included in the GKE Node OS images (Container-Optimized OS and Ubuntu) contains the vulnerable code. While the control plane is secure, software running within your nodes or administrative tools on the host OS might be at risk.</p>
<p>Updated GKE versions will include will the latest version of OpenSSL, which addresses the following CVEs:</p>
<p>
</p><ul>
<li><a href="https://openssl-library.org/news/vulnerabilities/#CVE-2025-11187">CVE-2025-11187</a></li>
<li><a href="https://openssl-library.org/news/vulnerabilities/#CVE-2025-15467">CVE-2025-15467</a></li>
<li><a href="https://openssl-library.org/news/vulnerabilities/#CVE-2025-15468">CVE-2025-15468</a></li>
<li><a href="https://openssl-library.org/news/vulnerabilities/#CVE-2025-15469">CVE-2025-15469</a></li>
<li><a href="https://openssl-library.org/news/vulnerabilities/#CVE-2025-66199">CVE-2025-66199</a></li>
<li><a href="https://openssl-library.org/news/vulnerabilities/#CVE-2025-68160">CVE-2025-68160</a></li>
<li><a href="https://openssl-library.org/news/vulnerabilities/#CVE-2025-69418">CVE-2025-69418</a></li>
<li><a href="https://openssl-library.org/news/vulnerabilities/#CVE-2025-69419">CVE-2025-69419</a></li>
<li><a href="https://openssl-library.org/news/vulnerabilities/#CVE-2025-69420">CVE-2025-69420</a></li>
<li><a href="https://openssl-library.org/news/vulnerabilities/#CVE-2025-69421">CVE-2025-69421</a></li>
<li><a href="https://openssl-library.org/news/vulnerabilities/#CVE-2026-22795">CVE-2026-22795</a></li>
<li><a href="https://openssl-library.org/news/vulnerabilities/#CVE-2026-22796">CVE-2026-22796</a></li>
</ul>
<h4 data-text="What should I do?" id="what-should-i-do_25" tabindex="-1">What should I do?</h4>
<p><strong>2026-02-20 Update:</strong>
        The following versions of GKE are updated with code to fix this
        vulnerability. Upgrade your GKE node pools to the following versions or later:
        </p><ul>
<li>1.35.0-gke.2398000</li>
<li>1.34.3-gke.1318000</li>
<li>1.33.5-gke.2392000</li>
<li>1.32.11-gke.1264000</li>
</ul>
<hr/>
<p>There is no action at this time. This security bulletin will be updated when new GKE versions are available that use the patched version of OpenSSL.</p>
</td>
<td>High</td>
</tr>
</tbody>
</table>
</section>
<section>
<h3 data-text="GDC (VMware)" id="gcp-2026-006-gdcvmware" tabindex="-1">GDC (VMware)</h3>
<table>
<thead>
<tr>
<th>Description</th>
<th>Severity</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<p>Multiple security vulnerabilities have been identified in the OpenSSL library. The most significant finding is CVE-2025-15467, a critical vulnerability that might allow for remote code execution (RCE) or denial of service (DoS) attacks via network-based vectors.</p>
<p>GDC software for VMware control plane and infrastructure is not vulnerable. GDC software for VMware core infrastructure, including the Kubernetes API Server and Kubelet, remains unaffected. These services use <a href="https://github.com/boringcrypto">BoringCrypto</a> (a security-hardened module derived from <a href="https://boringssl.googlesource.com/boringssl/+/fed35d32245ee4563691d21f55c12b4f8dac840a/crypto/fipsmodule/FIPS.md">BoringSSL</a>), which does not contain the vulnerable code found in the standard OpenSSL distribution.</p>
<p>GDC software for VMware Nodes: The <a href="https://www.openssl.org/">OpenSSL</a> library included in the GDC software for VMware Node OS images (Container-Optimized OS and Ubuntu) contains the vulnerable code. While the control plane is secure, software running within your nodes or administrative tools on the host OS might be at risk.</p>
<p>Updated GDC software for VMware versions will include will the latest version of OpenSSL, which addresses the following CVEs:</p>
<p>
</p><ul>
<li><a href="https://openssl-library.org/news/vulnerabilities/#CVE-2025-11187">CVE-2025-11187</a></li>
<li><a href="https://openssl-library.org/news/vulnerabilities/#CVE-2025-15467">CVE-2025-15467</a></li>
<li><a href="https://openssl-library.org/news/vulnerabilities/#CVE-2025-15468">CVE-2025-15468</a></li>
<li><a href="https://openssl-library.org/news/vulnerabilities/#CVE-2025-15469">CVE-2025-15469</a></li>
<li><a href="https://openssl-library.org/news/vulnerabilities/#CVE-2025-66199">CVE-2025-66199</a></li>
<li><a href="https://openssl-library.org/news/vulnerabilities/#CVE-2025-68160">CVE-2025-68160</a></li>
<li><a href="https://openssl-library.org/news/vulnerabilities/#CVE-2025-69418">CVE-2025-69418</a></li>
<li><a href="https://openssl-library.org/news/vulnerabilities/#CVE-2025-69419">CVE-2025-69419</a></li>
<li><a href="https://openssl-library.org/news/vulnerabilities/#CVE-2025-69420">CVE-2025-69420</a></li>
<li><a href="https://openssl-library.org/news/vulnerabilities/#CVE-2025-69421">CVE-2025-69421</a></li>
<li><a href="https://openssl-library.org/news/vulnerabilities/#CVE-2026-22795">CVE-2026-22795</a></li>
<li><a href="https://openssl-library.org/news/vulnerabilities/#CVE-2026-22796">CVE-2026-22796</a></li>
</ul>
<h4 data-text="What should I do?" id="what-should-i-do_26" tabindex="-1">What should I do?</h4>
<p>There is no action at this time. This security bulletin will be updated when new Google Distributed Cloud versions are available that use the patched version of OpenSSL.</p>
</td>
<td>High</td>
</tr>
</tbody>
</table>
</section>
<section>
<h3 data-text="GKE on AWS" id="gcp-2026-006-gkeaws" tabindex="-1">GKE on AWS</h3>
<table>
<thead>
<tr>
<th>Description</th>
<th>Severity</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<p>Multiple security vulnerabilities have been identified in the OpenSSL library. The most significant finding is CVE-2025-15467, a critical vulnerability that might allow for remote code execution (RCE) or denial of service (DoS) attacks via network-based vectors.</p>
<p>GKE on AWS control plane and infrastructure is not vulnerable. GKE on AWS core infrastructure, including the Kubernetes API Server and Kubelet, remains unaffected. These services use <a href="https://github.com/boringcrypto">BoringCrypto</a> (a security-hardened module derived from <a href="https://boringssl.googlesource.com/boringssl/+/fed35d32245ee4563691d21f55c12b4f8dac840a/crypto/fipsmodule/FIPS.md">BoringSSL</a>), which does not contain the vulnerable code found in the standard OpenSSL distribution.</p>
<p>GKE on AWS Nodes: The <a href="https://www.openssl.org/">OpenSSL</a> library included in the GKE on AWS Node OS images (Container-Optimized OS and Ubuntu) contains the vulnerable code. While the control plane is secure, software running within your nodes or administrative tools on the host OS might be at risk.</p>
<p>Updated GKE on AWS versions will include will the latest version of OpenSSL, which addresses the following CVEs:</p>
<p>
</p><ul>
<li><a href="https://openssl-library.org/news/vulnerabilities/#CVE-2025-11187">CVE-2025-11187</a></li>
<li><a href="https://openssl-library.org/news/vulnerabilities/#CVE-2025-15467">CVE-2025-15467</a></li>
<li><a href="https://openssl-library.org/news/vulnerabilities/#CVE-2025-15468">CVE-2025-15468</a></li>
<li><a href="https://openssl-library.org/news/vulnerabilities/#CVE-2025-15469">CVE-2025-15469</a></li>
<li><a href="https://openssl-library.org/news/vulnerabilities/#CVE-2025-66199">CVE-2025-66199</a></li>
<li><a href="https://openssl-library.org/news/vulnerabilities/#CVE-2025-68160">CVE-2025-68160</a></li>
<li><a href="https://openssl-library.org/news/vulnerabilities/#CVE-2025-69418">CVE-2025-69418</a></li>
<li><a href="https://openssl-library.org/news/vulnerabilities/#CVE-2025-69419">CVE-2025-69419</a></li>
<li><a href="https://openssl-library.org/news/vulnerabilities/#CVE-2025-69420">CVE-2025-69420</a></li>
<li><a href="https://openssl-library.org/news/vulnerabilities/#CVE-2025-69421">CVE-2025-69421</a></li>
<li><a href="https://openssl-library.org/news/vulnerabilities/#CVE-2026-22795">CVE-2026-22795</a></li>
<li><a href="https://openssl-library.org/news/vulnerabilities/#CVE-2026-22796">CVE-2026-22796</a></li>
</ul>
<h4 data-text="What should I do?" id="what-should-i-do_27" tabindex="-1">What should I do?</h4>
<p>There is no action at this time. This security bulletin will be updated when new GKE on AWS versions are available that use the patched version of OpenSSL.</p>
</td>
<td>High</td>
</tr>
</tbody>
</table>
</section>
<section>
<h3 data-text="GKE on Azure" id="gcp-2026-006-gkeazure" tabindex="-1">GKE on Azure</h3>
<table>
<thead>
<tr>
<th>Description</th>
<th>Severity</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<p>Multiple security vulnerabilities have been identified in the OpenSSL library. The most significant finding is CVE-2025-15467, a critical vulnerability that might allow for remote code execution (RCE) or denial of service (DoS) attacks via network-based vectors.</p>
<p>GKE on Azure control plane and infrastructure is not vulnerable. GKE on Azure core infrastructure, including the Kubernetes API Server and Kubelet, remains unaffected. These services use <a href="https://github.com/boringcrypto">BoringCrypto</a> (a security-hardened module derived from <a href="https://boringssl.googlesource.com/boringssl/+/fed35d32245ee4563691d21f55c12b4f8dac840a/crypto/fipsmodule/FIPS.md">BoringSSL</a>), which does not contain the vulnerable code found in the standard OpenSSL distribution.</p>
<p>GKE on Azure Nodes: The <a href="https://www.openssl.org/">OpenSSL</a> library included in the GKE on Azure Node OS images (Container-Optimized OS and Ubuntu) contains the vulnerable code. While the control plane is secure, software running within your nodes or administrative tools on the host OS might be at risk.</p>
<p>Updated GKE on Azure versions will include will the latest version of OpenSSL, which addresses the following CVEs:</p>
<p>
</p><ul>
<li><a href="https://openssl-library.org/news/vulnerabilities/#CVE-2025-11187">CVE-2025-11187</a></li>
<li><a href="https://openssl-library.org/news/vulnerabilities/#CVE-2025-15467">CVE-2025-15467</a></li>
<li><a href="https://openssl-library.org/news/vulnerabilities/#CVE-2025-15468">CVE-2025-15468</a></li>
<li><a href="https://openssl-library.org/news/vulnerabilities/#CVE-2025-15469">CVE-2025-15469</a></li>
<li><a href="https://openssl-library.org/news/vulnerabilities/#CVE-2025-66199">CVE-2025-66199</a></li>
<li><a href="https://openssl-library.org/news/vulnerabilities/#CVE-2025-68160">CVE-2025-68160</a></li>
<li><a href="https://openssl-library.org/news/vulnerabilities/#CVE-2025-69418">CVE-2025-69418</a></li>
<li><a href="https://openssl-library.org/news/vulnerabilities/#CVE-2025-69419">CVE-2025-69419</a></li>
<li><a href="https://openssl-library.org/news/vulnerabilities/#CVE-2025-69420">CVE-2025-69420</a></li>
<li><a href="https://openssl-library.org/news/vulnerabilities/#CVE-2025-69421">CVE-2025-69421</a></li>
<li><a href="https://openssl-library.org/news/vulnerabilities/#CVE-2026-22795">CVE-2026-22795</a></li>
<li><a href="https://openssl-library.org/news/vulnerabilities/#CVE-2026-22796">CVE-2026-22796</a></li>
</ul>
<h4 data-text="What should I do?" id="what-should-i-do_28" tabindex="-1">What should I do?</h4>
<p>There is no action at this time. This security bulletin will be updated when new GKE on Azure versions are available that use the patched version of OpenSSL.</p>
</td>
<td>High</td>
</tr>
</tbody>
</table>
</section>
<section>
<h3 data-text="GDC (bare metal)" id="gcp-2026-006-gdcbm" tabindex="-1">GDC (bare metal)</h3>
<table>
<thead>
<tr>
<th>Description</th>
<th>Severity</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<p>Several security issues have been discovered in OpenSSL. The most critical is CVE-2025-15467, which could be used to execute a denial of service or remote code execution attack over the internet.</p>
<p>GDC software for bare metal is not vulnerable to this threat. GDC software for bare metal uses <a href="https://github.com/boringcrypto">BoringCrypto</a> for network facing services such as the Kubernetes apiserver and Kubelet, and BoringCrypto is not affected by this vulnerability. BoringCrypto is extracted from <a href="https://boringssl.googlesource.com/boringssl/+/fed35d32245ee4563691d21f55c12b4f8dac840a/crypto/fipsmodule/FIPS.md">BoringSSL</a>, a fork of <a href="https://www.openssl.org/">OpenSSL</a> focused on security hardening and performance.</p>
<p>GDC software for bare metal does not provide a node OS. Customers are responsible for installing and maintaining a supported Linux distribution on physical hardware before installing the GKE software.</p>
<h4 data-text="What should I do?" id="what-should-i-do_29" tabindex="-1">What should I do?</h4>
<p>Update your Linux OS image to one that includes the latest Open SSL distribution.</p>
</td>
<td>High</td>
</tr>
</tbody>
</table>
</section>
</devsite-selector>]]>
    </content>
  </entry>

  <entry>
    <title>GCP-2026-003</title>
    <id>tag:google.com,2016:gke-security-bulletins#gcp-2026-003</id>
    <updated>2026-01-09T00:00:00+00:00</updated>
    <link rel="alternate" href="https://docs.cloud.google.com/kubernetes-engine/security-bulletins#gcp-2026-003"/>
    <content type="html"><![CDATA[<p><strong>Published: </strong>2026-01-09<br/> <strong>Updated: </strong>2026-03-25<br/> <strong>Reference:</strong> <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39964">CVE-2025-39964</a></p><p><strong>2026-03-25 Update: </strong> Added patch versions for Ubuntu nodes with GKE.</p><devsite-selector>
<section>
<h3 data-text="GKE" id="gcp-2026-003-gke" tabindex="-1">GKE</h3>
<p><strong>Updated: </strong>2026-03-25</p>
<table>
<thead>
<tr>
<th>Description</th>
<th>Severity</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<p>The following vulnerabilities were discovered in the Linux kernel that can lead
          to a privilege escalation on Container-Optimized OS nodes:
          </p><ul>
<li>CVE-2025-39964</li>
</ul>
<p>GKE Standard and Autopilot clusters are impacted.</p>
<p>Clusters using <a href="https://docs.cloud.google.com/kubernetes-engine/docs/concepts/sandbox-pods">GKE Sandbox</a> aren't impacted.</p>
<h4 data-text="What should I do?" id="what-should-i-do_30" tabindex="-1">What should I do?</h4>
<p><strong>2026-03-25 Update</strong>: The following versions of GKE are updated with code to fix this vulnerability on Ubuntu. Upgrade your Ubuntu node pools to the following versions or later:</p>
<ul>
<li>1.35.1-gke.1396000</li>
<li>1.34.4-gke.1047000</li>
<li>1.33.8-gke.1026000</li>
<li>1.32.12-gke.1026000</li>
<li>1.31.14-gke.1336000</li>
<li>1.30.14-gke.1991000</li>
</ul>
<hr/>
<p>The following minor versions are affected.
          <a href="https://docs.cloud.google.com/kubernetes-engine/docs/how-to/upgrading-a-container-cluster">Upgrade</a> your
          Container-Optimized OS node pools to one of the following patch versions or later:</p>
<ul>
<li>1.34.1-gke.3556000</li><li>1.30.14-gke.1719000</li><li>1.31.13-gke.1139000</li><li>1.29.15-gke.2467000</li><li>1.33.5-gke.1862000</li><li>1.32.9-gke.1239000</li><li>1.28.15-gke.3163000</li>
</ul>
<p>You can apply patch versions from newer release channels if your cluster runs the same
          minor version in its own release channel. This feature lets you secure your nodes until
          the patch version becomes the default in your release channel. For details, see
          <a href="https://docs.cloud.google.com/kubernetes-engine/docs/concepts/release-channels#newer-patch-versions">Run patch versions from a newer channel</a>.</p>
</td>
<td>High</td>
</tr>
</tbody>
</table>
</section>
<section>
<h3 data-text="GDC (VMware)" id="gcp-2026-003-gdcvmware" tabindex="-1">GDC (VMware)</h3>
<table>
<thead>
<tr>
<th>Description</th>
<th>Severity</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<p>The following vulnerabilities were discovered in the Linux kernel that can lead
            to a privilege escalation on Container-Optimized OS nodes:
            </p><ul>
<li>CVE-2025-39964</li>
</ul>
<h4 data-text="What should I do?" id="what-should-i-do_31" tabindex="-1">What should I do?</h4>
<p><aside class="note"><strong>Note: </strong>Patch versions and a severity assessment for GDC software for VMware are in progress. We'll update this bulletin with that information when it's available.</aside></p>
</td>
<td>Pending</td>
</tr>
</tbody>
</table>
</section>
<section>
<h3 data-text="GKE on AWS" id="gcp-2026-003-gkeaws" tabindex="-1">GKE on AWS</h3>
<table>
<thead>
<tr>
<th>Description</th>
<th>Severity</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<p>The following vulnerabilities were discovered in the Linux kernel that can lead
            to a privilege escalation on Container-Optimized OS nodes:
            </p><ul>
<li>CVE-2025-39964</li>
</ul>
<h4 data-text="What should I do?" id="what-should-i-do_32" tabindex="-1">What should I do?</h4>
<p><aside class="note"><strong>Note: </strong>Patch versions and a severity assessment for GKE on AWS are in progress. We'll update this bulletin with that information when it's available.</aside></p>
</td>
<td>Pending</td>
</tr>
</tbody>
</table>
</section>
<section>
<h3 data-text="GKE on Azure" id="gcp-2026-003-gkeazure" tabindex="-1">GKE on Azure</h3>
<table>
<thead>
<tr>
<th>Description</th>
<th>Severity</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<p>The following vulnerabilities were discovered in the Linux kernel that can lead
            to a privilege escalation on Container-Optimized OS nodes:
            </p><ul>
<li>CVE-2025-39964</li>
</ul>
<h4 data-text="What should I do?" id="what-should-i-do_33" tabindex="-1">What should I do?</h4>
<p><aside class="note"><strong>Note: </strong>Patch versions and a severity assessment for GKE on Azure are in progress. We'll update this bulletin with that information when it's available.</aside></p>
</td>
<td>Pending</td>
</tr>
</tbody>
</table>
</section>
<section>
<h3 data-text="GDC (bare metal)" id="gcp-2026-003-gdcbm" tabindex="-1">GDC (bare metal)</h3>
<table>
<thead>
<tr>
<th>Description</th>
<th>Severity</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<p>The following vulnerabilities were discovered in the Linux kernel that can lead
            to a privilege escalation on Container-Optimized OS nodes:
            </p><ul>
<li>CVE-2025-39964</li>
</ul>
<h4 data-text="What should I do?" id="what-should-i-do_34" tabindex="-1">What should I do?</h4>
<p>There is no action required. GDC software for bare metal isn't affected as it does not bundle an operating system in its distribution.</p>
</td>
<td>None</td>
</tr>
</tbody>
</table>
</section>
</devsite-selector>]]>
    </content>
  </entry>

