<?xml version="1.0" encoding="UTF-8"?>
<!-- AUTOGENERATED FILE. DO NOT EDIT. -->
<feed xmlns="http://www.w3.org/2005/Atom">
  <id>tag:google.com,2016:apigee-hybrid-release-notes</id>
  <title>Apigee hybrid - Release notes</title>
  <link rel="self" href="https://docs.cloud.google.com/feeds/apigee-hybrid-release-notes.xml"/>
  <author>
    <name>Google Cloud Platform</name>
  </author>
  <updated>2026-02-06T00:00:00-08:00</updated>

  <entry>
    <title>February 06, 2026</title>
    <id>tag:google.com,2016:apigee-hybrid-release-notes#February_06_2026</id>
    <updated>2026-02-06T00:00:00-08:00</updated>
    <link rel="alternate" href="https://docs.cloud.google.com/apigee/docs/hybrid/release-notes#February_06_2026"/>
    <content type="html"><![CDATA[<strong class="release-note-product-version-title">v1.15.0</strong>
<h3>Announcement</h3>
<h3 id="hybrid_1160-hotfix1">hybrid 1.16.0-hotfix.1</h3>
<p>On February 6, 2026 we released Apigee hybrid 1.16.0-hotfix.1.</p>
<aside class="special"><strong>Important:</strong><span> If your installation is already on Apigee hybrid v1.16.0, use the following procedure to apply this hotfix. For new installations, see <a href="https://docs.cloud.google.com/apigee/docs/hybrid/v1.16/big-picture">The big picture</a> and then apply the hotfix to the new installation with the following instructions.</span></aside>
<h4 id="apply_this_hotfix_with_the_following_steps">Apply this hotfix with the following steps:</h4>
<aside class="note"><strong>Note:</strong><span> This hotfix installs the <code>apigee-mart-server</code> container images. All other container images are unchanged from Hybrid v1.16.0.</span></aside>
<ol>
<li>In your overrides file, update the <code>image.url</code> and <code>image.tag</code> properties of <code>ao</code> and <code>mart</code> to version <code>1.16.0-hotfix.1</code>:
<pre class="devsite-click-to-copy">
ao:
  image:
    url: "gcr.io/apigee-release/hybrid/apigee-operators"
    tag: "1.16.0-hotfix.1"

mart:
  image:
    url: "gcr.io/apigee-release/hybrid/apigee-mart-server"
    tag: "1.16.0-hotfix.1"
</pre>
</li>
<li>Install the hotfix release for Apigee operators, beginning with a dry run:
<pre class="devsite-click-to-copy">
helm upgrade operator apigee-operator/ \
  --install \
  --namespace <var>APIGEE_NAMESPACE</var> \
  --atomic \
  -f overrides.yaml \
  --dry-run=server
</pre>
</li>
<li>If the dry run is successful, install the hotfix release for Apigee operators:
<pre class="devsite-click-to-copy">
helm upgrade operator apigee-operator/ \
  --install \
  --namespace <var>APIGEE_NAMESPACE</var> \
  --atomic \
  -f overrides.yaml
</pre>
</li>
<li>Install the hotfix release for your organization, beginning with a dry run:
<pre class="devsite-click-to-copy">
helm upgrade $ORG_NAME apigee-org/ \
  --install \
  --namespace <var>APIGEE_NAMESPACE</var> \
  --atomic \
  -f overrides.yaml \
  --dry-run=server
</pre>
</li>
<li>If the dry run is successful, install the hotfix release for your organization:
<pre class="devsite-click-to-copy">
helm upgrade $ORG_NAME apigee-org/ \
  --install \
  --namespace <var>APIGEE_NAMESPACE</var> \
  --atomic \
  -f overrides.yaml
</pre>
</li>
<li>Verify the organization chart by checking the state:
<pre class="devsite-click-to-copy">
kubectl -n <var>APIGEE_NAMESPACE</var> get apigeeorg
</pre>
</li>
<li>Install the hotfix release for your environment, beginning with a dry run:
<pre class="devsite-click-to-copy">
helm upgrade <var>ENV_RELEASE_NAME</var> apigee-env/ \
  --install \
  --namespace <var>APIGEE_NAMESPACE</var> \
  --atomic \
  --set env=$ENV_NAME \
  -f overrides.yaml \
  --dry-run=server
</pre>
</li>
<li>If the dry run is successful, install the hotfix release for your environment:
<pre class="devsite-click-to-copy">
helm upgrade <var>ENV_RELEASE_NAME</var> apigee-env/ \
  --install \
  --namespace <var>APIGEE_NAMESPACE</var> \
  --atomic \
  --set env=$ENV_NAME \
  -f overrides.yaml
</pre>
</li>
<li>Verify the environment chart by checking the state:
<pre class="devsite-click-to-copy">
kubectl -n <var>APIGEE_NAMESPACE</var> get apigeeenv
</pre>
</li>
</ol>
<h3>Fixed</h3>
<h4 id="fixed_in_this_release">Fixed in this release</h4>
<table>
<thead>
<tr>
<th>Bug ID</th>
<th>Description</th>
</tr>
</thead>
<tbody>
<tr>
<td><strong>479872706</strong></td>
<td><strong>An issue that prevented loading API products, apps, and developers after migrating data to Apigee hybrid 1.16.0 in certain configurations has been resolved.</strong></td>
</tr>
<tr>
<td><strong>481793880</strong></td>
<td><strong>An issue that prevented upgrading an existing organization when monetization was enabled has been fixed.</strong></td>
</tr>
</tbody>
</table>
]]>
    </content>
  </entry>

