<?xml version="1.0" encoding="UTF-8"?>
<!-- AUTOGENERATED FILE. DO NOT EDIT. -->
<feed xmlns="http://www.w3.org/2005/Atom">
  <id>tag:google.com,2016:gkeonaws-release-notes</id>
  <title>Anthos clusters on AWS (previous generation) - Release notes</title>
  <link rel="self" href="https://docs.cloud.google.com/feeds/gkeonaws-release-notes.xml"/>
  <author>
    <name>Google Cloud Platform</name>
  </author>
  <updated>2023-01-26T00:00:00-08:00</updated>

  <entry>
    <title>January 26, 2023</title>
    <id>tag:google.com,2016:gkeonaws-release-notes#January_26_2023</id>
    <updated>2023-01-26T00:00:00-08:00</updated>
    <link rel="alternate" href="https://docs.cloud.google.com/kubernetes-engine/multi-cloud/docs/aws/previous-generation/release-notes#January_26_2023"/>
    <content type="html"><![CDATA[<h3>Announcement</h3>
<p>Anthos clusters on AWS (previous generation) aws-1.14.1-gke.0 is now available.</p>
<h3>Feature</h3>
<p>You can now launch clusters with the following Kubernetes versions:</p>
<ul>
<li>1.23.15-gke.2000</li>
<li>1.24.9-gke.2100</li>
<li>1.25.5-gke.2100</li>
</ul>
<h3>Security</h3>
<p>This release fixes the following vulnerabilities:</p>
<ul>
<li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-23471">CVE-2022-23471</a></li>
</ul>
<h3>Feature</h3>
<p>Upgraded to containerd 1.6.12.</p>
]]>
    </content>
  </entry>

  <entry>
    <title>December 21, 2022</title>
    <id>tag:google.com,2016:gkeonaws-release-notes#December_21_2022</id>
    <updated>2022-12-21T00:00:00-08:00</updated>
    <link rel="alternate" href="https://docs.cloud.google.com/kubernetes-engine/multi-cloud/docs/aws/previous-generation/release-notes#December_21_2022"/>
    <content type="html"><![CDATA[<h3>Security</h3>
<p>A new vulnerability (CVE-2022-2602) has been discovered in the io_uring subsystem in the Linux kernel that can allow an attacker to potentially execute arbitrary code.
  For more information, see the <a href="https://cloud.google.com/anthos/clusters/docs/security-bulletins#gcp-2022-025">GCP-2022-2025 security bulletin</a>.</p>
]]>
    </content>
  </entry>

  <entry>
    <title>December 13, 2022</title>
    <id>tag:google.com,2016:gkeonaws-release-notes#December_13_2022</id>
    <updated>2022-12-13T00:00:00-08:00</updated>
    <link rel="alternate" href="https://docs.cloud.google.com/kubernetes-engine/multi-cloud/docs/aws/previous-generation/release-notes#December_13_2022"/>
    <content type="html"><![CDATA[<h3>Announcement</h3>
<p>Anthos clusters on AWS (previous generation) aws-1.14.0-gke.2 is now available.</p>
<h3>Security</h3>
<p>This release fixes the following vulnerabilities:</p>
<ul>
<li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-43680">CVE-2022-43680</a></li>
<li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-43680">CVE-2022-43680</a></li>
<li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-37434">CVE-2022-37434</a></li>
<li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-37434">CVE-2022-37434</a></li>
<li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-23218">CVE-2022-23218</a></li>
<li><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-33574">CVE-2021-33574</a></li>
<li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-23219">CVE-2022-23219</a></li>
<li><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-25013">CVE-2019-25013</a></li>
<li><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3999">CVE-2021-3999</a></li>
<li><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-10029">CVE-2020-10029</a></li>
<li><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-27645">CVE-2021-27645</a></li>
<li><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-19126">CVE-2019-19126</a></li>
<li><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-1752">CVE-2020-1752</a></li>
<li><a href="https://nvd.nist.gov/vuln/detail/CVE-2016-10228">CVE-2016-10228</a></li>
<li><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-6096">CVE-2020-6096</a></li>
<li><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-27618">CVE-2020-27618</a></li>
<li><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-35942">CVE-2021-35942</a></li>
<li><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3326">CVE-2021-3326</a></li>
</ul>
<h3>Deprecated</h3>
<p>Kubernetes version 1.25 deprecates several APIs. See the <a class="external" href="https://kubernetes.io/docs/reference/using-api/deprecation-guide/#v1-25">Kubernetes Deprecated API Migration Guide</a> for details.</p>
<h3>Feature</h3>
<p>You can now launch clusters with the following Kubernetes versions:</p>
<ul>
<li>1.23.13-gke.2000</li>
<li>1.24.7-gke.2000</li>
<li>1.25.3-gke.1900</li>
</ul>
]]>
    </content>
  </entry>

  <entry>
    <title>November 10, 2022</title>
    <id>tag:google.com,2016:gkeonaws-release-notes#November_10_2022</id>
    <updated>2022-11-10T00:00:00-08:00</updated>
    <link rel="alternate" href="https://docs.cloud.google.com/kubernetes-engine/multi-cloud/docs/aws/previous-generation/release-notes#November_10_2022"/>
    <content type="html"><![CDATA[<h3>Security</h3>
<p>Two new vulnerabilities (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2585">CVE-2022-2585</a> and <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2588">CVE-2022-2588</a>) have been discovered in the Linux kernel that can lead to a full container break out to root on the node.</p>
<p>For more information, see the <a href="https://cloud.google.com/anthos/clusters/docs/security-bulletins#gcp-2022-024">GCP-2022-024 security bulletin</a>.</p>
]]>
    </content>
  </entry>