  <entry>
    <title>GCP-2026-002</title>
    <id>tag:google.com,2016:gke-security-bulletins#gcp-2026-002</id>
    <updated>2026-01-07T00:00:00+00:00</updated>
    <link rel="alternate" href="https://docs.cloud.google.com/kubernetes-engine/security-bulletins#gcp-2026-002"/>
    <content type="html"><![CDATA[<p><strong>Published: </strong>2026-01-07<br/> <strong>Updated: </strong>2026-03-25<br/> <strong>Reference:</strong> <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40215">CVE-2025-40215</a></p><p><strong>2026-03-25 Update: </strong> Added patch versions for Ubuntu nodes with GKE.</p><devsite-selector>
<section>
<h3 data-text="GKE" id="gcp-2026-002-gke" tabindex="-1">GKE</h3>
<p><strong>Updated: </strong>2026-03-25</p>
<table>
<thead>
<tr>
<th>Description</th>
<th>Severity</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<p>The following vulnerabilities were discovered in the Linux kernel that can lead
          to a privilege escalation on Container-Optimized OS nodes:
          </p><ul>
<li>CVE-2025-40215</li>
</ul>
<p>GKE Standard clusters are impacted. GKE Autopilot clusters in the default configuration are not impacted, but might be vulnerable if you explicitly set the seccomp <code dir="ltr" translate="no">Unconfined</code> profile or allow <a href="https://docs.cloud.google.com/sdk/gcloud/reference/container/clusters/create-auto#--workload-policies"><code dir="ltr" translate="no">CAP_NET_ADMIN</code></a>.</p>
<p>Clusters using <a href="https://docs.cloud.google.com/kubernetes-engine/docs/concepts/sandbox-pods">GKE Sandbox</a> aren't impacted.</p>
<h4 data-text="What should I do?" id="what-should-i-do_35" tabindex="-1">What should I do?</h4>
<p><strong>2026-03-25 Update</strong>: The following versions of GKE are updated with code to fix this vulnerability on Ubuntu. Upgrade your Ubuntu node pools to the following versions or later:</p>
<ul>
<li>1.35.2-gke.1269000</li>
<li>1.34.4-gke.1193000</li>
<li>1.33.8-gke.1169000</li>
<li>1.32.13-gke.1059000</li>
<li>1.31.14-gke.1423000</li>
<li>1.30.14-gke.2071000</li>
</ul>
<hr/>
<p>The following minor versions are affected.
          <a href="https://docs.cloud.google.com/kubernetes-engine/docs/how-to/upgrading-a-container-cluster">Upgrade</a> your
          Container-Optimized OS node pools to one of the following patch versions or later:</p>
<ul>
<li>1.32.9-gke.1632000</li><li>1.29.15-gke.2553000</li><li>1.33.5-gke.1956000</li><li>1.34.1-gke.3556000</li><li>1.31.14-gke.1081000</li><li>1.30.14-gke.1794000</li><li>1.28.15-gke.3225000</li>
</ul>
<p>You can apply patch versions from newer release channels if your cluster runs the same
          minor version in its own release channel. This feature lets you secure your nodes until
          the patch version becomes the default in your release channel. For details, see
          <a href="https://docs.cloud.google.com/kubernetes-engine/docs/concepts/release-channels#newer-patch-versions">Run patch versions from a newer channel</a>.</p>
</td>
<td>High</td>
</tr>
</tbody>
</table>
</section>
<section>
<h3 data-text="GDC (VMware)" id="gcp-2026-002-gdcvmware" tabindex="-1">GDC (VMware)</h3>
<table>
<thead>
<tr>
<th>Description</th>
<th>Severity</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<p>The following vulnerabilities were discovered in the Linux kernel that can lead
            to a privilege escalation on Container-Optimized OS nodes:
            </p><ul>
<li>CVE-2025-40215</li>
</ul>
<h4 data-text="What should I do?" id="what-should-i-do_36" tabindex="-1">What should I do?</h4>
<p><aside class="note"><strong>Note: </strong>Patch versions and a severity assessment for GDC software for VMware are in progress. We'll update this bulletin with that information when it's available.</aside></p>
</td>
<td>Pending</td>
</tr>
</tbody>
</table>
</section>
<section>
<h3 data-text="GKE on AWS" id="gcp-2026-002-gkeaws" tabindex="-1">GKE on AWS</h3>
<table>
<thead>
<tr>
<th>Description</th>
<th>Severity</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<p>The following vulnerabilities were discovered in the Linux kernel that can lead
            to a privilege escalation on Container-Optimized OS nodes:
            </p><ul>
<li>CVE-2025-40215</li>
</ul>
<h4 data-text="What should I do?" id="what-should-i-do_37" tabindex="-1">What should I do?</h4>
<p><aside class="note"><strong>Note: </strong>Patch versions and a severity assessment for GKE on AWS are in progress. We'll update this bulletin with that information when it's available.</aside></p>
</td>
<td>Pending</td>
</tr>
</tbody>
</table>
</section>
<section>
<h3 data-text="GKE on Azure" id="gcp-2026-002-gkeazure" tabindex="-1">GKE on Azure</h3>
<table>
<thead>
<tr>
<th>Description</th>
<th>Severity</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<p>The following vulnerabilities were discovered in the Linux kernel that can lead
            to a privilege escalation on Container-Optimized OS nodes:
            </p><ul>
<li>CVE-2025-40215</li>
</ul>
<h4 data-text="What should I do?" id="what-should-i-do_38" tabindex="-1">What should I do?</h4>
<p><aside class="note"><strong>Note: </strong>Patch versions and a severity assessment for GKE on Azure are in progress. We'll update this bulletin with that information when it's available.</aside></p>
</td>
<td>Pending</td>
</tr>
</tbody>
</table>
</section>
<section>
<h3 data-text="GDC (bare metal)" id="gcp-2026-002-gdcbm" tabindex="-1">GDC (bare metal)</h3>
<table>
<thead>
<tr>
<th>Description</th>
<th>Severity</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<p>The following vulnerabilities were discovered in the Linux kernel that can lead
            to a privilege escalation on Container-Optimized OS nodes:
            </p><ul>
<li>CVE-2025-40215</li>
</ul>
<h4 data-text="What should I do?" id="what-should-i-do_39" tabindex="-1">What should I do?</h4>
<p>There is no action required. GDC software for bare metal isn't affected as it does not bundle an operating system in its distribution.</p>
</td>
<td>None</td>
</tr>
</tbody>
</table>
</section>
</devsite-selector>]]>
    </content>
  </entry>

  <entry>
    <title>GCP-2026-001</title>
    <id>tag:google.com,2016:gke-security-bulletins#gcp-2026-001</id>
    <updated>2026-01-07T00:00:00+00:00</updated>
    <link rel="alternate" href="https://docs.cloud.google.com/kubernetes-engine/security-bulletins#gcp-2026-001"/>
    <content type="html"><![CDATA[<p><strong>Published: </strong>2026-01-07<br/> <strong>Reference:</strong> <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40214">CVE-2025-40214</a></p><devsite-selector>
<section>
<h3 data-text="GKE" id="gcp-2026-001-gke" tabindex="-1">GKE</h3>
<table>
<thead>
<tr>
<th>Description</th>
<th>Severity</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<p>The following vulnerabilities were discovered in the Linux kernel that can lead
          to a privilege escalation on Container-Optimized OS nodes:
          </p><ul>
<li>CVE-2025-40214</li>
</ul>
<p>GKE Standard and Autopilot clusters are impacted.</p>
<p>Clusters using <a href="https://docs.cloud.google.com/kubernetes-engine/docs/concepts/sandbox-pods">GKE Sandbox</a> aren't impacted.</p>
<h4 data-text="What should I do?" id="what-should-i-do_40" tabindex="-1">What should I do?</h4>
<p>The following minor versions are affected.
          <a href="https://docs.cloud.google.com/kubernetes-engine/docs/how-to/upgrading-a-container-cluster">Upgrade</a> your
          Container-Optimized OS node pools to one of the following patch versions or later:</p>
<ul>
<li>1.32.9-gke.1632000</li><li>1.28.15-gke.3225000</li><li>1.33.5-gke.1956000</li><li>1.34.1-gke.3556000</li><li>1.30.14-gke.1794000</li><li>1.31.14-gke.1081000</li><li>1.29.15-gke.2553000</li>
</ul>
<p>You can apply patch versions from newer release channels if your cluster runs the same
          minor version in its own release channel. This feature lets you secure your nodes until
          the patch version becomes the default in your release channel. For details, see
          <a href="https://docs.cloud.google.com/kubernetes-engine/docs/concepts/release-channels#newer-patch-versions">Run patch versions from a newer channel</a>.</p>
</td>
<td>High</td>
</tr>
</tbody>
</table>
</section>
<section>
<h3 data-text="GDC (VMware)" id="gcp-2026-001-gdcvmware" tabindex="-1">GDC (VMware)</h3>
<table>
<thead>
<tr>
<th>Description</th>
<th>Severity</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<p>The following vulnerabilities were discovered in the Linux kernel that can lead
            to a privilege escalation on Container-Optimized OS nodes:
            </p><ul>
<li>CVE-2025-40214</li>
</ul>
<h4 data-text="What should I do?" id="what-should-i-do_41" tabindex="-1">What should I do?</h4>
<p><aside class="note"><strong>Note: </strong>Patch versions and a severity assessment for GDC software for VMware are in progress. We'll update this bulletin with that information when it's available.</aside></p>
</td>
<td>Pending</td>
</tr>
</tbody>
</table>
</section>
<section>
<h3 data-text="GKE on AWS" id="gcp-2026-001-gkeaws" tabindex="-1">GKE on AWS</h3>
<table>
<thead>
<tr>
<th>Description</th>
<th>Severity</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<p>The following vulnerabilities were discovered in the Linux kernel that can lead
            to a privilege escalation on Container-Optimized OS nodes:
            </p><ul>
<li>CVE-2025-40214</li>
</ul>
<h4 data-text="What should I do?" id="what-should-i-do_42" tabindex="-1">What should I do?</h4>
<p><aside class="note"><strong>Note: </strong>Patch versions and a severity assessment for GKE on AWS are in progress. We'll update this bulletin with that information when it's available.</aside></p>
</td>
<td>Pending</td>
</tr>
</tbody>
</table>
</section>
<section>
<h3 data-text="GKE on Azure" id="gcp-2026-001-gkeazure" tabindex="-1">GKE on Azure</h3>
<table>
<thead>
<tr>
<th>Description</th>
<th>Severity</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<p>The following vulnerabilities were discovered in the Linux kernel that can lead
            to a privilege escalation on Container-Optimized OS nodes:
            </p><ul>
<li>CVE-2025-40214</li>
</ul>
<h4 data-text="What should I do?" id="what-should-i-do_43" tabindex="-1">What should I do?</h4>
<p><aside class="note"><strong>Note: </strong>Patch versions and a severity assessment for GKE on Azure are in progress. We'll update this bulletin with that information when it's available.</aside></p>
</td>
<td>Pending</td>
</tr>
</tbody>
</table>
</section>
<section>
<h3 data-text="GDC (bare metal)" id="gcp-2026-001-gdcbm" tabindex="-1">GDC (bare metal)</h3>
<table>
<thead>
<tr>
<th>Description</th>
<th>Severity</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<p>The following vulnerabilities were discovered in the Linux kernel that can lead
            to a privilege escalation on Container-Optimized OS nodes:
            </p><ul>
<li>CVE-2025-40214</li>
</ul>
<h4 data-text="What should I do?" id="what-should-i-do_44" tabindex="-1">What should I do?</h4>
<p>There is no action required. GDC software for bare metal isn't affected as it does not bundle an operating system in its distribution.</p>
</td>
<td>None</td>
</tr>
</tbody>
</table>
</section>
</devsite-selector>]]>
    </content>
  </entry>

  <entry>
    <title>GCP-2025-074</title>
    <id>tag:google.com,2016:gke-security-bulletins#gcp-2025-074</id>
    <updated>2025-12-05T00:00:00+00:00</updated>
    <link rel="alternate" href="https://docs.cloud.google.com/kubernetes-engine/security-bulletins#gcp-2025-074"/>
    <content type="html"><![CDATA[<p><strong>Published: </strong>2025-12-05<br/> <strong>Reference:</strong> <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39965">CVE-2025-39965</a></p><devsite-selector>
<section>
<h3 data-text="GKE" id="gcp-2025-074-gke" tabindex="-1">GKE</h3>
<table>
<thead>
<tr>
<th>Description</th>
<th>Severity</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<p>The following vulnerabilities were discovered in the Linux kernel that can lead
          to a privilege escalation on Container-Optimized OS nodes:
          </p><ul>
<li>CVE-2025-39965</li>
</ul>
<p>GKE Standard clusters are impacted. GKE Autopilot clusters in the default configuration are not impacted, but might be vulnerable if you explicitly set the seccomp <code dir="ltr" translate="no">Unconfined</code> profile or allow <a href="https://docs.cloud.google.com/sdk/gcloud/reference/container/clusters/create-auto#--workload-policies"><code dir="ltr" translate="no">CAP_NET_ADMIN</code></a>.</p>
<p>Clusters using <a href="https://docs.cloud.google.com/kubernetes-engine/docs/concepts/sandbox-pods">GKE Sandbox</a> aren't impacted.</p>
<h4 data-text="What should I do?" id="what-should-i-do_45" tabindex="-1">What should I do?</h4>
<p>The following minor versions are affected.
          <a href="https://docs.cloud.google.com/kubernetes-engine/docs/how-to/upgrading-a-container-cluster">Upgrade</a> your
          Container-Optimized OS node pools to one of the following patch versions or later:</p>
<ul>
<li>1.32.9-gke.1330000</li><li>1.34.1-gke.2541000</li><li>1.33.5-gke.1350000</li><li>1.31.13-gke.1231000</li>
</ul>
<p>You can apply patch versions from newer release channels if your cluster runs the same
          minor version in its own release channel. This feature lets you secure your nodes until
          the patch version becomes the default in your release channel. For details, see
          <a href="https://docs.cloud.google.com/kubernetes-engine/docs/concepts/release-channels#newer-patch-versions">Run patch versions from a newer channel</a>.</p>
</td>
<td>High</td>
</tr>
</tbody>
</table>
</section>
<section>
<h3 data-text="GDC (VMware)" id="gcp-2025-074-gdcvmware" tabindex="-1">GDC (VMware)</h3>
<table>
<thead>
<tr>
<th>Description</th>
<th>Severity</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<p>The following vulnerabilities were discovered in the Linux kernel that can lead
            to a privilege escalation on Container-Optimized OS nodes:
            </p><ul>
<li>CVE-2025-39965</li>
</ul>
<h4 data-text="What should I do?" id="what-should-i-do_46" tabindex="-1">What should I do?</h4>
<p><aside class="note"><strong>Note: </strong>Patch versions and a severity assessment for GDC software for VMware are in progress. We'll update this bulletin with that information when it's available.</aside></p>
</td>
<td>Pending</td>
</tr>
</tbody>
</table>
</section>
<section>
<h3 data-text="GKE on AWS" id="gcp-2025-074-gkeaws" tabindex="-1">GKE on AWS</h3>
<table>
<thead>
<tr>
<th>Description</th>
<th>Severity</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<p>The following vulnerabilities were discovered in the Linux kernel that can lead
            to a privilege escalation on Container-Optimized OS nodes:
            </p><ul>
<li>CVE-2025-39965</li>
</ul>
<h4 data-text="What should I do?" id="what-should-i-do_47" tabindex="-1">What should I do?</h4>
<p><aside class="note"><strong>Note: </strong>Patch versions and a severity assessment for GKE on AWS are in progress. We'll update this bulletin with that information when it's available.</aside></p>
</td>
<td>Pending</td>
</tr>
</tbody>
</table>
</section>
<section>
<h3 data-text="GKE on Azure" id="gcp-2025-074-gkeazure" tabindex="-1">GKE on Azure</h3>
<table>
<thead>
<tr>
<th>Description</th>
<th>Severity</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<p>The following vulnerabilities were discovered in the Linux kernel that can lead
            to a privilege escalation on Container-Optimized OS nodes:
            </p><ul>
<li>CVE-2025-39965</li>
</ul>
<h4 data-text="What should I do?" id="what-should-i-do_48" tabindex="-1">What should I do?</h4>
<p><aside class="note"><strong>Note: </strong>Patch versions and a severity assessment for GKE on Azure are in progress. We'll update this bulletin with that information when it's available.</aside></p>
</td>
<td>Pending</td>
</tr>
</tbody>
</table>
</section>
<section>
<h3 data-text="GDC (bare metal)" id="gcp-2025-074-gdcbm" tabindex="-1">GDC (bare metal)</h3>
<table>
<thead>
<tr>
<th>Description</th>
<th>Severity</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<p>The following vulnerabilities were discovered in the Linux kernel that can lead
            to a privilege escalation on Container-Optimized OS nodes:
            </p><ul>
<li>CVE-2025-39965</li>
</ul>
<h4 data-text="What should I do?" id="what-should-i-do_49" tabindex="-1">What should I do?</h4>
<p>There is no action required. GDC software for bare metal isn't affected as it does not bundle an operating system in its distribution.</p>
</td>
<td>None</td>
</tr>
</tbody>
</table>
</section>
</devsite-selector>]]>
    </content>
  </entry>

  <entry>
    <title>GCP-2025-071</title>
    <id>tag:google.com,2016:gke-security-bulletins#gcp-2025-071</id>
    <updated>2025-12-02T00:00:00+00:00</updated>
    <link rel="alternate" href="https://docs.cloud.google.com/kubernetes-engine/security-bulletins#gcp-2025-071"/>
    <content type="html"><![CDATA[<p><strong>Published: </strong>2025-12-02<br/> <strong>Updated: </strong>2026-03-25<br/> <strong>Reference:</strong> <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40019">CVE-2025-40019</a></p><p><strong>2026-03-25 Update: </strong> Added patch versions for Ubuntu nodes with GKE.</p><p><strong>2025-12-11 Update: </strong> Added patch versions and a severity rating for GDC (VMware).</p><devsite-selector>
<section>
<h3 data-text="GKE" id="gcp-2025-071-gke" tabindex="-1">GKE</h3>
<p><strong>Updated: </strong>2026-03-25</p>
<table>
<thead>
<tr>
<th>Description</th>
<th>Severity</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<p>The following vulnerabilities were discovered in the Linux kernel that can lead
          to a privilege escalation on Container-Optimized OS nodes:
          </p><ul>
<li>CVE-2025-40019</li>
</ul>
<p>GKE Standard and Autopilot clusters are impacted.</p>
<p>Clusters using <a href="https://docs.cloud.google.com/kubernetes-engine/docs/concepts/sandbox-pods">GKE Sandbox</a> aren't impacted.</p>
<h4 data-text="What should I do?" id="what-should-i-do_50" tabindex="-1">What should I do?</h4>
<p><strong>2026-03-25 Update</strong>: The following versions of GKE are updated with code to fix this vulnerability on Ubuntu. Upgrade your Ubuntu node pools to the following versions or later:</p>
<ul>
<li>1.35.1-gke.1396000</li>
<li>1.34.4-gke.1047000</li>
<li>1.33.8-gke.1026000</li>
<li>1.32.12-gke.1026000</li>
<li>1.31.14-gke.1476000</li>
<li>1.30.14-gke.2117000</li>
</ul>
<hr/>
<p>The following minor versions are affected.
          <a href="https://docs.cloud.google.com/kubernetes-engine/docs/how-to/upgrading-a-container-cluster">Upgrade</a> your
          Container-Optimized OS node pools to one of the following patch versions or later:</p>
<ul>
<li>1.28.15-gke.2966000</li><li>1.32.9-gke.1330000</li><li>1.33.5-gke.1350000</li><li>1.29.15-gke.2236000</li><li>1.31.13-gke.1231000</li><li>1.30.14-gke.1525000</li><li>1.34.1-gke.2541000</li>
</ul>
<p>You can apply patch versions from newer release channels if your cluster runs the same
          minor version in its own release channel. This feature lets you secure your nodes until
          the patch version becomes the default in your release channel. For details, see
          <a href="https://docs.cloud.google.com/kubernetes-engine/docs/concepts/release-channels#newer-patch-versions">Run patch versions from a newer channel</a>.</p>
</td>
<td>High</td>
</tr>
</tbody>
</table>
</section>
<section>
<h3 data-text="GDC (VMware)" id="gcp-2025-071-gdcvmware" tabindex="-1">GDC (VMware)</h3>
<p><strong>Updated: </strong>2025-12-11</p>
<table>
<thead>
<tr>
<th>Description</th>
<th>Severity</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<p>The following vulnerabilities were discovered in the Linux kernel that can lead
            to a privilege escalation on Container-Optimized OS nodes:
            </p><ul>
<li>CVE-2025-40019</li>
</ul>
<h4 data-text="What should I do?" id="what-should-i-do_51" tabindex="-1">What should I do?</h4>
<p>The following versions of GDC (VMware) are updated with code to fix this vulnerability.
            Upgrade your GDC (VMware) clusters to the following versions or later:</p>
<ul>
<li>1.31.1100-gke.40</li>
</ul>
<hr/>
<p><aside class="note"><strong>Note: </strong>Patch versions and a severity assessment for GDC software for VMware are in progress. We'll update this bulletin with that information when it's available.</aside></p>
</td>
<td>High</td>
</tr>
</tbody>
</table>
</section>
<section>
<h3 data-text="GKE on AWS" id="gcp-2025-071-gkeaws" tabindex="-1">GKE on AWS</h3>
<table>
<thead>
<tr>
<th>Description</th>
<th>Severity</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<p>The following vulnerabilities were discovered in the Linux kernel that can lead
            to a privilege escalation on Container-Optimized OS nodes:
            </p><ul>
<li>CVE-2025-40019</li>
</ul>
<h4 data-text="What should I do?" id="what-should-i-do_52" tabindex="-1">What should I do?</h4>
<p><aside class="note"><strong>Note: </strong>Patch versions and a severity assessment for GKE on AWS are in progress. We'll update this bulletin with that information when it's available.</aside></p>
</td>
<td>Pending</td>
</tr>
</tbody>
</table>
</section>
<section>
<h3 data-text="GKE on Azure" id="gcp-2025-071-gkeazure" tabindex="-1">GKE on Azure</h3>
<table>
<thead>
<tr>
<th>Description</th>
<th>Severity</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<p>The following vulnerabilities were discovered in the Linux kernel that can lead
            to a privilege escalation on Container-Optimized OS nodes:
            </p><ul>
<li>CVE-2025-40019</li>
</ul>
<h4 data-text="What should I do?" id="what-should-i-do_53" tabindex="-1">What should I do?</h4>
<p><aside class="note"><strong>Note: </strong>Patch versions and a severity assessment for GKE on Azure are in progress. We'll update this bulletin with that information when it's available.</aside></p>
</td>
<td>Pending</td>
</tr>
</tbody>
</table>
</section>
<section>
<h3 data-text="GDC (bare metal)" id="gcp-2025-071-gdcbm" tabindex="-1">GDC (bare metal)</h3>
<table>
<thead>
<tr>
<th>Description</th>
<th>Severity</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<p>The following vulnerabilities were discovered in the Linux kernel that can lead
            to a privilege escalation on Container-Optimized OS nodes:
            </p><ul>
<li>CVE-2025-40019</li>
</ul>
<h4 data-text="What should I do?" id="what-should-i-do_54" tabindex="-1">What should I do?</h4>
<p>There is no action required. GDC software for bare metal isn't affected as it does not bundle an operating system in its distribution.</p>
</td>
<td>None</td>
</tr>
</tbody>
</table>
</section>
</devsite-selector>]]>
    </content>
  </entry>

