# November 2023 Releases

## What's new

### [<mark style="color:blue;">**Proxy Protocol Support for Application and Network Load Balancers**</mark>](/cloud/~/revisions/AMiYziCllTKB2y2lmONY/network-services/application-load-balancer/how-tos/create-target-groups.md#create-a-target-group)

{% hint style="success" %}
**November 28**

[<mark style="color:blue;">Application Load Balancers (ALB)</mark>](/cloud/~/revisions/AMiYziCllTKB2y2lmONY/network-services/application-load-balancer/how-tos/setup-alb.md#set-up-http-rules) and [<mark style="color:blue;">Network Load Balancers (NLB)</mark>](/cloud/~/revisions/AMiYziCllTKB2y2lmONY/network-services/network-load-balancer/configure-nlb.md#create-a-target) now support **Proxy Protocol** versions to send additional connection information, such as the source and destination. The **Targets** associated with your ALB and NLB can now be configured to accept incoming traffic using the **Proxy Protocol**.
{% endhint %}

### [<mark style="color:blue;">**Advisory on Escalation of Privilege for Some Intel Processors (CVE-2023-23583)**</mark>](/cloud/~/revisions/AMiYziCllTKB2y2lmONY/security/vulnerability-register/cve-2023-23583.md)

{% hint style="success" %}
**November 23**

Information on security advisory for CVE-2023-23583, also known as **Escalation of privilege for some Intel processors** vulnerability, is available on the documentation portal. This vulnerability is based on an unexpected behavior for some Intel(R) processors that may allow an authenticated user to potentially enable escalation of privilege and information disclosure or denial of service via local access.
{% endhint %}

### [<mark style="color:blue;">**Logging Service General Availability**</mark>](/cloud/~/revisions/AMiYziCllTKB2y2lmONY/observability/logging-service.md)

{% hint style="success" %}
**November 15**

Logging Service is now in the General Availability (GA) phase. You can create logging pipeline instances on the available locations to gather logs from multiple sources. You may also programmatically manage your logging pipelines via the API. To learn more about what changed during the transition from the [<mark style="color:blue;">Early Access (EA)</mark>](https://docs.ionos.com/support/general-information/glossary-of-terms#early-access-ea) phase to the GA phase, see [<mark style="color:blue;">Frequently Asked Questions (FAQs)</mark>](https://docs.ionos.com/cloud/managed-services/logging-service/logging-service-faqs#what-changed-in-the-product-during-its-transition-from-early-access-to-general-availability).
{% endhint %}

## Documentation updates

### [<mark style="color:blue;">**Cross Connect**</mark>](/cloud/~/revisions/AMiYziCllTKB2y2lmONY/network-services/cross-connect.md)

{% hint style="success" %}
**November 13**

**Cross Connect** is now available as an [<mark style="color:blue;">**Early Access (EA)**</mark>](https://docs.ionos.com/support/general-information/glossary-of-terms#early-access-ea) feature on a restricted early access basis. To access this feature, please contact your sales representative or [<mark style="color:blue;">customer support</mark>](https://docs.ionos.com/support/general-information/contact-information). With the enhanced feature, you can connect multiple [<mark style="color:blue;">Virtual Data Centers (VDCs)</mark>](https://docs.ionos.com/support/general-information/glossary-of-terms#virtual-data-center-vdc) seamlessly in the same region and under the same contract. Connections can be established via a private LAN only, thus enabling consistent and reliable data transfer and ensuring seamless connections, reduced latency, and minimized addressing discrepancies. Cross Connects are flexible, meaning you can easily modify the existing setup by effortlessly adding or deleting existing data centers or modifying the associated data centers.
{% endhint %}

### [<mark style="color:blue;">**Advisory on vCenter Server Vulnerability (CVE-2023-34048)**</mark>](/cloud/~/revisions/AMiYziCllTKB2y2lmONY/security/vulnerability-register/cve-2023-34048.md)

{% hint style="success" %}
**November 2**

Information on security advisory for CVE-2023-34048, also known as **vCenter Server out-of-bounds write** vulnerability is available on the documentation portal. This vulnerability allows an attacker with network access to trigger an **out-of-bounds** write that can lead to remote code execution.
{% endhint %}

### [<mark style="color:blue;">**Advisory on AMD Disclosed Vulnerability (CVE-2023-20569)**</mark>](/cloud/~/revisions/AMiYziCllTKB2y2lmONY/security/vulnerability-register/cve-2023-20569.md)

{% hint style="success" %}
**November 1**

Information on security advisory for CVE-2023-20569, also known as **Return Form Procedure (RET) Speculation** or **Inception** is available on the documentation portal. This vulnerability is reported by AMD as a sensitive information disclosure due to speculative side-channel attacks.
{% endhint %}


---

# Agent Instructions: Querying This Documentation

If you need additional information that is not directly available in this page, you can query the documentation dynamically by asking a question.

Perform an HTTP GET request on the current page URL with the `ask` query parameter:

```
GET https://docs.ionos.com/cloud/~/revisions/AMiYziCllTKB2y2lmONY/release-notes/previous-release-notes/november-2023.md?ask=<question>
```

The question should be specific, self-contained, and written in natural language.
The response will contain a direct answer to the question and relevant excerpts and sources from the documentation.

Use this mechanism when the answer is not explicitly present in the current page, you need clarification or additional context, or you want to retrieve related documentation sections.