  <entry>
    <title>October 31, 2022</title>
    <id>tag:google.com,2016:gkeonaws-release-notes#October_31_2022</id>
    <updated>2022-10-31T00:00:00-07:00</updated>
    <link rel="alternate" href="https://docs.cloud.google.com/kubernetes-engine/multi-cloud/docs/aws/previous-generation/release-notes#October_31_2022"/>
    <content type="html"><![CDATA[<h3>Announcement</h3>
<p>Anthos clusters on AWS (previous generation) aws-1.13.1-gke.1 is now available.</p>
<h3>Feature</h3>
<p>You can now launch clusters with the following Kubernetes versions:</p>
<ul>
<li>1.22.15-gke.1400</li>
<li>1.23.12-gke.1400</li>
<li>1.24.6-gke.1300</li>
</ul>
<h3>Security</h3>
<p>This release fixes the following vulnerabilities:</p>
<ul>
<li><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3999">CVE-2021-3999</a></li>
<li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-40674">CVE-2022-40674</a></li>
<li><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-46828">CVE-2021-46828</a></li>
<li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2526">CVE-2022-2526</a></li>
<li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1587">CVE-2022-1587</a></li>
<li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1586">CVE-2022-1586</a></li>
<li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-37434">CVE-2022-37434</a></li>
<li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2509">CVE-2022-2509</a></li>
<li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3176">CVE-2022-3176</a></li>
<li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2602">CVE-2022-2602</a></li>
<li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2585">CVE-2022-2585</a></li>
</ul>
]]>
    </content>
  </entry>

  <entry>
    <title>October 28, 2022</title>
    <id>tag:google.com,2016:gkeonaws-release-notes#October_28_2022</id>
    <updated>2022-10-28T00:00:00-07:00</updated>
    <link rel="alternate" href="https://docs.cloud.google.com/kubernetes-engine/multi-cloud/docs/aws/previous-generation/release-notes#October_28_2022"/>
    <content type="html"><![CDATA[<h3>Security</h3>
<p>A new vulnerability, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3176">CVE-2022-3176</a>, has been discovered in the Linux kernel that can lead to local privilege escalation. This vulnerability allows an unprivileged user to achieve full container breakout to root on the node.</p>
<p>For instructions and more details, see the
<a href="https://cloud.google.com/anthos/clusters/docs/security-bulletins#gcp-2022-021-anthosaws">Anthos clusters on AWS security bulletin</a>.</p>
]]>
    </content>
  </entry>

  <entry>
    <title>October 03, 2022</title>
    <id>tag:google.com,2016:gkeonaws-release-notes#October_03_2022</id>
    <updated>2022-10-03T00:00:00-07:00</updated>
    <link rel="alternate" href="https://docs.cloud.google.com/kubernetes-engine/multi-cloud/docs/aws/previous-generation/release-notes#October_03_2022"/>
    <content type="html"><![CDATA[<h3>Announcement</h3>
<p>Anthos clusters on AWS (previous generation) aws-1.13.0-gke.5 is now available.</p>
<h3>Feature</h3>
<p>You can now launch clusters with the following Kubernetes versions:</p>
<ul>
<li>1.22.15-gke.300</li>
<li>1.23.12-gke.300</li>
<li>1.24.6-gke.200</li>
</ul>
<h3>Security</h3>
<p>This release fixes the following vulnerabilities:</p>
<ul>
<li><a class="external" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1292">CVE-2022-1292</a> </li>
<li><a class="external" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1586">CVE-2022-1586</a> </li>
<li><a class="external" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2097">CVE-2022-2097</a> </li>
<li><a class="external" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2068">CVE-2022-2068</a> </li>
<li><a class="external" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34903">CVE-2022-34903</a> </li>
<li><a class="external" href="https://nvd.nist.gov/vuln/detail/CVE-2022-37434">CVE-2022-37434</a> </li>
</ul>
<h3>Issue</h3>
<p>If you use the deprecated <code>ubuntuRepositoryMirror: 'packages.cloud.google.com'</code> field in the AWSManagementService resource and are upgrading your node pool, you must upgrade only to the 1.22.15-gke.300 or 1.23.12-gke.300 versions included in this release. Upgrading to any other node pool version will cause your upgrade to hang. If your node pool is already hanging in the upgrading state, you need to delete and re-create the node pool. If you aren't using this field, this issue doesn't affect you and you can upgrade to any supported version.</p>
]]>
    </content>
  </entry>