  <entry>
    <title>GCP-2025-070</title>
    <id>tag:google.com,2016:gke-security-bulletins#gcp-2025-070</id>
    <updated>2025-12-02T00:00:00+00:00</updated>
    <link rel="alternate" href="https://docs.cloud.google.com/kubernetes-engine/security-bulletins#gcp-2025-070"/>
    <content type="html"><![CDATA[<p><strong>Published: </strong>2025-12-02<br/> <strong>Updated: </strong>2026-03-25<br/> <strong>Reference:</strong> <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40018">CVE-2025-40018</a></p><p><strong>2026-03-25 Update: </strong> Added patch versions for Ubuntu nodes with GKE.</p><p><strong>2025-12-11 Update: </strong> Added patch versions and a severity rating for GDC (VMware).</p><devsite-selector>
<section>
<h3 data-text="GKE" id="gcp-2025-070-gke" tabindex="-1">GKE</h3>
<p><strong>Updated: </strong>2026-03-25</p>
<table>
<thead>
<tr>
<th>Description</th>
<th>Severity</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<p>The following vulnerabilities were discovered in the Linux kernel that can lead
          to a privilege escalation on Container-Optimized OS nodes:
          </p><ul>
<li>CVE-2025-40018</li>
</ul>
<p>GKE Standard clusters are impacted. GKE Autopilot clusters in the default configuration are not impacted, but might be vulnerable if you explicitly set the seccomp <code dir="ltr" translate="no">Unconfined</code> profile or allow <a href="https://docs.cloud.google.com/sdk/gcloud/reference/container/clusters/create-auto#--workload-policies"><code dir="ltr" translate="no">CAP_NET_ADMIN</code></a>.</p>
<p>Clusters using <a href="https://docs.cloud.google.com/kubernetes-engine/docs/concepts/sandbox-pods">GKE Sandbox</a> aren't impacted.</p>
<h4 data-text="What should I do?" id="what-should-i-do_55" tabindex="-1">What should I do?</h4>
<p><strong>2026-03-25 Update</strong>: The following versions of GKE are updated with code to fix this vulnerability on Ubuntu. Upgrade your Ubuntu node pools to the following versions or later:</p>
<ul>
<li>1.35.1-gke.1396000</li>
<li>1.34.4-gke.1047000</li>
<li>1.33.8-gke.1026000</li>
<li>1.32.12-gke.1026000</li>
<li>1.31.14-gke.1336000</li>
<li>1.30.14-gke.1991000</li>
</ul>
<hr/>
<p>The following minor versions are affected.
          <a href="https://docs.cloud.google.com/kubernetes-engine/docs/how-to/upgrading-a-container-cluster">Upgrade</a> your
          Container-Optimized OS node pools to one of the following patch versions or later:</p>
<ul>
<li>1.32.9-gke.1330000</li><li>1.29.15-gke.2236000</li><li>1.30.14-gke.1525000</li><li>1.31.13-gke.1231000</li><li>1.34.1-gke.2541000</li><li>1.28.15-gke.2966000</li><li>1.33.5-gke.1350000</li>
</ul>
<p>You can apply patch versions from newer release channels if your cluster runs the same
          minor version in its own release channel. This feature lets you secure your nodes until
          the patch version becomes the default in your release channel. For details, see
          <a href="https://docs.cloud.google.com/kubernetes-engine/docs/concepts/release-channels#newer-patch-versions">Run patch versions from a newer channel</a>.</p>
</td>
<td>High</td>
</tr>
</tbody>
</table>
</section>
<section>
<h3 data-text="GDC (VMware)" id="gcp-2025-070-gdcvmware" tabindex="-1">GDC (VMware)</h3>
<p><strong>Updated: </strong>2025-12-11</p>
<table>
<thead>
<tr>
<th>Description</th>
<th>Severity</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<p>The following vulnerabilities were discovered in the Linux kernel that can lead
            to a privilege escalation on Container-Optimized OS nodes:
            </p><ul>
<li>CVE-2025-40018</li>
</ul>
<h4 data-text="What should I do?" id="what-should-i-do_56" tabindex="-1">What should I do?</h4>
<p>The following versions of GDC (VMware) are updated with code to fix this vulnerability.
            Upgrade your GDC (VMware) clusters to the following versions or later:</p>
<ul>
<li>1.31.1100-gke.40</li>
</ul>
<hr/>
<p><aside class="note"><strong>Note: </strong>Patch versions and a severity assessment for GDC software for VMware are in progress. We'll update this bulletin with that information when it's available.</aside></p>
</td>
<td>High</td>
</tr>
</tbody>
</table>
</section>
<section>
<h3 data-text="GKE on AWS" id="gcp-2025-070-gkeaws" tabindex="-1">GKE on AWS</h3>
<table>
<thead>
<tr>
<th>Description</th>
<th>Severity</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<p>The following vulnerabilities were discovered in the Linux kernel that can lead
            to a privilege escalation on Container-Optimized OS nodes:
            </p><ul>
<li>CVE-2025-40018</li>
</ul>
<h4 data-text="What should I do?" id="what-should-i-do_57" tabindex="-1">What should I do?</h4>
<p><aside class="note"><strong>Note: </strong>Patch versions and a severity assessment for GKE on AWS are in progress. We'll update this bulletin with that information when it's available.</aside></p>
</td>
<td>Pending</td>
</tr>
</tbody>
</table>
</section>
<section>
<h3 data-text="GKE on Azure" id="gcp-2025-070-gkeazure" tabindex="-1">GKE on Azure</h3>
<table>
<thead>
<tr>
<th>Description</th>
<th>Severity</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<p>The following vulnerabilities were discovered in the Linux kernel that can lead
            to a privilege escalation on Container-Optimized OS nodes:
            </p><ul>
<li>CVE-2025-40018</li>
</ul>
<h4 data-text="What should I do?" id="what-should-i-do_58" tabindex="-1">What should I do?</h4>
<p><aside class="note"><strong>Note: </strong>Patch versions and a severity assessment for GKE on Azure are in progress. We'll update this bulletin with that information when it's available.</aside></p>
</td>
<td>Pending</td>
</tr>
</tbody>
</table>
</section>
<section>
<h3 data-text="GDC (bare metal)" id="gcp-2025-070-gdcbm" tabindex="-1">GDC (bare metal)</h3>
<table>
<thead>
<tr>
<th>Description</th>
<th>Severity</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<p>The following vulnerabilities were discovered in the Linux kernel that can lead
            to a privilege escalation on Container-Optimized OS nodes:
            </p><ul>
<li>CVE-2025-40018</li>
</ul>
<h4 data-text="What should I do?" id="what-should-i-do_59" tabindex="-1">What should I do?</h4>
<p>There is no action required. GDC software for bare metal isn't affected as it does not bundle an operating system in its distribution.</p>
</td>
<td>None</td>
</tr>
</tbody>
</table>
</section>
</devsite-selector>]]>
    </content>
  </entry>

  <entry>
    <title>GCP-2025-066</title>
    <id>tag:google.com,2016:gke-security-bulletins#gcp-2025-066</id>
    <updated>2025-11-10T00:00:00+00:00</updated>
    <link rel="alternate" href="https://docs.cloud.google.com/kubernetes-engine/security-bulletins#gcp-2025-066"/>
    <content type="html"><![CDATA[<p><strong>Published: </strong>2025-11-10<br/> <strong>Updated: </strong>2025-11-27<br/> <strong>Reference:</strong> <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31133">CVE-2025-31133</a>, <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-52565">CVE-2025-52565</a>, <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-52881">CVE-2025-52881</a></p><p><strong>2025-11-27 Update: </strong> Added patch versions for GKE and GDC (bare metal).</p><devsite-selector>
<section>
<h3 data-text="GKE" id="gcp-2025-066-gke" tabindex="-1">GKE</h3>
<p><strong>Updated: </strong>2025-11-27</p>
<table>
<thead>
<tr>
<th>Description</th>
<th>Severity</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<p>Several security issues have been discovered in runc, an open source software component used for running containers on GKE. The vulnerabilities (CVE-2025-31133, CVE-2025-52565, and CVE-2025-52881) allow an attacker to execute a full container breakout, leading to root privilege escalation on the host node. An actor with privileges to deploy a malicious container image can exploit these vulnerabilities.</p>
<p>These vulnerabilities affect GKE Standard clusters running either Container-Optimized OS (COS) or Ubuntu node images, as well as Autopilot clusters. Node pools using GKE Sandbox are not affected and Windows node pools are not affected.</p>
<h4 data-text="What should I do?" id="what-should-i-do_60" tabindex="-1">What should I do?</h4>
<p><strong>2025-11-27 Update:</strong>
        The following versions of GKE are updated with code to fix these
        vulnerabilities on Container-Optimized OS. Upgrade your GKE node pools to the following versions or later:
        </p><ul>
<li>1.34.1-gke.3355000</li>
<li>1.33.5-gke.1791000</li>
<li>1.32.9-gke.1548000</li>
<li>1.31.13-gke.1454000</li>
<li>1.30.14-gke.1719000</li>
<li>1.29.15-gke.2467000</li>
<li>1.28.15-gke.3163000</li>
</ul>
<p>The following GKE versions have been updated with code to fix these
        vulnerabilities on Ubuntu. Upgrade your GKE node pools to the following
        versions or later:</p>
<ul>
<li>1.33.5-gke.1791000</li>
</ul>
<p>You can apply patch versions from newer release channels if your cluster runs the same
          minor version in its own release channel. This feature lets you secure your nodes until
          the patch version becomes the default in your release channel. For details, see
          <a href="https://docs.cloud.google.com/kubernetes-engine/docs/concepts/release-channels#newer-patch-versions">Run patch versions from a newer channel</a>.</p>
<hr/>
<p>GKE is developing new versions that include the fixes for these vulnerabilities. This bulletin will be updated once these new versions are available.</p>
</td>
<td>High</td>
</tr>
</tbody>
</table>
</section>
<section>
<h3 data-text="GDC (VMware)" id="gcp-2025-066-gdcvmware" tabindex="-1">GDC (VMware)</h3>
<table>
<thead>
<tr>
<th>Description</th>
<th>Severity</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<p>Several security issues have been discovered in runc, an open source software component used for running containers on GKE. The vulnerabilities (CVE-2025-31133, CVE-2025-52565, and CVE-2025-52881) allow an attacker to execute a full container breakout, leading to root privilege escalation on the host node. An actor with privileges to deploy a malicious container image can exploit these vulnerabilities.</p>
<p><strong>What should I do?</strong></p>
<p>GKE is developing new versions that include the fixes for these vulnerabilities. This bulletin will be updated once these new versions are available.</p>
</td>
<td>High</td>
</tr>
</tbody>
</table>
</section>
<section>
<h3 data-text="GKE on AWS" id="gcp-2025-066-gkeaws" tabindex="-1">GKE on AWS</h3>
<table>
<thead>
<tr>
<th>Description</th>
<th>Severity</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<p>Several security issues have been discovered in runc, an open source software component used for running containers on GKE. The vulnerabilities (CVE-2025-31133, CVE-2025-52565, and CVE-2025-52881) allow an attacker to execute a full container breakout, leading to root privilege escalation on the host node. An actor with privileges to deploy a malicious container image can exploit these vulnerabilities.</p>
<p><strong>What should I do?</strong></p>
<p>GKE is developing new versions that include the fixes for these vulnerabilities. This bulletin will be updated once these new versions are available.</p>
</td>
<td>High</td>
</tr>
</tbody>
</table>
</section>
<section>
<h3 data-text="GKE on Azure" id="gcp-2025-066-gkeazure" tabindex="-1">GKE on Azure</h3>
<table>
<thead>
<tr>
<th>Description</th>
<th>Severity</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<p>Several security issues have been discovered in runc, an open source software component used for running containers on GKE. The vulnerabilities (CVE-2025-31133, CVE-2025-52565, and CVE-2025-52881) allow an attacker to execute a full container breakout, leading to root privilege escalation on the host node. An actor with privileges to deploy a malicious container image can exploit these vulnerabilities.</p>
<p><strong>What should I do?</strong></p>
<p>GKE is developing new versions that include the fixes for these vulnerabilities. This bulletin will be updated once these new versions are available.</p>
</td>
<td>High</td>
</tr>
</tbody>
</table>
</section>
<section>
<h3 data-text="GDC (bare metal)" id="gcp-2025-066-gdcbm" tabindex="-1">GDC (bare metal)</h3>
<p><strong>Updated: </strong>2025-11-27</p>
<table>
<thead>
<tr>
<th>Description</th>
<th>Severity</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<p>Several security issues have been discovered in runc, an open source software component used for running containers on GKE. The vulnerabilities (CVE-2025-31133, CVE-2025-52565, and CVE-2025-52881) allow an attacker to execute a full container breakout, leading to root privilege escalation on the host node. An actor with privileges to deploy a malicious container image can exploit these vulnerabilities.</p>
<h4 data-text="What should I do?" id="what-should-i-do_61" tabindex="-1">What should I do?</h4>
<p><strong>2025-11-27 Update: </strong>The following versions of
            GDC (bare metal) are updated with code to fix this vulnerability. Upgrade
            your GDC (bare metal) clusters to these versions or later:</p>
<ul>
<li>1.31.1000-gke.44</li>
</ul>
<hr/>
<p>GKE is developing new versions that include the fixes for these vulnerabilities. This bulletin will be updated once these new versions are available.</p>
</td>
<td>High</td>
</tr>
</tbody>
</table>
</section>
</devsite-selector>]]>
    </content>
  </entry>

  <entry>
    <title>GCP-2025-063</title>
    <id>tag:google.com,2016:gke-security-bulletins#gcp-2025-063</id>
    <updated>2025-10-28T00:00:00+00:00</updated>
    <link rel="alternate" href="https://docs.cloud.google.com/kubernetes-engine/security-bulletins#gcp-2025-063"/>
    <content type="html"><![CDATA[<p><strong>Published: </strong>2025-10-28<br/> <strong>Updated: </strong>2025-11-17<br/> <strong>Reference:</strong> <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39682">CVE-2025-39682</a></p><p><strong>2025-10-30 Update: </strong> Added patch versions and a severity rating for GDC software for VMware.</p><devsite-selector>
<section>
<h3 data-text="GKE" id="gcp-2025-063-gke" tabindex="-1">GKE</h3>
<p><strong>Updated: </strong>2025-11-17</p>
<table>
<thead>
<tr>
<th>Description</th>
<th>Severity</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<p>The following vulnerabilities were discovered in the Linux kernel that can lead
          to a privilege escalation on Container-Optimized OS nodes:
          </p><ul>
<li>CVE-2025-39682</li>
</ul>
<p>GKE Standard and Autopilot clusters are impacted.</p>
<p>Clusters using <a href="https://docs.cloud.google.com/kubernetes-engine/docs/concepts/sandbox-pods">GKE Sandbox</a> aren't impacted.</p>
<h4 data-text="What should I do?" id="what-should-i-do_62" tabindex="-1">What should I do?</h4>
<p><strong>2025-11-17 Update:</strong>
        The following versions of GKE are updated with code to fix this
        vulnerability on Ubuntu. Upgrade your Ubuntu node pools to the following versions or later:
        </p><ul>
<li>1.32.9-gke.1462000</li>
<li>1.33.5-gke.1697000</li>
<li>1.34.1-gke.2909000</li>
</ul>
<hr/>
<p>The following minor versions are affected.
          <a href="https://docs.cloud.google.com/kubernetes-engine/docs/how-to/upgrading-a-container-cluster">Upgrade</a> your
          Container-Optimized OS node pools to one of the following patch versions or later:</p>
<ul>
<li>1.33.5-gke.1162000</li><li>1.32.9-gke.1072000</li><li>1.28.15-gke.2751000</li><li>1.34.1-gke.1127000</li><li>1.30.14-gke.1267000</li><li>1.31.13-gke.1023000</li><li>1.29.15-gke.1936000</li>
</ul>
<p>You can apply patch versions from newer release channels if your cluster runs the same
          minor version in its own release channel. This feature lets you secure your nodes until
          the patch version becomes the default in your release channel. For details, see
          <a href="https://docs.cloud.google.com/kubernetes-engine/docs/concepts/release-channels#newer-patch-versions">Run patch versions from a newer channel</a>.</p>
</td>
<td>High</td>
</tr>
</tbody>
</table>
</section>
<section>
<h3 data-text="GDC (VMware)" id="gcp-2025-063-gdcvmware" tabindex="-1">GDC (VMware)</h3>
<p><strong>Updated: </strong>2025-10-30</p>
<table>
<thead>
<tr>
<th>Description</th>
<th>Severity</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<p>The following vulnerabilities were discovered in the Linux kernel that can lead
            to a privilege escalation on Container-Optimized OS nodes:
            </p><ul>
<li>CVE-2025-39682</li>
</ul>
<h4 data-text="What should I do?" id="what-should-i-do_63" tabindex="-1">What should I do?</h4>
<p><strong>2025-10-30 Update: </strong>The following versions of
            GDC software for VMware are updated with code to fix this vulnerability. Upgrade
            your GDC software for VMware clusters to these versions or later:</p>
<ul>
<li>1.31.1000-gke.44</li>
</ul>
<hr/>
<p><aside class="note"><strong>Note: </strong>Patch versions and a severity assessment for GDC software for VMware are in progress. We'll update this bulletin with that information when it's available.</aside></p>
</td>
<td>Pending</td>
</tr>
</tbody>
</table>
</section>
<section>
<h3 data-text="GKE on AWS" id="gcp-2025-063-gkeaws" tabindex="-1">GKE on AWS</h3>
<table>
<thead>
<tr>
<th>Description</th>
<th>Severity</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<p>The following vulnerabilities were discovered in the Linux kernel that can lead
            to a privilege escalation on Container-Optimized OS nodes:
            </p><ul>
<li>CVE-2025-39682</li>
</ul>
<h4 data-text="What should I do?" id="what-should-i-do_64" tabindex="-1">What should I do?</h4>
<p><aside class="note"><strong>Note: </strong>Patch versions and a severity assessment for GKE on AWS are in progress. We'll update this bulletin with that information when it's available.</aside></p>
</td>
<td>Pending</td>
</tr>
</tbody>
</table>
</section>
<section>
<h3 data-text="GKE on Azure" id="gcp-2025-063-gkeazure" tabindex="-1">GKE on Azure</h3>
<table>
<thead>
<tr>
<th>Description</th>
<th>Severity</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<p>The following vulnerabilities were discovered in the Linux kernel that can lead
            to a privilege escalation on Container-Optimized OS nodes:
            </p><ul>
<li>CVE-2025-39682</li>
</ul>
<h4 data-text="What should I do?" id="what-should-i-do_65" tabindex="-1">What should I do?</h4>
<p><aside class="note"><strong>Note: </strong>Patch versions and a severity assessment for GKE on Azure are in progress. We'll update this bulletin with that information when it's available.</aside></p>
</td>
<td>Pending</td>
</tr>
</tbody>
</table>
</section>
<section>
<h3 data-text="GDC (bare metal)" id="gcp-2025-063-gdcbm" tabindex="-1">GDC (bare metal)</h3>
<table>
<thead>
<tr>
<th>Description</th>
<th>Severity</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<p>The following vulnerabilities were discovered in the Linux kernel that can lead
            to a privilege escalation on Container-Optimized OS nodes:
            </p><ul>
<li>CVE-2025-39682</li>
</ul>
<h4 data-text="What should I do?" id="what-should-i-do_66" tabindex="-1">What should I do?</h4>
<p>There is no action required. GDC software for bare metal isn't affected as it does not bundle an operating system in its distribution.</p>
</td>
<td>None</td>
</tr>
</tbody>
</table>
</section>
</devsite-selector>]]>
    </content>
  </entry>

  <entry>
    <title>GCP-2025-062</title>
    <id>tag:google.com,2016:gke-security-bulletins#gcp-2025-062</id>
    <updated>2025-10-22T00:00:00+00:00</updated>
    <link rel="alternate" href="https://docs.cloud.google.com/kubernetes-engine/security-bulletins#gcp-2025-062"/>
    <content type="html"><![CDATA[<p><strong>Published: </strong>2025-10-22<br/> <strong>Updated: </strong>2025-10-30<br/> <strong>Reference:</strong> <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-58240">CVE-2024-58240</a></p><p><strong>2025-10-30 Update: </strong> Added patch versions for Ubuntu nodes on GKE, and patch versions and a severity rating for GDC software for VMware.</p><devsite-selector>
<section>
<h3 data-text="GKE" id="gcp-2025-062-gke" tabindex="-1">GKE</h3>
<p><strong>Updated: </strong>2025-10-30</p>
<table>
<thead>
<tr>
<th>Description</th>
<th>Severity</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<p>The following vulnerabilities were discovered in the Linux kernel that can lead
          to a privilege escalation on Container-Optimized OS nodes:
          </p><ul>
<li>CVE-2024-58240</li>
</ul>
<p>GKE Standard and Autopilot clusters are impacted.</p>
<p>Clusters using <a href="https://docs.cloud.google.com/kubernetes-engine/docs/concepts/sandbox-pods">GKE Sandbox</a> aren't impacted.</p>
<h4 data-text="What should I do?" id="what-should-i-do_67" tabindex="-1">What should I do?</h4>
<p><strong>2025-10-30 Update: </strong>The following versions of
          GKE are updated with code to fix this vulnerability on Ubuntu. Upgrade
          your Ubuntu node pools to these versions or later:</p>
<ul>
<li>1.28.15-gke.2740000</li>
<li>1.29.15-gke.1979000</li>
<li>1.30.14-gke.1267000</li>
<li>1.31.13-gke.1040000</li>
</ul>
<hr/>
<p>The following minor versions are affected.
          <a href="https://docs.cloud.google.com/kubernetes-engine/docs/how-to/upgrading-a-container-cluster">Upgrade</a> your
          Container-Optimized OS node pools to one of the following patch versions or later:</p>
<ul>
<li>1.32.9-gke.1010000</li><li>1.28.15-gke.2740000</li><li>1.29.15-gke.1936000</li><li>1.31.12-gke.1220000</li><li>1.30.14-gke.1267000</li>
</ul>
<p>You can apply patch versions from newer release channels if your cluster runs the same
          minor version in its own release channel. This feature lets you secure your nodes until
          the patch version becomes the default in your release channel. For details, see
          <a href="https://docs.cloud.google.com/kubernetes-engine/docs/concepts/release-channels#newer-patch-versions">Run patch versions from a newer channel</a>.</p>
</td>
<td>High</td>
</tr>
</tbody>
</table>
</section>
<section>
<h3 data-text="GDC (VMware)" id="gcp-2025-062-gdcvmware" tabindex="-1">GDC (VMware)</h3>
<p><strong>Updated: </strong>2025-10-30</p>
<table>
<thead>
<tr>
<th>Description</th>
<th>Severity</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<p>The following vulnerabilities were discovered in the Linux kernel that can lead
            to a privilege escalation on Container-Optimized OS nodes:
            </p><ul>
<li>CVE-2024-58240</li>
</ul>
<h4 data-text="What should I do?" id="what-should-i-do_68" tabindex="-1">What should I do?</h4>
<p><strong>2025-10-30 Update: </strong>The following versions of
            GDC software for VMware are updated with code to fix this vulnerability. Upgrade
            your GDC software for VMware clusters to these versions or later:</p>
<ul>
<li>1.31.1000-gke.44</li>
</ul>
<hr/>
<p><aside class="note"><strong>Note: </strong>Patch versions and a severity assessment for GDC software for VMware are in progress. We'll update this bulletin with that information when it's available.</aside></p>
</td>
<td>High</td>
</tr>
</tbody>
</table>
</section>
<section>
<h3 data-text="GKE on AWS" id="gcp-2025-062-gkeaws" tabindex="-1">GKE on AWS</h3>
<table>
<thead>
<tr>
<th>Description</th>
<th>Severity</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<p>The following vulnerabilities were discovered in the Linux kernel that can lead
            to a privilege escalation on Container-Optimized OS nodes:
            </p><ul>
<li>CVE-2024-58240</li>
</ul>
<h4 data-text="What should I do?" id="what-should-i-do_69" tabindex="-1">What should I do?</h4>
<p><aside class="note"><strong>Note: </strong>Patch versions and a severity assessment for GKE on AWS are in progress. We'll update this bulletin with that information when it's available.</aside></p>
</td>
<td>Pending</td>
</tr>
</tbody>
</table>
</section>
<section>
<h3 data-text="GKE on Azure" id="gcp-2025-062-gkeazure" tabindex="-1">GKE on Azure</h3>
<table>
<thead>
<tr>
<th>Description</th>
<th>Severity</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<p>The following vulnerabilities were discovered in the Linux kernel that can lead
            to a privilege escalation on Container-Optimized OS nodes:
            </p><ul>
<li>CVE-2024-58240</li>
</ul>
<h4 data-text="What should I do?" id="what-should-i-do_70" tabindex="-1">What should I do?</h4>
<p><aside class="note"><strong>Note: </strong>Patch versions and a severity assessment for GKE on Azure are in progress. We'll update this bulletin with that information when it's available.</aside></p>
</td>
<td>Pending</td>
</tr>
</tbody>
</table>
</section>
<section>
<h3 data-text="GDC (bare metal)" id="gcp-2025-062-gdcbm" tabindex="-1">GDC (bare metal)</h3>
<table>
<thead>
<tr>
<th>Description</th>
<th>Severity</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<p>The following vulnerabilities were discovered in the Linux kernel that can lead
            to a privilege escalation on Container-Optimized OS nodes:
            </p><ul>
<li>CVE-2024-58240</li>
</ul>
<h4 data-text="What should I do?" id="what-should-i-do_71" tabindex="-1">What should I do?</h4>
<p>There is no action required. GDC software for bare metal isn't affected as it does not bundle an operating system in its distribution.</p>
</td>
<td>None</td>
</tr>
</tbody>
</table>
</section>
</devsite-selector>]]>
    </content>
  </entry>