  <entry>
    <title>December 19, 2025</title>
    <id>tag:google.com,2016:apigee-hybrid-release-notes#December_19_2025</id>
    <updated>2025-12-19T00:00:00-08:00</updated>
    <link rel="alternate" href="https://docs.cloud.google.com/apigee/docs/hybrid/release-notes#December_19_2025"/>
    <content type="html"><![CDATA[<strong class="release-note-product-version-title">v1.16.0</strong>
<h3>Change</h3>
<p><strong>UDCA component removed</strong></p>
<p>In Apigee hybrid v1.16, the Unified Data Collection Agent (UDCA) component has been removed. The responsibilities of sending analytics, trace, and deployment status data to the Apigee control plane are now handled using a <a href="https://docs.cloud.google.com/pubsub/docs">Google Cloud Pub/Sub</a> based data pipeline. Using the Pub/Sub based data pipeline has been the default data collection mechanism since <a href="https://docs.cloud.google.com/apigee/docs/hybrid/release-notes#hybrid_v1140">Apigee hybrid v1.14.0</a>.</p>
<h3>Feature</h3>
<p><strong><code>apigee-guardrails</code> service account</strong></p>
<p>In v1.16.0, Apigee Hybrid introduces an <code>apigee-guardrails</code> Google IAM service account. This is used by the <code>apigee-operator</code> chart during initial installation to check that all needed APIs are enabled in your project.</p>
<aside class="note"><strong>Note:</strong><span> The <code>apigee-guardrails</code> service account is required for both upgraded and new installations. See <a href="https://docs.cloud.google.com/apigee/docs/hybrid/v1.16/upgrade#set-up-the-apigee-guardrails-service-account">Upgrading to Apigee hybrid to version 1.16: Set up the <code>apigee-guardrails</code> service account</a> for upgrade instructions.</span></aside>
<p>See:</p>
<ul>
<li><a href="https://docs.cloud.google.com/apigee/docs/hybrid/v1.16/guardrails">Diagnosing issues with guardrails</a></li>
<li><a href="https://docs.cloud.google.com/apigee/docs/hybrid/v1.16/sa-about#apigee-guardrails">About service accounts: <code>apigee-guardrails</code></a></li>
<li><a href="https://docs.cloud.google.com/apigee/docs/hybrid/v1.16/create-service-account"><code>create-service-account</code></a></li>
<li><a href="https://docs.cloud.google.com/apigee/docs/hybrid/v1.16/upgrade#changes-from-previous-version">Upgrading to Apigee hybrid to version 1.16</a></li>
<li><a href="https://docs.cloud.google.com/apigee/docs/hybrid/v1.16/install-service-accounts">Installation Part 2: Step 4: Create service accounts</a></li>
<li><a href="https://docs.cloud.google.com/apigee/docs/hybrid/v1.16/install-sa-authentication">Installation Part 2: Step 5: Set up service account authentication</a></li>
</ul>
<h3>Change</h3>
<p><strong>Support for cert-manager release 1.18 and 1.19</strong></p>
<p>Apigee hybrid v1.16 supports cert-manager release 1.18 and 1.19.</p>
<aside class="note"><strong>Note:</strong><span> cert-manager release 1.18 introduces a change to the default certificate <code>Spec.PrivateKey.RotationPolicy</code> value that can impact traffic on upgraded Apigee hybrid installations. This does not affect new installations of Apigee Hybrid. See <a href="https://docs.cloud.google.com/apigee/docs/release/known-issues#465834046">Known issue 465834046</a>.</span></aside>
<h3>Fixed</h3>
<h4 id="fixed_in_this_release">Fixed in this release</h4>
<table>
<thead>
<tr>
<th>Bug ID</th>
<th>Description</th>
</tr>
</thead>
<tbody>
<tr>
<td><strong>448647917</strong></td>
<td><strong>Fixed a issue where non-SSL connections through a forward proxy could be improperly shared.</strong> (also fixed in <a href="https://docs.cloud.google.com/apigee/docs/release/release-notes#October_31_2025">Apigee 1-16-0-apigee-4</a>)</td>
</tr>
<tr>
<td><strong>442501403</strong></td>
<td><strong>Fixed an issue that caused incorrect target latency metrics in Apigee Analytics when a TargetEndpoint is configured with a &lt;LoadBalancer&gt;.</strong> (also fixed in <a href="https://docs.cloud.google.com/apigee/docs/release/release-notes#October_16_2025">Apigee 1-16-0-apigee-3</a>)</td>
</tr>
<tr>
<td><strong>438192028</strong></td>
<td><strong>Updated the geolocation database to mitigate stale IP-to-location mappings.</strong> (also fixed in <a href="https://docs.cloud.google.com/apigee/docs/release/release-notes#October_16_2025">Apigee 1-16-0-apigee-3</a>)</td>
</tr>
<tr>
<td><strong>437999897</strong></td>
<td><strong>Reduced the log level for failed geo IP lookups to address excessive log messages for private IP addresses.</strong> (also fixed in <a href="https://docs.cloud.google.com/apigee/docs/release/release-notes#October_16_2025">Apigee 1-16-0-apigee-3</a>)</td>
</tr>
<tr>
<td><strong>436323210</strong></td>
<td><strong>Fixed ingress cert keys to allow both <code>tls.key</code>/<code>key</code> and <code>tls.crt</code>/<code>cert</code>.</strong></td>
</tr>
<tr>
<td><strong>N/A</strong></td>
<td><strong>Updates to security, infrastructure, and libraries.</strong> (also fixed in <a href="https://docs.cloud.google.com/apigee/docs/release/release-notes#October_31_2025">Apigee 1-16-0-apigee-4</a>)</td>
</tr>
</tbody>
</table>
<h3>Announcement</h3>
<h3 id="hybrid_v1160">hybrid v1.16.0</h3>
<p>On December 19, 2025 we released an updated version of the Apigee hybrid software, 1.16.0.</p>
<ul>
<li>For information on upgrading, see <a href="https://docs.cloud.google.com/apigee/docs/hybrid/v1.16/upgrade">Upgrading Apigee hybrid to version v1.16</a>.</li>
<li>For information on new installations, see <a href="https://docs.cloud.google.com/apigee/docs/hybrid/v1.16/big-picture">The big picture</a>.</li>
</ul>
<aside class="note"><strong>Note:</strong><span> This is a minor release: The container images used in minor releases are integrated with the Apigee hybrid Helm charts. Upgrading to a minor via the Helm chart automatically updates the images. No manual image changes are typically needed. For information on container image support in Apigee hybrid releases, see <a href="https://docs.cloud.google.com/apigee/docs/release/apigee-release-process#apigee-hybrid-container-images">Apigee release process</a>.</span></aside>
<h3>Security</h3>
<h4 id="fixed_in_this_release_2">Fixed in this release</h4>
<table>
<thead>
<tr>
<th>Bug ID</th>
<th>Description</th>
</tr>
</thead>
<tbody>
<tr>
<td><strong>452621774, 452381632, 441266643, 448498138</strong></td>
<td><strong>Security fix for Apigee infrastructure.</strong> (also fixed in <a href="https://docs.cloud.google.com/apigee/docs/release/release-notes#October_31_2025">Apigee 1-16-0-apigee-4</a>) <br/>This addresses the following vulnerabilities:<ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-53864">CVE-2025-53864</a><p>Updated Nimbus JWT library from 9.37.2 to 9.37.4, which introduced changes in behavior including changes to error string verbiage.</p></li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-8916">CVE-2025-8916</a></li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-5115">CVE-2025-5115</a></li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2024-40094">CVE-2024-40094</a></li></ul></td>
</tr>
<tr>
<td><strong>440419558, 433759657</strong></td>
<td><strong>Security fix for Apigee infrastructure.</strong> (also fixed in <a href="https://docs.cloud.google.com/apigee/docs/release/release-notes#October_16_2025">Apigee 1-16-0-apigee-3</a>) <p>This addresses the following vulnerabilities:<ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22868">CVE-2025-22868</a></li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-48924">CVE-2025-48924</a></li><aside class="note"><b>Note</b>: This fix updates a Java library that is included in Apigee.  Reliance on Java libraries that are included with Apigee is not supported. Those libraries are for Apigee product functionality only, and there's no guarantee that a library will be available from release to release. For more information, see <a href="https://docs.cloud.google.com/apigee/docs/api-platform/reference/policies/java-callout-policy#Restrictions">Restrictions</a>.</aside></ul></p></td>
</tr>
<tr>
<td><strong>443902061</strong></td>
<td><strong>Security fix for Apigee infrastructure</strong> (also fixed in <a href="https://docs.cloud.google.com/apigee/docs/release/release-notes#October_16_2025">Apigee 1-16-0-apigee-3</a>) <p>This addresses the following vulnerability:<ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-13292">CVE-2025-13292</a><p>Fixed an issue with improper access control that resulted in cross-tenant analytics modification and access to log data.</p></li></ul></p></td>
</tr>
<tr>
<td><strong>N/A</strong></td>
<td><strong>Security fixes for <code>apigee-asm-ingress</code>.</strong> <br/>This addresses the following vulnerabilities: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-58188">CVE-2025-58188</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-58187">CVE-2025-58187</a> </li></ul></td>
</tr>
<tr>
<td><strong>N/A</strong></td>
<td><strong>Security fixes for <code>apigee-asm-istiod</code>.</strong> <br/>This addresses the following vulnerabilities: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-58188">CVE-2025-58188</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-58187">CVE-2025-58187</a> </li></ul></td>
</tr>
<tr>
<td><strong>N/A</strong></td>
<td><strong>Security fixes for <code>apigee-connect-agent</code>.</strong> <br/>This addresses the following vulnerabilities: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-61725">CVE-2025-61725</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-61723">CVE-2025-61723</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-58188">CVE-2025-58188</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-58187">CVE-2025-58187</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-47907">CVE-2025-47907</a> </li></ul></td>
</tr>
<tr>
<td><strong>N/A</strong></td>
<td><strong>Security fixes for <code>apigee-fluent-bit</code>.</strong> <br/>This addresses the following vulnerability: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-9230">CVE-2025-9230</a> </li></ul></td>
</tr>
<tr>
<td><strong>N/A</strong></td>
<td><strong>Security fixes for <code>apigee-hybrid-cassandra</code>.</strong> <br/>This addresses the following vulnerabilities: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-61725">CVE-2025-61725</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-61723">CVE-2025-61723</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-58188">CVE-2025-58188</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-58187">CVE-2025-58187</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-47913">CVE-2025-47913</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-47907">CVE-2025-47907</a> </li></ul></td>
</tr>
<tr>
<td><strong>N/A</strong></td>
<td><strong>Security fixes for <code>apigee-hybrid-cassandra-client</code>.</strong> <br/>This addresses the following vulnerabilities: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-61725">CVE-2025-61725</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-61723">CVE-2025-61723</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-58188">CVE-2025-58188</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-58187">CVE-2025-58187</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-47907">CVE-2025-47907</a> </li></ul></td>
</tr>
<tr>
<td><strong>N/A</strong></td>
<td><strong>Security fixes for <code>apigee-kube-rbac-proxy</code>.</strong> <br/>This addresses the following vulnerabilities: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-61725">CVE-2025-61725</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-61723">CVE-2025-61723</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-58188">CVE-2025-58188</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-58187">CVE-2025-58187</a> </li></ul></td>
</tr>
<tr>
<td><strong>N/A</strong></td>
<td><strong>Security fixes for <code>apigee-mart-server</code>.</strong> <br/>This addresses the following vulnerabilities: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-53066">CVE-2025-53066</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-50106">CVE-2025-50106</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-50059">CVE-2025-50059</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-48913">CVE-2025-48913</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-30749">CVE-2025-30749</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2024-13009">CVE-2024-13009</a> </li></ul></td>
</tr>
<tr>
<td><strong>N/A</strong></td>
<td><strong>Security fixes for <code>apigee-open-telemetry-collector</code>.</strong> <br/>This addresses the following vulnerabilities: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-61723">CVE-2025-61723</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-58188">CVE-2025-58188</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-58187">CVE-2025-58187</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-29786">CVE-2025-29786</a> </li></ul></td>
</tr>
<tr>
<td><strong>N/A</strong></td>
<td><strong>Security fixes for <code>apigee-operators</code>.</strong> <br/>This addresses the following vulnerabilities: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-61723">CVE-2025-61723</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-58188">CVE-2025-58188</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-58187">CVE-2025-58187</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-61725">CVE-2025-61725</a> </li></ul></td>
</tr>
<tr>
<td><strong>N/A</strong></td>
<td><strong>Security fixes for <code>apigee-prom-prometheus</code>.</strong> <br/>This addresses the following vulnerabilities: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-61723">CVE-2025-61723</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-58188">CVE-2025-58188</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-58187">CVE-2025-58187</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-48174">CVE-2022-48174</a> </li></ul></td>
</tr>
<tr>
<td><strong>N/A</strong></td>
<td><strong>Security fixes for <code>apigee-prometheus-adapter</code>.</strong> <br/>This addresses the following vulnerabilities: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-61723">CVE-2025-61723</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-58188">CVE-2025-58188</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-58187">CVE-2025-58187</a> </li></ul></td>
</tr>
<tr>
<td><strong>N/A</strong></td>
<td><strong>Security fixes for <code>apigee-redis</code>.</strong> <br/>This addresses the following vulnerabilities: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-61725">CVE-2025-61725</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-61723">CVE-2025-61723</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-58188">CVE-2025-58188</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-58187">CVE-2025-58187</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-47907">CVE-2025-47907</a> </li></ul></td>
</tr>
<tr>
<td><strong>N/A</strong></td>
<td><strong>Security fixes for <code>apigee-runtime</code>.</strong> <br/>This addresses the following vulnerabilities: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-50106">CVE-2025-50106</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-50059">CVE-2025-50059</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-48913">CVE-2025-48913</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-30749">CVE-2025-30749</a> </li></ul></td>
</tr>
<tr>
<td><strong>N/A</strong></td>
<td><strong>Security fixes for <code>apigee-stackdriver-logging-agent</code>.</strong> <br/>This addresses the following vulnerability: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-24294">CVE-2025-24294</a> </li></ul></td>
</tr>
<tr>
<td><strong>N/A</strong></td>
<td><strong>Security fixes for <code>apigee-synchronizer</code>.</strong> <br/>This addresses the following vulnerabilities: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-50106">CVE-2025-50106</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-50059">CVE-2025-50059</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-48913">CVE-2025-48913</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-30749">CVE-2025-30749</a> </li></ul></td>
</tr>
<tr>
<td><strong>N/A</strong></td>
<td><strong>Security fixes for <code>apigee-udca</code>.</strong> <br/>This addresses the following vulnerabilities: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-61725">CVE-2025-61725</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-61723">CVE-2025-61723</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-58188">CVE-2025-58188</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-58187">CVE-2025-58187</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-47913">CVE-2025-47913</a> </li></ul></td>
</tr>
<tr>
<td><strong>N/A</strong></td>
<td><strong>Security fixes for <code>apigee-watcher</code>.</strong> <br/>This addresses the following vulnerabilities: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-61723">CVE-2025-61723</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-58188">CVE-2025-58188</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-58187">CVE-2025-58187</a> </li></ul></td>
</tr>
</tbody>
</table>
<h3>Feature</h3>
<p><strong>Seccomp Profiles</strong></p>
<p>Apigee Hybrid now offers the capability to apply Seccomp Profiles to your runtime components, significantly enhancing the security posture of your deployment.</p>
<p>This feature allows Apigee administrators and security teams to restrict the system calls (syscalls) a containerized process can make to the host's kernel. By limiting a container to only the necessary syscalls, you can:</p>
<ul>
<li>Enhance Security: Mitigate the risk of container breakouts and privilege escalation.</li>
<li>Enforce Least Privilege: Ensure components only have access to the exact system calls required for their operation.</li>
<li>Meet Compliance: Provide a critical control for meeting stringent security compliance requirements.</li>
</ul>
<p>Seccomp profiles are not enabled by default. To enable the feature, see <a href="https://docs.cloud.google.com/apigee/docs/hybrid/v1.16/configure-seccomp-profiles">Configure Seccomp profiles for pod security</a>.</p>
<h3>Security</h3>
<h4 id="fixed_since_last_minor_release_2">Fixed since last minor release</h4>
<table>
<thead>
<tr>
<th>Bug ID</th>
<th>Description</th>
</tr>
</thead>
<tbody>
<tr>
<td><strong>448498138</strong></td>
<td><strong>Security fixes for <code>apigee-runtime</code>.</strong> (Fixed in <a href="https://docs.cloud.google.com/apigee/docs/hybrid/release-notes#hybrid_v1151">v1.15.1</a>) <br/>This addresses the following vulnerability: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2024-40094">CVE-2024-40094</a></li> </ul></td>
</tr>
<tr>
<td><strong>447367372</strong></td>
<td><strong>Security fixes for <code>apigee-runtime</code>.</strong> (Fixed in <a href="https://docs.cloud.google.com/apigee/docs/hybrid/release-notes#hybrid_v1151">v1.15.1</a>) <br/>This addresses the following vulnerability: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-58057">CVE-2025-58057</a></li> </ul></td>
</tr>
<tr>
<td><strong>433952146</strong></td>
<td><strong>Security fix.</strong> (Fixed in <a href="https://docs.cloud.google.com/apigee/docs/hybrid/release-notes#hybrid_v1143">v1.14.3</a>) <br/>This addresses the following vulnerability: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2024-6763">CVE-2024-6763</a> </li></ul></td>
</tr>
<tr>
<td><strong>433951774</strong></td>
<td><strong>Security fix.</strong> (Fixed in <a href="https://docs.cloud.google.com/apigee/docs/hybrid/release-notes#hybrid_v1143">v1.14.3</a>) <br/>This addresses the following vulnerability: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2024-7254">CVE-2024-7254</a> </li></ul></td>
</tr>
<tr>
<td><strong>433950558</strong></td>
<td><strong>Security fix.</strong> (Fixed in <a href="https://docs.cloud.google.com/apigee/docs/hybrid/release-notes#hybrid_v1143">v1.14.3</a>) <br/>This addresses the following vulnerability: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2024-47554">CVE-2024-47554</a> </li></ul></td>
</tr>
<tr>
<td><strong>433950370</strong></td>
<td><strong>Security fix.</strong> (Fixed in <a href="https://docs.cloud.google.com/apigee/docs/hybrid/release-notes#hybrid_v1143">v1.14.3</a>) <br/>This addresses the following vulnerability: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-25193">CVE-2025-25193</a> </li></ul></td>
</tr>
<tr>
<td><strong>418557195</strong></td>
<td><strong>Security fixes for <code>apigee-fluent-bit</code>.</strong> (Fixed in <a href="https://docs.cloud.google.com/apigee/docs/hybrid/release-notes#hybrid_v1151">v1.15.1</a>) <br/>This addresses the following vulnerabilities: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-24528">CVE-2025-24528</a></li> <li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-4207">CVE-2025-4207</a></li> <li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-1390">CVE-2025-1390</a></li> <li><a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26462">CVE-2024-26462</a></li> <li><a href="https://nvd.nist.gov/vuln/detail/CVE-2024-13176">CVE-2024-13176</a></li> </ul></td>
</tr>
<tr>
<td><strong>396944778</strong></td>
<td><strong>Security fixes for <code>apigee-synchronizer</code>.</strong> (Fixed in <a href="https://docs.cloud.google.com/apigee/docs/hybrid/release-notes#hybrid_v1134">v1.13.4</a>) <br/>This addresses the following vulnerabilities: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-25193">CVE-2025-25193</a></li> <li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-24970">CVE-2025-24970</a></li> <li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-23184">CVE-2025-23184</a></li> <li><a href="https://nvd.nist.gov/vuln/detail/CVE-2024-47554">CVE-2024-47554</a></li> </ul></td>
</tr>
<tr>
<td><strong>392934392</strong></td>
<td><strong>Security fixes for <code>apigee-logger</code>.</strong></td>
</tr>
<tr>
<td><strong>N/A</strong></td>
<td><strong>Incorporated an updated base image for <code>stackdriver-logging-agent</code>, improving the overall security of the service.</strong>  (Fixed in <a href="https://docs.cloud.google.com/apigee/docs/hybrid/release-notes#hybrid_1142-hotfix1">1.14.2-hotfix.1</a>) <br/>This addresses the following vulnerabilities (among others and not limited to): <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-32221">CVE-2022-32221</a> </li> <li><a href="https://osv.dev/vulnerability/GHSA-jvgm-pfqv-887x">GHSA-jvgm-pfqv-887x</a> </li></ul></td>
</tr>
<tr>
<td><strong>N/A</strong></td>
<td><strong>Security fixes for <code>apigee-asm-ingress</code>.</strong>  (Fixed in <a href="https://docs.cloud.google.com/apigee/docs/hybrid/release-notes#hybrid_v1143">v1.14.3</a>) <br/>This addresses the following vulnerability: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22871">CVE-2025-22871</a> </li></ul></td>
</tr>
<tr>
<td><strong>N/A</strong></td>
<td><strong>Security fixes for <code>apigee-asm-istiod</code>.</strong>  (Fixed in <a href="https://docs.cloud.google.com/apigee/docs/hybrid/release-notes#hybrid_v1143">v1.14.3</a>) <br/>This addresses the following vulnerability: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22871">CVE-2025-22871</a> </li></ul></td>
</tr>
<tr>
<td><strong>N/A</strong></td>
<td><strong>Security fixes for <code>apigee-envoy</code>.</strong>  (Fixed in <a href="https://docs.cloud.google.com/apigee/docs/hybrid/release-notes#hybrid_v1143">v1.14.3</a>) <br/>This addresses the following vulnerability: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-0395">CVE-2025-0395</a> </li></ul></td>
</tr>
<tr>
<td><strong>N/A</strong></td>
<td><strong>Security fixes for <code>apigee-fluent-bit</code>.</strong>  (Fixed in <a href="https://docs.cloud.google.com/apigee/docs/hybrid/release-notes#hybrid_v1143">v1.14.3</a> &amp; <a href="https://docs.cloud.google.com/apigee/docs/hybrid/release-notes#hybrid_v1151">v1.15.1</a>) <br/>This addresses the following vulnerabilities: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-32990">CVE-2025-32990</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-32988">CVE-2025-32988</a> </li></ul></td>
</tr>
<tr>
<td><strong>N/A</strong></td>
<td><strong>Security fixes for <code>apigee-hybrid-cassandra-client</code>.</strong>  (Fixed in <a href="https://docs.cloud.google.com/apigee/docs/hybrid/release-notes#hybrid_v1143">v1.14.3</a>) <br/>This addresses the following vulnerability: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22871">CVE-2025-22871</a> </li></ul></td>
</tr>
<tr>
<td><strong>N/A</strong></td>
<td><strong>Security fixes for <code>apigee-hybrid-cassandra</code>.</strong>  (Fixed in <a href="https://docs.cloud.google.com/apigee/docs/hybrid/release-notes#hybrid_v1143">v1.14.3</a>) <br/>This addresses the following vulnerabilities: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-23015">CVE-2025-23015</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22871">CVE-2025-22871</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-24970">CVE-2025-24970</a> </li></ul></td>
</tr>
<tr>
<td><strong>N/A</strong></td>
<td><strong>Security fixes for <code>apigee-hybrid-cassandra</code>.</strong>  (Fixed in <a href="https://docs.cloud.google.com/apigee/docs/hybrid/release-notes#hybrid_v1151">v1.15.1</a>) <br/>This addresses the following vulnerability: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-23015">CVE-2025-23015</a> </li></ul></td>
</tr>
<tr>
<td><strong>N/A</strong></td>
<td><strong>Security fixes for <code>apigee-kube-rbac-proxy</code>.</strong>  (Fixed in <a href="https://docs.cloud.google.com/apigee/docs/hybrid/release-notes#hybrid_v1143">v1.14.3</a>) <br/>This addresses the following vulnerability: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22871">CVE-2025-22871</a> </li></ul></td>
</tr>
<tr>
<td><strong>N/A</strong></td>
<td><strong>Security fixes for <code>apigee-mart-server</code>.</strong>  (Fixed in <a href="https://docs.cloud.google.com/apigee/docs/hybrid/release-notes#hybrid_v1134">v1.13.4</a>) <br/>This addresses the following vulnerability: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2024-20952">CVE-2024-20952</a> </li></ul></td>
</tr>
<tr>
<td><strong>N/A</strong></td>
<td><strong>Security fixes for <code>apigee-mart-server</code>.</strong>  (Fixed in <a href="https://docs.cloud.google.com/apigee/docs/hybrid/release-notes#hybrid_v1143">v1.14.3</a>) <br/>This addresses the following vulnerabilities: <ul> <li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-48924">CVE-2025-48924</a> </li> <li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-48795">CVE-2025-48795</a> </li> <li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-48734">CVE-2025-48734</a> </li> <li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-24970">CVE-2025-24970</a> </li> <li><a href="https://nvd.nist.gov/vuln/detail/CVE-2024-47554">CVE-2024-47554</a> </li> <li><a href="https://nvd.nist.gov/vuln/detail/CVE-2024-47535">CVE-2024-47535</a> </li> <li><a href="https://nvd.nist.gov/vuln/detail/CVE-2024-13009">CVE-2024-13009</a> </li> <li><a href="https://nvd.nist.gov/vuln/detail/CVE-2024-8184">CVE-2024-8184</a> </li> <li><a href="https://nvd.nist.gov/vuln/detail/CVE-2024-7254">CVE-2024-7254</a> </li> <li><a href="https://nvd.nist.gov/vuln/detail/CVE-2024-6763">CVE-2024-6763</a> </li> </ul></td>
</tr>
</tbody>
</table>
<h3>Fixed</h3>
<h4 id="fixed_since_last_minor_release">Fixed since last minor release</h4>
<table>
<thead>
<tr>
<th>Bug ID</th>
<th>Description</th>
</tr>
</thead>
<tbody>
<tr>
<td><strong>451841788</strong></td>
<td><strong>Apigee hybrid required the <code>mintTaskScheduler.serviceAccountPath</code> property even when Monetization was not enabled.</strong> (Fixed in <a href="https://docs.cloud.google.com/apigee/docs/hybrid/release-notes#hybrid_v1151">v1.15.1</a> &amp; <a href="https://docs.cloud.google.com/apigee/docs/hybrid/release-notes#hybrid_v1143">v1.14.3</a>)</td>
</tr>
<tr>
<td><strong>451375397</strong></td>
<td><strong>The <code>apigee-pull-push.sh</code> script could return a No such image error message.</strong> (Fixed in <a href="https://docs.cloud.google.com/apigee/docs/hybrid/release-notes#hybrid_v1151">v1.15.1</a> &amp; <a href="https://docs.cloud.google.com/apigee/docs/hybrid/release-notes#hybrid_v1143">v1.14.3</a>)</td>
</tr>
<tr>
<td><strong>445912919</strong></td>
<td><strong>Unused files and folders have been removed from the Apigee hybrid Helm charts to prevent potential security exposure and streamline the product installation and upgrade process.</strong> (Fixed in <a href="https://docs.cloud.google.com/apigee/docs/hybrid/release-notes#hybrid_v1151">v1.15.1</a>)</td>
</tr>
<tr>
<td><strong>442501403</strong></td>
<td><strong>Fixed an issue that caused incorrect target latency metrics in Apigee Analytics when a <code>TargetEndpoint</code> is configured with a <code>&lt;LoadBalancer&gt;</code>.</strong> (Fixed in <a href="https://docs.cloud.google.com/apigee/docs/hybrid/release-notes#hybrid_v1151">v1.15.1</a>)</td>
</tr>
<tr>
<td><strong>437999897</strong></td>
<td><strong>Reduced the log level for failed geo IP lookups to address excessive log messages for private IP addresses.</strong> (Fixed in <a href="https://docs.cloud.google.com/apigee/docs/hybrid/release-notes#hybrid_v1151">v1.15.1</a>)</td>
</tr>
<tr>
<td><strong>431930277</strong>, <strong>395272878</strong></td>
<td><strong>When the configuration property <a href="https://docs.cloud.google.com/apigee/docs/hybrid/v1.15/config-prop-ref#envs-managementcallsskipproxy"><code>envs.managementCallsSkipProxy</code></a> is set to <code>true</code> via helm for environment-level forward proxy, trace and analytics (which use <code>googleapis.com</code>) will skip forward proxy.</strong> (Fixed in <a href="https://docs.cloud.google.com/apigee/docs/hybrid/release-notes#hybrid_v1151">v1.15.1</a>)</td>
</tr>
<tr>
<td><strong>423597917</strong></td>
<td><strong>Post of an <a href="https://docs.cloud.google.com/apigee/docs/reference/apis/apigee/rest/v1/organizations.appgroups.apps.keys/updateAppGroupAppKey"><code>AppGroupAppKey</code></a> scopes should result in insert operation instead of update.</strong> (Fixed in <a href="https://docs.cloud.google.com/apigee/docs/hybrid/release-notes#hybrid_v1151">v1.15.1</a> &amp; <a href="https://docs.cloud.google.com/apigee/docs/hybrid/release-notes#hybrid_v1143">v1.14.3</a>)</td>
</tr>
<tr>
<td><strong>420675540</strong></td>
<td><strong>Fixed Cassandra based replication for runtime contracts in synchronizer.</strong> (Fixed in <a href="https://docs.cloud.google.com/apigee/docs/hybrid/release-notes#hybrid_v1151">v1.15.1</a>, <a href="https://docs.cloud.google.com/apigee/docs/hybrid/release-notes#hybrid_v1143">v1.14.3</a> &amp; <a href="https://docs.cloud.google.com/apigee/docs/hybrid/release-notes#hybrid_v1134">v1.13.4</a>)</td>
</tr>
<tr>
<td><strong>419578402</strong></td>
<td><strong>Mint-Mart forward proxy compatible.</strong> (Fixed in <a href="https://docs.cloud.google.com/apigee/docs/hybrid/release-notes#hybrid_v1151">v1.15.1</a> &amp; <a href="https://docs.cloud.google.com/apigee/docs/hybrid/release-notes#hybrid_v1143">v1.14.3</a>)</td>
</tr>
<tr>
<td><strong>416634326</strong></td>
<td><strong>Presence of istio.io Custom Resource Definitions (CRDs) in an Apigee hybrid cluster could cause failure in apigee-ingressgateway-manager pods.</strong> (Fixed in <a href="https://docs.cloud.google.com/apigee/docs/hybrid/release-notes#hybrid_v1151">v1.15.1</a>, <a href="https://docs.cloud.google.com/apigee/docs/hybrid/release-notes#hybrid_v1143">v1.14.3</a> &amp; <a href="https://docs.cloud.google.com/apigee/docs/hybrid/release-notes#hybrid_v1134">v1.13.4</a>)</td>
</tr>
<tr>
<td><strong>414499328</strong></td>
<td><strong><code>ApigeeTelemetry</code> could become stuck in <code>creating</code> state</strong> (Fixed in <a href="https://docs.cloud.google.com/apigee/docs/hybrid/release-notes#hybrid_v1143">v1.14.3</a> &amp; <a href="https://docs.cloud.google.com/apigee/docs/hybrid/release-notes#hybrid_v1134">v1.13.4</a>)</td>
</tr>
<tr>
<td><strong>412740465</strong></td>
<td><strong>Fixed issue where zipkin headers were not generated by Apigee Ingress Gateway.</strong> (Fixed in <a href="https://docs.cloud.google.com/apigee/docs/hybrid/release-notes#hybrid_v1151">v1.15.1</a> &amp; <a href="https://docs.cloud.google.com/apigee/docs/hybrid/release-notes#hybrid_v1143">v1.14.3</a>)</td>
</tr>
<tr>
<td><strong>409048431</strong></td>
<td><strong>Fixes a vulnerability which could allow a SAML signature verification to be bypassed.</strong> (Fixed in <a href="https://docs.cloud.google.com/apigee/docs/hybrid/release-notes#hybrid_v1151">v1.15.1</a> &amp; <a href="https://docs.cloud.google.com/apigee/docs/hybrid/release-notes#hybrid_v1143">v1.14.3</a>)</td>
</tr>
<tr>
<td><strong>401746333</strong></td>
<td><strong>Fixed a <code>java.lang.ClassCircularityError</code> that could occur in Java Callouts due to an issue with the class loading mechanism.</strong>(Fixed in <a href="https://docs.cloud.google.com/apigee/docs/hybrid/release-notes#hybrid_v1151">v1.15.1</a> &amp; <a href="https://docs.cloud.google.com/apigee/docs/hybrid/release-notes#hybrid_v1143">v1.14.3</a>)</td>
</tr>
<tr>
<td><strong>395272878</strong></td>
<td><strong>Separate Forward proxy support for <code>googleapis.com</code> and <code>non-googleapis.com</code> runtime traffic.</strong> (Fixed in <a href="https://docs.cloud.google.com/apigee/docs/hybrid/release-notes#hybrid_v1143">v1.14.3</a>)</td>
</tr>
<tr>
<td><strong>393615439</strong></td>
<td><strong>OASValidation behavior for <code>allOf</code> with <code>additionalProperties: true</code>.</strong> (Fixed in <a href="https://docs.cloud.google.com/apigee/docs/hybrid/release-notes#hybrid_1142-hotfix1">1.14.2-hotfix.1</a>)</td>
</tr>
<tr>
<td><strong>382565315</strong></td>
<td><strong>A memory leak within the Security Policy has been addressed, improving system stability.</strong> (Fixed in <a href="https://docs.cloud.google.com/apigee/docs/hybrid/release-notes#hybrid_v1134">v1.13.4</a>)</td>
</tr>
<tr>
<td><strong>378686709</strong></td>
<td><strong>The use of wildcards (*) in Apigee proxy basepaths would conflict with other explicit basepaths, resulting in a 404 error.</strong> To apply this fix, follow the procedure in <a href="https://docs.cloud.google.com/apigee/docs/release/known-issues#378686709">Known issue 378686709</a>. (Fixed in <a href="https://docs.cloud.google.com/apigee/docs/hybrid/release-notes#hybrid_v1151">v1.15.1</a> &amp; <a href="https://docs.cloud.google.com/apigee/docs/hybrid/release-notes#hybrid_v1143">v1.14.3</a>)</td>
</tr>
<tr>
<td><strong>375360455</strong></td>
<td><strong>Updated apigee-runtime drain timeout to 300s to fix connection termination issue during pod termination.</strong> (Fixed in <a href="https://docs.cloud.google.com/apigee/docs/hybrid/release-notes#hybrid_v1134">v1.13.4</a>)</td>
</tr>
<tr>
<td><strong>367815792</strong></td>
<td><strong>Two new Flow Variables: <code>app_group_app</code> and <code>app_group_name</code> have been added to VerifyApiKey and Access Token policy.</strong> (Fixed in <a href="https://docs.cloud.google.com/apigee/docs/hybrid/release-notes#hybrid_v1151">v1.15.1</a> &amp; <a href="https://docs.cloud.google.com/apigee/docs/hybrid/release-notes#hybrid_v1143">v1.14.3</a>)</td>
</tr>
</tbody>
</table>
]]>
    </content>
  </entry>