  <entry>
    <title>August 25, 2022</title>
    <id>tag:google.com,2016:gkeonaws-release-notes#August_25_2022</id>
    <updated>2022-08-25T00:00:00-07:00</updated>
    <link rel="alternate" href="https://docs.cloud.google.com/kubernetes-engine/multi-cloud/docs/aws/previous-generation/release-notes#August_25_2022"/>
    <content type="html"><![CDATA[<h3>Announcement</h3>
<p>Anthos clusters on AWS (previous generation) aws-1.12.2-gke.1 is now available.</p>
<h3>Feature</h3>
<p>You can now launch clusters with the following Kubernetes versions:</p>
<ul>
<li>1.21.14-gke.2900</li>
<li>1.22.12-gke.1100</li>
<li>1.23.9-gke.800</li>
</ul>
<h3>Security</h3>
<p>This release fixes the following vulnerabilities:</p>
<ul>
<li><a class="external" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29901">CVE-2022-29901</a> </li>
<li><a class="external" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28693">CVE-2022-28693</a> </li>
<li><a class="external" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29900">CVE-2022-29900</a> </li>
<li><a class="external" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23825">CVE-2022-23825</a> </li>
<li><a class="external" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29361">CVE-2020-29361</a> </li>
<li><a class="external" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27350">CVE-2020-27350</a> </li>
<li><a class="external" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20232">CVE-2021-20232</a> </li>
<li><a class="external" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34903">CVE-2022-34903</a> </li>
<li><a class="external" href="https://nvd.nist.gov/vuln/detail/CVE-2020-24659">CVE-2020-24659</a> </li>
<li><a class="external" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20305">CVE-2021-20305</a> </li>
<li><a class="external" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43618">CVE-2021-43618</a> </li>
<li><a class="external" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3580">CVE-2021-3580</a> </li>
<li><a class="external" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20231">CVE-2021-20231</a> </li>
<li><a class="external" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3520">CVE-2021-3520</a> </li>
<li><a class="external" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29363">CVE-2020-29363</a> </li>
<li><a class="external" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29362">CVE-2020-29362</a> </li>
<li><a class="external" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1664">CVE-2022-1664</a> </li>
<li><a class="external" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33910">CVE-2021-33910</a> </li>
<li><a class="external" href="https://nvd.nist.gov/vuln/detail/CVE-2018-25032">CVE-2018-25032</a> </li>
</ul>
]]>
    </content>
  </entry>

  <entry>
    <title>August 08, 2022</title>
    <id>tag:google.com,2016:gkeonaws-release-notes#August_08_2022</id>
    <updated>2022-08-08T00:00:00-07:00</updated>
    <link rel="alternate" href="https://docs.cloud.google.com/kubernetes-engine/multi-cloud/docs/aws/previous-generation/release-notes#August_08_2022"/>
    <content type="html"><![CDATA[<h3>Announcement</h3>
<p>Anthos clusters on AWS (previous generation) aws-1.12.1-gke.0 is now available.</p>
<h3>Feature</h3>
<p>You can now launch clusters with the following Kubernetes versions:</p>
<ul>
<li>1.23.8-gke.2000</li>
<li>1.22.12-gke.300</li>
<li>1.21.14-gke.2100</li>
</ul>
<h3>Security</h3>
<p>This release fixes the following vulnerabilities:</p>
<ul>
<li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1292">CVE-2022-1292</a></li>
<li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2068">CVE-2022-2068</a></li>
<li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1271">CVE-2022-1271</a></li>
<li><a href="https://nvd.nist.gov/vuln/detail/CVE-2018-25032">CVE-2018-25032</a></li>
<li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1271">CVE-2022-1271</a></li>
<li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-31030">CVE-2022-31030</a></li>
<li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2327">CVE-2022-2327</a></li>
</ul>
]]>
    </content>
  </entry>

  <entry>
    <title>August 01, 2022</title>
    <id>tag:google.com,2016:gkeonaws-release-notes#August_01_2022</id>
    <updated>2022-08-01T00:00:00-07:00</updated>
    <link rel="alternate" href="https://docs.cloud.google.com/kubernetes-engine/multi-cloud/docs/aws/previous-generation/release-notes#August_01_2022"/>
    <content type="html"><![CDATA[<h3>Security</h3>
<p>A new vulnerability (CVE-2022-2327) has been discovered in the Linux kernel that can lead to local privilege escalation.  This vulnerability allows an unprivileged user to achieve a full container breakout to root on the node.<br/>
  For more information, see the <a href="https://cloud.google.com/anthos/clusters/docs/security-bulletins#gcp-2022-018">GCP-2022-018 security bulletin</a>.</p>
]]>
    </content>
  </entry>

  <entry>
    <title>July 07, 2022</title>
    <id>tag:google.com,2016:gkeonaws-release-notes#July_07_2022</id>
    <updated>2022-07-07T00:00:00-07:00</updated>
    <link rel="alternate" href="https://docs.cloud.google.com/kubernetes-engine/multi-cloud/docs/aws/previous-generation/release-notes#July_07_2022"/>
    <content type="html"><![CDATA[<h3>Announcement</h3>
<p>Anthos clusters on AWS (previous generation) aws-1.12.0-gke.0 is now available.</p>
<h3>Announcement</h3>
<p>This release note has been updated to mark the actual date of release, July 7, 2022. Previously, the release date was mentioned as June 24th.</p>
<h3>Feature</h3>
<p>You can now launch clusters with the following Kubernetes versions:</p>
<ul>
<li>1.23.7-gke.1500</li>
<li>1.22.10-gke.1500</li>
<li>1.21.13-gke.1600</li>
</ul>
<h3>Feature</h3>
<p>You can now launch Kubernetes 1.23 clusters.</p>
<h3>Deprecated</h3>
<p>Kubernetes 1.20 clusters are no longer supported.
This version no longer supports creation or maintenance of Kubernetes 1.19 clusters.</p>
<h3>Security</h3>
<p>This release fixes the following vulnerabilities:</p>
<ul>
<li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1292">CVE-2022-1292</a>. <br/> Note: this vulnerability is fixed in 1.23 clusters. It is still present in 1.21 and 1.22 clusters.</li>
<li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-29581">CVE-2022-29581</a></li>
<li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-29582">CVE-2022-29582</a></li>
<li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1116">CVE-2022-1116</a></li>
<li><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-4160">CVE-2021-4160</a></li>
<li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0778">CVE-2022-0778</a></li>
<li><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-43618">CVE-2021-43618</a></li>
</ul>
]]>
    </content>
  </entry>