  <entry>
    <title>GCP-2025-057</title>
    <id>tag:google.com,2016:gke-security-bulletins#gcp-2025-057</id>
    <updated>2025-10-17T00:00:00+00:00</updated>
    <link rel="alternate" href="https://docs.cloud.google.com/kubernetes-engine/security-bulletins#gcp-2025-057"/>
    <content type="html"><![CDATA[<p><strong>Published: </strong>2025-10-17<br/> <strong>Updated: </strong>2025-11-11<br/> <strong>Reference:</strong> <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38618">CVE-2025-38618</a></p><p><strong>2025-11-11 Update: </strong>Added patch versions for Ubuntu node pools in GKE.</p><p><strong>2025-10-27 Update: </strong> Added patch versions and a severity rating for GDC software for VMware.</p><devsite-selector>
<section>
<h3 data-text="GKE" id="gcp-2025-057-gke" tabindex="-1">GKE</h3>
<p><strong>Updated: </strong>2025-11-11</p>
<table>
<thead>
<tr>
<th>Description</th>
<th>Severity</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<p>The following vulnerabilities were discovered in the Linux kernel that can lead
          to a privilege escalation on Container-Optimized OS nodes:
          </p><ul>
<li>CVE-2025-38618</li>
</ul>
<p>GKE Standard and Autopilot clusters are impacted.</p>
<p>Clusters using <a href="https://docs.cloud.google.com/kubernetes-engine/docs/concepts/sandbox-pods">GKE Sandbox</a> aren't impacted.</p>
<h4 data-text="What should I do?" id="what-should-i-do_72" tabindex="-1">What should I do?</h4>
<p><strong>2025-11-11 Update:</strong> The following versions of GKE are
          updated with code to fix this vulnerability on Ubuntu. Upgrade your Ubuntu node pools to
          the following versions or later:</p>
<ul>
<li>1.28.15-gke.2767000</li>
<li>1.29.15-gke.2002000</li>
<li>1.30.14-gke.1349000</li>
<li>1.31.13-gke.1123000</li>
<li>1.32.9-gke.1207000</li>
<li>1.33.5-gke.1308000</li>
<li>1.34.1-gke.2037000</li>
</ul>
<hr/>
<p>The following minor versions are affected.
          <a href="https://docs.cloud.google.com/kubernetes-engine/docs/how-to/upgrading-a-container-cluster">Upgrade</a> your
          Container-Optimized OS node pools to one of the following patch versions or later:</p>
<ul>
<li>1.30.14-gke.1267000</li><li>1.31.13-gke.1023000</li><li>1.29.15-gke.1936000</li><li>1.33.5-gke.1162000</li><li>1.32.9-gke.1072000</li><li>1.28.15-gke.2751000</li><li>1.34.1-gke.1127000</li>
</ul>
<p>You can apply patch versions from newer release channels if your cluster runs the same
          minor version in its own release channel. This feature lets you secure your nodes until
          the patch version becomes the default in your release channel. For details, see
          <a href="https://docs.cloud.google.com/kubernetes-engine/docs/concepts/release-channels#newer-patch-versions">Run patch versions from a newer channel</a>.</p>
</td>
<td>High</td>
</tr>
</tbody>
</table>
</section>
<section>
<h3 data-text="GDC (VMware)" id="gcp-2025-057-gdcvmware" tabindex="-1">GDC (VMware)</h3>
<p><strong>Updated: </strong>2025-10-27</p>
<table>
<thead>
<tr>
<th>Description</th>
<th>Severity</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<p>The following vulnerabilities were discovered in the Linux kernel that can lead
            to a privilege escalation on Container-Optimized OS nodes:
            </p><ul>
<li>CVE-2025-38618</li>
</ul>
<h4 data-text="What should I do?" id="what-should-i-do_73" tabindex="-1">What should I do?</h4>
<p><strong>2025-10-27 Update: </strong>The following versions of
            GDC software for VMware are updated with code to fix this vulnerability. Upgrade
            your GDC software for VMware clusters to these versions or later:</p>
<ul>
<li>1.31.1000-gke.44</li>
</ul>
<hr/>
<p><aside class="note"><strong>Note: </strong>Patch versions and a severity assessment for GDC software for VMware are in progress. We'll update this bulletin with that information when it's available.</aside></p>
</td>
<td>High</td>
</tr>
</tbody>
</table>
</section>
<section>
<h3 data-text="GKE on AWS" id="gcp-2025-057-gkeaws" tabindex="-1">GKE on AWS</h3>
<table>
<thead>
<tr>
<th>Description</th>
<th>Severity</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<p>The following vulnerabilities were discovered in the Linux kernel that can lead
            to a privilege escalation on Container-Optimized OS nodes:
            </p><ul>
<li>CVE-2025-38618</li>
</ul>
<h4 data-text="What should I do?" id="what-should-i-do_74" tabindex="-1">What should I do?</h4>
<p><aside class="note"><strong>Note: </strong>Patch versions and a severity assessment for GKE on AWS are in progress. We'll update this bulletin with that information when it's available.</aside></p>
</td>
<td>Pending</td>
</tr>
</tbody>
</table>
</section>
<section>
<h3 data-text="GKE on Azure" id="gcp-2025-057-gkeazure" tabindex="-1">GKE on Azure</h3>
<table>
<thead>
<tr>
<th>Description</th>
<th>Severity</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<p>The following vulnerabilities were discovered in the Linux kernel that can lead
            to a privilege escalation on Container-Optimized OS nodes:
            </p><ul>
<li>CVE-2025-38618</li>
</ul>
<h4 data-text="What should I do?" id="what-should-i-do_75" tabindex="-1">What should I do?</h4>
<p><aside class="note"><strong>Note: </strong>Patch versions and a severity assessment for GKE on Azure are in progress. We'll update this bulletin with that information when it's available.</aside></p>
</td>
<td>Pending</td>
</tr>
</tbody>
</table>
</section>
<section>
<h3 data-text="GDC (bare metal)" id="gcp-2025-057-gdcbm" tabindex="-1">GDC (bare metal)</h3>
<table>
<thead>
<tr>
<th>Description</th>
<th>Severity</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<p>The following vulnerabilities were discovered in the Linux kernel that can lead
            to a privilege escalation on Container-Optimized OS nodes:
            </p><ul>
<li>CVE-2025-38618</li>
</ul>
<h4 data-text="What should I do?" id="what-should-i-do_76" tabindex="-1">What should I do?</h4>
<p>There is no action required. GDC software for bare metal isn't affected as it does not bundle an operating system in its distribution.</p>
</td>
<td>None</td>
</tr>
</tbody>
</table>
</section>
</devsite-selector>]]>
    </content>
  </entry>

  <entry>
    <title>GCP-2025-056</title>
    <id>tag:google.com,2016:gke-security-bulletins#gcp-2025-056</id>
    <updated>2025-10-16T00:00:00+00:00</updated>
    <link rel="alternate" href="https://docs.cloud.google.com/kubernetes-engine/security-bulletins#gcp-2025-056"/>
    <content type="html"><![CDATA[<p><strong>Published: </strong>2025-10-16<br/> <strong>Updated: </strong>2026-03-24<br/> <strong>Reference:</strong> <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39946">CVE-2025-39946</a></p><p><strong>2026-03-24 Update: </strong> Added patch versions for Ubuntu nodes with GKE.</p><p><strong>2025-11-13 Update: </strong> Added patch versions for GDC software for VMware.</p><devsite-selector>
<section>
<h3 data-text="GKE" id="gcp-2025-056-gke" tabindex="-1">GKE</h3>
<p><strong>Updated: </strong>2026-03-24</p>
<table>
<thead>
<tr>
<th>Description</th>
<th>Severity</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<p>The following vulnerabilities were discovered in the Linux kernel that can lead
          to a privilege escalation on Container-Optimized OS nodes:
          </p><ul>
<li>CVE-2025-39946</li>
</ul>
<p>GKE Standard and Autopilot clusters are impacted.</p>
<p>Clusters using <a href="https://docs.cloud.google.com/kubernetes-engine/docs/concepts/sandbox-pods">GKE Sandbox</a> aren't impacted.</p>
<h4 data-text="What should I do?" id="what-should-i-do_77" tabindex="-1">What should I do?</h4>
<p><strong>2026-03-24 Update</strong>: The following versions of GKE are updated with code to fix this vulnerability on Ubuntu. Upgrade your Ubuntu node pools to the following versions or later:</p>
<ul>
<li>1.35.2-gke.1269000</li>
<li>1.34.4-gke.1193000</li>
<li>1.33.8-gke.1169000</li>
<li>1.32.13-gke.1059000</li>
</ul>
<hr/>
<p>The following minor versions are affected.
          <a href="https://docs.cloud.google.com/kubernetes-engine/docs/how-to/upgrading-a-container-cluster">Upgrade</a> your
          Container-Optimized OS node pools to one of the following patch versions or later:</p>
<ul>
<li>1.32.9-gke.1108000</li><li>1.29.15-gke.1989000</li><li>1.31.13-gke.1023000</li><li>1.30.14-gke.1336000</li><li>1.28.15-gke.2751000</li><li>1.34.1-gke.1279000</li><li>1.33.5-gke.1162000</li>
</ul>
<p>You can apply patch versions from newer release channels if your cluster runs the same
          minor version in its own release channel. This feature lets you secure your nodes until
          the patch version becomes the default in your release channel. For details, see
          <a href="https://docs.cloud.google.com/kubernetes-engine/docs/concepts/release-channels#newer-patch-versions">Run patch versions from a newer channel</a>.</p>
</td>
<td>High</td>
</tr>
</tbody>
</table>
</section>
<section>
<h3 data-text="GDC (VMware)" id="gcp-2025-056-gdcvmware" tabindex="-1">GDC (VMware)</h3>
<p><strong>Updated: </strong>2025-11-13</p>
<table>
<thead>
<tr>
<th>Description</th>
<th>Severity</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<p>The following vulnerabilities were discovered in the Linux kernel that can lead
            to a privilege escalation on Container-Optimized OS nodes:
            </p><ul>
<li>CVE-2025-39946</li>
</ul>
<h4 data-text="What should I do?" id="what-should-i-do_78" tabindex="-1">What should I do?</h4>
<p><strong>2025-11-13 Update:</strong>
            The following versions of GDC software for VMware are updated with code to fix this
            vulnerability. Upgrade your GDC software for VMware clusters to the following versions
            or later:
            </p><ul>
<li>1.31.1100-gke.40</li>
</ul>
<hr/>
<p><aside class="note"><strong>Note: </strong>Patch versions and a severity assessment for GDC software for VMware are in progress. We'll update this bulletin with that information when it's available.</aside></p>
</td>
<td>High</td>
</tr>
</tbody>
</table>
</section>
<section>
<h3 data-text="GKE on AWS" id="gcp-2025-056-gkeaws" tabindex="-1">GKE on AWS</h3>
<table>
<thead>
<tr>
<th>Description</th>
<th>Severity</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<p>The following vulnerabilities were discovered in the Linux kernel that can lead
            to a privilege escalation on Container-Optimized OS nodes:
            </p><ul>
<li>CVE-2025-39946</li>
</ul>
<h4 data-text="What should I do?" id="what-should-i-do_79" tabindex="-1">What should I do?</h4>
<p><aside class="note"><strong>Note: </strong>Patch versions and a severity assessment for GKE on AWS are in progress. We'll update this bulletin with that information when it's available.</aside></p>
</td>
<td>Pending</td>
</tr>
</tbody>
</table>
</section>
<section>
<h3 data-text="GKE on Azure" id="gcp-2025-056-gkeazure" tabindex="-1">GKE on Azure</h3>
<table>
<thead>
<tr>
<th>Description</th>
<th>Severity</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<p>The following vulnerabilities were discovered in the Linux kernel that can lead
            to a privilege escalation on Container-Optimized OS nodes:
            </p><ul>
<li>CVE-2025-39946</li>
</ul>
<h4 data-text="What should I do?" id="what-should-i-do_80" tabindex="-1">What should I do?</h4>
<p><aside class="note"><strong>Note: </strong>Patch versions and a severity assessment for GKE on Azure are in progress. We'll update this bulletin with that information when it's available.</aside></p>
</td>
<td>Pending</td>
</tr>
</tbody>
</table>
</section>
<section>
<h3 data-text="GDC (bare metal)" id="gcp-2025-056-gdcbm" tabindex="-1">GDC (bare metal)</h3>
<table>
<thead>
<tr>
<th>Description</th>
<th>Severity</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<p>The following vulnerabilities were discovered in the Linux kernel that can lead
            to a privilege escalation on Container-Optimized OS nodes:
            </p><ul>
<li>CVE-2025-39946</li>
</ul>
<h4 data-text="What should I do?" id="what-should-i-do_81" tabindex="-1">What should I do?</h4>
<p>There is no action required. GDC software for bare metal isn't affected as it does not bundle an operating system in its distribution.</p>
</td>
<td>None</td>
</tr>
</tbody>
</table>
</section>
</devsite-selector>]]>
    </content>
  </entry>

  <entry>
    <title>GCP-2025-055</title>
    <id>tag:google.com,2016:gke-security-bulletins#gcp-2025-055</id>
    <updated>2025-10-15T00:00:00+00:00</updated>
    <link rel="alternate" href="https://docs.cloud.google.com/kubernetes-engine/security-bulletins#gcp-2025-055"/>
    <content type="html"><![CDATA[<p><strong>Published: </strong>2025-10-15<br/> <strong>Updated: </strong>2025-11-11<br/> <strong>Reference:</strong> <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38617">CVE-2025-38617</a></p><p><strong>2025-11-11 Update: </strong>Added patch versions for Ubuntu node pools in GKE.</p><p><strong>2025-10-16 Update: </strong>Added patch versions and a severity rating for GDC software for VMware.</p><devsite-selector>
<section>
<h3 data-text="GKE" id="gcp-2025-055-gke" tabindex="-1">GKE</h3>
<p><strong>Updated: </strong>2025-11-11</p>
<table>
<thead>
<tr>
<th>Description</th>
<th>Severity</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<p>The following vulnerabilities were discovered in the Linux kernel that can lead
          to a privilege escalation on Container-Optimized OS nodes:
          </p><ul>
<li>CVE-2025-38617</li>
</ul>
<p>GKE Standard clusters are impacted. GKE Autopilot clusters in the default configuration are not impacted, but might be vulnerable if you explicitly set the seccomp <code dir="ltr" translate="no">Unconfined</code> profile or allow <a href="https://docs.cloud.google.com/sdk/gcloud/reference/container/clusters/create-auto#--workload-policies"><code dir="ltr" translate="no">CAP_NET_ADMIN</code></a>.</p>
<p>Clusters using <a href="https://docs.cloud.google.com/kubernetes-engine/docs/concepts/sandbox-pods">GKE Sandbox</a> aren't impacted.</p>
<h4 data-text="What should I do?" id="what-should-i-do_82" tabindex="-1">What should I do?</h4>
<p><strong>2025-11-11 Update:</strong> The following versions of GKE are
          updated with code to fix this vulnerability on Ubuntu. Upgrade your Ubuntu node pools to
          the following versions or later:</p>
<ul>
<li>1.28.15-gke.2767000</li>
<li>1.29.15-gke.2002000</li>
<li>1.30.14-gke.1349000</li>
<li>1.31.13-gke.1123000</li>
<li>1.32.9-gke.1207000</li>
<li>1.33.5-gke.1308000</li>
<li>1.34.1-gke.2037000</li>
</ul>
<hr/>
<p>The following minor versions are affected.
          <a href="https://docs.cloud.google.com/kubernetes-engine/docs/how-to/upgrading-a-container-cluster">Upgrade</a> your
          Container-Optimized OS node pools to one of the following patch versions or later:</p>
<ul>
<li>1.28.15-gke.2610000</li><li>1.32.9-gke.1010000</li><li>1.33.4-gke.1350000</li><li>1.29.15-gke.1835000</li><li>1.31.12-gke.1220000</li><li>1.30.14-gke.1267000</li><li>1.34.1-gke.1127000</li>
</ul>
<p>You can apply patch versions from newer release channels if your cluster runs the same
          minor version in its own release channel. This feature lets you secure your nodes until
          the patch version becomes the default in your release channel. For details, see
          <a href="https://docs.cloud.google.com/kubernetes-engine/docs/concepts/release-channels#newer-patch-versions">Run patch versions from a newer channel</a>.</p>
</td>
<td>High</td>
</tr>
</tbody>
</table>
</section>
<section>
<h3 data-text="GDC (VMware)" id="gcp-2025-055-gdcvmware" tabindex="-1">GDC (VMware)</h3>
<p><strong>Updated: </strong>2025-10-16</p>
<table>
<thead>
<tr>
<th>Description</th>
<th>Severity</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<p>The following vulnerabilities were discovered in the Linux kernel that can lead
            to a privilege escalation on Container-Optimized OS nodes:
            </p><ul>
<li>CVE-2025-38617</li>
</ul>
<h4 data-text="What should I do?" id="what-should-i-do_83" tabindex="-1">What should I do?</h4>
<p><strong>2025-10-16 Update:</strong> The following versions of
            GDC software for VMware are updated with code to fix this vulnerability. Upgrade
            your GDC software for VMware clusters to the following versions or later:</p>
<ul>
<li>1.31.1000-gke.44</li>
</ul>
<hr/>
<p><aside class="note"><strong>Note: </strong>Patch versions and a severity assessment for GDC software for VMware are in progress. We'll update this bulletin with that information when it's available.</aside></p>
</td>
<td>High</td>
</tr>
</tbody>
</table>
</section>
<section>
<h3 data-text="GKE on AWS" id="gcp-2025-055-gkeaws" tabindex="-1">GKE on AWS</h3>
<table>
<thead>
<tr>
<th>Description</th>
<th>Severity</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<p>The following vulnerabilities were discovered in the Linux kernel that can lead
            to a privilege escalation on Container-Optimized OS nodes:
            </p><ul>
<li>CVE-2025-38617</li>
</ul>
<h4 data-text="What should I do?" id="what-should-i-do_84" tabindex="-1">What should I do?</h4>
<p><aside class="note"><strong>Note: </strong>Patch versions and a severity assessment for GKE on AWS are in progress. We'll update this bulletin with that information when it's available.</aside></p>
</td>
<td>Pending</td>
</tr>
</tbody>
</table>
</section>
<section>
<h3 data-text="GKE on Azure" id="gcp-2025-055-gkeazure" tabindex="-1">GKE on Azure</h3>
<table>
<thead>
<tr>
<th>Description</th>
<th>Severity</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<p>The following vulnerabilities were discovered in the Linux kernel that can lead
            to a privilege escalation on Container-Optimized OS nodes:
            </p><ul>
<li>CVE-2025-38617</li>
</ul>
<h4 data-text="What should I do?" id="what-should-i-do_85" tabindex="-1">What should I do?</h4>
<p><aside class="note"><strong>Note: </strong>Patch versions and a severity assessment for GKE on Azure are in progress. We'll update this bulletin with that information when it's available.</aside></p>
</td>
<td>Pending</td>
</tr>
</tbody>
</table>
</section>
<section>
<h3 data-text="GDC (bare metal)" id="gcp-2025-055-gdcbm" tabindex="-1">GDC (bare metal)</h3>
<table>
<thead>
<tr>
<th>Description</th>
<th>Severity</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<p>The following vulnerabilities were discovered in the Linux kernel that can lead
            to a privilege escalation on Container-Optimized OS nodes:
            </p><ul>
<li>CVE-2025-38617</li>
</ul>
<h4 data-text="What should I do?" id="what-should-i-do_86" tabindex="-1">What should I do?</h4>
<p>There is no action required. GDC software for bare metal isn't affected as it does not bundle an operating system in its distribution.</p>
</td>
<td>None</td>
</tr>
</tbody>
</table>
</section>
</devsite-selector>]]>
    </content>
  </entry>