  <entry>
    <title>October 12, 2025</title>
    <id>tag:google.com,2016:apigee-hybrid-release-notes#October_12_2025</id>
    <updated>2025-10-12T00:00:00-07:00</updated>
    <link rel="alternate" href="https://docs.cloud.google.com/apigee/docs/hybrid/release-notes#October_12_2025"/>
    <content type="html"><![CDATA[<strong class="release-note-product-version-title">v1.15.1</strong>
<h3>Feature</h3>
<p><strong>Recurring, top-up, and setup fees for Apigee hybrid monetization</strong></p>
<p>Apigee hybrid now supports recurring, top-up, and setup fees for monetization. For information see <a href="https://docs.cloud.google.com/apigee/docs/hybrid/v1.15/monetization-for-hybrid">Enabling monetization for Apigee hybrid</a>.</p>
<h3>Announcement</h3>
<h3 id="hybrid_v1151">hybrid v1.15.1</h3>
<p>On October 10, 2025 we released an updated version of the Apigee hybrid software, 1.15.1.</p>
<ul>
<li>For information on upgrading, see <a href="https://docs.cloud.google.com/apigee/docs/hybrid/v1.15/upgrade">Upgrading Apigee hybrid to version 1.15</a>.</li>
<li>For information on new installations, see <a href="https://docs.cloud.google.com/apigee/docs/hybrid/v1.15/big-picture">The big picture</a>.</li>
</ul>
<aside class="note"><strong>Note:</strong><span> This is a patch release: The container images used in patch releases are integrated with the Apigee hybrid Helm charts. Upgrading to a patch via the Helm chart automatically updates the images. No manual image changes are typically needed. For information on container image support in Apigee hybrid releases, see <a href="https://docs.cloud.google.com/apigee/docs/release/apigee-release-process#apigee-hybrid-container-images">Apigee release process</a>.</span></aside>
<h3>Feature</h3>
<p><strong>Apigee policies for LLM/GenAI workloads</strong></p>
<p>Apigee hybrid now supports the following Apigee policies with support for LLM/GenAI workloads.</p>
<ul>
<li><a href="https://docs.cloud.google.com/apigee/docs/api-platform/reference/policies/semantic-cache-lookup-policy">SemanticCacheLookup policy</a></li>
<li><a href="https://docs.cloud.google.com/apigee/docs/api-platform/reference/policies/semantic-cache-populate-policy">SemanticCachePopulate policy</a></li>
<li><a href="https://docs.cloud.google.com/apigee/docs/api-platform/reference/policies/sanitize-user-prompt-policy">SanitizeUserPrompt</a></li>
<li><a href="https://docs.cloud.google.com/apigee/docs/api-platform/reference/policies/sanitize-user-prompt-policy">SanitizeModelResponse</a></li>
</ul>
<p>The Apigee semantic caching policies enable intelligent response reuse based on semantic similarity. Using these policies in your Apigee API proxies can minimize redundant backend API calls, reduce latency, and lower operational costs. With this release, the semantic caching policies support URL templating, enabling the use of variables for AI model endpoint values.</p>
<p>The Model Armor policies protect your AI applications by sanitizing user prompts to and responses from large language models (LLMs). Using these policies in your Apigee API proxies can mitigate the risks associated with LLM usage by leveraging Model Armor to detect prompt injection, prevent jailbreak attacks, apply responsible AI filters, filter malicious URLs, and protect sensitive data.</p>
<aside class="note"><b>Note:</b> In Apigee hybrid, this feature has the following limitations:
  <ul>
<li>Support for these policies is limited to installations on Google Cloud Platform.</li>
<li>Apigee hybrid does not support forward proxy with these policies.</li>
</ul>
</aside>
<p>For more information on using these policies in your Apigee API proxies, see:</p>
<ul>
<li><a href="https://docs.cloud.google.com/apigee/docs/api-platform/tutorials/using-semantic-caching-policies">Get started with semantic caching policies</a></li>
<li><a href="https://docs.cloud.google.com/apigee/docs/api-platform/tutorials/using-model-armor-policies">Get started with Apigee Model Armor policies</a></li>
</ul>
<h3>Fixed</h3>
<table>
<thead>
<tr>
<th>Bug ID</th>
<th>Description</th>
</tr>
</thead>
<tbody>
<tr>
<td><strong>451841788</strong></td>
<td><strong>Apigee hybrid required the <code>mintTaskScheduler.serviceAccountPath</code> property even when Monetization was not enabled.</strong></td>
</tr>
<tr>
<td><strong>451375397</strong></td>
<td><strong>The <code>apigee-pull-push.sh</code> script could return a "No such image error" message.</strong></td>
</tr>
<tr>
<td><strong>445912919</strong></td>
<td><strong>Unused files and folders have been removed from the Apigee hybrid Helm charts to prevent potential security exposure and streamline the product installation and upgrade process.</strong></td>
</tr>
<tr>
<td><strong>442501403</strong></td>
<td><strong>Fixed an issue that caused incorrect target latency metrics in Apigee Analytics when a <code>TargetEndpoint</code> is configured with a <code>&lt;LoadBalancer&gt;</code>.</strong></td>
</tr>
<tr>
<td><strong>437999897</strong></td>
<td><strong>Reduced the log level for failed geo IP lookups to address excessive log messages for private IP addresses.</strong></td>
</tr>
<tr>
<td><strong>431930277</strong>, <strong>395272878</strong></td>
<td><strong>When the configuration property <a href="https://docs.cloud.google.com/apigee/docs/hybrid/v1.15/config-prop-ref#envs-managementcallsskipproxy"><code>envs.managementCallsSkipProxy</code></a> is set to <code>true</code> via helm for environment-level forward proxy, trace and analytics (which use <code>googleapis.com</code>) will skip forward proxy.</strong></td>
</tr>
<tr>
<td><strong>423597917</strong></td>
<td><strong>Post of an <a href="https://docs.cloud.google.com/apigee/docs/reference/apis/apigee/rest/v1/organizations.appgroups.apps.keys/updateAppGroupAppKey"><code>AppGroupAppKey</code></a> scopes should result in insert operation instead of update.</strong></td>
</tr>
<tr>
<td><strong>420675540</strong></td>
<td><strong>Fixed Cassandra based replication for runtime contracts in synchronizer.</strong></td>
</tr>
<tr>
<td><strong>419578402</strong></td>
<td><strong>Mint-Mart forward proxy compatible.</strong></td>
</tr>
<tr>
<td><strong>416634326</strong></td>
<td><strong>Presence of istio.io Custom Resource Definitions (CRDs) in an Apigee hybrid cluster could cause failure in apigee-ingressgateway-manager pods.</strong></td>
</tr>
<tr>
<td><strong>412740465</strong></td>
<td><strong>Fixed issue where zipkin headers were not generated by Apigee Ingress Gateway.</strong></td>
</tr>
<tr>
<td><strong>409048431</strong></td>
<td><strong>Fixes a vulnerability which could allow a SAML signature verification to be bypassed.</strong></td>
</tr>
<tr>
<td><strong>378686709</strong></td>
<td><strong>The use of wildcards (*) in Apigee proxy basepaths would conflict with other explicit basepaths, resulting in a 404 error.</strong> To apply this fix, follow the procedure in <a href="https://docs.cloud.google.com/apigee/docs/release/known-issues#378686709">Known issue 378686709</a>.</td>
</tr>
<tr>
<td><strong>367815792</strong></td>
<td><strong>Two new Flow Variables: <code>app_group_app</code> and <code>app_group_name</code> have been added to VerifyApiKey and Access Token policy.</strong></td>
</tr>
</tbody>
</table>
<h3>Security</h3>
<table>
<thead>
<tr>
<th>Bug ID</th>
<th>Description</th>
</tr>
</thead>
<tbody>
<tr>
<td><strong>448498138</strong></td>
<td><strong>Security fixes for <code>apigee-runtime</code>.</strong> <br/>This addresses the following vulnerability: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2024-40094">CVE-2024-40094</a></li> </ul></td>
</tr>
<tr>
<td><strong>447367372</strong></td>
<td><strong>Security fixes for <code>apigee-runtime</code>.</strong> <br/>This addresses the following vulnerability: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-58057">CVE-2025-58057</a></li> </ul></td>
</tr>
<tr>
<td><strong>418557195</strong></td>
<td><strong>Security fixes for <code>apigee-fluent-bit</code>.</strong> <br/>This addresses the following vulnerabilities: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-24528">CVE-2025-24528</a></li> <li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-4207">CVE-2025-4207</a></li> <li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-1390">CVE-2025-1390</a></li> <li><a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26462">CVE-2024-26462</a></li> <li><a href="https://nvd.nist.gov/vuln/detail/CVE-2024-13176">CVE-2024-13176</a></li> </ul></td>
</tr>
<tr>
<td><strong>N/A</strong></td>
<td><strong>Security fixes for <code>apigee-fluent-bit</code>.</strong> <br/>This addresses the following vulnerabilities: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-32990">CVE-2025-32990</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-32988">CVE-2025-32988</a> </li></ul></td>
</tr>
<tr>
<td><strong>N/A</strong></td>
<td><strong>Security fixes for <code>apigee-hybrid-cassandra</code>.</strong> <br/>This addresses the following vulnerability: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-23015">CVE-2025-23015</a> </li></ul></td>
</tr>
<tr>
<td><strong>N/A</strong></td>
<td><strong>Security fixes for <code>apigee-mart-server</code>.</strong> <br/>This addresses the following vulnerabilities: <ul> <li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-58057">CVE-2025-58057</a> </li> <li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-58056">CVE-2025-58056</a> </li> <li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-55163">CVE-2025-55163</a> </li> <li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-48924">CVE-2025-48924</a> </li> <li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-48795">CVE-2025-48795</a> </li> <li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-48734">CVE-2025-48734</a> </li> <li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-24970">CVE-2025-24970</a> </li> <li><a href="https://nvd.nist.gov/vuln/detail/CVE-2024-47554">CVE-2024-47554</a> </li> <li><a href="https://nvd.nist.gov/vuln/detail/CVE-2024-47535">CVE-2024-47535</a> </li> <li><a href="https://nvd.nist.gov/vuln/detail/CVE-2024-13009">CVE-2024-13009</a> </li> <li><a href="https://nvd.nist.gov/vuln/detail/CVE-2024-8184">CVE-2024-8184</a> </li> <li><a href="https://nvd.nist.gov/vuln/detail/CVE-2024-7254">CVE-2024-7254</a> </li> <li><a href="https://nvd.nist.gov/vuln/detail/CVE-2024-6763">CVE-2024-6763</a> </li> </ul></td>
</tr>
<tr>
<td><strong>N/A</strong></td>
<td><strong>Security fixes for <code>apigee-stackdriver-logging-agent</code>.</strong> <br/>This addresses the following vulnerabilities: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-58767">CVE-2025-58767</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-24294">CVE-2025-24294</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-33953">CVE-2023-33953</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-32511">CVE-2022-32511</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-29181">CVE-2022-29181</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-24839">CVE-2022-24839</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-24836">CVE-2022-24836</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0759">CVE-2022-0759</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-41817">CVE-2021-41817</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-31799">CVE-2021-31799</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-30560">CVE-2021-30560</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-28965">CVE-2021-28965</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-23214">CVE-2021-23214</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-25695">CVE-2020-25695</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-25694">CVE-2020-25694</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-25613">CVE-2020-25613</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-3881">CVE-2019-3881</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2018-25032">CVE-2018-25032</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2018-1115">CVE-2018-1115</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2018-10915">CVE-2018-10915</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2018-1058">CVE-2018-1058</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2018-1053">CVE-2018-1053</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2017-7546">CVE-2017-7546</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2017-7484">CVE-2017-7484</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2017-15098">CVE-2017-15098</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2017-14798">CVE-2017-14798</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2016-7954">CVE-2016-7954</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2016-7048">CVE-2016-7048</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2016-5424">CVE-2016-5424</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2016-5423">CVE-2016-5423</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2016-0766">CVE-2016-0766</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2015-3167">CVE-2015-3167</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2015-3166">CVE-2015-3166</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2015-0244">CVE-2015-0244</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2015-0243">CVE-2015-0243</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2015-0241">CVE-2015-0241</a> </li></ul></td>
</tr>
</tbody>
</table>
<h3>Change</h3>
<p><strong>Documentation change</strong></p>
<p>The following documents have been changed or introduced to align the Apigee hybrid installation guides with the supported methods for service account authentication:</p>
<ul>
<li><a href="https://docs.cloud.google.com/apigee/docs/hybrid/v1.15/sa-authentication-methods">Service account authentication methods in Apigee hybrid</a> - A new overview topic for service account authentication.</li>
<li><a href="https://docs.cloud.google.com/apigee/docs/hybrid/v1.15/storing-sa-keys-in-k8s-secrets">Storing service account keys in Kubernetes secrets</a> - A new topic.</li>
<li><a href="https://docs.cloud.google.com/apigee/docs/hybrid/v1.15/install-service-accounts">Step 4: Create service accounts</a> - Rewritten to accommodate all supported methods of service account authentication.</li>
<li><a href="https://docs.cloud.google.com/apigee/docs/hybrid/v1.15/install-sa-authentication">Step 5: Set up service account authentication</a> - A new topic on configuring authentication after creating service accounts.</li>
<li><a href="https://docs.cloud.google.com/apigee/docs/hybrid/v1.15/install-create-overrides">Step 7: Create the overrides</a> and <a href="https://docs.cloud.google.com/apigee/docs/hybrid/v1.15/install-helm-charts">Step 11: Install Apigee hybrid Using Helm</a> - Topics revised to provide templates, examples, and procedures for each supported type of service account authentication.</li>
<li><strong>Step 11(Optional): Configure Workload Identity</strong> - Topic removed. The procedures are included in <a href="https://docs.cloud.google.com/apigee/docs/hybrid/v1.15/install-helm-charts.html#wif-for-gke">Step 11: Install Apigee hybrid Using Helm: WIF for GKE</a></li>
</ul>
]]>
    </content>
  </entry>