  <entry>
    <title>June 23, 2022</title>
    <id>tag:google.com,2016:gkeonaws-release-notes#June_23_2022</id>
    <updated>2022-06-23T00:00:00-07:00</updated>
    <link rel="alternate" href="https://docs.cloud.google.com/kubernetes-engine/multi-cloud/docs/aws/previous-generation/release-notes#June_23_2022"/>
    <content type="html"><![CDATA[<h3>Security</h3>
<p>Three new memory corruption vulnerabilities (CVE-2022-29581, CVE-2022-29582, CVE-2022-1116) have been discovered in the Linux kernel. These vulnerabilities allow an unprivileged user with local access to the cluster to achieve a full container breakout to root on the node. For more information, refer to the <a href="https://cloud.google.com/anthos/clusters/docs/security-bulletins#gcp-2022-016">GCP-2022-016 security bulletin</a>.</p>
]]>
    </content>
  </entry>

  <entry>
    <title>June 01, 2022</title>
    <id>tag:google.com,2016:gkeonaws-release-notes#June_01_2022</id>
    <updated>2022-06-01T00:00:00-07:00</updated>
    <link rel="alternate" href="https://docs.cloud.google.com/kubernetes-engine/multi-cloud/docs/aws/previous-generation/release-notes#June_01_2022"/>
    <content type="html"><![CDATA[<h3>Change</h3>
<p>Anthos Clusters on AWS aws-1.11.1-gke.7 (previous generation) is now available. Clusters in this release support the following Kubernetes versions:</p>
<ul>
<li>1.22.9-gke.800</li>
<li>1.21.12-gke.1000</li>
<li>1.20.15-gke.7500</li>
</ul>
<h3>Security</h3>
<p>This release fixes the following CVEs:</p>
<ul>
<li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-24769">CVE-2022-24769</a></li>
<li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1292">CVE-2022-1292</a></li>
<li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-25235">CVE-2022-25235</a></li>
<li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-25236">CVE-2022-25236</a></li>
<li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-25315">CVE-2022-25315</a></li>
<li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-23852">CVE-2022-23852</a></li>
<li><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-4160">CVE-2021-4160</a></li>
<li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-25313">CVE-2022-25313</a></li>
<li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-24407">CVE-2022-24407</a></li>
<li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-23219">CVE-2022-23219</a></li>
<li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-23218">CVE-2022-23218</a></li>
<li><a href="https://access.redhat.com/security/cve/cve-2021-3999">CVE-2021-3999</a></li>
</ul>
]]>
    </content>
  </entry>

  <entry>
    <title>May 02, 2022</title>
    <id>tag:google.com,2016:gkeonaws-release-notes#May_02_2022</id>
    <updated>2022-05-02T00:00:00-07:00</updated>
    <link rel="alternate" href="https://docs.cloud.google.com/kubernetes-engine/multi-cloud/docs/aws/previous-generation/release-notes#May_02_2022"/>
    <content type="html"><![CDATA[<h3>Announcement</h3>
<p>Anthos Clusters on AWS aws-1.11.0-gke.6 (previous generation) is now available. Clusters in this release support the following Kubernetes versions:</p>
<ul>
<li>1.22.8-gke.1300</li>
<li>1.21.11-gke.1100</li>
<li>1.20.15-gke.5200</li>
</ul>
<h3>Change</h3>
<p>This release removes unneeded permissions from the <code>coredns-autoscaler</code>, <code>calico-typha</code>, and <code>konnectivity-agent-autoscaler</code> components.</p>
<h3>Fixed</h3>
<p>This release fixes the following CVEs:</p>
<ul>
<li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0492">CVE-2022-0492</a></li>
<li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1055">CVE-2022-1055</a></li>
</ul>
<h3>Fixed</h3>
<p>The issue announced in the April 19th release note regarding the creation of 1.22 clusters has been resolved. You can now create 1.22 clusters.</p>
]]>
    </content>
  </entry>

  <entry>
    <title>April 26, 2022</title>
    <id>tag:google.com,2016:gkeonaws-release-notes#April_26_2022</id>
    <updated>2022-04-26T00:00:00-07:00</updated>
    <link rel="alternate" href="https://docs.cloud.google.com/kubernetes-engine/multi-cloud/docs/aws/previous-generation/release-notes#April_26_2022"/>
    <content type="html"><![CDATA[<h3>Security</h3>
<p>Two security vulnerabilities, <a class="external" href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1055">CVE-2022-1055</a> and <a class="external" href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27666">CVE-2022-27666</a> have been discovered in the Linux kernel. Each can lead to a local attacker being able to perform a container breakout, privilege escalation on the host, or both. These vulnerabilities affect all GKE node operating systems (Container-Optimized OS and Ubuntu). For instructions and more details, see the <a href="https://cloud.google.com/anthos/clusters/docs/security-bulletins#gcp-2022-014">GCP-2022-014 security bulletin</a>.</p>
]]>
    </content>
  </entry>

  <entry>
    <title>April 19, 2022</title>
    <id>tag:google.com,2016:gkeonaws-release-notes#April_19_2022</id>
    <updated>2022-04-19T00:00:00-07:00</updated>
    <link rel="alternate" href="https://docs.cloud.google.com/kubernetes-engine/multi-cloud/docs/aws/previous-generation/release-notes#April_19_2022"/>
    <content type="html"><![CDATA[<h3>Announcement</h3>
<p>An issue has been discovered in Anthos clusters on AWS (previous generation). Do not launch Kubernetes 1.22 clusters at this time. </p>
<p>The Anthos clusters on AWS (previous generation) release <code>1.11.0-gke.1</code> has been removed. We are working on a fix.</p>
]]>
    </content>
  </entry>