  <entry>
    <title>GCP-2025-050</title>
    <id>tag:google.com,2016:gke-security-bulletins#gcp-2025-050</id>
    <updated>2025-09-10T00:00:00+00:00</updated>
    <link rel="alternate" href="https://docs.cloud.google.com/kubernetes-engine/security-bulletins#gcp-2025-050"/>
    <content type="html"><![CDATA[<p><strong>Published: </strong>2025-09-10<br/> <strong>Updated: </strong>2025-11-11<br/> <strong>Reference:</strong> <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38500">CVE-2025-38500</a></p><p><strong>2025-11-11 Update: </strong>Added patch versions for Ubuntu node pools in GKE.</p><p><strong>2025-10-16 Update: </strong>Added patch versions and a severity rating for GDC software for VMware.</p><devsite-selector>
<section>
<h3 data-text="GKE" id="gcp-2025-050-gke" tabindex="-1">GKE</h3>
<p><strong>Updated: </strong>2025-11-11</p>
<table>
<thead>
<tr>
<th>Description</th>
<th>Severity</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<p>The following vulnerabilities were discovered in the Linux kernel that can lead
          to a privilege escalation on Container-Optimized OS nodes:
          </p><ul>
<li>CVE-2025-38500</li>
</ul>
<p>GKE Standard clusters are impacted. GKE Autopilot clusters in the default configuration are not impacted, but might be vulnerable if you explicitly set the seccomp <code dir="ltr" translate="no">Unconfined</code> profile or allow <a href="https://docs.cloud.google.com/sdk/gcloud/reference/container/clusters/create-auto#--workload-policies"><code dir="ltr" translate="no">CAP_NET_ADMIN</code></a>.</p>
<p>Clusters using <a href="https://docs.cloud.google.com/kubernetes-engine/docs/concepts/sandbox-pods">GKE Sandbox</a> aren't impacted.</p>
<h4 data-text="What should I do?" id="what-should-i-do_87" tabindex="-1">What should I do?</h4>
<p><strong>2025-11-11 Update:</strong> The following versions of GKE are
          updated with code to fix this vulnerability on Ubuntu. Upgrade your Ubuntu node pools to
          the following versions or later:</p>
<ul>
<li>1.32.9-gke.1207000</li>
<li>1.33.5-gke.1308000</li>
<li>1.34.1-gke.2037000</li>
</ul>
<hr/>
<p>The following minor versions are affected.
          <a href="https://docs.cloud.google.com/kubernetes-engine/docs/how-to/upgrading-a-container-cluster">Upgrade</a> your
          Container-Optimized OS node pools to one of the following patch versions or later:</p>
<ul>
<li>1.33.4-gke.1036000</li><li>1.32.8-gke.1026000</li><li>1.31.12-gke.1014000</li><li>1.30.14-gke.1108000</li><li>1.29.15-gke.1820000</li><li>1.28.15-gke.2599000</li>
</ul>
<p>You can apply patch versions from newer release channels if your cluster runs the same
          minor version in its own release channel. This feature lets you secure your nodes until
          the patch version becomes the default in your release channel. For details, see
          <a href="https://docs.cloud.google.com/kubernetes-engine/docs/concepts/release-channels#newer-patch-versions">Run patch versions from a newer channel</a>.</p>
</td>
<td>High</td>
</tr>
</tbody>
</table>
</section>
<section>
<h3 data-text="GDC (VMware)" id="gcp-2025-050-gdcvmware" tabindex="-1">GDC (VMware)</h3>
<p><strong>Updated: </strong>2025-10-16</p>
<table>
<thead>
<tr>
<th>Description</th>
<th>Severity</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<p>The following vulnerabilities were discovered in the Linux kernel that can lead
            to a privilege escalation on Container-Optimized OS nodes:
            </p><ul>
<li>CVE-2025-38500</li>
</ul>
<h4 data-text="What should I do?" id="what-should-i-do_88" tabindex="-1">What should I do?</h4>
<p><strong>2025-10-16 Update:</strong> The following versions of
            GDC software for VMware are updated with code to fix this vulnerability. Upgrade
            your GDC software for VMware clusters to the following versions or later:</p>
<ul>
<li>1.31.1000-gke.44</li>
</ul>
<hr/>
<p><aside class="note"><strong>Note: </strong>Patch versions and a severity assessment for GDC software for VMware are in progress. We'll update this bulletin with that information when it's available.</aside></p>
</td>
<td>High</td>
</tr>
</tbody>
</table>
</section>
<section>
<h3 data-text="GKE on AWS" id="gcp-2025-050-gkeaws" tabindex="-1">GKE on AWS</h3>
<table>
<thead>
<tr>
<th>Description</th>
<th>Severity</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<p>The following vulnerabilities were discovered in the Linux kernel that can lead
            to a privilege escalation on Container-Optimized OS nodes:
            </p><ul>
<li>CVE-2025-38500</li>
</ul>
<h4 data-text="What should I do?" id="what-should-i-do_89" tabindex="-1">What should I do?</h4>
<p><aside class="note"><strong>Note: </strong>Patch versions and a severity assessment for GKE on AWS are in progress. We'll update this bulletin with that information when it's available.</aside></p>
</td>
<td>Pending</td>
</tr>
</tbody>
</table>
</section>
<section>
<h3 data-text="GKE on Azure" id="gcp-2025-050-gkeazure" tabindex="-1">GKE on Azure</h3>
<table>
<thead>
<tr>
<th>Description</th>
<th>Severity</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<p>The following vulnerabilities were discovered in the Linux kernel that can lead
            to a privilege escalation on Container-Optimized OS nodes:
            </p><ul>
<li>CVE-2025-38500</li>
</ul>
<h4 data-text="What should I do?" id="what-should-i-do_90" tabindex="-1">What should I do?</h4>
<p><aside class="note"><strong>Note: </strong>Patch versions and a severity assessment for GKE on Azure are in progress. We'll update this bulletin with that information when it's available.</aside></p>
</td>
<td>Pending</td>
</tr>
</tbody>
</table>
</section>
<section>
<h3 data-text="GDC (bare metal)" id="gcp-2025-050-gdcbm" tabindex="-1">GDC (bare metal)</h3>
<table>
<thead>
<tr>
<th>Description</th>
<th>Severity</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<p>The following vulnerabilities were discovered in the Linux kernel that can lead
            to a privilege escalation on Container-Optimized OS nodes:
            </p><ul>
<li>CVE-2025-38500</li>
</ul>
<h4 data-text="What should I do?" id="what-should-i-do_91" tabindex="-1">What should I do?</h4>
<p>There is no action required. GDC software for bare metal isn't affected as it does not bundle an operating system in its distribution.</p>
</td>
<td>None</td>
</tr>
</tbody>
</table>
</section>
</devsite-selector>]]>
    </content>
  </entry>

  <entry>
    <title>GCP-2025-047</title>
    <id>tag:google.com,2016:gke-security-bulletins#gcp-2025-047</id>
    <updated>2025-08-27T00:00:00+00:00</updated>
    <link rel="alternate" href="https://docs.cloud.google.com/kubernetes-engine/security-bulletins#gcp-2025-047"/>
    <content type="html"><![CDATA[<p><strong>Published: </strong>2025-08-27<br/> <strong>Updated: </strong>2025-09-25<br/> <strong>Reference:</strong> <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38350">CVE-2025-38350</a></p><p><strong>2025-09-25 Update: </strong> Added patch versions for Ubuntu node pools on GKE.</p><devsite-selector>
<section>
<h3 data-text="GKE" id="gcp-2025-047-gke" tabindex="-1">GKE</h3>
<p><strong>Updated: </strong>2025-09-25</p>
<table>
<thead>
<tr>
<th>Description</th>
<th>Severity</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<p>The following vulnerabilities were discovered in the Linux kernel that can lead
          to a privilege escalation on Container-Optimized OS nodes:
          </p><ul>
<li>CVE-2025-38350</li>
</ul>
<p>GKE Standard clusters are impacted. GKE Autopilot clusters in the default configuration are not impacted, but might be vulnerable if you explicitly set the seccomp <code dir="ltr" translate="no">Unconfined</code> profile or allow <a href="https://docs.cloud.google.com/sdk/gcloud/reference/container/clusters/create-auto#--workload-policies"><code dir="ltr" translate="no">CAP_NET_ADMIN</code></a>.</p>
<p>Clusters using <a href="https://docs.cloud.google.com/kubernetes-engine/docs/concepts/sandbox-pods">GKE Sandbox</a> aren't impacted.</p>
<h4 data-text="What should I do?" id="what-should-i-do_92" tabindex="-1">What should I do?</h4>
<p><strong>2025-09-25 Update:</strong> The following versions of GKE are updated with code to fix this vulnerability on Ubuntu. Upgrade your Ubuntu node pools to the following versions or later:</p>
<ul>
<li>1.28.15-gke.2697000</li><li>1.29.15-gke.1936000</li><li>1.30.14-gke.1150000</li><li>1.31.12-gke.1110000
  </li><li>1.32.8-gke.1170000</li><li>1.33.4-gke.1245000</li><li>1.34.0-gke.1662000</li>
</ul>
<hr/>
<p>The following minor versions are affected.
          <a href="https://docs.cloud.google.com/kubernetes-engine/docs/how-to/upgrading-a-container-cluster">Upgrade</a> your
          Container-Optimized OS node pools to one of the following patch versions or later:</p>
<ul>
<li>1.28.15-gke.2527000</li><li>1.32.7-gke.1016000</li><li>1.33.3-gke.1392000</li><li>1.29.15-gke.1713000</li><li>1.31.11-gke.1064000</li><li>1.30.14-gke.1011000</li>
</ul>
<p>You can apply patch versions from newer release channels if your cluster runs the same
          minor version in its own release channel. This feature lets you secure your nodes until
          the patch version becomes the default in your release channel. For details, see
          <a href="https://docs.cloud.google.com/kubernetes-engine/docs/concepts/release-channels#newer-patch-versions">Run patch versions from a newer channel</a>.</p>
</td>
<td>High</td>
</tr>
</tbody>
</table>
</section>
<section>
<h3 data-text="GDC (VMware)" id="gcp-2025-047-gdcvmware" tabindex="-1">GDC (VMware)</h3>
<table>
<thead>
<tr>
<th>Description</th>
<th>Severity</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<p>The following vulnerabilities were discovered in the Linux kernel that can lead
            to a privilege escalation on Container-Optimized OS nodes:
            </p><ul>
<li>CVE-2025-38350</li>
</ul>
<h4 data-text="What should I do?" id="what-should-i-do_93" tabindex="-1">What should I do?</h4>
<p><aside class="note"><strong>Note: </strong>Patch versions and a severity assessment for GDC software for VMware are in progress. We'll update this bulletin with that information when it's available.</aside></p>
</td>
<td>Pending</td>
</tr>
</tbody>
</table>
</section>
<section>
<h3 data-text="GKE on AWS" id="gcp-2025-047-gkeaws" tabindex="-1">GKE on AWS</h3>
<table>
<thead>
<tr>
<th>Description</th>
<th>Severity</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<p>The following vulnerabilities were discovered in the Linux kernel that can lead
            to a privilege escalation on Container-Optimized OS nodes:
            </p><ul>
<li>CVE-2025-38350</li>
</ul>
<h4 data-text="What should I do?" id="what-should-i-do_94" tabindex="-1">What should I do?</h4>
<p><aside class="note"><strong>Note: </strong>Patch versions and a severity assessment for GKE on AWS are in progress. We'll update this bulletin with that information when it's available.</aside></p>
</td>
<td>Pending</td>
</tr>
</tbody>
</table>
</section>
<section>
<h3 data-text="GKE on Azure" id="gcp-2025-047-gkeazure" tabindex="-1">GKE on Azure</h3>
<table>
<thead>
<tr>
<th>Description</th>
<th>Severity</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<p>The following vulnerabilities were discovered in the Linux kernel that can lead
            to a privilege escalation on Container-Optimized OS nodes:
            </p><ul>
<li>CVE-2025-38350</li>
</ul>
<h4 data-text="What should I do?" id="what-should-i-do_95" tabindex="-1">What should I do?</h4>
<p><aside class="note"><strong>Note: </strong>Patch versions and a severity assessment for GKE on Azure are in progress. We'll update this bulletin with that information when it's available.</aside></p>
</td>
<td>Pending</td>
</tr>
</tbody>
</table>
</section>
<section>
<h3 data-text="GDC (bare metal)" id="gcp-2025-047-gdcbm" tabindex="-1">GDC (bare metal)</h3>
<table>
<thead>
<tr>
<th>Description</th>
<th>Severity</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<p>The following vulnerabilities were discovered in the Linux kernel that can lead
            to a privilege escalation on Container-Optimized OS nodes:
            </p><ul>
<li>CVE-2025-38350</li>
</ul>
<h4 data-text="What should I do?" id="what-should-i-do_96" tabindex="-1">What should I do?</h4>
<p>There is no action required. GDC software for bare metal isn't affected as it does not bundle an operating system in its distribution.</p>
</td>
<td>None</td>
</tr>
</tbody>
</table>
</section>
</devsite-selector>]]>
    </content>
  </entry>

  <entry>
    <title>GCP-2025-046</title>
    <id>tag:google.com,2016:gke-security-bulletins#gcp-2025-046</id>
    <updated>2025-08-23T00:00:00+00:00</updated>
    <link rel="alternate" href="https://docs.cloud.google.com/kubernetes-engine/security-bulletins#gcp-2025-046"/>
    <content type="html"><![CDATA[<p><strong>Published: </strong>2025-08-23<br/> <strong>Updated: </strong>2025-11-11<br/> <strong>Reference:</strong> <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38477">CVE-2025-38477</a></p><p><strong>2025-11-11 Update: </strong>Added patch versions for Ubuntu node pools in GKE.</p><p><strong>2025-10-16 Update: </strong>Added patch versions and a severity rating for GDC software for VMware.</p><devsite-selector>
<section>
<h3 data-text="GKE" id="gcp-2025-046-gke" tabindex="-1">GKE</h3>
<p><strong>Updated: </strong>2025-11-11</p>
<table>
<thead>
<tr>
<th>Description</th>
<th>Severity</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<p>The following vulnerabilities were discovered in the Linux kernel that can lead
          to a privilege escalation on Container-Optimized OS nodes:
          </p><ul>
<li>CVE-2025-38477</li>
</ul>
<p>GKE Standard clusters are impacted. GKE Autopilot clusters in the default configuration are not impacted, but might be vulnerable if you explicitly set the seccomp <code dir="ltr" translate="no">Unconfined</code> profile or allow <a href="https://docs.cloud.google.com/sdk/gcloud/reference/container/clusters/create-auto#--workload-policies"><code dir="ltr" translate="no">CAP_NET_ADMIN</code></a>.</p>
<p>Clusters using <a href="https://docs.cloud.google.com/kubernetes-engine/docs/concepts/sandbox-pods">GKE Sandbox</a> aren't impacted.</p>
<h4 data-text="What should I do?" id="what-should-i-do_97" tabindex="-1">What should I do?</h4>
<p><strong>2025-11-11 Update:</strong> The following versions of GKE are
          updated with code to fix this vulnerability on Ubuntu. Upgrade your Ubuntu node pools to
          the following versions or later:</p>
<ul>
<li>1.28.15-gke.2767000</li>
<li>1.29.15-gke.2002000</li>
<li>1.30.14-gke.1349000</li>
<li>1.31.13-gke.1123000</li>
<li>1.32.9-gke.1207000</li>
<li>1.33.5-gke.1308000</li>
<li>1.34.1-gke.2037000</li>
</ul>
<hr/>
<p>The following minor versions are affected.
          <a href="https://docs.cloud.google.com/kubernetes-engine/docs/how-to/upgrading-a-container-cluster">Upgrade</a> your
          Container-Optimized OS node pools to one of the following patch versions or later:</p>
<ul>
<li>1.32.7-gke.1016000</li><li>1.33.3-gke.1392000</li><li>1.29.15-gke.1713000</li><li>1.30.14-gke.1011000</li><li>1.31.11-gke.1064000</li><li>1.28.15-gke.2527000</li>
</ul>
<p>You can apply patch versions from newer release channels if your cluster runs the same
          minor version in its own release channel. This feature lets you secure your nodes until
          the patch version becomes the default in your release channel. For details, see
          <a href="https://docs.cloud.google.com/kubernetes-engine/docs/concepts/release-channels#newer-patch-versions">Run patch versions from a newer channel</a>.</p>
</td>
<td>High</td>
</tr>
</tbody>
</table>
</section>
<section>
<h3 data-text="GDC (VMware)" id="gcp-2025-046-gdcvmware" tabindex="-1">GDC (VMware)</h3>
<p><strong>Updated: </strong>2025-10-16</p>
<table>
<thead>
<tr>
<th>Description</th>
<th>Severity</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<p>The following vulnerabilities were discovered in the Linux kernel that can lead
            to a privilege escalation on Container-Optimized OS nodes:
            </p><ul>
<li>CVE-2025-38477</li>
</ul>
<h4 data-text="What should I do?" id="what-should-i-do_98" tabindex="-1">What should I do?</h4>
<p><strong>2025-10-16 Update:</strong> The following versions of
            GDC software for VMware are updated with code to fix this vulnerability. Upgrade
            your GDC software for VMware clusters to the following versions or later:</p>
<ul>
<li>1.31.1000-gke.44</li>
</ul>
<hr/>
<p><aside class="note"><strong>Note: </strong>Patch versions and a severity assessment for GDC software for VMware are in progress. We'll update this bulletin with that information when it's available.</aside></p>
</td>
<td>High</td>
</tr>
</tbody>
</table>
</section>
<section>
<h3 data-text="GKE on AWS" id="gcp-2025-046-gkeaws" tabindex="-1">GKE on AWS</h3>
<table>
<thead>
<tr>
<th>Description</th>
<th>Severity</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<p>The following vulnerabilities were discovered in the Linux kernel that can lead
            to a privilege escalation on Container-Optimized OS nodes:
            </p><ul>
<li>CVE-2025-38477</li>
</ul>
<h4 data-text="What should I do?" id="what-should-i-do_99" tabindex="-1">What should I do?</h4>
<p><aside class="note"><strong>Note: </strong>Patch versions and a severity assessment for GKE on AWS are in progress. We'll update this bulletin with that information when it's available.</aside></p>
</td>
<td>Pending</td>
</tr>
</tbody>
</table>
</section>
<section>
<h3 data-text="GKE on Azure" id="gcp-2025-046-gkeazure" tabindex="-1">GKE on Azure</h3>
<table>
<thead>
<tr>
<th>Description</th>
<th>Severity</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<p>The following vulnerabilities were discovered in the Linux kernel that can lead
            to a privilege escalation on Container-Optimized OS nodes:
            </p><ul>
<li>CVE-2025-38477</li>
</ul>
<h4 data-text="What should I do?" id="what-should-i-do_100" tabindex="-1">What should I do?</h4>
<p><aside class="note"><strong>Note: </strong>Patch versions and a severity assessment for GKE on Azure are in progress. We'll update this bulletin with that information when it's available.</aside></p>
</td>
<td>Pending</td>
</tr>
</tbody>
</table>
</section>
<section>
<h3 data-text="GDC (bare metal)" id="gcp-2025-046-gdcbm" tabindex="-1">GDC (bare metal)</h3>
<table>
<thead>
<tr>
<th>Description</th>
<th>Severity</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<p>The following vulnerabilities were discovered in the Linux kernel that can lead
            to a privilege escalation on Container-Optimized OS nodes:
            </p><ul>
<li>CVE-2025-38477</li>
</ul>
<h4 data-text="What should I do?" id="what-should-i-do_101" tabindex="-1">What should I do?</h4>
<p>There is no action required. GDC software for bare metal isn't affected as it does not bundle an operating system in its distribution.</p>
</td>
<td>None</td>
</tr>
</tbody>
</table>
</section>
</devsite-selector>]]>
    </content>
  </entry>