  <entry>
    <title>October 07, 2025</title>
    <id>tag:google.com,2016:apigee-hybrid-release-notes#October_07_2025</id>
    <updated>2025-10-07T00:00:00-07:00</updated>
    <link rel="alternate" href="https://docs.cloud.google.com/apigee/docs/hybrid/release-notes#October_07_2025"/>
    <content type="html"><![CDATA[<strong class="release-note-product-version-title">v1.14.3</strong>
<h3>Announcement</h3>
<h3 id="hybrid_v1143">hybrid v1.14.3</h3>
<p>On October 7, 2025 we released an enhancement to Apigee hybrid version 1.14.3, recurring, top-up, and setup fees for Apigee hybrid monetization.</p>
<aside class="note"><strong>Note:</strong><span> This is an enhancement to an existing release.</span></aside>
<ul>
<li>For complete information on the contents of the v1.14.3 release, see <a href="https://docs.cloud.google.com/apigee/docs/hybrid/release-notes#hybrid_v1143">Apigee hybrid v1.14.3 release notes</a>.</li>
</ul>
<h3>Feature</h3>
<p><strong>Recurring, top-up, and setup fees for Apigee hybrid monetization</strong></p>
<p>Apigee hybrid now supports recurring, top-up, and setup fees for monetization. For information see <a href="https://docs.cloud.google.com/apigee/docs/hybrid/v1.14/monetization-for-hybrid">Enabling monetization for Apigee hybrid</a>.</p>
<h3>Fixed</h3>
<table>
<thead>
<tr>
<th>Bug ID</th>
<th>Description</th>
</tr>
</thead>
<tbody>
<tr>
<td><strong>419578402</strong></td>
<td><strong>Mint-Mart forward proxy compatible.</strong></td>
</tr>
</tbody>
</table>
]]>
    </content>
  </entry>

  <entry>
    <title>September 29, 2025</title>
    <id>tag:google.com,2016:apigee-hybrid-release-notes#September_29_2025</id>
    <updated>2025-09-29T00:00:00-07:00</updated>
    <link rel="alternate" href="https://docs.cloud.google.com/apigee/docs/hybrid/release-notes#September_29_2025"/>
    <content type="html"><![CDATA[<strong class="release-note-product-version-title">v1.14.3</strong>
<h3>Announcement</h3>
<h3 id="hybrid_v1143">hybrid v1.14.3</h3>
<p>On September 29, 2025 we released an updated version of the Apigee hybrid software, 1.14.3.</p>
<ul>
<li>For information on upgrading, see <a href="https://docs.cloud.google.com/apigee/docs/hybrid/v1.14/upgrade">Upgrading Apigee hybrid to version 1.14</a>.</li>
<li>For information on new installations, see <a href="https://docs.cloud.google.com/apigee/docs/hybrid/v1.14/big-picture">The big picture</a>.</li>
</ul>
<aside class="note"><strong>Note:</strong><span> This is a patch release: The container images used in patch releases are integrated with the Apigee hybrid Helm charts. Upgrading to a patch via the Helm chart automatically updates the images. No manual image changes are typically needed. For information on container image support in Apigee hybrid releases, see <a href="https://docs.cloud.google.com/apigee/docs/release/apigee-release-process#apigee-hybrid-container-images">Apigee release process</a>.</span></aside>
<h3>Fixed</h3>
<table>
<thead>
<tr>
<th>Bug ID</th>
<th>Description</th>
</tr>
</thead>
<tbody>
<tr>
<td><strong>451841788</strong></td>
<td><strong>Apigee hybrid required the <code>mintTaskScheduler.serviceAccountPath</code> property even when Monetization was not enabled.</strong></td>
</tr>
<tr>
<td><strong>451375397</strong></td>
<td><strong>The <code>apigee-pull-push.sh</code> script could return a "No such image" error message.</strong></td>
</tr>
<tr>
<td><strong>423597917</strong></td>
<td><strong>Post of an <a href="https://docs.cloud.google.com/apigee/docs/reference/apis/apigee/rest/v1/organizations.appgroups.apps.keys/updateAppGroupAppKey"><code>AppGroupAppKey</code></a> scopes should result in insert operation instead of update.</strong></td>
</tr>
<tr>
<td><strong>420675540</strong></td>
<td><strong>Fixed Cassandra based replication for runtime contracts in synchronizer.</strong></td>
</tr>
<tr>
<td><strong>416634326</strong></td>
<td><strong>Presence of istio.io Custom Resource Definitions (CRDs) in an Apigee hybrid cluster could cause failure in apigee-ingressgateway-manager pods.</strong></td>
</tr>
<tr>
<td><strong>414499328</strong></td>
<td><strong><code>ApigeeTelemetry</code> could become stuck in <code>creating</code> state</strong></td>
</tr>
<tr>
<td><strong>412740465</strong></td>
<td><strong>Fixed issue where zipkin headers were not generated by Apigee Ingress Gateway.</strong></td>
</tr>
<tr>
<td><strong>409048431</strong></td>
<td><strong>Fixes a vulnerability which could allow a SAML signature verification to be bypassed.</strong></td>
</tr>
<tr>
<td><strong>395272878</strong></td>
<td><strong>Separate Forward proxy support for <code>googleapis.com</code> and <code>non-googleapis.com</code> runtime traffic.</strong></td>
</tr>
<tr>
<td><strong>378686709</strong></td>
<td><strong>The use of wildcards (*) in Apigee proxy basepaths would conflict with other explicit basepaths, resulting in a 404 error.</strong> To apply this fix, follow the procedure in <a href="https://docs.cloud.google.com/apigee/docs/release/known-issues#378686709">Known issue 378686709</a>.</td>
</tr>
<tr>
<td><strong>367815792</strong></td>
<td><strong>Two new Flow Variables: <code>app_group_app</code> and <code>app_group_name</code> have been added to VerifyApiKey and Access Token policy.</strong></td>
</tr>
</tbody>
</table>
<h3>Security</h3>
<table>
<thead>
<tr>
<th>Bug ID</th>
<th>Description</th>
</tr>
</thead>
<tbody>
<tr>
<td><strong>433952146</strong></td>
<td><strong>Security fix.</strong> <br/>This addresses the following vulnerability: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2024-6763">CVE-2024-6763</a> </li></ul></td>
</tr>
<tr>
<td><strong>433951774</strong></td>
<td><strong>Security fix.</strong> <br/>This addresses the following vulnerability: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2024-7254">CVE-2024-7254</a> </li></ul></td>
</tr>
<tr>
<td><strong>433950558</strong></td>
<td><strong>Security fix.</strong> <br/>This addresses the following vulnerability: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2024-47554">CVE-2024-47554</a> </li></ul></td>
</tr>
<tr>
<td><strong>433950370</strong></td>
<td><strong>Security fix.</strong> <br/>This addresses the following vulnerability: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-25193">CVE-2025-25193</a> </li></ul></td>
</tr>
<tr>
<td><strong>N/A</strong></td>
<td><strong>Security fixes for <code>apigee-asm-ingress</code>.</strong> <br/>This addresses the following vulnerability: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22871">CVE-2025-22871</a> </li></ul></td>
</tr>
<tr>
<td><strong>N/A</strong></td>
<td><strong>Security fixes for <code>apigee-asm-istiod</code>.</strong> <br/>This addresses the following vulnerability: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22871">CVE-2025-22871</a> </li></ul></td>
</tr>
<tr>
<td><strong>N/A</strong></td>
<td><strong>Security fixes for <code>apigee-envoy</code>.</strong> <br/>This addresses the following vulnerability: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-0395">CVE-2025-0395</a> </li></ul></td>
</tr>
<tr>
<td><strong>N/A</strong></td>
<td><strong>Security fixes for <code>apigee-fluent-bit</code>.</strong> <br/>This addresses the following vulnerabilities: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-32990">CVE-2025-32990</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-32988">CVE-2025-32988</a> </li></ul></td>
</tr>
<tr>
<td><strong>N/A</strong></td>
<td><strong>Security fixes for <code>apigee-hybrid-cassandra</code>.</strong> <br/>This addresses the following vulnerabilities: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-23015">CVE-2025-23015</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22871">CVE-2025-22871</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-24970">CVE-2025-24970</a> </li></ul></td>
</tr>
<tr>
<td><strong>N/A</strong></td>
<td><strong>Security fixes for <code>apigee-hybrid-cassandra-client</code>.</strong> <br/>This addresses the following vulnerability: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22871">CVE-2025-22871</a> </li></ul></td>
</tr>
<tr>
<td><strong>N/A</strong></td>
<td><strong>Security fixes for <code>apigee-kube-rbac-proxy</code>.</strong> <br/>This addresses the following vulnerability: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22871">CVE-2025-22871</a> </li></ul></td>
</tr>
<tr>
<td><strong>N/A</strong></td>
<td><strong>Security fixes for <code>apigee-mart-server</code>.</strong> <br/>This addresses the following vulnerabilities: <ul> <li><a href="https://nvd.nist.gov/vuln/detail/2025-48924">CVE-2025-48924</a> </li> <li><a href="https://nvd.nist.gov/vuln/detail/2025-48795">CVE-2025-48795</a> </li> <li><a href="https://nvd.nist.gov/vuln/detail/2025-48734">CVE-2025-48734</a> </li> <li><a href="https://nvd.nist.gov/vuln/detail/2025-24970">CVE-2025-24970</a> </li> <li><a href="https://nvd.nist.gov/vuln/detail/2024-47554">CVE-2024-47554</a> </li> <li><a href="https://nvd.nist.gov/vuln/detail/2024-47535">CVE-2024-47535</a> </li> <li><a href="https://nvd.nist.gov/vuln/detail/2024-13009">CVE-2024-13009</a> </li> <li><a href="https://nvd.nist.gov/vuln/detail/2024-8184">CVE-2024-8184</a> </li> <li><a href="https://nvd.nist.gov/vuln/detail/2024-7254">CVE-2024-7254</a> </li> <li><a href="https://nvd.nist.gov/vuln/detail/2024-6763">CVE-2024-6763</a> </li> </ul></td>
</tr>
<tr>
<td><strong>N/A</strong></td>
<td><strong>Security fixes for <code>apigee-operators</code>.</strong> <br/>This addresses the following vulnerability: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22871">CVE-2025-22871</a> </li></ul></td>
</tr>
<tr>
<td><strong>N/A</strong></td>
<td><strong>Security fixes for <code>apigee-stackdriver-logging-agent</code>.</strong> <br/>This addresses the following vulnerabilities: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-43857">CVE-2025-43857</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41946">CVE-2024-41946</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41123">CVE-2024-41123</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2024-25062">CVE-2024-25062</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-42915">CVE-2023-42915</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-33953">CVE-2023-33953</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-34169">CVE-2022-34169</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-32511">CVE-2022-32511</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-32207">CVE-2022-32207</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-29181">CVE-2022-29181</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-28739">CVE-2022-28739</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-27782">CVE-2022-27782</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-24839">CVE-2022-24839</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-24836">CVE-2022-24836</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-23308">CVE-2022-23308</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0759">CVE-2022-0759</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-41819">CVE-2021-41819</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-41817">CVE-2021-41817</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-4044">CVE-2021-4044</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3518">CVE-2021-3518</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3517">CVE-2021-3517</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-32740">CVE-2021-32740</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-32066">CVE-2021-32066</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-31799">CVE-2021-31799</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-30560">CVE-2021-30560</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-28966">CVE-2021-28966</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-28965">CVE-2021-28965</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-23214">CVE-2021-23214</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-22926">CVE-2021-22926</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-7595">CVE-2020-7595</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-25695">CVE-2020-25695</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-25694">CVE-2020-25694</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-25613">CVE-2020-25613</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-9193">CVE-2019-9193</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-3881">CVE-2019-3881</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-20388">CVE-2019-20388</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-10211">CVE-2019-10211</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-10210">CVE-2019-10210</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-10128">CVE-2019-10128</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-10127">CVE-2019-10127</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2018-25032">CVE-2018-25032</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2018-1115">CVE-2018-1115</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2018-10915">CVE-2018-10915</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2018-1058">CVE-2018-1058</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2018-1053">CVE-2018-1053</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2017-7546">CVE-2017-7546</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2017-7486">CVE-2017-7486</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2017-7484">CVE-2017-7484</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2017-17405">CVE-2017-17405</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2017-15098">CVE-2017-15098</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2017-14798">CVE-2017-14798</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2016-7954">CVE-2016-7954</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2016-7048">CVE-2016-7048</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2016-5424">CVE-2016-5424</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2016-5423">CVE-2016-5423</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2016-0766">CVE-2016-0766</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2015-3167">CVE-2015-3167</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2015-3166">CVE-2015-3166</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2015-0244">CVE-2015-0244</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2015-0243">CVE-2015-0243</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2015-0242">CVE-2015-0242</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2015-0241">CVE-2015-0241</a> </li></ul></td>
</tr>
<tr>
<td><strong>N/A</strong></td>
<td><strong>Security fixes for <code>apigee-watcher</code>.</strong> <br/>This addresses the following vulnerability: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22871">CVE-2025-22871</a> </li></ul></td>
</tr>
</tbody>
</table>
]]>
    </content>
  </entry>