  <entry>
    <title>April 12, 2022</title>
    <id>tag:google.com,2016:gkeonaws-release-notes#April_12_2022</id>
    <updated>2022-04-12T00:00:00-07:00</updated>
    <link rel="alternate" href="https://docs.cloud.google.com/kubernetes-engine/multi-cloud/docs/aws/previous-generation/release-notes#April_12_2022"/>
    <content type="html"><![CDATA[<h3>Security</h3>
<p>A security vulnerability, CVE-2022-23648, has been discovered in containerd's handling of path traversal in the OCI image volume specification. Containers launched through containerd's CRI implementation with a specially-crafted image configuration could gain full read access to arbitrary files and directories on the host.</p>
<p>For more information, see the <a href="https://cloud.google.com/anthos/clusters/docs/security-bulletins#gcp-2022-013">GCP-2022-013 security bulletin</a>.</p>
]]>
    </content>
  </entry>

  <entry>
    <title>April 07, 2022</title>
    <id>tag:google.com,2016:gkeonaws-release-notes#April_07_2022</id>
    <updated>2022-04-07T00:00:00-07:00</updated>
    <link rel="alternate" href="https://docs.cloud.google.com/kubernetes-engine/multi-cloud/docs/aws/previous-generation/release-notes#April_07_2022"/>
    <content type="html"><![CDATA[<h3>Security</h3>
<p>A security vulnerability,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0847">CVE-2022-0847</a>, has been discovered in the Linux kernel version 5.8 and later that can potentially escalate container privileges to root. This vulnerability affects Anthos Clusters on AWS (previous generation) running Kubernetes version v1.19, v1.20 or v1.21 on Ubuntu.</p>
<p>For more information, see the <a href="https://cloud.google.com/anthos/clusters/docs/security-bulletins#gcp-2022-012">GCP-2022-012 security bulletin</a>.</p>
]]>
    </content>
  </entry>

  <entry>
    <title>April 05, 2022</title>
    <id>tag:google.com,2016:gkeonaws-release-notes#April_05_2022</id>
    <updated>2022-04-05T00:00:00-07:00</updated>
    <link rel="alternate" href="https://docs.cloud.google.com/kubernetes-engine/multi-cloud/docs/aws/previous-generation/release-notes#April_05_2022"/>
    <content type="html"><![CDATA[<h3>Announcement</h3>
<p>Anthos Clusters on AWS aws-1.11.0-gke.1 (previous generation) is now available. Clusters in this release support the following Kubernetes versions:</p>
<ul>
<li>1.22.8-gke.300</li>
<li>1.21.11-gke.100</li>
<li>1.20.15-gke.2200</li>
</ul>
<h3>Change</h3>
<p>To use an Application Load Balancer (ALBs) with version 1.22 clusters, you need to
upgrade your <a href="https://cloud.google.com/anthos/clusters/docs/multi-cloud/aws/previous-generation/how-to/loadbalancer-alb#configure_your_cluster">ALB controller configuration</a>.</p>
<h3>Announcement</h3>
<p>This version adds support for Kubernetes 1.22 clusters. </p>
<p>Because Kubernetes 1.22 replaces some <code>v1beta</code> APIs with <code>v1</code> APIs, your workloads might need to be updated to use 1.22. For more information, see Kubernetes 1.22 <a href="https://cloud.google.com/kubernetes-engine/docs/deprecations/apis-1-22">Deprecated APIs</a>.</p>
<h3>Issue</h3>
<p>The workload identity webhook is not supported on cluster versions 1.22 and later. Before you upgrade your clusters to version 1.22, you should modify any workloads that depend on the webhook to configure their credentials without it.</p>
<h3>Deprecated</h3>
<p>This version no longer supports creation or maintenance of Kubernetes 1.18 clusters.</p>
<h3>Security</h3>
<p>This release includes fixes for the following CVEs:</p>
<ul>
<li><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-22600">CVE-2021-22600</a></li>
<li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-23648">CVE-2022-23648</a></li>
<li><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3177">CVE-2021-3177</a></li>
<li><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-15165">CVE-2019-15165</a></li>
<li><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3521">CVE-2021-3521</a></li>
<li><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-4122">CVE-2021-4122</a></li>
</ul>
]]>
    </content>
  </entry>

  <entry>
    <title>February 24, 2022</title>
    <id>tag:google.com,2016:gkeonaws-release-notes#February_24_2022</id>
    <updated>2022-02-24T00:00:00-08:00</updated>
    <link rel="alternate" href="https://docs.cloud.google.com/kubernetes-engine/multi-cloud/docs/aws/previous-generation/release-notes#February_24_2022"/>
    <content type="html"><![CDATA[<h3>Announcement</h3>
<p>Anthos Clusters on AWS aws-1.10.2-gke.0 (previous generation) is now available. Clusters in this release support the following Kubernetes versions:</p>
<ul>
<li>1.21.9-gke.1900</li>
<li>1.20.15-gke.1900</li>
<li>1.19.16-gke.7700</li>
</ul>
<h3>Security</h3>
<p>This release includes fixes for the following CVEs:</p>
<ul>
<li><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-45960">CVE-2021-45960</a></li>
<li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-22827">CVE-2022-22827</a></li>
<li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-22825">CVE-2022-22825</a></li>
<li><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-46143">CVE-2021-46143</a></li>
<li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-22826">CVE-2022-22826</a></li>
<li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-23852">CVE-2022-23852</a></li>
<li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-23990">CVE-2022-23990</a></li>
<li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-22824">CVE-2022-22824</a></li>
<li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-22822">CVE-2022-22822</a></li>
<li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-22823">CVE-2022-22823</a></li>
</ul>
]]>
    </content>
  </entry>