  <entry>
    <title>GCP-2025-041</title>
    <id>tag:google.com,2016:gke-security-bulletins#gcp-2025-041</id>
    <updated>2025-07-21T00:00:00+00:00</updated>
    <link rel="alternate" href="https://docs.cloud.google.com/kubernetes-engine/security-bulletins#gcp-2025-041"/>
    <content type="html"><![CDATA[<p><strong>Published: </strong>2025-07-21<br/> <strong>Updated: </strong>2025-11-10<br/> <strong>Reference:</strong> <a class="external" href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37890">CVE-2025-37890</a></p><p><strong>2025-11-10 Update: </strong> Added patch versions for GDC software for VMware.</p><devsite-selector>
<section>
<h3 data-text="GKE" id="gcp-2025-041-gke" tabindex="-1">GKE</h3>
<table>
<thead>
<tr>
<th>Description</th>
<th>Severity</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<p>The following vulnerabilities were discovered in the Linux kernel that can lead
          to a privilege escalation on Ubuntu nodes:
          </p><ul>
<li>CVE-2025-37890</li>
</ul>
<p>GKE Standard clusters are impacted. GKE Autopilot clusters in the default configuration are not impacted, but might be vulnerable if you explicitly set the seccomp <code dir="ltr" translate="no">Unconfined</code> profile or allow <a href="https://docs.cloud.google.com/sdk/gcloud/reference/container/clusters/create-auto#--workload-policies"><code dir="ltr" translate="no">CAP_NET_ADMIN</code></a>.</p>
<p>Clusters using <a href="https://docs.cloud.google.com/kubernetes-engine/docs/concepts/sandbox-pods">GKE Sandbox</a> aren't impacted.</p>
<h4 data-text="What should I do?" id="what-should-i-do_102" tabindex="-1">What should I do?</h4>
<p>The following minor versions are affected.
          <a href="https://docs.cloud.google.com/kubernetes-engine/docs/how-to/upgrading-a-container-cluster">Upgrade</a> your
          Ubuntu node pools to one of the following patch versions or later:</p>
<ul>
<li>1.28.15-gke.2461000</li><li>1.29.15-gke.1614000</li><li>1.30.12-gke.1372000</li><li>1.31.10-gke.1067000</li><li>1.32.6-gke.1060000</li><li>1.33.2-gke.1384000</li>
</ul>
<p>You can apply patch versions from newer release channels if your cluster runs the same
          minor version in its own release channel. This feature lets you secure your nodes until
          the patch version becomes the default in your release channel. For details, see
          <a href="https://docs.cloud.google.com/kubernetes-engine/docs/concepts/release-channels#newer-patch-versions">Run patch versions from a newer channel</a>.</p>
</td>
<td>High</td>
</tr>
</tbody>
</table>
</section>
<section>
<h3 data-text="GDC (VMware)" id="gcp-2025-041-gdcvmware" tabindex="-1">GDC (VMware)</h3>
<p><strong>Updated: </strong>2025-11-10</p>
<table>
<thead>
<tr>
<th>Description</th>
<th>Severity</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<p>The following vulnerabilities were discovered in the Linux kernel that can lead
            to a privilege escalation on Ubuntu nodes:
            </p><ul>
<li>CVE-2025-37890</li>
</ul>
<h4 data-text="What should I do?" id="what-should-i-do_103" tabindex="-1">What should I do?</h4>
<p><strong>2025-11-10 Update:</strong>
            The following versions of GDC software for VMware are updated with code to fix this
            vulnerability. Upgrade your GDC software for VMware clusters to the following versions
            or later:
            </p><ul>
<li>1.31.300-gke.81</li>
</ul>
<hr/>
<p><aside class="note"><strong>Note: </strong>Patch versions and a severity assessment for GDC software for VMware are in progress. We'll update this bulletin with that information when it's available.</aside></p>
</td>
<td>Pending</td>
</tr>
</tbody>
</table>
</section>
<section>
<h3 data-text="GKE on AWS" id="gcp-2025-041-gkeaws" tabindex="-1">GKE on AWS</h3>
<table>
<thead>
<tr>
<th>Description</th>
<th>Severity</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<aside class="note"><strong>Note: </strong>This section applies to both the current and previous generation of GKE on AWS</aside>
<p>The following vulnerabilities were discovered in the Linux kernel that can lead
            to a privilege escalation on Ubuntu nodes:
            </p><ul>
<li>CVE-2025-37890</li>
</ul>
<h4 data-text="What should I do?" id="what-should-i-do_104" tabindex="-1">What should I do?</h4>
<p><aside class="note"><strong>Note: </strong>Patch versions and a severity assessment for GKE on AWS are in progress. We'll update this bulletin with that information when it's available.</aside></p>
</td>
<td>Pending</td>
</tr>
</tbody>
</table>
</section>
<section>
<h3 data-text="GKE on Azure" id="gcp-2025-041-gkeazure" tabindex="-1">GKE on Azure</h3>
<table>
<thead>
<tr>
<th>Description</th>
<th>Severity</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<p>The following vulnerabilities were discovered in the Linux kernel that can lead
            to a privilege escalation on Ubuntu nodes:
            </p><ul>
<li>CVE-2025-37890</li>
</ul>
<h4 data-text="What should I do?" id="what-should-i-do_105" tabindex="-1">What should I do?</h4>
<p><aside class="note"><strong>Note: </strong>Patch versions and a severity assessment for GKE on Azure are in progress. We'll update this bulletin with that information when it's available.</aside></p>
</td>
<td>Pending</td>
</tr>
</tbody>
</table>
</section>
<section>
<h3 data-text="GDC (bare metal)" id="gcp-2025-041-gdcbm" tabindex="-1">GDC (bare metal)</h3>
<table>
<thead>
<tr>
<th>Description</th>
<th>Severity</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<p>The following vulnerabilities were discovered in the Linux kernel that can lead
            to a privilege escalation on Ubuntu nodes:
            </p><ul>
<li>CVE-2025-37890</li>
</ul>
<h4 data-text="What should I do?" id="what-should-i-do_106" tabindex="-1">What should I do?</h4>
<p>There is no action required. GDC software for bare metal isn't affected as it does not bundle an operating system in its distribution.</p>
</td>
<td>None</td>
</tr>
</tbody>
</table>
</section>
</devsite-selector>]]>
    </content>
  </entry>

  <entry>
    <title>GCP-2025-039</title>
    <id>tag:google.com,2016:gke-security-bulletins#gcp-2025-039</id>
    <updated>2025-07-15T00:00:00+00:00</updated>
    <link rel="alternate" href="https://docs.cloud.google.com/kubernetes-engine/security-bulletins#gcp-2025-039"/>
    <content type="html"><![CDATA[<p><strong>Published: </strong>2025-07-15<br/> <strong>Updated: </strong>2025-11-10<br/> <strong>Reference:</strong> <a class="external" href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38083">CVE-2025-38083</a></p><p><strong>2025-11-10 Update: </strong> Added patch versions for GDC software for VMware.</p><p><strong>2025-08-28 Update: </strong> Added patch versions for Ubuntu node pools on GKE.</p><devsite-selector>
<section>
<h3 data-text="GKE" id="gcp-2025-039-gke" tabindex="-1">GKE</h3>
<p><strong>Updated: </strong>2025-08-28</p>
<table>
<thead>
<tr>
<th>Description</th>
<th>Severity</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<p>The following vulnerabilities were discovered in the Linux kernel that can lead
          to a privilege escalation on Container-Optimized OS nodes:
          </p><ul>
<li>CVE-2025-38083</li>
</ul>
<p>GKE Standard clusters are impacted. GKE Autopilot clusters in the default configuration are not impacted, but might be vulnerable if you explicitly set the seccomp <code dir="ltr" translate="no">Unconfined</code> profile or allow <a href="https://docs.cloud.google.com/sdk/gcloud/reference/container/clusters/create-auto#--workload-policies"><code dir="ltr" translate="no">CAP_NET_ADMIN</code></a>.</p>
<p>Clusters using <a href="https://docs.cloud.google.com/kubernetes-engine/docs/concepts/sandbox-pods">GKE Sandbox</a> aren't impacted.</p>
<h4 data-text="What should I do?" id="what-should-i-do_107" tabindex="-1">What should I do?</h4>
<p><strong>2025-08-28 Update:</strong>
          The following versions of GKE are updated with code to fix this vulnerability on Ubuntu. Upgrade your Ubuntu node pools to the following versions or later:</p>
<ul>
<li>1.28.15-gke.2564000</li>
<li>1.29.15-gke.1773000</li>
<li>1.30.14-gke.1036000</li>
<li>1.31.11-gke.1101000</li>
<li>1.32.7-gke.1079000</li>
<li>1.33.3-gke.1392000</li>
</ul>
<hr/>
<p>The following minor versions are affected.
          <a href="https://docs.cloud.google.com/kubernetes-engine/docs/how-to/upgrading-a-container-cluster">Upgrade</a> your
          Container-Optimized OS node pools to one of the following patch versions or later:</p>
<ul>
<li>1.32.6-gke.1013000</li><li>1.29.15-gke.1607000</li><li>1.31.10-gke.1021000</li><li>1.30.12-gke.1333000</li><li>1.33.2-gke.1240000</li><li>1.28.15-gke.2456000</li>
</ul>
<p>You can apply patch versions from newer release channels if your cluster runs the same
          minor version in its own release channel. This feature lets you secure your nodes until
          the patch version becomes the default in your release channel. For details, see
          <a href="https://docs.cloud.google.com/kubernetes-engine/docs/concepts/release-channels#newer-patch-versions">Run patch versions from a newer channel</a>.</p>
</td>
<td>High</td>
</tr>
</tbody>
</table>
</section>
<section>
<h3 data-text="GDC (VMware)" id="gcp-2025-039-gdcvmware" tabindex="-1">GDC (VMware)</h3>
<p><strong>Updated: </strong>2025-11-10</p>
<table>
<thead>
<tr>
<th>Description</th>
<th>Severity</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<p>The following vulnerabilities were discovered in the Linux kernel that can lead
            to a privilege escalation on Container-Optimized OS nodes:
            </p><ul>
<li>CVE-2025-38083</li>
</ul>
<h4 data-text="What should I do?" id="what-should-i-do_108" tabindex="-1">What should I do?</h4>
<p><strong>2025-11-10 Update:</strong>
            The following versions of GDC software for VMware are updated with code to fix this
            vulnerability. Upgrade your GDC software for VMware clusters to the following versions
            or later:
            </p><ul>
<li>1.31.300-gke.81</li>
</ul>
<hr/>
<p><aside class="note"><strong>Note: </strong>Patch versions and a severity assessment for GDC software for VMware are in progress. We'll update this bulletin with that information when it's available.</aside></p>
</td>
<td>High</td>
</tr>
</tbody>
</table>
</section>
<section>
<h3 data-text="GKE on AWS" id="gcp-2025-039-gkeaws" tabindex="-1">GKE on AWS</h3>
<table>
<thead>
<tr>
<th>Description</th>
<th>Severity</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<aside class="note"><strong>Note: </strong>This section applies to both the current and previous generation of GKE on AWS</aside>
<p>The following vulnerabilities were discovered in the Linux kernel that can lead
            to a privilege escalation on Container-Optimized OS nodes:
            </p><ul>
<li>CVE-2025-38083</li>
</ul>
<h4 data-text="What should I do?" id="what-should-i-do_109" tabindex="-1">What should I do?</h4>
<p><aside class="note"><strong>Note: </strong>Patch versions and a severity assessment for GKE on AWS are in progress. We'll update this bulletin with that information when it's available.</aside></p>
</td>
<td>Pending</td>
</tr>
</tbody>
</table>
</section>
<section>
<h3 data-text="GKE on Azure" id="gcp-2025-039-gkeazure" tabindex="-1">GKE on Azure</h3>
<table>
<thead>
<tr>
<th>Description</th>
<th>Severity</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<p>The following vulnerabilities were discovered in the Linux kernel that can lead
            to a privilege escalation on Container-Optimized OS nodes:
            </p><ul>
<li>CVE-2025-38083</li>
</ul>
<h4 data-text="What should I do?" id="what-should-i-do_110" tabindex="-1">What should I do?</h4>
<p><aside class="note"><strong>Note: </strong>Patch versions and a severity assessment for GKE on Azure are in progress. We'll update this bulletin with that information when it's available.</aside></p>
</td>
<td>Pending</td>
</tr>
</tbody>
</table>
</section>
<section>
<h3 data-text="GDC (bare metal)" id="gcp-2025-039-gdcbm" tabindex="-1">GDC (bare metal)</h3>
<table>
<thead>
<tr>
<th>Description</th>
<th>Severity</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<p>The following vulnerabilities were discovered in the Linux kernel that can lead
            to a privilege escalation on Container-Optimized OS nodes:
            </p><ul>
<li>CVE-2025-38083</li>
</ul>
<h4 data-text="What should I do?" id="what-should-i-do_111" tabindex="-1">What should I do?</h4>
<p>There is no action required. GDC software for bare metal isn't affected as it does not bundle an operating system in its distribution.</p>
</td>
<td>None</td>
</tr>
</tbody>
</table>
</section>
</devsite-selector>]]>
    </content>
  </entry>

  <entry>
    <title>GCP-2025-038</title>
    <id>tag:google.com,2016:gke-security-bulletins#gcp-2025-038</id>
    <updated>2025-07-09T00:00:00+00:00</updated>
    <link rel="alternate" href="https://docs.cloud.google.com/kubernetes-engine/security-bulletins#gcp-2025-038"/>
    <content type="html"><![CDATA[<p><strong>Published: </strong>2025-07-09<br/> <strong>Updated: </strong>2025-09-25<br/> <strong>Reference:</strong> <a class="external" href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37752">CVE-2025-37752</a></p><p><strong>2025-09-25 Update: </strong> Added patch versions for Ubuntu node pools on GKE.</p><devsite-selector>
<section>
<h3 data-text="GKE" id="gcp-2025-038-gke" tabindex="-1">GKE</h3>
<p><strong>Updated: </strong>2025-09-25</p>
<table>
<thead>
<tr>
<th>Description</th>
<th>Severity</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<p>The following vulnerabilities were discovered in the Linux kernel that can lead
          to a privilege escalation on Container-Optimized OS nodes:
          </p><ul>
<li>CVE-2025-37752</li>
</ul>
<p>GKE Standard clusters are impacted. GKE Autopilot clusters in the default configuration are not impacted, but might be vulnerable if you explicitly set the seccomp <code dir="ltr" translate="no">Unconfined</code> profile or allow <a href="https://docs.cloud.google.com/sdk/gcloud/reference/container/clusters/create-auto#--workload-policies"><code dir="ltr" translate="no">CAP_NET_ADMIN</code></a>.</p>
<p>Clusters using <a href="https://docs.cloud.google.com/kubernetes-engine/docs/concepts/sandbox-pods">GKE Sandbox</a> aren't impacted.</p>
<h4 data-text="What should I do?" id="what-should-i-do_112" tabindex="-1">What should I do?</h4>
<p><strong>2025-09-25 Update:</strong> The following versions of GKE are updated with code to fix this vulnerability on Ubuntu. Upgrade your Ubuntu node pools to the following versions or later:</p>
<ul>
<li>1.28.15-gke.2697000</li><li>1.29.15-gke.1936000</li><li>1.30.14-gke.1150000</li><li>1.31.12-gke.1110000
  </li><li>1.32.8-gke.1170000</li><li>1.33.4-gke.1245000</li><li>1.34.0-gke.1662000</li>
</ul>
<hr/>
<p>The following minor versions are affected.
          <a href="https://docs.cloud.google.com/kubernetes-engine/docs/how-to/upgrading-a-container-cluster">Upgrade</a> your
          Container-Optimized OS node pools to one of the following patch versions or later:</p>
<ul>
<li>1.33.1-gke.1584000</li><li>1.32.4-gke.1603000</li><li>1.31.9-gke.1176000</li><li>1.30.12-gke.1208000</li><li>1.28.15-gke.2303000</li><li>1.29.15-gke.1415000</li>
</ul>
<p>You can apply patch versions from newer release channels if your cluster runs the same
          minor version in its own release channel. This feature lets you secure your nodes until
          the patch version becomes the default in your release channel. For details, see
          <a href="https://docs.cloud.google.com/kubernetes-engine/docs/concepts/release-channels#newer-patch-versions">Run patch versions from a newer channel</a>.</p>
</td>
<td>High</td>
</tr>
</tbody>
</table>
</section>
<section>
<h3 data-text="GDC (VMware)" id="gcp-2025-038-gdcvmware" tabindex="-1">GDC (VMware)</h3>
<table>
<thead>
<tr>
<th>Description</th>
<th>Severity</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<p>The following vulnerabilities were discovered in the Linux kernel that can lead
            to a privilege escalation on Container-Optimized OS nodes:
            </p><ul>
<li>CVE-2025-37752</li>
</ul>
<h4 data-text="What should I do?" id="what-should-i-do_113" tabindex="-1">What should I do?</h4>
<p><aside class="note"><strong>Note: </strong>Patch versions and a severity assessment for GDC software for VMware are in progress. We'll update this bulletin with that information when it's available.</aside></p>
</td>
<td>Pending</td>
</tr>
</tbody>
</table>
</section>
<section>
<h3 data-text="GKE on AWS" id="gcp-2025-038-gkeaws" tabindex="-1">GKE on AWS</h3>
<table>
<thead>
<tr>
<th>Description</th>
<th>Severity</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<aside class="note"><strong>Note: </strong>This section applies to both the current and previous generation of GKE on AWS</aside>
<p>The following vulnerabilities were discovered in the Linux kernel that can lead
            to a privilege escalation on Container-Optimized OS nodes:
            </p><ul>
<li>CVE-2025-37752</li>
</ul>
<h4 data-text="What should I do?" id="what-should-i-do_114" tabindex="-1">What should I do?</h4>
<p><aside class="note"><strong>Note: </strong>Patch versions and a severity assessment for GKE on AWS are in progress. We'll update this bulletin with that information when it's available.</aside></p>
</td>
<td>Pending</td>
</tr>
</tbody>
</table>
</section>
<section>
<h3 data-text="GKE on Azure" id="gcp-2025-038-gkeazure" tabindex="-1">GKE on Azure</h3>
<table>
<thead>
<tr>
<th>Description</th>
<th>Severity</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<p>The following vulnerabilities were discovered in the Linux kernel that can lead
            to a privilege escalation on Container-Optimized OS nodes:
            </p><ul>
<li>CVE-2025-37752</li>
</ul>
<h4 data-text="What should I do?" id="what-should-i-do_115" tabindex="-1">What should I do?</h4>
<p><aside class="note"><strong>Note: </strong>Patch versions and a severity assessment for GKE on Azure are in progress. We'll update this bulletin with that information when it's available.</aside></p>
</td>
<td>Pending</td>
</tr>
</tbody>
</table>
</section>
<section>
<h3 data-text="GDC (bare metal)" id="gcp-2025-038-gdcbm" tabindex="-1">GDC (bare metal)</h3>
<table>
<thead>
<tr>
<th>Description</th>
<th>Severity</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<p>The following vulnerabilities were discovered in the Linux kernel that can lead
            to a privilege escalation on Container-Optimized OS nodes:
            </p><ul>
<li>CVE-2025-37752</li>
</ul>
<h4 data-text="What should I do?" id="what-should-i-do_116" tabindex="-1">What should I do?</h4>
<p>There is no action required. GDC software for bare metal isn't affected as it does not bundle an operating system in its distribution.</p>
</td>
<td>None</td>
</tr>
</tbody>
</table>
</section>
</devsite-selector>]]>
    </content>
  </entry>

  <entry>
    <title>GCP-2025-036</title>
    <id>tag:google.com,2016:gke-security-bulletins#gcp-2025-036</id>
    <updated>2025-07-01T00:00:00+00:00</updated>
    <link rel="alternate" href="https://docs.cloud.google.com/kubernetes-engine/security-bulletins#gcp-2025-036"/>
    <content type="html"><![CDATA[<p><strong>Published: </strong>2025-07-01<br/> <strong>Updated: </strong>2025-11-10<br/> <strong>Reference:</strong> <a class="external" href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38001">CVE-2025-38001</a></p><p><strong>2025-11-10 Update: </strong> Added patch versions for GDC software for VMware.</p><p><strong>2025-07-21 Update: </strong> Added patch versions for Ubuntu node pools on GKE.</p><devsite-selector>
<section>
<h3 data-text="GKE" id="gcp-2025-036-gke" tabindex="-1">GKE</h3>
<p><strong>Updated: </strong>2025-07-21</p>
<table>
<thead>
<tr>
<th>Description</th>
<th>Severity</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<p>The following vulnerabilities were discovered in the Linux kernel that can lead
          to a privilege escalation on Container-Optimized OS nodes:
          </p><ul>
<li>CVE-2025-38001</li>
</ul>
<p>GKE Standard clusters are impacted. GKE Autopilot clusters in the default configuration are not impacted, but might be vulnerable if you explicitly set the seccomp <code dir="ltr" translate="no">Unconfined</code> profile or allow <a href="https://docs.cloud.google.com/sdk/gcloud/reference/container/clusters/create-auto#--workload-policies"><code dir="ltr" translate="no">CAP_NET_ADMIN</code></a>.</p>
<p>Clusters using <a href="https://docs.cloud.google.com/kubernetes-engine/docs/concepts/sandbox-pods">GKE Sandbox</a> aren't impacted.</p>
<h4 data-text="What should I do?" id="what-should-i-do_117" tabindex="-1">What should I do?</h4>
<p><strong>2025-07-21 Update:</strong>
          The following versions of GKE are updated with code to fix this vulnerability on Ubuntu. Upgrade your GKE Ubuntu node pools to the following versions or later:
          </p><ul>
<li>1.28.15-gke.2461000</li>
<li>1.29.15-gke.1614000</li>
<li>1.30.12-gke.1372000</li>
<li>1.31.10-gke.1067000</li>
<li>1.32.6-gke.1060000</li>
<li>1.33.2-gke.1384000</li>
</ul>
<hr/>
<p>The following minor versions are affected.
          <a href="https://docs.cloud.google.com/kubernetes-engine/docs/how-to/upgrading-a-container-cluster">Upgrade</a> your
          Container-Optimized OS node pools to one of the following patch versions or later:</p>
<ul>
<li>1.33.1-gke.1959000</li><li>1.30.12-gke.1279000</li><li>1.31.9-gke.1287000</li><li>1.28.15-gke.2428000</li><li>1.29.15-gke.1549000</li><li>1.32.4-gke.1698000</li>
</ul>
<p>You can apply patch versions from newer release channels if your cluster runs the same
          minor version in its own release channel. This feature lets you secure your nodes until
          the patch version becomes the default in your release channel. For details, see
          <a href="https://docs.cloud.google.com/kubernetes-engine/docs/concepts/release-channels#newer-patch-versions">Run patch versions from a newer channel</a>.</p>
</td>
<td>High</td>
</tr>
</tbody>
</table>
</section>
<section>
<h3 data-text="GDC (VMware)" id="gcp-2025-036-gdcvmware" tabindex="-1">GDC (VMware)</h3>
<p><strong>Updated: </strong>2025-11-10</p>
<table>
<thead>
<tr>
<th>Description</th>
<th>Severity</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<p>The following vulnerabilities were discovered in the Linux kernel that can lead
            to a privilege escalation on Container-Optimized OS nodes:
            </p><ul>
<li>CVE-2025-38001</li>
</ul>
<h4 data-text="What should I do?" id="what-should-i-do_118" tabindex="-1">What should I do?</h4>
<p><strong>2025-11-10 Update:</strong>
            The following versions of GDC software for VMware are updated with code to fix this
            vulnerability. Upgrade your GDC software for VMware clusters to the following versions
            or later:
            </p><ul>
<li>1.31.300-gke.81</li>
</ul>
<hr/>
<p><aside class="note"><strong>Note: </strong>Patch versions and a severity assessment for GDC software for VMware are in progress. We'll update this bulletin with that information when it's available.</aside></p>
</td>
<td>High</td>
</tr>
</tbody>
</table>
</section>
<section>
<h3 data-text="GKE on AWS" id="gcp-2025-036-gkeaws" tabindex="-1">GKE on AWS</h3>
<table>
<thead>
<tr>
<th>Description</th>
<th>Severity</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<aside class="note"><strong>Note: </strong>This section applies to both the current and previous generation of GKE on AWS</aside>
<p>The following vulnerabilities were discovered in the Linux kernel that can lead
            to a privilege escalation on Container-Optimized OS nodes:
            </p><ul>
<li>CVE-2025-38001</li>
</ul>
<h4 data-text="What should I do?" id="what-should-i-do_119" tabindex="-1">What should I do?</h4>
<p><aside class="note"><strong>Note: </strong>Patch versions and a severity assessment for GKE on AWS are in progress. We'll update this bulletin with that information when it's available.</aside></p>
</td>
<td>Pending</td>
</tr>
</tbody>
</table>
</section>
<section>
<h3 data-text="GKE on Azure" id="gcp-2025-036-gkeazure" tabindex="-1">GKE on Azure</h3>
<table>
<thead>
<tr>
<th>Description</th>
<th>Severity</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<p>The following vulnerabilities were discovered in the Linux kernel that can lead
            to a privilege escalation on Container-Optimized OS nodes:
            </p><ul>
<li>CVE-2025-38001</li>
</ul>
<h4 data-text="What should I do?" id="what-should-i-do_120" tabindex="-1">What should I do?</h4>
<p><aside class="note"><strong>Note: </strong>Patch versions and a severity assessment for GKE on Azure are in progress. We'll update this bulletin with that information when it's available.</aside></p>
</td>
<td>Pending</td>
</tr>
</tbody>
</table>
</section>
<section>
<h3 data-text="GDC (bare metal)" id="gcp-2025-036-gdcbm" tabindex="-1">GDC (bare metal)</h3>
<table>
<thead>
<tr>
<th>Description</th>
<th>Severity</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<p>The following vulnerabilities were discovered in the Linux kernel that can lead
            to a privilege escalation on Container-Optimized OS nodes:
            </p><ul>
<li>CVE-2025-38001</li>
</ul>
<h4 data-text="What should I do?" id="what-should-i-do_121" tabindex="-1">What should I do?</h4>
<p>There is no action required. GDC software for bare metal isn't affected as it does not bundle an operating system in its distribution.</p>
</td>
<td>None</td>
</tr>
</tbody>
</table>
</section>
</devsite-selector>]]>
    </content>
  </entry>