  <entry>
    <title>September 24, 2025</title>
    <id>tag:google.com,2016:apigee-hybrid-release-notes#September_24_2025</id>
    <updated>2025-09-24T00:00:00-07:00</updated>
    <link rel="alternate" href="https://docs.cloud.google.com/apigee/docs/hybrid/release-notes#September_24_2025"/>
    <content type="html"><![CDATA[<strong class="release-note-product-version-title">v1.15.0</strong>
<h3>Announcement</h3>
<h3 id="apigee_operator_for_kubernetes_for_apigee_hybrid_preview">Apigee Operator for Kubernetes for Apigee Hybrid (Preview)</h3>
<p>On September 24, 2025 we released the Apigee Operator for Kubernetes for Apigee Hybrid 1.15.0 and newer.</p>
<p>The Apigee Operator for Kubernetes allows you to perform API management tasks, such as defining API products and operations, using Kubernetes tools. This preview release allows you to integrate this capability with your Apigee hybrid (v1.15.0 or newer) installation.</p>
<p>For more information, see:</p>
<ul>
<li><a href="https://docs.cloud.google.com/apigee/docs/api-platform/apigee-kubernetes/apigee-apim-operator-overview">Apigee Operator for Kubernetes overview</a></li>
<li><a href="https://docs.cloud.google.com/apigee/docs/api-platform/apigee-kubernetes/apigee-apim-operator-install-hybrid">Install the Apigee Operator for Kubernetes for Apigee hybrid</a></li>
</ul>
]]>
    </content>
  </entry>

  <entry>
    <title>July 09, 2025</title>
    <id>tag:google.com,2016:apigee-hybrid-release-notes#July_09_2025</id>
    <updated>2025-07-09T00:00:00-07:00</updated>
    <link rel="alternate" href="https://docs.cloud.google.com/apigee/docs/hybrid/release-notes#July_09_2025"/>
    <content type="html"><![CDATA[<strong class="release-note-product-version-title">v1.13.4</strong>
<h3>Announcement</h3>
<h3 id="hybrid_v1134">hybrid v1.13.4</h3>
<p>On July 9, 2025 we released an updated version of the Apigee hybrid software, 1.13.4.</p>
<ul>
<li>For information on upgrading, see <a href="https://docs.cloud.google.com/apigee/docs/hybrid/v1.13/upgrade">Upgrading Apigee hybrid to version 1.13</a>.</li>
<li>For information on new installations, see <a href="https://docs.cloud.google.com/apigee/docs/hybrid/v1.13/big-picture">The big picture</a>.</li>
</ul>
<aside class="note"><strong>Note:</strong><span> if you are upgrading to Apigee hybrid version 1.13.4 from version 1.13.2 or earlier, see <a href="https://docs.cloud.google.com/apigee/docs/hybrid/v1.13/upgrade#recommended-actions-upgrade-1133">APPENDIX: Validate policies after upgrade to 1.13.3 or later</a> for steps to address stricter class instantiation checks introduced in <a href="https://docs.cloud.google.com/apigee/docs/hybrid/release-notes#hybrid_v1133">version 1.13.3</a>.</span></aside><aside class="note"><strong>Note:</strong><span> This is a patch release: The container images used in patch releases are integrated with the Apigee hybrid Helm charts. Upgrading to a patch via the Helm chart automatically updates the images. No manual image changes are typically needed. For information on container image support in Apigee hybrid releases, see <a href="https://docs.cloud.google.com/apigee/docs/release/apigee-release-process#apigee-hybrid-container-images">Apigee release process</a>.</span></aside>
<h3>Fixed</h3>
<table>
<thead>
<tr>
<th>Bug ID</th>
<th>Description</th>
</tr>
</thead>
<tbody>
<tr>
<td><strong>420675540</strong></td>
<td><strong>Fixed Cassandra based replication for runtime contracts in synchronizer.</strong></td>
</tr>
<tr>
<td><strong>401746333</strong></td>
<td><strong>Fixed a <code>java.lang.ClassCircularityError</code> that could occur in Java Callouts due to an issue with the class loading mechanism.</strong></td>
</tr>
<tr>
<td><strong>382565315</strong></td>
<td><strong>A memory leak within the Security Policy has been addressed, improving system stability.</strong></td>
</tr>
<tr>
<td><strong>375360455</strong></td>
<td><strong>Updated apigee-runtime drain timeout to 300s to fix connection termination issue during pod termination.</strong></td>
</tr>
</tbody>
</table>
<h3>Security</h3>
<table>
<thead>
<tr>
<th>Bug ID</th>
<th>Description</th>
</tr>
</thead>
<tbody>
<tr>
<td><strong>396944778</strong></td>
<td><strong>Security fixes for <code>apigee-synchronizer</code>.</strong> <br/>This addresses the following vulnerabilities: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-25193">CVE-2025-25193</a></li> <li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-24970">CVE-2025-24970</a></li> <li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-23184">CVE-2025-23184</a></li> <li><a href="https://nvd.nist.gov/vuln/detail/CVE-2024-47554">CVE-2024-47554</a></li> </ul></td>
</tr>
<tr>
<td><strong>392934392</strong></td>
<td><strong>Security fixes for <code>apigee-logger</code>.</strong></td>
</tr>
<tr>
<td><strong>N/A</strong></td>
<td><strong>Security fixes for <code>apigee-mart-server</code>.</strong> <br/>This addresses the following vulnerability: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2024-20952">CVE-2024-20952</a> </li></ul></td>
</tr>
<tr>
<td><strong>N/A</strong></td>
<td><strong>Security fixes for <code>apigee-mint-task-scheduler</code>.</strong> <br/>This addresses the following vulnerability: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2024-20952">CVE-2024-20952</a> </li></ul></td>
</tr>
<tr>
<td><strong>N/A</strong></td>
<td><strong>Security fixes for <code>apigee-redis</code>.</strong> <br/>This addresses the following vulnerabilities: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-24834">CVE-2022-24834</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-24735">CVE-2022-24735</a> </li></ul></td>
</tr>
<tr>
<td><strong>N/A</strong></td>
<td><strong>Security fixes for <code>apigee-runtime</code>.</strong> <br/>This addresses the following vulnerability: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2024-20952">CVE-2024-20952</a> </li></ul></td>
</tr>
<tr>
<td><strong>N/A</strong></td>
<td><strong>Security fixes for <code>apigee-synchronizer</code>.</strong> <br/>This addresses the following vulnerability: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2024-20952">CVE-2024-20952</a> </li></ul></td>
</tr>
<tr>
<td><strong>N/A</strong></td>
<td><strong>Security fixes for <code>vault</code>.</strong> <br/>This addresses the following vulnerability: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-0377">CVE-2025-0377</a> </li></ul></td>
</tr>
</tbody>
</table>
]]>
    </content>
  </entry>