  <entry>
    <title>February 04, 2022</title>
    <id>tag:google.com,2016:gkeonaws-release-notes#February_04_2022</id>
    <updated>2022-02-04T00:00:00-08:00</updated>
    <link rel="alternate" href="https://docs.cloud.google.com/kubernetes-engine/multi-cloud/docs/aws/previous-generation/release-notes#February_04_2022"/>
    <content type="html"><![CDATA[<h3>Security</h3>
<p>A security vulnerability, <a class="external" href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4034">CVE-2021-4034</a>, has been discovered in pkexec, a part of the Linux policy kit package (polkit), that allows an authenticated user to perform a privilege escalation attack. PolicyKit is generally used only on Linux desktop systems to allow non-root users to perform actions such as rebooting the system, installing packages, restarting services etc, as governed by a policy.</p>
<p>Anthos clusters on AWS is unaffected. </p>
<p>For instructions and more details, see the <a href="https://cloud.google.com/anthos/clusters/docs/security-bulletins#gcp-2022-004">GCP-2022-004 security bulletin</a>.</p>
]]>
    </content>
  </entry>

  <entry>
    <title>January 27, 2022</title>
    <id>tag:google.com,2016:gkeonaws-release-notes#January_27_2022</id>
    <updated>2022-01-27T00:00:00-08:00</updated>
    <link rel="alternate" href="https://docs.cloud.google.com/kubernetes-engine/multi-cloud/docs/aws/previous-generation/release-notes#January_27_2022"/>
    <content type="html"><![CDATA[<h3>Announcement</h3>
<p>Anthos Clusters on AWS aws-1.10.1-gke.0 (previous generation) is now available. Clusters in this release support the following Kubernetes versions:</p>
<ul>
<li>1.21.8-gke.2000</li>
<li>1.20.14-gke.2000</li>
<li>1.19.16-gke.5300</li>
</ul>
<h3>Security</h3>
<p>This release includes fixes for the following CVEs:</p>
<ul>
<li><a href="https://nvd.nist.gov/vuln/detail/CVE-2018-20482">CVE-2018-20482</a></li>
<li><a href="https://nvd.nist.gov/vuln/detail/CVE-2018-20673">CVE-2018-20673</a></li>
<li><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-20838">CVE-2019-20838</a></li>
<li><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-17594">CVE-2019-17594</a></li>
<li><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-17595">CVE-2019-17595</a></li>
<li><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-14155">CVE-2020-14155</a></li>
<li><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-20266">CVE-2021-20266</a></li>
<li><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-23840">CVE-2021-23840</a></li>
<li><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-23841">CVE-2021-23841</a></li>
<li><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-27645">CVE-2021-27645</a></li>
<li><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-33574">CVE-2021-33574</a></li>
<li><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-35942">CVE-2021-35942</a></li>
<li><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-42574">CVE-2021-42574</a></li>
<li><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-43618">CVE-2021-43618</a></li>
<li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0185">CVE-2022-0185 </a></li>
</ul>
<h3>Change</h3>
<p>The release note from December 14 has been updated to clarify which service account no longer needs the ServiceUsageViewer role. The ServiceUsageViewer role is now required for the user that runs the <code>anthos-gke</code> command-line tool.</p>
]]>
    </content>
  </entry>

  <entry>
    <title>December 14, 2021</title>
    <id>tag:google.com,2016:gkeonaws-release-notes#December_14_2021</id>
    <updated>2021-12-14T00:00:00-08:00</updated>
    <link rel="alternate" href="https://docs.cloud.google.com/kubernetes-engine/multi-cloud/docs/aws/previous-generation/release-notes#December_14_2021"/>
    <content type="html"><![CDATA[<h3>Announcement</h3>
<p>Anthos Clusters on AWS aws-1.10.0-gke.5 (previous generation) is now available.</p>
<p>Anthos clusters on AWS aws-1.10.0-gke.5 (previous generation) clusters run the following Kubernetes versions:</p>
<ul>
<li>1.19.16-gke.1000</li>
<li>1.20.12-gke.1000</li>
<li>1.21.6-gke.1000</li>
</ul>
<h3>Deprecated</h3>
<p>Kubernetes 1.18 is no longer supported.
You can no longer launch Kubernetes 1.17 clusters. Your existing 1.17 clusters will continue to run.</p>
<h3>Feature</h3>
<p>This release supports creating instances in the <code>c5a</code>, <code>c5ad</code>, <code>i3en</code>, <code>m5a</code>, <code>m5ad</code>, <code>r5a</code>, <code>r5ad</code>, and <code>t3a</code> families.</p>
<h3>Security</h3>
<p>This release fixes the following security issues:</p>
<ul>
<li><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3733">CVE-2021-3733</a></li>
<li><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3737">CVE-2021-3737</a></li>
<li><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3711">CVE-2021-3711</a></li>
</ul>
<h3>Fixed</h3>
<p>This release fixes an earlier issue with 1.21 clusters that use both OIDC and an HTTP proxy.</p>
<h3>Issue</h3>
<p>To install Anthos Service Mesh, follow the steps in <a href="https://cloud.google.com/anthos/clusters/docs/multi-cloud/aws/previous-generation/how-to/connecting-to-a-cluster">Connecting to your cluster</a> before starting your Anthos Service Mesh installation.</p>
<h3>Change</h3>
<p>Updated: The management service account no longer needs the ServiceUsageViewer role to install Anthos clusters on AWS. For more information, see <a href="https://cloud.google.com/anthos/clusters/docs/multi-cloud/aws/previous-generation/how-to/prerequisites#permissions_for_anthos-gke_command-line_tool">Prerequisites</a>.</p>
]]>
    </content>
  </entry>