  <entry>
    <title>GCP-2025-035</title>
    <id>tag:google.com,2016:gke-security-bulletins#gcp-2025-035</id>
    <updated>2025-06-17T00:00:00+00:00</updated>
    <link rel="alternate" href="https://docs.cloud.google.com/kubernetes-engine/security-bulletins#gcp-2025-035"/>
    <content type="html"><![CDATA[<p><strong>Published: </strong>2025-06-17<br/> <strong>Updated: </strong>2025-11-10<br/> <strong>Reference:</strong> <a class="external" href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37997">CVE-2025-37997</a></p><p><strong>2025-11-10 Update: </strong> Added patch versions for GDC software for VMware.</p><p><strong>2025-07-21 Update: </strong> Added patch versions for Ubuntu node pools on GKE.</p><devsite-selector>
<section>
<h3 data-text="GKE" id="gcp-2025-035-gke" tabindex="-1">GKE</h3>
<p><strong>Updated: </strong>2025-07-21</p>
<table>
<thead>
<tr>
<th>Description</th>
<th>Severity</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<p>The following vulnerabilities were discovered in the Linux kernel that can lead
          to a privilege escalation on Container-Optimized OS nodes:
          </p><ul>
<li>CVE-2025-37997</li>
</ul>
<p>GKE Standard clusters are impacted. GKE Autopilot clusters in the default configuration are not impacted, but might be vulnerable if you explicitly set the seccomp <code dir="ltr" translate="no">Unconfined</code> profile or allow <a href="https://docs.cloud.google.com/sdk/gcloud/reference/container/clusters/create-auto#--workload-policies"><code dir="ltr" translate="no">CAP_NET_ADMIN</code></a>.</p>
<p>Clusters using <a href="https://docs.cloud.google.com/kubernetes-engine/docs/concepts/sandbox-pods">GKE Sandbox</a> aren't impacted.</p>
<h4 data-text="What should I do?" id="what-should-i-do_122" tabindex="-1">What should I do?</h4>
<p><strong>2025-07-21 Update:</strong>
          The following versions of GKE are updated with code to fix this vulnerability on Ubuntu. Upgrade your GKE Ubuntu node pools to the following versions or later:
          </p><ul>
<li>1.28.15-gke.2461000</li>
<li>1.29.15-gke.1614000</li>
<li>1.30.12-gke.1372000</li>
<li>1.31.10-gke.1067000</li>
<li>1.32.6-gke.1060000</li>
<li>1.33.2-gke.1384000</li>
</ul>
<hr/>
<p>The following minor versions are affected.
          <a href="https://docs.cloud.google.com/kubernetes-engine/docs/how-to/upgrading-a-container-cluster">Upgrade</a> your
          Container-Optimized OS node pools to one of the following patch versions or later:</p>
<ul>
<li>1.28.15-gke.2403000</li><li>1.31.9-gke.1176000</li><li>1.30.12-gke.1246000</li><li>1.29.15-gke.1523000</li><li>1.33.1-gke.1545000</li><li>1.27.16-gke.2874000</li><li>1.32.4-gke.1603000</li>
</ul>
<p>You can apply patch versions from newer release channels if your cluster runs the same
          minor version in its own release channel. This feature lets you secure your nodes until
          the patch version becomes the default in your release channel. For details, see
          <a href="https://docs.cloud.google.com/kubernetes-engine/docs/concepts/release-channels#newer-patch-versions">Run patch versions from a newer channel</a>.</p>
</td>
<td>High</td>
</tr>
</tbody>
</table>
</section>
<section>
<h3 data-text="GDC (VMware)" id="gcp-2025-035-gdcvmware" tabindex="-1">GDC (VMware)</h3>
<p><strong>Updated: </strong>2025-11-10</p>
<table>
<thead>
<tr>
<th>Description</th>
<th>Severity</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<p>The following vulnerabilities were discovered in the Linux kernel that can lead
            to a privilege escalation on Container-Optimized OS nodes:
            </p><ul>
<li>CVE-2025-37997</li>
</ul>
<h4 data-text="What should I do?" id="what-should-i-do_123" tabindex="-1">What should I do?</h4>
<p><strong>2025-11-10 Update:</strong>
            The following versions of GDC software for VMware are updated with code to fix this
            vulnerability. Upgrade your GDC software for VMware clusters to the following versions
            or later:
            </p><ul>
<li>1.31.300-gke.81</li>
</ul>
<hr/>
<p><aside class="note"><strong>Note: </strong>Patch versions and a severity assessment for GDC software for VMware are in progress. We'll update this bulletin with that information when it's available.</aside></p>
</td>
<td>Pending</td>
</tr>
</tbody>
</table>
</section>
<section>
<h3 data-text="GKE on AWS" id="gcp-2025-035-gkeaws" tabindex="-1">GKE on AWS</h3>
<table>
<thead>
<tr>
<th>Description</th>
<th>Severity</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<aside class="note"><strong>Note: </strong>This section applies to both the current and previous generation of GKE on AWS</aside>
<p>The following vulnerabilities were discovered in the Linux kernel that can lead
            to a privilege escalation on Container-Optimized OS nodes:
            </p><ul>
<li>CVE-2025-37997</li>
</ul>
<h4 data-text="What should I do?" id="what-should-i-do_124" tabindex="-1">What should I do?</h4>
<p><aside class="note"><strong>Note: </strong>Patch versions and a severity assessment for GKE on AWS are in progress. We'll update this bulletin with that information when it's available.</aside></p>
</td>
<td>Pending</td>
</tr>
</tbody>
</table>
</section>
<section>
<h3 data-text="GKE on Azure" id="gcp-2025-035-gkeazure" tabindex="-1">GKE on Azure</h3>
<table>
<thead>
<tr>
<th>Description</th>
<th>Severity</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<p>The following vulnerabilities were discovered in the Linux kernel that can lead
            to a privilege escalation on Container-Optimized OS nodes:
            </p><ul>
<li>CVE-2025-37997</li>
</ul>
<h4 data-text="What should I do?" id="what-should-i-do_125" tabindex="-1">What should I do?</h4>
<p><aside class="note"><strong>Note: </strong>Patch versions and a severity assessment for GKE on Azure are in progress. We'll update this bulletin with that information when it's available.</aside></p>
</td>
<td>Pending</td>
</tr>
</tbody>
</table>
</section>
<section>
<h3 data-text="GDC (bare metal)" id="gcp-2025-035-gdcbm" tabindex="-1">GDC (bare metal)</h3>
<table>
<thead>
<tr>
<th>Description</th>
<th>Severity</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<p>The following vulnerabilities were discovered in the Linux kernel that can lead
            to a privilege escalation on Container-Optimized OS nodes:
            </p><ul>
<li>CVE-2025-37997</li>
</ul>
<h4 data-text="What should I do?" id="what-should-i-do_126" tabindex="-1">What should I do?</h4>
<p>There is no action required. GDC software for bare metal isn't affected as it does not bundle an operating system in its distribution.</p>
</td>
<td>None</td>
</tr>
</tbody>
</table>
</section>
</devsite-selector>]]>
    </content>
  </entry>

  <entry>
    <title>GCP-2025-034</title>
    <id>tag:google.com,2016:gke-security-bulletins#gcp-2025-034</id>
    <updated>2025-06-17T00:00:00+00:00</updated>
    <link rel="alternate" href="https://docs.cloud.google.com/kubernetes-engine/security-bulletins#gcp-2025-034"/>
    <content type="html"><![CDATA[<p><strong>Published: </strong>2025-06-17<br/> <strong>Updated: </strong>2025-07-21<br/> <strong>Reference:</strong> <a class="external" href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38000">CVE-2025-38000</a></p><p><strong>2025-07-21 Update: </strong> Added patch versions for Ubuntu node pools on GKE.</p><devsite-selector>
<section>
<h3 data-text="GKE" id="gcp-2025-034-gke" tabindex="-1">GKE</h3>
<p><strong>Updated: </strong>2025-07-21</p>
<table>
<thead>
<tr>
<th>Description</th>
<th>Severity</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<p>The following vulnerabilities were discovered in the Linux kernel that can lead
          to a privilege escalation on Container-Optimized OS nodes:
          </p><ul>
<li>CVE-2025-38000</li>
</ul>
<p>GKE Standard clusters are impacted. GKE Autopilot clusters in the default configuration are not impacted, but might be vulnerable if you explicitly set the seccomp <code dir="ltr" translate="no">Unconfined</code> profile or allow <a href="https://docs.cloud.google.com/sdk/gcloud/reference/container/clusters/create-auto#--workload-policies"><code dir="ltr" translate="no">CAP_NET_ADMIN</code></a>.</p>
<p>Clusters using <a href="https://docs.cloud.google.com/kubernetes-engine/docs/concepts/sandbox-pods">GKE Sandbox</a> aren't impacted.</p>
<h4 data-text="What should I do?" id="what-should-i-do_127" tabindex="-1">What should I do?</h4>
<p><strong>2025-07-21 Update:</strong>
          The following versions of GKE are updated with code to fix this vulnerability on Ubuntu. Upgrade your GKE Ubuntu node pools to the following versions or later:
          </p><ul>
<li>1.28.15-gke.2461000</li>
<li>1.29.15-gke.1614000</li>
<li>1.30.12-gke.1372000</li>
<li>1.31.10-gke.1067000</li>
<li>1.32.6-gke.1060000</li>
<li>1.33.2-gke.1384000</li>
</ul>
<hr/>
<p>The following minor versions are affected.
          <a href="https://docs.cloud.google.com/kubernetes-engine/docs/how-to/upgrading-a-container-cluster">Upgrade</a> your
          Container-Optimized OS node pools to one of the following patch versions or later:</p>
<ul>
<li>1.33.1-gke.1545000</li><li>1.27.16-gke.2874000</li><li>1.32.4-gke.1603000</li><li>1.28.15-gke.2403000</li><li>1.30.12-gke.1246000</li><li>1.31.9-gke.1176000</li><li>1.29.15-gke.1523000</li>
</ul>
<p>You can apply patch versions from newer release channels if your cluster runs the same
          minor version in its own release channel. This feature lets you secure your nodes until
          the patch version becomes the default in your release channel. For details, see
          <a href="https://docs.cloud.google.com/kubernetes-engine/docs/concepts/release-channels#newer-patch-versions">Run patch versions from a newer channel</a>.</p>
</td>
<td>High</td>
</tr>
</tbody>
</table>
</section>
<section>
<h3 data-text="GDC (VMware)" id="gcp-2025-034-gdcvmware" tabindex="-1">GDC (VMware)</h3>
<table>
<thead>
<tr>
<th>Description</th>
<th>Severity</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<p>The following vulnerabilities were discovered in the Linux kernel that can lead
            to a privilege escalation on Container-Optimized OS nodes:
            </p><ul>
<li>CVE-2025-38000</li>
</ul>
<h4 data-text="What should I do?" id="what-should-i-do_128" tabindex="-1">What should I do?</h4>
<p><aside class="note"><strong>Note: </strong>Patch versions and a severity assessment for GDC software for VMware are in progress. We'll update this bulletin with that information when it's available.</aside></p>
</td>
<td>Pending</td>
</tr>
</tbody>
</table>
</section>
<section>
<h3 data-text="GKE on AWS" id="gcp-2025-034-gkeaws" tabindex="-1">GKE on AWS</h3>
<table>
<thead>
<tr>
<th>Description</th>
<th>Severity</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<aside class="note"><strong>Note: </strong>This section applies to both the current and previous generation of GKE on AWS</aside>
<p>The following vulnerabilities were discovered in the Linux kernel that can lead
            to a privilege escalation on Container-Optimized OS nodes:
            </p><ul>
<li>CVE-2025-38000</li>
</ul>
<h4 data-text="What should I do?" id="what-should-i-do_129" tabindex="-1">What should I do?</h4>
<p><aside class="note"><strong>Note: </strong>Patch versions and a severity assessment for GKE on AWS are in progress. We'll update this bulletin with that information when it's available.</aside></p>
</td>
<td>Pending</td>
</tr>
</tbody>
</table>
</section>
<section>
<h3 data-text="GKE on Azure" id="gcp-2025-034-gkeazure" tabindex="-1">GKE on Azure</h3>
<table>
<thead>
<tr>
<th>Description</th>
<th>Severity</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<p>The following vulnerabilities were discovered in the Linux kernel that can lead
            to a privilege escalation on Container-Optimized OS nodes:
            </p><ul>
<li>CVE-2025-38000</li>
</ul>
<h4 data-text="What should I do?" id="what-should-i-do_130" tabindex="-1">What should I do?</h4>
<p><aside class="note"><strong>Note: </strong>Patch versions and a severity assessment for GKE on Azure are in progress. We'll update this bulletin with that information when it's available.</aside></p>
</td>
<td>Pending</td>
</tr>
</tbody>
</table>
</section>
<section>
<h3 data-text="GDC (bare metal)" id="gcp-2025-034-gdcbm" tabindex="-1">GDC (bare metal)</h3>
<table>
<thead>
<tr>
<th>Description</th>
<th>Severity</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<p>The following vulnerabilities were discovered in the Linux kernel that can lead
            to a privilege escalation on Container-Optimized OS nodes:
            </p><ul>
<li>CVE-2025-38000</li>
</ul>
<h4 data-text="What should I do?" id="what-should-i-do_131" tabindex="-1">What should I do?</h4>
<p>There is no action required. GDC software for bare metal isn't affected as it does not bundle an operating system in its distribution.</p>
</td>
<td>None</td>
</tr>
</tbody>
</table>
</section>
</devsite-selector>]]>
    </content>
  </entry>