  <entry>
    <title>June 04, 2025</title>
    <id>tag:google.com,2016:apigee-hybrid-release-notes#June_04_2025</id>
    <updated>2025-06-04T00:00:00-07:00</updated>
    <link rel="alternate" href="https://docs.cloud.google.com/apigee/docs/hybrid/release-notes#June_04_2025"/>
    <content type="html"><![CDATA[<strong class="release-note-product-version-title">v1.15.0</strong>
<h3>Announcement</h3>
<h3 id="hybrid_v1150">hybrid v1.15.0</h3>
<p>On June 4, 2025 we released an updated version of the Apigee hybrid software, 1.15.0.</p>
<ul>
<li>For information on upgrading, see <a href="https://docs.cloud.google.com/apigee/docs/hybrid/v1.15/upgrade">Upgrading Apigee hybrid to version 1.15</a>.</li>
<li>For information on new installations, see <a href="https://docs.cloud.google.com/apigee/docs/hybrid/v1.15/big-picture">The big picture</a>.</li>
</ul>
<aside class="note"><strong>Note:</strong><span> This is a minor release: The container images used in minor releases are integrated with the Apigee hybrid Helm charts. Upgrading to a minor via the Helm chart automatically updates the images. No manual image changes are typically needed. For information on container image support in Apigee hybrid releases, see <a href="https://docs.cloud.google.com/apigee/docs/release/apigee-release-process#apigee-hybrid-container-images">Apigee release process</a>.</span></aside>
<h3>Feature</h3>
<p><strong>Large message payload support in Apigee hybrid</strong></p>
<p>Apigee now supports message payloads up to 30MB. You configure support for large message payloads in Apigee hybrid for individual environments or for your whole installation. See <a href="https://docs.cloud.google.com/apigee/docs/hybrid/v1.15/configure-large-payload-support">Configure large message payload support in Apigee hybrid</a>.</p>
<h3>Fixed</h3>
<table>
<thead>
<tr>
<th>Bug ID</th>
<th>Description</th>
</tr>
</thead>
<tbody>
<tr>
<td><strong>414499328</strong></td>
<td><strong><code>ApigeeTelemetry</code> could become stuck in <code>creating</code> state</strong> (Fixed in <a href="https://docs.cloud.google.com/apigee/docs/hybrid/release-notes#hybrid_v1150">v1.15.0</a>)</td>
</tr>
<tr>
<td><strong>412324617</strong></td>
<td><strong>Fixed issue where Runtime container could spin at 100% cpu limit.</strong> (Fixed in <a href="https://docs.cloud.google.com/apigee/docs/hybrid/release-notes#hybrid_v1142">v1.14.2</a>)</td>
</tr>
<tr>
<td><strong>399447688</strong></td>
<td><strong>API proxy deployment could become stuck in <code>PROGRESSING</code> state.</strong> (Fixed in <a href="https://docs.cloud.google.com/apigee/docs/hybrid/release-notes#hybrid_v1142">v1.14.2</a>)</td>
</tr>
<tr>
<td><strong>396886110</strong></td>
<td><strong>Fixed a bug where the HPA max replicas could be lower than min.</strong> (Fixed in <a href="https://docs.cloud.google.com/apigee/docs/hybrid/release-notes#hybrid_v1141">v1.14.1</a>)</td>
</tr>
<tr>
<td><strong>413708061</strong>, <strong>396571537</strong></td>
<td><strong>Rotating Cassandra credentials in Kubernetes secrets fixed for Multi-region deployments.</strong> (Fixed in <a href="https://docs.cloud.google.com/apigee/docs/hybrid/release-notes#hybrid_v1142">v1.14.2</a>)</td>
</tr>
<tr>
<td><strong>392547038</strong></td>
<td><strong>Add Helm chart template checks for non-existent environments and virtualhosts.</strong> (Fixed in <a href="https://docs.cloud.google.com/apigee/docs/hybrid/release-notes#hybrid_v1141">v1.14.1</a>)</td>
</tr>
<tr>
<td><strong>391861216</strong></td>
<td><strong>Restore for Google Cloud Platform and HYBRID Cloud Providers no longer affects system keyspaces. This fixes <a href="https://docs.cloud.google.com/apigee/docs/release/known-issues#391861216">Known Issue 391861216</a>.</strong> (Fixed in <a href="https://docs.cloud.google.com/apigee/docs/hybrid/release-notes#hybrid_v1141">v1.14.1</a>)</td>
</tr>
<tr>
<td><strong>390258745</strong>, <strong>388608440</strong></td>
<td><strong>Any left over Cassandra snapshots are automatically removed. This fixes <a href="https://docs.cloud.google.com/apigee/docs/release/known-issues#388608440">known issue 388608440</a>.</strong> (Fixed in <a href="https://docs.cloud.google.com/apigee/docs/hybrid/release-notes#hybrid_v1141">v1.14.1</a>)</td>
</tr>
<tr>
<td><strong>384937220</strong></td>
<td><strong>Fixed <code>ApigeeRoute</code> name collision on internal chaining gateway for Enhanced Proxy Limits.</strong> (Fixed in <a href="https://docs.cloud.google.com/apigee/docs/hybrid/release-notes#hybrid_v1142">v1.14.2</a>)</td>
</tr>
<tr>
<td><strong>383441226</strong></td>
<td><strong>Added the following <code>metrics</code> configuration properties:</strong> <ul><li><a href="https://docs.cloud.google.com/apigee/docs/hybrid/v1.15/config-prop-ref#metrics-adapter-resources-limits-cpu">metrics.adapter.resources.limits.cpu</a></li> <li><a href="https://docs.cloud.google.com/apigee/docs/hybrid/v1.15/config-prop-ref#metrics-adapter-resources-limits-memory">metrics.adapter.resources.limits.memory</a></li> <li><a href="https://docs.cloud.google.com/apigee/docs/hybrid/v1.15/config-prop-ref#metrics-adapter-resources-requests-cpu">metrics.adapter.resources.requests.cpu</a></li> <li><a href="https://docs.cloud.google.com/apigee/docs/hybrid/v1.15/config-prop-ref#metrics-adapter-resources-requests-memory">metrics.adapter.resources.requests.memory</a></li> <li><a href="https://docs.cloud.google.com/apigee/docs/hybrid/v1.15/config-prop-ref#metrics-prometheus-resources-limits-cpu">metrics.prometheus.resources.limits.cpu</a></li> <li><a href="https://docs.cloud.google.com/apigee/docs/hybrid/v1.15/config-prop-ref#metrics-prometheus-resources-limits-memory">metrics.prometheus.resources.limits.memory</a></li> <li><a href="https://docs.cloud.google.com/apigee/docs/hybrid/v1.15/config-prop-ref#metrics-prometheus-resources-requests-cpu">metrics.prometheus.resources.requests.cpu</a></li> <li><a href="https://docs.cloud.google.com/apigee/docs/hybrid/v1.15/config-prop-ref#metrics-prometheus-resources-requests-memory">metrics.prometheus.resources.requests.memory</a></li> </ul> (Fixed in <a href="https://docs.cloud.google.com/apigee/docs/hybrid/release-notes#hybrid_v1141">v1.14.1</a>)</td>
</tr>
<tr>
<td><strong>368155212</strong></td>
<td><strong>Auto Cassandra secret rotation could fail when <a href="https://docs.cloud.google.com/apigee/docs/hybrid/v1.15/enhanced-proxy-limits">Enhanced per-environment proxy limits</a> are enabled.</strong> (Fixed in <a href="https://docs.cloud.google.com/apigee/docs/hybrid/release-notes#hybrid_v1142">v1.14.2</a>)</td>
</tr>
<tr>
<td><strong>367681534</strong></td>
<td><strong>Tagging <a href="http://gcr.io/apigee-release/hybrid/apigee-stackdriver-prometheus-sidecar:0.10.0"><code>apigee-stackdriver-prometheus-sidecar</code></a> to prevent removal from customer repos after 2 years due to infrequent updates.</strong> (Fixed in <a href="https://docs.cloud.google.com/apigee/docs/hybrid/release-notes#hybrid_1140-hotfix1">1.14.0-hotfix.1</a>)</td>
</tr>
</tbody>
</table>
<h3>Security</h3>
<p><strong>Fixed in this release</strong></p>
<table>
<thead>
<tr>
<th>Bug ID</th>
<th>Description</th>
</tr>
</thead>
<tbody>
<tr>
<td><strong>N/A</strong></td>
<td><strong>Security fixes for <code>apigee-asm-ingress</code>.</strong> <br/>This addresses the following vulnerability: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22871">CVE-2025-22871</a> </li></ul></td>
</tr>
<tr>
<td><strong>N/A</strong></td>
<td><strong>Security fixes for <code>apigee-asm-istiod</code>.</strong> <br/>This addresses the following vulnerability: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22871">CVE-2025-22871</a> </li></ul></td>
</tr>
<tr>
<td><strong>N/A</strong></td>
<td><strong>Security fixes for <code>apigee-connect-agent</code>.</strong> <br/>This addresses the following vulnerability: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22871">CVE-2025-22871</a> </li></ul></td>
</tr>
<tr>
<td><strong>N/A</strong></td>
<td><strong>Security fixes for <code>apigee-envoy</code>.</strong> <br/>This addresses the following vulnerabilities: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-4802">CVE-2025-4802</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-0395">CVE-2025-0395</a> </li></ul></td>
</tr>
<tr>
<td><strong>N/A</strong></td>
<td><strong>Security fixes for <code>apigee-fluent-bit</code>.</strong> <br/>This addresses the following vulnerability: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-4802">CVE-2025-4802</a> </li></ul></td>
</tr>
<tr>
<td><strong>N/A</strong></td>
<td><strong>Security fixes for <code>apigee-hybrid-cassandra</code>.</strong> <br/>This addresses the following vulnerabilities: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-23015">CVE-2025-23015</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22871">CVE-2025-22871</a> </li></ul></td>
</tr>
<tr>
<td><strong>N/A</strong></td>
<td><strong>Security fixes for <code>apigee-hybrid-cassandra-client</code>.</strong> <br/>This addresses the following vulnerability: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22871">CVE-2025-22871</a> </li></ul></td>
</tr>
<tr>
<td><strong>N/A</strong></td>
<td><strong>Security fixes for <code>apigee-kube-rbac-proxy</code>.</strong> <br/>This addresses the following vulnerability: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22871">CVE-2025-22871</a> </li></ul></td>
</tr>
<tr>
<td><strong>N/A</strong></td>
<td><strong>Security fixes for <code>apigee-mart-server</code>.</strong> <br/>This addresses the following vulnerability: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3715">CVE-2022-3715</a> </li></ul></td>
</tr>
<tr>
<td><strong>N/A</strong></td>
<td><strong>Security fixes for <code>apigee-operators</code>.</strong> <br/>This addresses the following vulnerability: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22871">CVE-2025-22871</a> </li></ul></td>
</tr>
<tr>
<td><strong>N/A</strong></td>
<td><strong>Security fixes for <code>apigee-prom-prometheus</code>.</strong> <br/>This addresses the following vulnerabilities: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22871">CVE-2025-22871</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22869">CVE-2025-22869</a> </li></ul></td>
</tr>
<tr>
<td><strong>N/A</strong></td>
<td><strong>Security fixes for <code>apigee-prometheus-adapter</code>.</strong> <br/>This addresses the following vulnerability: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22871">CVE-2025-22871</a> </li></ul></td>
</tr>
<tr>
<td><strong>N/A</strong></td>
<td><strong>Security fixes for <code>apigee-redis</code>.</strong> <br/>This addresses the following vulnerabilities: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22871">CVE-2025-22871</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2024-24791">CVE-2024-24791</a> </li></ul></td>
</tr>
<tr>
<td><strong>N/A</strong></td>
<td><strong>Security fixes for <code>apigee-runtime</code>.</strong> <br/>This addresses the following vulnerabilities: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-0725">CVE-2025-0725</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3715">CVE-2022-3715</a> </li></ul></td>
</tr>
<tr>
<td><strong>N/A</strong></td>
<td><strong>Security fixes for <code>apigee-stackdriver-logging-agent</code>.</strong> <br/>This addresses the following vulnerabilities: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-43857">CVE-2025-43857</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-32415">CVE-2025-32415</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-32414">CVE-2025-32414</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-27788">CVE-2025-27788</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-27113">CVE-2025-27113</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49761">CVE-2024-49761</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41946">CVE-2024-41946</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41123">CVE-2024-41123</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2024-25062">CVE-2024-25062</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-42915">CVE-2023-42915</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-33953">CVE-2023-33953</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-34169">CVE-2022-34169</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-32511">CVE-2022-32511</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-32207">CVE-2022-32207</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-29181">CVE-2022-29181</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-28739">CVE-2022-28739</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-27782">CVE-2022-27782</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-24839">CVE-2022-24839</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-24836">CVE-2022-24836</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-23308">CVE-2022-23308</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0759">CVE-2022-0759</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-41819">CVE-2021-41819</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-41817">CVE-2021-41817</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-4044">CVE-2021-4044</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3518">CVE-2021-3518</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3517">CVE-2021-3517</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-32740">CVE-2021-32740</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-32066">CVE-2021-32066</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-31799">CVE-2021-31799</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-30560">CVE-2021-30560</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-28966">CVE-2021-28966</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-28965">CVE-2021-28965</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-23214">CVE-2021-23214</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-22926">CVE-2021-22926</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-7595">CVE-2020-7595</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-25695">CVE-2020-25695</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-25694">CVE-2020-25694</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-25613">CVE-2020-25613</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-9193">CVE-2019-9193</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-3881">CVE-2019-3881</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-20388">CVE-2019-20388</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-10211">CVE-2019-10211</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-10210">CVE-2019-10210</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-10128">CVE-2019-10128</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-10127">CVE-2019-10127</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2018-25032">CVE-2018-25032</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2018-1115">CVE-2018-1115</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2018-10915">CVE-2018-10915</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2018-1058">CVE-2018-1058</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2018-1053">CVE-2018-1053</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2017-7546">CVE-2017-7546</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2017-7486">CVE-2017-7486</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2017-7484">CVE-2017-7484</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2017-17405">CVE-2017-17405</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2017-15098">CVE-2017-15098</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2017-14798">CVE-2017-14798</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2016-7954">CVE-2016-7954</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2016-7048">CVE-2016-7048</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2016-5424">CVE-2016-5424</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2016-5423">CVE-2016-5423</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2016-0766">CVE-2016-0766</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2015-3167">CVE-2015-3167</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2015-3166">CVE-2015-3166</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2015-0244">CVE-2015-0244</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2015-0243">CVE-2015-0243</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2015-0242">CVE-2015-0242</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2015-0241">CVE-2015-0241</a> </li></ul></td>
</tr>
<tr>
<td><strong>N/A</strong></td>
<td><strong>Security fixes for <code>apigee-synchronizer</code>.</strong> <br/>This addresses the following vulnerabilities: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-0725">CVE-2025-0725</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3715">CVE-2022-3715</a> </li></ul></td>
</tr>
<tr>
<td><strong>N/A</strong></td>
<td><strong>Security fixes for <code>apigee-watcher</code>.</strong> <br/>This addresses the following vulnerability: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22871">CVE-2025-22871</a> </li></ul></td>
</tr>
<tr>
<td><strong>N/A</strong></td>
<td><strong>Security fixes for <code>cert-manager-cainjector</code>.</strong> <br/>This addresses the following vulnerabilities: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-45287">CVE-2023-45287</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-45285">CVE-2023-45285</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-44487">CVE-2023-44487</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-39325">CVE-2023-39325</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-39323">CVE-2023-39323</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-29405">CVE-2023-29405</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-29404">CVE-2023-29404</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-29403">CVE-2023-29403</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-29402">CVE-2023-29402</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-29400">CVE-2023-29400</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-24540">CVE-2023-24540</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-24539">CVE-2023-24539</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-24538">CVE-2023-24538</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-24537">CVE-2023-24537</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-24536">CVE-2023-24536</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-24534">CVE-2023-24534</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-41725">CVE-2022-41725</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-41724">CVE-2022-41724</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-41723">CVE-2022-41723</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-41715">CVE-2022-41715</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-32189">CVE-2022-32189</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-30635">CVE-2022-30635</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-30633">CVE-2022-30633</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-30632">CVE-2022-30632</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-30631">CVE-2022-30631</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-30630">CVE-2022-30630</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-30580">CVE-2022-30580</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2880">CVE-2022-2880</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2879">CVE-2022-2879</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-28327">CVE-2022-28327</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-28131">CVE-2022-28131</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-27664">CVE-2022-27664</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-24921">CVE-2022-24921</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-24675">CVE-2022-24675</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-23806">CVE-2022-23806</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-23773">CVE-2022-23773</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-23772">CVE-2022-23772</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-44716">CVE-2021-44716</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-41772">CVE-2021-41772</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-41771">CVE-2021-41771</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-39293">CVE-2021-39293</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-38297">CVE-2021-38297</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-33198">CVE-2021-33198</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-33196">CVE-2021-33196</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-33195">CVE-2021-33195</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-33194">CVE-2021-33194</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-29923">CVE-2021-29923</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-27918">CVE-2021-27918</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-28367">CVE-2020-28367</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-28366">CVE-2020-28366</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-28362">CVE-2020-28362</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-16845">CVE-2020-16845</a> </li></ul></td>
</tr>
<tr>
<td><strong>N/A</strong></td>
<td><strong>Security fixes for <code>cert-manager-controller</code>.</strong> <br/>This addresses the following vulnerabilities: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-45287">CVE-2023-45287</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-45285">CVE-2023-45285</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-44487">CVE-2023-44487</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-39325">CVE-2023-39325</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-39323">CVE-2023-39323</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-29405">CVE-2023-29405</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-29404">CVE-2023-29404</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-29403">CVE-2023-29403</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-29402">CVE-2023-29402</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-29400">CVE-2023-29400</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-24540">CVE-2023-24540</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-24539">CVE-2023-24539</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-24538">CVE-2023-24538</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-24537">CVE-2023-24537</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-24536">CVE-2023-24536</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-24534">CVE-2023-24534</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-41725">CVE-2022-41725</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-41724">CVE-2022-41724</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-41723">CVE-2022-41723</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-41715">CVE-2022-41715</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-32189">CVE-2022-32189</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-30635">CVE-2022-30635</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-30633">CVE-2022-30633</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-30632">CVE-2022-30632</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-30631">CVE-2022-30631</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-30630">CVE-2022-30630</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-30580">CVE-2022-30580</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2880">CVE-2022-2880</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2879">CVE-2022-2879</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-28327">CVE-2022-28327</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-28131">CVE-2022-28131</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-27664">CVE-2022-27664</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-24921">CVE-2022-24921</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-24675">CVE-2022-24675</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-23806">CVE-2022-23806</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-23773">CVE-2022-23773</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-23772">CVE-2022-23772</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-44716">CVE-2021-44716</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-41772">CVE-2021-41772</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-41771">CVE-2021-41771</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-39293">CVE-2021-39293</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-38297">CVE-2021-38297</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-33198">CVE-2021-33198</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-33196">CVE-2021-33196</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-33195">CVE-2021-33195</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-33194">CVE-2021-33194</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-29923">CVE-2021-29923</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-27918">CVE-2021-27918</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-28367">CVE-2020-28367</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-28366">CVE-2020-28366</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-28362">CVE-2020-28362</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-16845">CVE-2020-16845</a> </li></ul></td>
</tr>
<tr>
<td><strong>N/A</strong></td>
<td><strong>Security fixes for <code>cert-manager-webhook</code>.</strong> <br/>This addresses the following vulnerabilities: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-45287">CVE-2023-45287</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-45285">CVE-2023-45285</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-44487">CVE-2023-44487</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-39325">CVE-2023-39325</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-39323">CVE-2023-39323</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-29405">CVE-2023-29405</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-29404">CVE-2023-29404</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-29403">CVE-2023-29403</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-29402">CVE-2023-29402</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-29400">CVE-2023-29400</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-24540">CVE-2023-24540</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-24539">CVE-2023-24539</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-24538">CVE-2023-24538</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-24537">CVE-2023-24537</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-24536">CVE-2023-24536</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-24534">CVE-2023-24534</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-41725">CVE-2022-41725</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-41724">CVE-2022-41724</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-41723">CVE-2022-41723</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-41715">CVE-2022-41715</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-32189">CVE-2022-32189</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-30635">CVE-2022-30635</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-30633">CVE-2022-30633</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-30632">CVE-2022-30632</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-30631">CVE-2022-30631</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-30630">CVE-2022-30630</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-30580">CVE-2022-30580</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2880">CVE-2022-2880</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2879">CVE-2022-2879</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-28327">CVE-2022-28327</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-28131">CVE-2022-28131</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-27664">CVE-2022-27664</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-24921">CVE-2022-24921</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-24675">CVE-2022-24675</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-23806">CVE-2022-23806</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-23773">CVE-2022-23773</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-23772">CVE-2022-23772</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-44716">CVE-2021-44716</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-41772">CVE-2021-41772</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-41771">CVE-2021-41771</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-39293">CVE-2021-39293</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-38297">CVE-2021-38297</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-33198">CVE-2021-33198</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-33196">CVE-2021-33196</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-33195">CVE-2021-33195</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-33194">CVE-2021-33194</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-29923">CVE-2021-29923</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-27918">CVE-2021-27918</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-28367">CVE-2020-28367</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-28366">CVE-2020-28366</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-28362">CVE-2020-28362</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-16845">CVE-2020-16845</a> </li></ul></td>
</tr>
<tr>
<td><strong>N/A</strong></td>
<td><strong>Security fixes for <code>vault</code>.</strong> <br/>This addresses the following vulnerability: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-0377">CVE-2025-0377</a> </li></ul></td>
</tr>
</tbody>
</table>
<h3>Security</h3>
<p><strong>Fixed since last minor release</strong></p>
<table>
<thead>
<tr>
<th>Bug ID</th>
<th>Description</th>
</tr>
</thead>
<tbody>
<tr>
<td><strong>391923260</strong></td>
<td><strong>Security fixes for <code>apigee-watcher</code>.</strong> (Fixed in <a href="https://docs.cloud.google.com/apigee/docs/hybrid/release-notes#hybrid_v1141">v1.14.1</a>)  <br/>This addresses the following vulnerabilities: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2024-24789">CVE-2024-24789</a></li> <li><a href="https://nvd.nist.gov/vuln/detail/CVE-2024-45337">CVE-2024-45337</a></li> <li><a href="https://nvd.nist.gov/vuln/detail/CVE-2024-45338">CVE-2024-45338</a></li> <li><a href="https://nvd.nist.gov/vuln/detail/CVE-2024-24790">CVE-2024-24790</a></li> <li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-23635">CVE-2022-23635</a></li> <li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-31045">CVE-2022-31045</a></li> <li><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-39156">CVE-2021-39156</a></li> <li><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-39155">CVE-2021-39155</a></li> <li><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-14993">CVE-2019-14993</a> </li></ul></td>
</tr>
<tr>
<td><strong>391923260</strong></td>
<td><strong>Security fixes for <code>apigee-udca</code>.</strong>  (Fixed in <a href="https://docs.cloud.google.com/apigee/docs/hybrid/release-notes#hybrid_v1142">v1.14.2</a>) <br/>This addresses the following vulnerabilities: <ul> <li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-27788">CVE-2025-27788</a></li> <li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22869">CVE-2025-22869</a></li> <li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22868">CVE-2025-22868</a></li> <li><a href="https://nvd.nist.gov/vuln/detail/CVE-2024-45337">CVE-2024-45337</a></li> <li><a href="https://nvd.nist.gov/vuln/detail/CVE-CVE-2024-34158">CVE-2024-34158</a></li> <li><a href="https://nvd.nist.gov/vuln/detail/CVE-CVE-2024-34156">CVE-2024-34156</a></li> <li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-6481">CVE-2023-6481</a></li> </ul></td>
</tr>
<tr>
<td><strong>385394193</strong>, <strong>383850393</strong>, <strong>383778273</strong></td>
<td><strong>Security fixes for <code>apigee-cassandra-backup-utility</code>, <code>apigee-cassandra-client</code>, and <code>apigee-hybrid-cassandra</code>.</strong> (Fixed in <a href="https://docs.cloud.google.com/apigee/docs/hybrid/release-notes#hybrid_v1141">v1.14.1</a>)  <br/>This addresses the following vulnerabilities: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2024-0727">CVE-2024-0727</a> </li> <li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-5678">CVE-2023-5678</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3715">CVE-2022-3715</a> </li></ul></td>
</tr>
<tr>
<td><strong>385394193</strong>, <strong>383850393</strong>, <strong>383778273</strong></td>
<td><strong>Security fixes for <code>apigee-cassandra-backup-utility</code>, <code>apigee-cassandra-client</code>, and <code>apigee-hybrid-cassandra</code>.</strong> (Fixed in <a href="https://docs.cloud.google.com/apigee/docs/hybrid/release-notes#hybrid_v1133">v1.13.3</a>)  <br/>This addresses the following vulnerabilities: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3715">CVE-2022-3715</a> </li> <li><a href="https://nvd.nist.gov/vuln/detail/CVE-2024-0727">CVE-2024-0727</a> </li> <li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-5678">CVE-2023-5678</a> </li></ul></td>
</tr>
<tr>
<td><strong>383113773, 382967738</strong></td>
<td><strong>Fixed a vulnerability in PythonScript policy.</strong> (Fixed in <a href="https://docs.cloud.google.com/apigee/docs/hybrid/release-notes#hybrid_v1141">v1.14.1</a>)</td>
</tr>
<tr>
<td><strong>365178914</strong></td>
<td><strong>Security fixes for <code>apigee-cassandra-backup-utility</code> and <code>apigee-hybrid-cassandra</code>.</strong> (Fixed in <a href="https://docs.cloud.google.com/apigee/docs/hybrid/release-notes#hybrid_v1141">v1.14.1</a>) <br/>This addresses the following vulnerability: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-37920">CVE-2023-37920</a> </li></ul></td>
</tr>
<tr>
<td><strong>N/A</strong></td>
<td><strong>Security fixes for <code>apigee-watcher</code>.</strong> (Fixed in <a href="https://docs.cloud.google.com/apigee/docs/hybrid/release-notes#hybrid_v1142">v1.14.2</a>)  <br/>This addresses the following vulnerabilities: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22869">CVE-2025-22869</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22868">CVE-2025-22868</a> </li></ul></td>
</tr>
<tr>
<td><strong>N/A</strong></td>
<td><strong>Security fixes for <code>apigee-udca</code>.</strong> (Fixed in <a href="https://docs.cloud.google.com/apigee/docs/hybrid/release-notes#hybrid_v1133">v1.13.3</a>)  <br/>This addresses the following vulnerability: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2024-24790">CVE-2024-24790</a> </li></ul></td>
</tr>
<tr>
<td><strong>N/A</strong></td>
<td><strong>Security fixes for <code>apigee-stackdriver-logging-agent</code>.</strong> (Fixed in <a href="https://docs.cloud.google.com/apigee/docs/hybrid/release-notes#hybrid_v1142">v1.14.2</a>)  <br/>This addresses the following vulnerabilities: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-24928">CVE-2025-24928</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-24855">CVE-2025-24855</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-0306">CVE-2025-0306</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56171">CVE-2024-56171</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2024-55549">CVE-2024-55549</a> </li></ul></td>
</tr>
<tr>
<td><strong>N/A</strong></td>
<td><strong>Security fixes for <code>apigee-redis</code>.</strong> (Fixed in <a href="https://docs.cloud.google.com/apigee/docs/hybrid/release-notes#hybrid_v1142">v1.14.2</a>)  <br/>This addresses the following vulnerabilities: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22869">CVE-2025-22869</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56171">CVE-2024-56171</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2024-24791">CVE-2024-24791</a> </li></ul></td>
</tr>
<tr>
<td><strong>N/A</strong></td>
<td><strong>Security fixes for <code>apigee-prometheus-adapter</code>.</strong> (Fixed in <a href="https://docs.cloud.google.com/apigee/docs/hybrid/release-notes#hybrid_v1142">v1.14.2</a>)  <br/>This addresses the following vulnerability: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22868">CVE-2025-22868</a> </li></ul></td>
</tr>
<tr>
<td><strong>N/A</strong></td>
<td><strong>Security fixes for <code>apigee-prometheus-adapter</code>.</strong> (Fixed in <a href="https://docs.cloud.google.com/apigee/docs/hybrid/release-notes#hybrid_v1141">v1.14.1</a>)  <br/>This addresses the following vulnerabilities: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2024-45338">CVE-2024-45338</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2024-45337">CVE-2024-45337</a> </li></ul></td>
</tr>
<tr>
<td><strong>N/A</strong></td>
<td><strong>Security fixes for <code>apigee-operators</code>.</strong> (Fixed in <a href="https://docs.cloud.google.com/apigee/docs/hybrid/release-notes#hybrid_v1142">v1.14.2</a>)  <br/>This addresses the following vulnerabilities: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22869">CVE-2025-22869</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22868">CVE-2025-22868</a> </li></ul></td>
</tr>
<tr>
<td><strong>N/A</strong></td>
<td><strong>Security fixes for <code>apigee-open-telemetry-collector</code>.</strong> (Fixed in <a href="https://docs.cloud.google.com/apigee/docs/hybrid/release-notes#hybrid_v1142">v1.14.2</a>)  <br/>This addresses the following vulnerabilities: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-29786">CVE-2025-29786</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22869">CVE-2025-22869</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22868">CVE-2025-22868</a> </li></ul></td>
</tr>
<tr>
<td><strong>N/A</strong></td>
<td><strong>Security fixes for <code>apigee-open-telemetry-collector</code>.</strong> (Fixed in <a href="https://docs.cloud.google.com/apigee/docs/hybrid/release-notes#hybrid_v1141">v1.14.1</a>)  <br/>This addresses the following vulnerability: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2024-45338">CVE-2024-45338</a> </li></ul></td>
</tr>
<tr>
<td><strong>N/A</strong></td>
<td><strong>Security fixes for <code>apigee-mint-task-scheduler</code>.</strong> (Fixed in <a href="https://docs.cloud.google.com/apigee/docs/hybrid/release-notes#hybrid_v1142">v1.14.2</a>)  <br/>This addresses the following vulnerability: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21587">CVE-2025-21587</a> </li></ul></td>
</tr>
<tr>
<td><strong>N/A</strong></td>
<td><strong>Security fixes for <code>apigee-mint-task-scheduler</code>.</strong> (Fixed in <a href="https://docs.cloud.google.com/apigee/docs/hybrid/release-notes#hybrid_v1141">v1.14.1</a>)  <br/>This addresses the following vulnerabilities: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-24970">CVE-2025-24970</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2024-47535">CVE-2024-47535</a> </li></ul></td>
</tr>
<tr>
<td><strong>N/A</strong></td>
<td><strong>Security fixes for <code>apigee-mint-task-scheduler</code>.</strong> (Fixed in <a href="https://docs.cloud.google.com/apigee/docs/hybrid/release-notes#hybrid_v1133">v1.13.3</a>)  <br/>This addresses the following vulnerability: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2024-47535">CVE-2024-47535</a> </li></ul></td>
</tr>
<tr>
<td><strong>N/A</strong></td>
<td><strong>Security fixes for <code>apigee-kube-rbac-proxy</code>.</strong> (Fixed in <a href="https://docs.cloud.google.com/apigee/docs/hybrid/release-notes#hybrid_v1133">v1.13.3</a>)  <br/>This addresses the following vulnerabilities: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2024-24790">CVE-2024-24790</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-9192">CVE-2019-9192</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-1010023">CVE-2019-1010023</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-1010022">CVE-2019-1010022</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2018-20796">CVE-2018-20796</a> </li></ul></td>
</tr>
<tr>
<td><strong>N/A</strong></td>
<td><strong>Security fixes for <code>apigee-hybrid-cassandra</code>.</strong> (Fixed in <a href="https://docs.cloud.google.com/apigee/docs/hybrid/release-notes#hybrid_v1142">v1.14.2</a>)  <br/>This addresses the following vulnerability: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-23015">CVE-2025-23015</a> </li></ul></td>
</tr>
<tr>
<td><strong>N/A</strong></td>
<td><strong>Security fixes for <code>apigee-hybrid-cassandra</code>.</strong> (Fixed in <a href="https://docs.cloud.google.com/apigee/docs/hybrid/release-notes#hybrid_v1141">v1.14.1</a>)  <br/>This addresses the following vulnerability: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-37920">CVE-2023-37920</a> </li></ul></td>
</tr>
<tr>
<td><strong>N/A</strong></td>
<td><strong>Security fixes for <code>apigee-hybrid-cassandra</code>.</strong> (Fixed in <a href="https://docs.cloud.google.com/apigee/docs/hybrid/release-notes#hybrid_v1133">v1.13.3</a>)  <br/>This addresses the following vulnerability: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2024-9287">CVE-2024-9287</a> </li></ul></td>
</tr>
<tr>
<td><strong>N/A</strong></td>
<td><strong>Security fixes for <code>apigee-hybrid-cassandra-client</code>.</strong> (Fixed in <a href="https://docs.cloud.google.com/apigee/docs/hybrid/release-notes#hybrid_v1142">v1.14.2</a>)  <br/>This addresses the following vulnerability: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22868">CVE-2025-22868</a> </li></ul></td>
</tr>
<tr>
<td><strong>N/A</strong></td>
<td><strong>Security fixes for <code>apigee-fluent-bit</code>.</strong> (Fixed in <a href="https://docs.cloud.google.com/apigee/docs/hybrid/release-notes#hybrid_v1142">v1.14.2</a>)  <br/>This addresses the following vulnerabilities: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-1094">CVE-2025-1094</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-0395">CVE-2025-0395</a> </li></ul></td>
</tr>
<tr>
<td><strong>N/A</strong></td>
<td><strong>Security fixes for <code>apigee-fluent-bit</code>.</strong> (Fixed in <a href="https://docs.cloud.google.com/apigee/docs/hybrid/release-notes#hybrid_v1133">v1.13.3</a>)  <br/>This addresses the following vulnerability: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2024-10979">CVE-2024-10979</a> </li></ul></td>
</tr>
<tr>
<td><strong>N/A</strong></td>
<td><strong>Security fixes for <code>apigee-asm-istiod</code>.</strong> (Fixed in <a href="https://docs.cloud.google.com/apigee/docs/hybrid/release-notes#hybrid_v1141">v1.14.1</a>)  <br/>This addresses the following vulnerability: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2024-45338">CVE-2024-45338</a> </li></ul></td>
</tr>
</tbody>
</table>
]]>
    </content>
  </entry>