  <entry>
    <title>December 02, 2021</title>
    <id>tag:google.com,2016:gkeonaws-release-notes#December_02_2021</id>
    <updated>2021-12-02T00:00:00-08:00</updated>
    <link rel="alternate" href="https://docs.cloud.google.com/kubernetes-engine/multi-cloud/docs/aws/previous-generation/release-notes#December_02_2021"/>
    <content type="html"><![CDATA[<h3>Issue</h3>
<p>If your cluster uses both a proxy and OIDC authentication, do not upgrade to version 1.21.4 or 1.21.5. If you encounter an issue during an upgrade, contact support for assistance.</p>
]]>
    </content>
  </entry>

  <entry>
    <title>October 29, 2021</title>
    <id>tag:google.com,2016:gkeonaws-release-notes#October_29_2021</id>
    <updated>2021-10-29T00:00:00-07:00</updated>
    <link rel="alternate" href="https://docs.cloud.google.com/kubernetes-engine/multi-cloud/docs/aws/previous-generation/release-notes#October_29_2021"/>
    <content type="html"><![CDATA[<h3>Announcement</h3>
<p>Anthos Clusters on AWS aws-1.9.1-gke.0 is now available.</p>
<p>Anthos clusters on AWS aws-1.9.1-gke.0 clusters run the following Kubernetes versions:</p>
<ul>
<li>1.18.20-gke.8300</li>
<li>1.19.15-gke.1600</li>
<li>1.20.11-gke.1600</li>
<li>1.21.5-gke.1600</li>
</ul>
<h3>Fixed</h3>
<p>Release aws-1.9.1-gke.0 fixes an issue in release 1.9.0 in which authorization with AWS IAM assumed roles failed.</p>
<h3>Fixed</h3>
<p>Release aws-1.9.1-gke.0 of Anthos Clusters on AWS fixes the following security issues:</p>
<ul>
<li><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-38160">CVE-2021-38160</a></li>
<li><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3612">CVE-2021-3612</a></li>
<li><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-37576">CVE-2021-37576</a></li>
<li><a href="https://nvd.nist.gov/vuln/detail/CVE-2018-5729">CVE-2018-5729</a></li>
<li><a href="https://nvd.nist.gov/vuln/detail/CVE-2018-5730">CVE-2018-5730</a></li>
<li><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-16119">CVE-2020-16119</a></li>
<li><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-20305">CVE-2021-20305</a></li>
<li><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-22543">CVE-2021-22543</a></li>
<li><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-33624">CVE-2021-33624</a></li>
<li><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-33910">CVE-2021-33910</a></li>
<li><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3580">CVE-2021-3580</a></li>
<li><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3653">CVE-2021-3653</a></li>
<li><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3712">CVE-2021-3712</a></li>
<li><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-37159">CVE-2021-37159</a></li>
<li><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-37750">CVE-2021-37750</a></li>
<li><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-40490">CVE-2021-40490</a></li>
<li><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-42008">CVE-2021-42008</a></li>
</ul>
<p>For more information, click on the CVE or search for details at https://nvd.nist.gov.</p>
]]>
    </content>
  </entry>

  <entry>
    <title>October 25, 2021</title>
    <id>tag:google.com,2016:gkeonaws-release-notes#October_25_2021</id>
    <updated>2021-10-25T00:00:00-07:00</updated>
    <link rel="alternate" href="https://docs.cloud.google.com/kubernetes-engine/multi-cloud/docs/aws/previous-generation/release-notes#October_25_2021"/>
    <content type="html"><![CDATA[<h3>Security</h3>
<p>A security issue was discovered in the Kubernetes ingress-nginx controller, <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25742">CVE-2021-25742</a>. Ingress-nginx custom snippets allows retrieval of ingress-nginx service account tokens and secrets across all namespaces. For more information, see the <a href="https://cloud.google.com/anthos/clusters/docs/security-bulletins#gcp-2021-024">GCP-2021-024 security bulletin</a>.</p>
<h3>Security</h3>
<p>The security community recently disclosed a new security vulnerability  <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30465">CVE-2021-30465</a>  found in <code>runc</code> that has the potential to allow full access to a node filesystem.</p>
<p>For more information, see the <a href="https://cloud.google.com/anthos/clusters/docs/security-bulletins#gcp-2021-011">GCP-2021-011 security bulletin</a>.</p>
]]>
    </content>
  </entry>