  <entry>
    <title>GCP-2025-033</title>
    <id>tag:google.com,2016:gke-security-bulletins#gcp-2025-033</id>
    <updated>2025-06-06T00:00:00+00:00</updated>
    <link rel="alternate" href="https://docs.cloud.google.com/kubernetes-engine/security-bulletins#gcp-2025-033"/>
    <content type="html"><![CDATA[<p><strong>Published: </strong>2025-06-06<br/> <strong>Reference: </strong>N/A</p><devsite-selector>
<section>
<h3 data-text="GKE" id="gcp-2025-033-gke" tabindex="-1">GKE</h3>
<table>
<thead>
<tr>
<th>Description</th>
<th>Severity</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<p>
        A security issue was discovered where attackers might be able to bypass
        <a href="https://cloud.google.com/kubernetes-engine/docs/how-to/isolate-workloads-dedicated-nodes#avoiding-privesc">workload isolation</a>
        restrictions on GKE clusters. Only clusters relying on node isolation to separate workloads
        inside a cluster are affected. Note that node isolation should
        never be used as a primary security boundary.
        </p>
<p>
        To exploit this vulnerability, attackers must first gain access to the kubelet node client
        credentials. Access to these credentials typically requires root permissions on the host and
        access to the host filesystem. For most systems, this means you need both an application
        vulnerability to gain access to the workload and a container breakout vulnerability to gain
        access to the host. Attackers with access to such credentials could do the following:
        </p>
<ul>
<li>Attackers could re-register the node with the same
          name, but with different values for certain fields in the Node object.
          Specifically, an attacker could set <code dir="ltr" translate="no">.spec.providerID</code> to point to a different
          instance in the cluster, causing the GKE control plane to delete the referenced
          Compute Engine instance.
          </li><li>Attackers could also change <code dir="ltr" translate="no">.spec.taints</code> to affect workload scheduling.
          When implementing node isolation as a security control, you must use labels and label
          selectors with the <code dir="ltr" translate="no">node-restriction.kubernetes.io/</code> prefix to prevent
          compromised nodes from manipulating scheduling behavior.
        </li></ul>
<h4 data-text="What should I do?" id="what-should-i-do_132" tabindex="-1">What should I do?</h4>
<p>Implement the following changes to address this issue:</p>
<strong>Upgrade your GKE cluster and optionally implement validating admission policy</strong>
<p>
          Address the provider ID issue by upgrading your GKE clusters to a patched version. The
          following versions of GKE or later have been updated to address the <code dir="ltr" translate="no">providerID</code> issue:
          </p>
<ul>
<li>1.33.1-gke.1386000</li>
<li>1.32.4-gke.1533000</li>
<li>1.31.9-gke.1119000</li>
<li>1.30.12-gke.1208000</li>
</ul>
<p>
          Optionally, if you cannot upgrade, implement the following validating admission policy on your cluster to mitigate the <code dir="ltr" translate="no">providerID</code> issue:
          </p>
<div></div><devsite-code><pre class="devsite-click-to-copy suppresswarning" dir="ltr" is-upgraded="" style="font-size: 75%;" syntax="Transact-SQL" syntax-guessed="" translate="no"><span class="devsite-syntax-nl">apiVersion</span><span class="devsite-syntax-p">:</span><span class="devsite-syntax-w"> </span><span class="devsite-syntax-n">admissionregistration</span><span class="devsite-syntax-p">.</span><span class="devsite-syntax-n">k8s</span><span class="devsite-syntax-p">.</span><span class="devsite-syntax-n">io</span><span class="devsite-syntax-o">/</span><span class="devsite-syntax-n">v1</span>
<span class="devsite-syntax-nl">kind</span><span class="devsite-syntax-p">:</span><span class="devsite-syntax-w"> </span><span class="devsite-syntax-n">ValidatingAdmissionPolicy</span>
<span class="devsite-syntax-nl">metadata</span><span class="devsite-syntax-p">:</span>
<span class="devsite-syntax-w">  </span><span class="devsite-syntax-nl">name</span><span class="devsite-syntax-p">:</span><span class="devsite-syntax-w"> </span><span class="devsite-syntax-n">validate</span><span class="devsite-syntax-o">-</span><span class="devsite-syntax-n">node</span><span class="devsite-syntax-o">-</span><span class="devsite-syntax-n">providerid</span>
<span class="devsite-syntax-nl">spec</span><span class="devsite-syntax-p">:</span>
<span class="devsite-syntax-w">  </span><span class="devsite-syntax-nl">failurePolicy</span><span class="devsite-syntax-p">:</span><span class="devsite-syntax-w"> </span><span class="devsite-syntax-n">Fail</span>
<span class="devsite-syntax-w">  </span><span class="devsite-syntax-nl">matchConstraints</span><span class="devsite-syntax-p">:</span>
<span class="devsite-syntax-w">    </span><span class="devsite-syntax-nl">resourceRules</span><span class="devsite-syntax-p">:</span>
<span class="devsite-syntax-w">    </span><span class="devsite-syntax-o">-</span><span class="devsite-syntax-w"> </span><span class="devsite-syntax-nl">apiGroups</span><span class="devsite-syntax-p">:</span><span class="devsite-syntax-w">   </span><span class="devsite-syntax-o">[</span><span class="devsite-syntax-n">""</span><span class="devsite-syntax-o">]</span>
<span class="devsite-syntax-w">      </span><span class="devsite-syntax-nl">apiVersions</span><span class="devsite-syntax-p">:</span><span class="devsite-syntax-w"> </span><span class="devsite-syntax-o">[</span><span class="devsite-syntax-n">"v1"</span><span class="devsite-syntax-o">]</span>
<span class="devsite-syntax-w">      </span><span class="devsite-syntax-nl">operations</span><span class="devsite-syntax-p">:</span><span class="devsite-syntax-w">  </span><span class="devsite-syntax-o">[</span><span class="devsite-syntax-n">"CREATE", "UPDATE"</span><span class="devsite-syntax-o">]</span>
<span class="devsite-syntax-w">      </span><span class="devsite-syntax-nl">resources</span><span class="devsite-syntax-p">:</span><span class="devsite-syntax-w">   </span><span class="devsite-syntax-o">[</span><span class="devsite-syntax-n">"nodes"</span><span class="devsite-syntax-o">]</span>
<span class="devsite-syntax-w">  </span><span class="devsite-syntax-nl">matchConditions</span><span class="devsite-syntax-p">:</span>
<span class="devsite-syntax-w">  </span><span class="devsite-syntax-o">-</span><span class="devsite-syntax-w"> </span><span class="devsite-syntax-nl">name</span><span class="devsite-syntax-p">:</span><span class="devsite-syntax-w"> </span><span class="devsite-syntax-ss">"has-providerid"</span>
<span class="devsite-syntax-w">    </span><span class="devsite-syntax-nl">expression</span><span class="devsite-syntax-p">:</span><span class="devsite-syntax-w"> </span><span class="devsite-syntax-ss">"has(object.spec.providerID)"</span>
<span class="devsite-syntax-w">  </span><span class="devsite-syntax-nl">validations</span><span class="devsite-syntax-p">:</span>
<span class="devsite-syntax-w">  </span><span class="devsite-syntax-o">-</span><span class="devsite-syntax-w"> </span><span class="devsite-syntax-nl">expression</span><span class="devsite-syntax-p">:</span><span class="devsite-syntax-w"> </span><span class="devsite-syntax-ss">"object.spec.providerID == '' || object.spec.providerID.endsWith('/' + object.metadata.name)"</span>
<span class="devsite-syntax-w">    </span><span class="devsite-syntax-nl">message</span><span class="devsite-syntax-p">:</span><span class="devsite-syntax-w"> </span><span class="devsite-syntax-ss">"node.spec.providerID must match the node name"</span>
<span class="devsite-syntax-c1">---</span>
<span class="devsite-syntax-nl">apiVersion</span><span class="devsite-syntax-p">:</span><span class="devsite-syntax-w"> </span><span class="devsite-syntax-n">admissionregistration</span><span class="devsite-syntax-p">.</span><span class="devsite-syntax-n">k8s</span><span class="devsite-syntax-p">.</span><span class="devsite-syntax-n">io</span><span class="devsite-syntax-o">/</span><span class="devsite-syntax-n">v1</span>
<span class="devsite-syntax-nl">kind</span><span class="devsite-syntax-p">:</span><span class="devsite-syntax-w"> </span><span class="devsite-syntax-n">ValidatingAdmissionPolicyBinding</span>
<span class="devsite-syntax-nl">metadata</span><span class="devsite-syntax-p">:</span>
<span class="devsite-syntax-w">  </span><span class="devsite-syntax-nl">name</span><span class="devsite-syntax-p">:</span><span class="devsite-syntax-w"> </span><span class="devsite-syntax-n">validate</span><span class="devsite-syntax-o">-</span><span class="devsite-syntax-n">node</span><span class="devsite-syntax-o">-</span><span class="devsite-syntax-n">providerid</span><span class="devsite-syntax-o">-</span><span class="devsite-syntax-n">binding</span>
<span class="devsite-syntax-nl">spec</span><span class="devsite-syntax-p">:</span>
<span class="devsite-syntax-w">  </span><span class="devsite-syntax-nl">policyName</span><span class="devsite-syntax-p">:</span><span class="devsite-syntax-w"> </span><span class="devsite-syntax-n">validate</span><span class="devsite-syntax-o">-</span><span class="devsite-syntax-n">node</span><span class="devsite-syntax-o">-</span><span class="devsite-syntax-n">providerid</span>
<span class="devsite-syntax-w">  </span><span class="devsite-syntax-nl">validationActions</span><span class="devsite-syntax-p">:</span><span class="devsite-syntax-w"> </span><span class="devsite-syntax-o">[</span><span class="devsite-syntax-n">Deny</span><span class="devsite-syntax-o">]</span></pre></devsite-code>
<p>
<strong>Use node restricted labels when isolating workloads to specific
          nodes as a security control</strong>
</p>
<p>
          If you are using labels for node isolation, as described in
          <a href="https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#node-isolation-restriction">Kubernetes documentation</a>,
          use node restricted labels (for example, labels of the form <code dir="ltr" translate="no">node-restriction.kubernetes.io/example-constraint</code>)
          in node affinity and node selector terms used for workload isolation.
          </p>
<p>
          Kubelet node credentials are prevented from applying such labels by the
          <a href="https://kubernetes.io/docs/reference/access-authn-authz/admission-controllers/#noderestriction">NodeRestriction</a>
          admission controller. The NodeRestriction admission controller is built into Kubernetes
          and enabled on all GKE clusters.
          </p>
<p>
<strong>GKE restricts the scope of node credentials on newly created nodes for new clusters</strong>
</p>
<p>
          As an additional hardening measure, new clusters starting from GKE version
          1.33.1-gke.1386000 restrict the scope of node credentials on newly created nodes. Node
          credentials are bound to the Compute Engine instance originally provisioned for the Node. After the
          instance is deleted, attackers are prevented from using such compromised credentials to
          register the Node, with attacker controlled taints or <code dir="ltr" translate="no">providerID</code> values.
          You can create a new cluster with version 1.33.1-gke.1386000 or later for newly-created
          nodes to have this additional hardening.
          </p>
</td>
<td>Medium</td>
</tr>
</tbody>
</table>
</section>
<section>
<h3 data-text="GDC (VMware)" id="gcp-2025-033-gdcvmware" tabindex="-1">GDC (VMware)</h3>
<table>
<thead>
<tr>
<th>Description</th>
<th>Severity</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<p>A security issue was discovered where attackers might be able to bypass <a href="https://cloud.google.com/kubernetes-engine/docs/how-to/isolate-workloads-dedicated-nodes#avoiding-privesc">workload isolation</a>
            restrictions on GKE clusters.</p>
<h4 data-text="What should I do?" id="what-should-i-do_133" tabindex="-1">What should I do?</h4>
<p>No action required.  This issue is specific to how GKE nodes are provisioned and managed on Compute Engine, and does not apply to GDC (VMware).</p>
</td>
<td>None</td>
</tr>
</tbody>
</table>
</section>
<section>
<h3 data-text="GKE on AWS" id="gcp-2025-033-gkeaws" tabindex="-1">GKE on AWS</h3>
<table>
<thead>
<tr>
<th>Description</th>
<th>Severity</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<aside class="note"><strong>Note: </strong>This section applies to both the current and previous generation of GKE on AWS</aside>
<p>A security issue was discovered where attackers might be able to bypass <a href="https://cloud.google.com/kubernetes-engine/docs/how-to/isolate-workloads-dedicated-nodes#avoiding-privesc">workload isolation</a>
            restrictions on GKE clusters.</p>
<h4 data-text="What should I do?" id="what-should-i-do_134" tabindex="-1">What should I do?</h4>
<h5 data-text="GKE on AWS" id="gke-on-aws" tabindex="-1">GKE on AWS</h5>
<p>No action required.  This issue is specific to how GKE nodes are provisioned and managed on Compute Engine, and does not apply to GKE on AWS.</p>
<h5 data-text="GKE on AWS (previous generation)" id="gke-on-aws-previous-generation" tabindex="-1">GKE on AWS (previous generation)</h5>
<p>No action required.  This issue is specific to how GKE nodes are provisioned and managed on Compute Engine, and does not apply to GKE on AWS (previous generation).</p>
</td>
<td>None</td>
</tr>
</tbody>
</table>
</section>
<section>
<h3 data-text="GKE on Azure" id="gcp-2025-033-gkeazure" tabindex="-1">GKE on Azure</h3>
<table>
<thead>
<tr>
<th>Description</th>
<th>Severity</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<p>A security issue was discovered where attackers might be able to bypass <a href="https://cloud.google.com/kubernetes-engine/docs/how-to/isolate-workloads-dedicated-nodes#avoiding-privesc">workload isolation</a>
            restrictions on GKE clusters.</p>
<h4 data-text="What should I do?" id="what-should-i-do_135" tabindex="-1">What should I do?</h4>
<p>No action required.  This issue is specific to how GKE nodes are provisioned and managed on Compute Engine, and does not apply to GKE on Azure.</p>
</td>
<td>None</td>
</tr>
</tbody>
</table>
</section>
<section>
<h3 data-text="GDC (bare metal)" id="gcp-2025-033-gdcbm" tabindex="-1">GDC (bare metal)</h3>
<table>
<thead>
<tr>
<th>Description</th>
<th>Severity</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<p>A security issue was discovered where attackers might be able to bypass <a href="https://cloud.google.com/kubernetes-engine/docs/how-to/isolate-workloads-dedicated-nodes#avoiding-privesc">workload isolation</a>
            restrictions on GKE clusters.</p>
<h4 data-text="What should I do?" id="what-should-i-do_136" tabindex="-1">What should I do?</h4>
<p>No action required.  This issue is specific to how GKE nodes are provisioned and managed on Compute Engine, and does not apply to GDC (bare metal).</p>
</td>
<td>None</td>
</tr>
</tbody>
</table>
</section>
</devsite-selector>]]>
    </content>
  </entry>

  <entry>
    <title>GCP-2025-032</title>
    <id>tag:google.com,2016:gke-security-bulletins#gcp-2025-032</id>
    <updated>2025-06-03T00:00:00+00:00</updated>
    <link rel="alternate" href="https://docs.cloud.google.com/kubernetes-engine/security-bulletins#gcp-2025-032"/>
    <content type="html"><![CDATA[<p><strong>Published: </strong>2025-06-03<br/> <strong>Updated: </strong>2025-07-21<br/> <strong>Reference:</strong> <a class="external" href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37798">CVE-2025-37798</a></p><p><strong>2025-07-21 Update: </strong> Added patch versions for Ubuntu node pools on GKE.</p><devsite-selector>
<section>
<h3 data-text="GKE" id="gcp-2025-032-gke" tabindex="-1">GKE</h3>
<p><strong>Updated: </strong>2025-07-21</p>
<table>
<thead>
<tr>
<th>Description</th>
<th>Severity</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<p>The following vulnerabilities were discovered in the Linux kernel that can lead
          to a privilege escalation on Container-Optimized OS nodes:
          </p><ul>
<li>CVE-2025-37798</li>
</ul>
<p>GKE Standard clusters are impacted. GKE Autopilot clusters in the default configuration are not impacted, but might be vulnerable if you explicitly set the seccomp <code dir="ltr" translate="no">Unconfined</code> profile or allow <a href="https://docs.cloud.google.com/sdk/gcloud/reference/container/clusters/create-auto#--workload-policies"><code dir="ltr" translate="no">CAP_NET_ADMIN</code></a>.</p>
<p>Clusters using <a href="https://docs.cloud.google.com/kubernetes-engine/docs/concepts/sandbox-pods">GKE Sandbox</a> aren't impacted.</p>
<h4 data-text="What should I do?" id="what-should-i-do_137" tabindex="-1">What should I do?</h4>
<p><strong>2025-07-21 Update:</strong>
          The following versions of GKE are updated with code to fix this vulnerability on Ubuntu. Upgrade your GKE Ubuntu node pools to the following versions or later:
          </p><ul>
<li>1.28.15-gke.2461000</li>
<li>1.29.15-gke.1614000</li>
<li>1.30.12-gke.1372000</li>
<li>1.31.10-gke.1067000</li>
<li>1.32.6-gke.1060000</li>
<li>1.33.2-gke.1384000</li>
</ul>
<hr/>
<p>The following minor versions are affected.
          <a href="https://docs.cloud.google.com/kubernetes-engine/docs/how-to/upgrading-a-container-cluster">Upgrade</a> your
          Container-Optimized OS node pools to one of the following patch versions or later:</p>
<ul>
<li>1.29.15-gke.1415000</li><li>1.30.12-gke.1168000</li><li>1.31.9-gke.1044000</li><li>1.27.16-gke.2771000</li><li>1.28.15-gke.2303000</li><li>1.32.4-gke.1415000</li><li>1.33.1-gke.1107000</li>
</ul>
<p>You can apply patch versions from newer release channels if your cluster runs the same
          minor version in its own release channel. This feature lets you secure your nodes until
          the patch version becomes the default in your release channel. For details, see
          <a href="https://docs.cloud.google.com/kubernetes-engine/docs/concepts/release-channels#newer-patch-versions">Run patch versions from a newer channel</a>.</p>
</td>
<td>High</td>
</tr>
</tbody>
</table>
</section>
<section>
<h3 data-text="GDC (VMware)" id="gcp-2025-032-gdcvmware" tabindex="-1">GDC (VMware)</h3>
<table>
<thead>
<tr>
<th>Description</th>
<th>Severity</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<p>The following vulnerabilities were discovered in the Linux kernel that can lead
            to a privilege escalation on Container-Optimized OS nodes:
            </p><ul>
<li>CVE-2025-37798</li>
</ul>
<h4 data-text="What should I do?" id="what-should-i-do_138" tabindex="-1">What should I do?</h4>
<p><aside class="note"><strong>Note: </strong>Patch versions and a severity assessment for GDC software for VMware are in progress. We'll update this bulletin with that information when it's available.</aside></p>
</td>
<td>Pending</td>
</tr>
</tbody>
</table>
</section>
<section>
<h3 data-text="GKE on AWS" id="gcp-2025-032-gkeaws" tabindex="-1">GKE on AWS</h3>
<table>
<thead>
<tr>
<th>Description</th>
<th>Severity</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<aside class="note"><strong>Note: </strong>This section applies to both the current and previous generation of GKE on AWS</aside>
<p>The following vulnerabilities were discovered in the Linux kernel that can lead
            to a privilege escalation on Container-Optimized OS nodes:
            </p><ul>
<li>CVE-2025-37798</li>
</ul>
<h4 data-text="What should I do?" id="what-should-i-do_139" tabindex="-1">What should I do?</h4>
<p><aside class="note"><strong>Note: </strong>Patch versions and a severity assessment for GKE on AWS are in progress. We'll update this bulletin with that information when it's available.</aside></p>
</td>
<td>Pending</td>
</tr>
</tbody>
</table>
</section>
<section>
<h3 data-text="GKE on Azure" id="gcp-2025-032-gkeazure" tabindex="-1">GKE on Azure</h3>
<table>
<thead>
<tr>
<th>Description</th>
<th>Severity</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<p>The following vulnerabilities were discovered in the Linux kernel that can lead
            to a privilege escalation on Container-Optimized OS nodes:
            </p><ul>
<li>CVE-2025-37798</li>
</ul>
<h4 data-text="What should I do?" id="what-should-i-do_140" tabindex="-1">What should I do?</h4>
<p><aside class="note"><strong>Note: </strong>Patch versions and a severity assessment for GKE on Azure are in progress. We'll update this bulletin with that information when it's available.</aside></p>
</td>
<td>Pending</td>
</tr>
</tbody>
</table>
</section>
<section>
<h3 data-text="GDC (bare metal)" id="gcp-2025-032-gdcbm" tabindex="-1">GDC (bare metal)</h3>
<table>
<thead>
<tr>
<th>Description</th>
<th>Severity</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<p>The following vulnerabilities were discovered in the Linux kernel that can lead
            to a privilege escalation on Container-Optimized OS nodes:
            </p><ul>
<li>CVE-2025-37798</li>
</ul>
<h4 data-text="What should I do?" id="what-should-i-do_141" tabindex="-1">What should I do?</h4>
<p>There is no action required. GDC software for bare metal isn't affected as it does not bundle an operating system in its distribution.</p>
</td>
<td>None</td>
</tr>
</tbody>
</table>
</section>
</devsite-selector>]]>
    </content>
  </entry>

  <entry>
    <title>GCP-2025-031</title>
    <id>tag:google.com,2016:gke-security-bulletins#gcp-2025-031</id>
    <updated>2025-06-03T00:00:00+00:00</updated>
    <link rel="alternate" href="https://docs.cloud.google.com/kubernetes-engine/security-bulletins#gcp-2025-031"/>
    <content type="html"><![CDATA[<p><strong>Published: </strong>2025-06-03<br/> <strong>Updated: </strong>2025-08-26<br/> <strong>Reference:</strong> <a class="external" href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37797">CVE-2025-37797</a></p><p><strong>2025-08-26 Update: </strong> Added patch versions for Ubuntu node pools on GKE.</p><devsite-selector>
<section>
<h3 data-text="GKE" id="gcp-2025-031-gke" tabindex="-1">GKE</h3>
<p><strong>Updated: </strong>2025-08-26</p>
<table>
<thead>
<tr>
<th>Description</th>
<th>Severity</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<p>The following vulnerabilities were discovered in the Linux kernel that can lead
          to a privilege escalation on Container-Optimized OS nodes:
          </p><ul>
<li>CVE-2025-37797</li>
</ul>
<p>GKE Standard clusters are impacted. GKE Autopilot clusters in the default configuration are not impacted, but might be vulnerable if you explicitly set the seccomp <code dir="ltr" translate="no">Unconfined</code> profile or allow <a href="https://docs.cloud.google.com/sdk/gcloud/reference/container/clusters/create-auto#--workload-policies"><code dir="ltr" translate="no">CAP_NET_ADMIN</code></a>.</p>
<p>Clusters using <a href="https://docs.cloud.google.com/kubernetes-engine/docs/concepts/sandbox-pods">GKE Sandbox</a> aren't impacted.</p>
<h4 data-text="What should I do?" id="what-should-i-do_142" tabindex="-1">What should I do?</h4>
<p><strong>2025-08-26 Update:</strong>
          The following versions of GKE are updated with code to fix this vulnerability on Ubuntu. Upgrade your Ubuntu node pools to the following versions or later:</p>
<ul>
<li>1.28.15-gke.2507000</li>
<li>1.29.15-gke.1686000</li>
<li>1.30.14-gke.1011000</li>
<li>1.31.11-gke.1064000</li>
<li>1.32.7-gke.1079000</li>
<li>1.33.3-gke.1392000</li>
</ul>
<hr/>
<p>The following minor versions are affected.
          <a href="https://docs.cloud.google.com/kubernetes-engine/docs/how-to/upgrading-a-container-cluster">Upgrade</a> your
          Container-Optimized OS node pools to one of the following patch versions or later:</p>
<ul>
<li>1.32.4-gke.1415000</li><li>1.28.15-gke.2303000</li><li>1.27.16-gke.2820000</li><li>1.33.1-gke.1107000</li><li>1.29.15-gke.1415000</li><li>1.31.9-gke.1044000</li><li>1.30.12-gke.1168000</li>
</ul>
<p>You can apply patch versions from newer release channels if your cluster runs the same
          minor version in its own release channel. This feature lets you secure your nodes until
          the patch version becomes the default in your release channel. For details, see
          <a href="https://docs.cloud.google.com/kubernetes-engine/docs/concepts/release-channels#newer-patch-versions">Run patch versions from a newer channel</a>.</p>
</td>
<td>High</td>
</tr>
</tbody>
</table>
</section>
<section>
<h3 data-text="GDC (VMware)" id="gcp-2025-031-gdcvmware" tabindex="-1">GDC (VMware)</h3>
<table>
<thead>
<tr>
<th>Description</th>
<th>Severity</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<p>The following vulnerabilities were discovered in the Linux kernel that can lead
            to a privilege escalation on Container-Optimized OS nodes:
            </p><ul>
<li>CVE-2025-37797</li>
</ul>
<h4 data-text="What should I do?" id="what-should-i-do_143" tabindex="-1">What should I do?</h4>
<p><aside class="note"><strong>Note: </strong>Patch versions and a severity assessment for GDC software for VMware are in progress. We'll update this bulletin with that information when it's available.</aside></p>
</td>
<td>Pending</td>
</tr>
</tbody>
</table>
</section>
<section>
<h3 data-text="GKE on AWS" id="gcp-2025-031-gkeaws" tabindex="-1">GKE on AWS</h3>
<table>
<thead>
<tr>
<th>Description</th>
<th>Severity</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<aside class="note"><strong>Note: </strong>This section applies to both the current and previous generation of GKE on AWS</aside>
<p>The following vulnerabilities were discovered in the Linux kernel that can lead
            to a privilege escalation on Container-Optimized OS nodes:
            </p><ul>
<li>CVE-2025-37797</li>
</ul>
<h4 data-text="What should I do?" id="what-should-i-do_144" tabindex="-1">What should I do?</h4>
<p><aside class="note"><strong>Note: </strong>Patch versions and a severity assessment for GKE on AWS are in progress. We'll update this bulletin with that information when it's available.</aside></p>
</td>
<td>Pending</td>
</tr>
</tbody>
</table>
</section>
<section>
<h3 data-text="GKE on Azure" id="gcp-2025-031-gkeazure" tabindex="-1">GKE on Azure</h3>
<table>
<thead>
<tr>
<th>Description</th>
<th>Severity</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<p>The following vulnerabilities were discovered in the Linux kernel that can lead
            to a privilege escalation on Container-Optimized OS nodes:
            </p><ul>
<li>CVE-2025-37797</li>
</ul>
<h4 data-text="What should I do?" id="what-should-i-do_145" tabindex="-1">What should I do?</h4>
<p><aside class="note"><strong>Note: </strong>Patch versions and a severity assessment for GKE on Azure are in progress. We'll update this bulletin with that information when it's available.</aside></p>
</td>
<td>Pending</td>
</tr>
</tbody>
</table>
</section>
<section>
<h3 data-text="GDC (bare metal)" id="gcp-2025-031-gdcbm" tabindex="-1">GDC (bare metal)</h3>
<table>
<thead>
<tr>
<th>Description</th>
<th>Severity</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<p>The following vulnerabilities were discovered in the Linux kernel that can lead
            to a privilege escalation on Container-Optimized OS nodes:
            </p><ul>
<li>CVE-2025-37797</li>
</ul>
<h4 data-text="What should I do?" id="what-should-i-do_146" tabindex="-1">What should I do?</h4>
<p>There is no action required. GDC software for bare metal isn't affected as it does not bundle an operating system in its distribution.</p>
</td>
<td>None</td>
</tr>
</tbody>
</table>
</section>
</devsite-selector>]]>
    </content>
  </entry>


</feed>