  <entry>
    <title>May 29, 2025</title>
    <id>tag:google.com,2016:apigee-hybrid-release-notes#May_29_2025</id>
    <updated>2025-05-29T00:00:00-07:00</updated>
    <link rel="alternate" href="https://docs.cloud.google.com/apigee/docs/hybrid/release-notes#May_29_2025"/>
    <content type="html"><![CDATA[<strong class="release-note-product-version-title">v1.14.2</strong>
<h3>Announcement</h3>
<p>On May 29, 2025 we announced the shutdown schedule for the Apigee Classic UI.</p>
<h3>Deprecated</h3>
<p>The Apigee Classic UI will be shutdown as of August 29, 2025.</p>
<p>This is the final phase of moving Apigee to the Google Cloud console. Apigee in the Google Cloud console gives you the ability to manage all of your Apigee functionality in one place.</p>
<p>To prepare for the shutdown of the Apigee Classic UI, familiarize yourself with the new Apigee UI in Google Cloud console by reviewing <a href="https://docs.cloud.google.com/apigee/docs/api-platform/fundamentals/ui-overview">UI overview</a>.</p>
<p>See <a href="https://docs.cloud.google.com/apigee/docs/deprecations/apigee-classic-ui">Apigee Classic UI shutdown</a> for details on shutdown dates and exception request.</p>
]]>
    </content>
  </entry>

  <entry>
    <title>May 16, 2025</title>
    <id>tag:google.com,2016:apigee-hybrid-release-notes#May_16_2025</id>
    <updated>2025-05-16T00:00:00-07:00</updated>
    <link rel="alternate" href="https://docs.cloud.google.com/apigee/docs/hybrid/release-notes#May_16_2025"/>
    <content type="html"><![CDATA[<strong class="release-note-product-version-title">1.14.2-hotfix.1</strong>
<h3>Announcement</h3>
<h3 id="hybrid_1142-hotfix1">hybrid 1.14.2-hotfix.1</h3>
<p>On May 16, 2025 we released an updated version of the Apigee hybrid software, 1.14.2-hotfix.1.</p>
<aside class="special"><strong>Important:</strong><span> If your installation is already on Apigee hybrid v1.14.2, use the following procedure to apply this hotfix. If your installation is on 1.14.1 or older, follow the instructions in <a href="https://docs.cloud.google.com/apigee/docs/hybrid/v1.14/upgrade">Upgrading Apigee hybrid to version 1.14</a>.</span></aside>
<h4 id="apply_this_hotfix_with_the_following_steps">Apply this hotfix with the following steps:</h4>
<ol>
<li><p>Download the <code>apigee-org</code> and <code>apigee-env</code> charts with the <code>1.14.2-hotfix.1</code> version tag:</p>
<pre class="devsite-terminal">
export CHART_REPO=oci://us-docker.pkg.dev/apigee-release/apigee-hybrid-helm-charts
<code class="devsite-terminal">export CHART_VERSION=1.14.2-hotfix.1</code>
<code class="devsite-terminal">helm pull $CHART_REPO/apigee-env --version $CHART_VERSION --untar</code>
<code class="devsite-terminal">helm pull $CHART_REPO/apigee-org --version $CHART_VERSION --untar</code>
</pre></li>
<li><p><b>Optional</b>: Perform this step if you need to allow use of the <code>allOf</code> combinator along with setting <code>additionalProperties: true</code> in your OAS spec. See <a href="#393615439">fixed bug 393615439</a>.</p>
<p>Add the following stanza to your <code>overrides.yaml</code>:</p>
<pre class="prettyprint"><code>runtime:
  cwcAppend:
    conf_message-processor-communication_oas.disable.resolve.combinator: true
</code></pre></li>
<li><p>Install the hotfix release:</p>
<ol>
<li><p>Update the <code>apigee-env</code> chart with the <code>helm upgrade</code> command and your current overrides file for each environment in your Apigee org:</p>
<h4><b>Dry run:</b></h4>
<pre class="devsite-terminal">
helm upgrade <var>ENV_RELEASE_NAME</var> apigee-env/ \
--namespace <var>APIGEE_NAMESPACE</var> \
--set env=<var>ENV_NAME</var> \
--atomic \
-f <var>OVERRIDES_FILE</var> \
--dry-run=server
</pre>
<ul>
<li><var>ENV_RELEASE_NAME</var> is a name used to keep track of installation and upgrades of the <code>apigee-env chart</code>. This name must be unique from the other Helm release names in your installation. Usually this is the same as <var>ENV_NAME</var>. However, if your environment has the same name as your environment group, you must use different release names for the environment and environment group, for example <code>dev-env-release</code> and <code>dev-envgroup-release</code>. For more information on releases in Helm, see <a href="https://helm.sh/docs/intro/using_helm/#three-big-concepts">Three big concepts</a> in the Helm documentation.</li>
<li><var>APIGEE_NAMESPACE</var> is your installation's namespace. The default is <code>apigee</code>.</li>
<li><var>ENV_NAME</var> is the name of the environment you are upgrading.</li>
<li><var>OVERRIDES_FILE</var> is your edited overrides file.</li>
</ul>
<h4><b>Install the changes:</b></h4>
<pre class="devsite-terminal">helm upgrade <var>ENV_RELEASE_NAME</var> apigee-env/ \
--namespace <var>APIGEE_NAMESPACE</var> \
--set env=<var>ENV_NAME</var> \
--atomic \
-f <var>OVERRIDES_FILE</var></pre></li>
<li><p>Update the <code>apigee-org</code> chart:</p>
<h4><b>Dry run:</b></h4>
<pre class="devsite-terminal">helm upgrade <var>ORG_NAME</var> apigee-org/ \
--namespace <var>APIGEE_NAMESPACE</var> \
-f <var>OVERRIDES_FILE</var> \
--dry-run=server</pre>
<h4><b>Install the changes:</b></h4>
<pre class="devsite-terminal">helm upgrade <var>ORG_NAME</var> apigee-org/ \
--namespace <var>APIGEE_NAMESPACE</var> \
-f <var>OVERRIDES_FILE</var></pre></li>
</ol></li>
<li><p>Verify the installation:</p>
<p>Ensure runtime and udca pods are up and running by checking their state:</p>
<p><pre class="devsite-terminal">kubectl -n APIGEE_NAMESPACE get pods -l app=apigee-runtime</pre>
<pre class="devsite-terminal">kubectl -n APIGEE_NAMESPACE get pods -l app=apigee-udca</pre></p></li>
</ol>
<ul>
<li>For information on upgrading, see <a href="https://docs.cloud.google.com/apigee/docs/hybrid/v1.14/upgrade">Upgrading Apigee hybrid to version 1.14</a>.</li>
<li>For information on new installations, see <a href="https://docs.cloud.google.com/apigee/docs/hybrid/v1.14/big-picture">The big picture</a>.</li>
</ul>
<aside class="note"><strong>Note:</strong><span> This is a hotfix release: For critical security and other immediate fixes, Apigee provides specific container image tags that you must manually update in your existing deployments. The Helm chart binary usually remains unchanged for hotfixes. Hotfixes are temporary and their changes will be included in the next standard release. For information on container image support in Apigee hybrid releases, see <a href="https://docs.cloud.google.com/apigee/docs/release/apigee-release-process#apigee-hybrid-container-images">Apigee release process</a>.</span></aside>
<h3>Fixed</h3>
<table>
<thead>
<tr>
<th>Bug ID</th>
<th>Description</th>
</tr>
</thead>
<tbody>
<tr>
<td id="393615439"><b>393615439</b></td>
<td><b>OASValidation behavior for <code>allOf</code> with <code>additionalProperties: true</code>.</b>
<h4><b>Issue</b></h4>
<p>
          The OASValidation policy in Apigee Hybrid versions 1.12 and later may incorrectly reject requests when validating against an OpenAPI Specification (OAS) that uses combinator keywords (<code>allOf</code>, <code>oneOf</code>, <code>anyOf</code>) and allows additional properties (<code>additionalProperties: true</code>) within the combined schema. This occurs because the default behavior resolves combinators into an aggregated schema before validation, but an underlying issue in the parser library can cause the <code>additionalProperties</code> definition to be handled incorrectly during this resolution. This behavior differs from Apigee Edge and older Apigee Hybrid versions.
        </p>
<h4><b>Resolution</b></h4>
<p>
          A configuration flag has been introduced to control this behavior. By setting this flag, you can disable the pre-validation combinator resolution step, reverting to the behavior consistent with Apigee Edge and older Hybrid versions.
        </p>
<h4><b>Validation errors in Apigee hybrid</b></h4>
<p>
          If you encounter the validation errors described above, particularly for specs that worked correctly in Apigee Edge or Hybrid versions prior to 1.12, you can revert to the previous validation behavior by setting the following flag for the apigee-runtime container:
        </p>
<pre class="devsite-click-to-copy">conf_message-processor-communication_oas.disable.resolve.combinator = true</pre>
<aside class="note">
<b>Note:</b> Reverting to the older behavior (by setting the flag to true) reintroduces the older limitation: When using <code>allOf</code>, the <code>additionalProperties</code> keyword must be explicitly set to true if you intend to make the inheritance work correctly. The older behavior does not correctly handle schema validation with <code>allOf</code> when <code>additionalProperties</code> is set to false or is undefined. Customers migrating from Edge/OPDK or older hybrid versions should already be working around this limitation.
        </aside>
</td>
</tr>
</tbody>
</table>
<h3>Security</h3>
<table>
<thead>
<tr>
<th>Bug ID</th>
<th>Description</th>
</tr>
</thead>
<tbody>
<tr>
<td><strong>N/A</strong></td>
<td><strong>Incorporated an updated base image for <code>stackdriver-logging-agent</code>, improving the overall security of the service.</strong> <br/>This addresses the following vulnerabilities (among others and not limited to): <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-32221">CVE-2022-32221</a> </li> <li><a href="https://osv.dev/vulnerability/GHSA-jvgm-pfqv-887x">GHSA-jvgm-pfqv-887x</a> </li></ul></td>
</tr>
</tbody>
</table>
]]>
    </content>
  </entry>