  <entry>
    <title>September 30, 2021</title>
    <id>tag:google.com,2016:gkeonaws-release-notes#September_30_2021</id>
    <updated>2021-09-30T00:00:00-07:00</updated>
    <link rel="alternate" href="https://docs.cloud.google.com/kubernetes-engine/multi-cloud/docs/aws/previous-generation/release-notes#September_30_2021"/>
    <content type="html"><![CDATA[<h3>Change</h3>
<p>Anthos Clusters on AWS aws-1.9.0-gke.2 is now available.</p>
<p>Anthos clusters on AWS aws-1.9.0-gke.2 clusters run the following Kubernetes versions:</p>
<ul>
<li>1.18.20-gke.6300</li>
<li>1.19.14-gke.2200</li>
<li>1.20.10-gke.2000</li>
<li>1.21.4-gke.2100</li>
</ul>
<h3>Feature</h3>
<p><a href="https://cloud.google.com/anthos/identity/">Anthos Identity Service</a> is available on Kubernetes clusters version 1.21 and above.</p>
<h3>Feature</h3>
<p>Kubernetes 1.21 clusters now support the Kubernetes Konnectivity tool for communication between nodes and the control plane. When you launch a 1.21 cluster, you must allow connections between control plane nodes and node pool nodes on port 8132.</p>
<h3>Deprecated</h3>
<p>The VolumeSnapshot resource API version <code>v1beta1</code> is deprecated in Kubernetes 1.21 clusters. Use API version <code>v1</code> for 1.21 clusters and above. All previously persisted VolumeSnapshot objects remain functional.</p>
<h3>Security</h3>
<p>A security vulnerability, <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8561">CVE-2020-8561</a>,
has been discovered in Kubernetes where certain webhooks can be made to
redirect <code>kube-apiserver</code> requests to private networks of that API
server.
For more information, see the <a href="https://cloud.google.com/anthos/clusters/docs/security-bulletins#gcp-2021-021">GCP-2021-021 security bulletin</a>.</p>
<h3>Feature</h3>
<p>You can now specify a Cloud Storage Bucket name where Anthos clusters on AWS stores configuration data.</p>
<h3>Feature</h3>
<p>You can now launch node pools with AWS R5 instances.</p>
<h3>Feature</h3>
<p>You can now launch Kubernetes 1.21 clusters.</p>
<h3>Feature</h3>
<p>You can now update the OIDC configuration on a running cluster.</p>
<h3>Deprecated</h3>
<p>You cannot create new 1.16 clusters. Existing 1.16 clusters continue to function.</p>
<h3>Change</h3>
<p>Error messages when upgrading or downgrading your clusters have been clarified.</p>
]]>
    </content>
  </entry>

  <entry>
    <title>September 15, 2021</title>
    <id>tag:google.com,2016:gkeonaws-release-notes#September_15_2021</id>
    <updated>2021-09-15T00:00:00-07:00</updated>
    <link rel="alternate" href="https://docs.cloud.google.com/kubernetes-engine/multi-cloud/docs/aws/previous-generation/release-notes#September_15_2021"/>
    <content type="html"><![CDATA[<h3>Security</h3>
<p>A security issue was discovered in Kubernetes, CVE-2021-25741, where
a user may be able to create a container with subpath volume mounts to
access files &amp; directories outside of the volume, including on the host
filesystem.
  For more information, see the <a href="https://cloud.google.com/anthos/clusters/docs/security-bulletins#gcp-2021-018">GCP-2021-018 security bulletin</a>.</p>
]]>
    </content>
  </entry>

  <entry>
    <title>September 01, 2021</title>
    <id>tag:google.com,2016:gkeonaws-release-notes#September_01_2021</id>
    <updated>2021-09-01T00:00:00-07:00</updated>
    <link rel="alternate" href="https://docs.cloud.google.com/kubernetes-engine/multi-cloud/docs/aws/previous-generation/release-notes#September_01_2021"/>
    <content type="html"><![CDATA[<h3>Announcement</h3>
<p>Anthos clusters on AWS aws-1.8.2-gke.2 is now available.</p>
<p>Anthos clusters on AWS aws-1.8.2-gke.2 clusters run the following Kubernetes versions:</p>
<ul>
<li>1.17.17-gke.15800</li>
<li>1.18.20-gke.4800</li>
<li>1.19.14-gke.600</li>
<li>1.20.10-gke.600</li>
</ul>
<h3>Security</h3>
<p>The supported versions also offer the latest patches and updates for security vulnerabilities, exposures, and issues impacting Anthos clusters on AWS 1.8.</p>
]]>
    </content>
  </entry>

  <entry>
    <title>July 29, 2021</title>
    <id>tag:google.com,2016:gkeonaws-release-notes#July_29_2021</id>
    <updated>2021-07-29T00:00:00-07:00</updated>
    <link rel="alternate" href="https://docs.cloud.google.com/kubernetes-engine/multi-cloud/docs/aws/previous-generation/release-notes#July_29_2021"/>
    <content type="html"><![CDATA[<h3>Announcement</h3>
<p>Anthos clusters on AWS aws-1.8.1-gke.1 is now available.</p>
<p>Anthos clusters on AWS aws-1.8.1-gke.1 clusters run the following Kubernetes versions:</p>
<ul>
<li>1.17.17-gke.13600</li>
<li>1.18.20-gke.2600</li>
<li>1.19.13-gke.300</li>
<li>1.20.9-gke.300</li>
</ul>
<h3>Security</h3>
<p>This release contains fixes for the following security vulnerabilities:</p>
<ul>
<li><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-33560">CVE-2021-33560</a></li>
<li><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-20232">CVE-2021-20232</a></li>
<li><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-20231">CVE-2021-20231</a></li>
<li><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-24659">CVE-2020-24659</a></li>
<li><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-20305">CVE-2021-20305</a></li>
<li><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3580">CVE-2021-3580</a></li>
<li><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3520">CVE-2021-3520</a></li>
<li><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-20271">CVE-2021-20271</a></li>
</ul>
<h3>Change</h3>
<p>Anthos clusters on AWS now requires <code>kubectl</code> version 1.17 or higher and <code>terraform</code> version v0.14.3 or higher.</p>
]]>
    </content>
  </entry>

</feed>