  <entry>
    <title>May 02, 2025</title>
    <id>tag:google.com,2016:apigee-hybrid-release-notes#May_02_2025</id>
    <updated>2025-05-02T00:00:00-07:00</updated>
    <link rel="alternate" href="https://docs.cloud.google.com/apigee/docs/hybrid/release-notes#May_02_2025"/>
    <content type="html"><![CDATA[<strong class="release-note-product-version-title">v1.14.2</strong>
<h3>Announcement</h3>
<h3 id="hybrid_v1142">hybrid v1.14.2</h3>
<p>On May 2, 2025 we released an updated version of the Apigee hybrid software, 1.14.2.</p>
<ul>
<li>For information on upgrading, see <a href="https://docs.cloud.google.com/apigee/docs/hybrid/v1.14/upgrade">Upgrading Apigee hybrid to version 1.14</a>.</li>
<li>For information on new installations, see <a href="https://docs.cloud.google.com/apigee/docs/hybrid/v1.14/big-picture">The big picture</a>.</li>
</ul>
<aside class="note"><strong>Note:</strong><span> This is a patch release: The container images used in patch releases are integrated with the Apigee hybrid Helm charts. Upgrading to a patch via the Helm chart automatically updates the images. No manual image changes are typically needed. For information on container image support in Apigee hybrid releases, see <a href="https://docs.cloud.google.com/apigee/docs/release/apigee-release-process#apigee-hybrid-container-images">Apigee release process</a>.</span></aside>
<h3>Feature</h3>
<p><strong>Large message payload support in Apigee hybrid</strong></p>
<p>Apigee now supports message payloads up to 30MB. For information see:</p>
<ul>
<li><a href="https://docs.cloud.google.com/apigee/docs/api-platform/fundamentals/best-practices-api-proxy-design-and-development#size">Message payload size</a></li>
<li><a href="https://docs.cloud.google.com/apigee/docs/hybrid/v1.14/config-prop-ref#runtime-resources-limits-memory"><code>runtime.resources.limits.memory</code></a> in the Configuration property reference.</li>
<li><a href="https://docs.cloud.google.com/apigee/docs/hybrid/v1.14/config-prop-ref#runtime-resources-requests-memory"><code>runtime.resources.requests.memory</code></a> in the Configuration property reference.</li>
</ul>
<h3>Change</h3>
<p>Starting with v1.14.2, third-party container images will be labeled with a version tag that matches the Apigee hybrid image tag. This affects the image tags returned by the <a href="https://docs.cloud.google.com/apigee/docs/hybrid/v1.14/apigee-pull-push.html"><code>apigee-pull-push</code></a> command line tool. For more information, see:</p>
<ul>
<li><a href="https://docs.cloud.google.com/apigee/docs/hybrid/v1.14/container-images#supported-platforms">Use a private image repository with Apigee hybrid</a></li>
<li><a href="https://docs.cloud.google.com/apigee/docs/hybrid/v1.14/apigee-pull-push#list-the-images-in-your-repository"><code>apigee-pull-push</code></a></li>
<li><a href="https://docs.cloud.google.com/apigee/docs/hybrid/v1.14/config-prop-ref#hub"><code>hub</code></a></li>
</ul>
<aside class="note"><strong>Note:</strong><span> You can see the original component container image tags as a label with the <code>docker history</code> and <code>docker inspect</code> commands.</span></aside>
<h3>Fixed</h3>
<table>
<thead>
<tr>
<th>Bug ID</th>
<th>Description</th>
</tr>
</thead>
<tbody>
<tr>
<td><strong>412324617</strong></td>
<td><strong>Fixed issue where Runtime container could spin at 100% cpu limit.</strong></td>
</tr>
<tr>
<td><strong>401746333</strong></td>
<td><strong>Fixed a <code>java.lang.ClassCircularityError</code> that could occur in Java Callouts due to an issue with the class loading mechanism.</strong></td>
</tr>
<tr>
<td><strong>399447688</strong></td>
<td><strong>API proxy deployment could become stuck in <code>PROGRESSING</code> state.</strong></td>
</tr>
<tr>
<td><strong>397693324</strong></td>
<td><strong>ESS and non-ESS Multi-region Cassandra credential rotation could fail in every region except the first.</strong></td>
</tr>
<tr>
<td><strong>396571537</strong></td>
<td><strong>Rotating Cassandra credentials in Kubernetes secrets fixed for Multi-region deployments.</strong></td>
</tr>
<tr>
<td><strong>384937220</strong></td>
<td><strong>Fixed <code>ApigeeRoute</code> name collision on internal chaining gateway for Enhanced Proxy Limits.</strong></td>
</tr>
<tr>
<td><strong>368155212</strong></td>
<td><strong>Auto Cassandra secret rotation could fail when <a href="https://docs.cloud.google.com/apigee/docs/hybrid/v1.14/enhanced-proxy-limits">Enhanced per-environment proxy limits</a> are enabled.</strong></td>
</tr>
</tbody>
</table>
<h3>Security</h3>
<table>
<thead>
<tr>
<th>Bug ID</th>
<th>Description</th>
</tr>
</thead>
<tbody>
<tr>
<td><strong>391923260</strong></td>
<td><strong>Security fixes for <code>apigee-udca</code>.</strong> <br/>This addresses the following vulnerabilities: <ul> <li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-27788">CVE-2025-27788</a></li> <li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22869">CVE-2025-22869</a></li> <li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22868">CVE-2025-22868</a></li> <li><a href="https://nvd.nist.gov/vuln/detail/CVE-2024-45337">CVE-2024-45337</a></li> <li><a href="https://nvd.nist.gov/vuln/detail/CVE-2024-34158">CVE-2024-34158</a></li> <li><a href="https://nvd.nist.gov/vuln/detail/CVE-2024-34156">CVE-2024-34156</a></li> <li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-6481">CVE-2023-6481</a></li> </ul></td>
</tr>
<tr>
<td><strong>N/A</strong></td>
<td><strong>Security fixes for <code>apigee-fluent-bit</code>.</strong> <br/>This addresses the following vulnerabilities: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-1094">CVE-2025-1094</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-0395">CVE-2025-0395</a> </li></ul></td>
</tr>
<tr>
<td><strong>N/A</strong></td>
<td><strong>Security fixes for <code>apigee-hybrid-cassandra</code>.</strong> <br/>This addresses the following vulnerability: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-23015">CVE-2025-23015</a> </li></ul></td>
</tr>
<tr>
<td><strong>N/A</strong></td>
<td><strong>Security fixes for <code>apigee-hybrid-cassandra-client</code>.</strong> <br/>This addresses the following vulnerability: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22868">CVE-2025-22868</a> </li></ul></td>
</tr>
<tr>
<td><strong>N/A</strong></td>
<td><strong>Security fixes for <code>apigee-mint-task-scheduler</code>.</strong> <br/>This addresses the following vulnerability: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21587">CVE-2025-21587</a> </li></ul></td>
</tr>
<tr>
<td><strong>N/A</strong></td>
<td><strong>Security fixes for <code>apigee-open-telemetry-collector</code>.</strong> <br/>This addresses the following vulnerabilities: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-29786">CVE-2025-29786</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22869">CVE-2025-22869</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22868">CVE-2025-22868</a> </li></ul></td>
</tr>
<tr>
<td><strong>N/A</strong></td>
<td><strong>Security fixes for <code>apigee-operators</code>.</strong> <br/>This addresses the following vulnerabilities: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22869">CVE-2025-22869</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22868">CVE-2025-22868</a> </li></ul></td>
</tr>
<tr>
<td><strong>N/A</strong></td>
<td><strong>Security fixes for <code>apigee-prometheus-adapter</code>.</strong> <br/>This addresses the following vulnerability: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22868">CVE-2025-22868</a> </li></ul></td>
</tr>
<tr>
<td><strong>N/A</strong></td>
<td><strong>Security fixes for <code>apigee-redis</code>.</strong> <br/>This addresses the following vulnerabilities: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22869">CVE-2025-22869</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56171">CVE-2024-56171</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2024-24791">CVE-2024-24791</a> </li></ul></td>
</tr>
<tr>
<td><strong>N/A</strong></td>
<td><strong>Security fixes for <code>apigee-stackdriver-logging-agent</code>.</strong> <br/>This addresses the following vulnerabilities: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-24928">CVE-2025-24928</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-24855">CVE-2025-24855</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-0306">CVE-2025-0306</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56171">CVE-2024-56171</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2024-55549">CVE-2024-55549</a> </li></ul></td>
</tr>
<tr>
<td><strong>N/A</strong></td>
<td><strong>Security fixes for <code>apigee-watcher</code>.</strong> <br/>This addresses the following vulnerabilities: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22869">CVE-2025-22869</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22868">CVE-2025-22868</a> </li></ul></td>
</tr>
</tbody>
</table>
]]>
    </content>
  </entry>

  <entry>
    <title>April 14, 2025</title>
    <id>tag:google.com,2016:apigee-hybrid-release-notes#April_14_2025</id>
    <updated>2025-04-14T00:00:00-07:00</updated>
    <link rel="alternate" href="https://docs.cloud.google.com/apigee/docs/hybrid/release-notes#April_14_2025"/>
    <content type="html"><![CDATA[<strong class="release-note-product-version-title">v1.14.0</strong>
<h3>Announcement</h3>
<p>On April 14, 2025 we released an updated version of Apigee.</p>
<h3>Feature</h3>
<p><strong>Announcing data collectors data residency (DRZ) compliance for Apigee and Apigee hybrid.</strong></p>
<p>Data collectors can be used with data residency for Subscription and Pay-as-you-go organizations and hybrid versions 1.14.0 and later.</p>
<p>See <a href="https://docs.cloud.google.com/apigee/docs/api-platform/get-started/drz-concepts#data-residency-compatibility">Data residency compatibility</a> for information.</p>
<strong class="release-note-product-version-title">1.11.2-hotfix.3</strong>
<h3>Announcement</h3>
<h3 id="hybrid_1112-hotfix3">hybrid 1.11.2-hotfix.3</h3>
<p>On April 14, 2025 we released an updated version of the Apigee hybrid software, 1.11.2-hotfix.3.</p>
<h4 id="apply_this_hotfix_with_the_following_steps_2">Apply this hotfix with the following steps:</h4>
<ol>
<li><p>In your overrides file, update the <code>image.url</code> and <code>image.tag</code> properties of <code>ao</code> and <code>runtime</code>:</p>
<pre class="prettyprint"><code>runtime:
  image:
    url: "gcr.io/apigee-release/hybrid/apigee-runtime"
    tag: "1.11.2-hotfix.3"
</code></pre></li>
<li><p>Install the hotfix release:</p>
<ul>
<li><p>For Helm-managed releases, update the <code>apigee-env</code> chart with the <code>helm upgrade</code> command and your current overrides files:</p>
<p>For each environment in your Apigee org:</p>
<pre class="prettyprint"><code>helm upgrade ENV_RELEASE_NAME apigee-env/ \
  --namespace APIGEE_NAMESPACE \
  --set env=ENV_NAME \
  --atomic \
  -f OVERRIDES_FILE
</code></pre>
<ul>
<li><var>ENV_RELEASE_NAME</var> is a name used to keep track of installation and upgrades of the <code>apigee-env chart</code>. This name must be unique from the other Helm release names in your installation. Usually this is the same as <var>ENV_NAME</var>. However, if your environment has the same name as your environment group, you must use different release names for the environment and environment group, for example <code>dev-env-release</code> and <code>dev-envgroup-release</code>. For more information on releases in Helm, see <a href="https://helm.sh/docs/intro/using_helm/#three-big-concepts">Three big concepts</a> in the Helm documentation.</li>
<li><var>APIGEE_NAMESPACE</var> is your installation's namespace. The default is <code>apigee</code>.</li>
<li><var>ENV_NAME</var> is the name of the environment you are upgrading.</li>
<li><var>OVERRIDES_FILE</var> is your edited overrides file.</li>
</ul></li>
<li><p>For <code>apigeectl</code>-managed releases:</p>
<ol>
<li><p>Install the hotfix release with <code>apigeectl init</code> using your updated overrides file:</p>
<pre class="prettyprint"><code>${APIGEECTL_HOME}/apigeectl init -f OVERRIDES_FILE --dry-run=client
</code></pre>
<p>Followed by:</p>
<pre class="prettyprint"><code>${APIGEECTL_HOME}/apigeectl init -f OVERRIDES_FILE
</code></pre></li>
<li><p>Apply the hotfix release with <code>apigeectl apply</code>:</p>
<pre class="prettyprint"><code>${APIGEECTL_HOME}/apigeectl apply -f OVERRIDES_FILE --all-envs --dry-run=client
</code></pre>
<p>Followed by:</p>
<pre class="prettyprint"><code>${APIGEECTL_HOME}/apigeectl apply -f OVERRIDES_FILE --all-envs
</code></pre></li>
</ol></li>
</ul></li>
</ol>
<ul>
<li>For information on upgrading, see <a href="https://docs.cloud.google.com/apigee/docs/hybrid/v1.11/upgrade">Upgrading Apigee hybrid to version 1.11</a>.</li>
<li>For information on new installations, see <a href="https://docs.cloud.google.com/apigee/docs/hybrid/v1.11/big-picture">The big picture</a>.</li>
<li>For recommended actions after upgrading, see <a href="https://docs.cloud.google.com/apigee/docs/hybrid/v1.11/upgrade#recommended-actions-upgrade-1112h3">Validate policies after upgrade to 1.12-hotfix.3</a>.</li>
</ul>
<aside class="note"><strong>Note:</strong><span> This is a hotfix release: For critical security and other immediate fixes, Apigee provides specific container image tags that you must manually update in your existing deployments. The Helm chart binary usually remains unchanged for hotfixes. Hotfixes are temporary and their changes will be included in the next standard release. For information on container image support in Apigee hybrid releases, see the <a href="https://docs.cloud.google.com/apigee/docs/release/apigee-release-process#apigee-hybrid-container-images">Apigee release process</a>.</span></aside>
<h3>Security</h3>
<p><strong>Stricter class instantiation checks included in this release.</strong></p>
<p>JavaCallout policy now includes additional security during Java class instantiation. The enhanced security measure prevents the deployment of policies that directly or indirectly attempt actions that require permissions that are not allowed.</p>
<p>In most cases, existing policies will continue to function as expected without any issues. However, there is a possibility that policies relying on third-party libraries, or those with custom code that indirectly triggers operations requiring elevated permissions, could be affected.</p>
<p>To test your installation, follow the procedure in <a href="https://docs.cloud.google.com/apigee/docs/hybrid/v1.11/upgrade#recommended-actions-upgrade-1112h3">Validate policies after upgrade to 1.11.2-hotfix.3</a> to validate policy behavior.</p>
<table>
<thead>
<tr>
<th>Bug ID</th>
<th>Description</th>
</tr>
</thead>
<tbody>
<tr>
<td><strong>382967738</strong></td>
<td><strong>Fixed a vulnerability in PythonScript policy.</strong></td>
</tr>
</tbody>
</table>
]]>
    </content>
  </entry>

  <entry>
    <title>March 27, 2025</title>
    <id>tag:google.com,2016:apigee-hybrid-release-notes#March_27_2025</id>
    <updated>2025-03-27T00:00:00-07:00</updated>
    <link rel="alternate" href="https://docs.cloud.google.com/apigee/docs/hybrid/release-notes#March_27_2025"/>
    <content type="html"><![CDATA[<strong class="release-note-product-version-title">v1.14.0</strong>
<h3>Announcement</h3>
<p>On March 27, 2025, we released an updated version of Apigee.</p>
<h3>Feature</h3>
<p><strong>Availability of client IP resolution functionality with Apigee hybrid.</strong></p>
<p>Client IP resolution functonality is now available with Apigee hybrid versions 1.14.0 and later.</p>
<p>See <a href="https://docs.cloud.google.com/apigee/docs/api-platform/system-administration/client-ip-resolution">Client IP resolution</a> for information.</p>
]]>
    </content>
  </entry>

  <entry>
    <title>March 25, 2025</title>
    <id>tag:google.com,2016:apigee-hybrid-release-notes#March_25_2025</id>
    <updated>2025-03-25T00:00:00-07:00</updated>
    <link rel="alternate" href="https://docs.cloud.google.com/apigee/docs/hybrid/release-notes#March_25_2025"/>
    <content type="html"><![CDATA[<strong class="release-note-product-version-title">v1.14.0</strong>
<h3>Announcement</h3>
<p>On March 25, 2025 we released an updated version of Advanced API Security.</p>
<h3>Change</h3>
<p><strong>New Advanced API Security support when using data residency (DRZ) with Apigee hybrid</strong></p>
<p>Advanced API Security is now available for Apigee hybrid orgs using DRZ, for hybrid versions 1.14.0 and later. See <a href="https://docs.cloud.google.com/apigee/docs/hybrid/latest/using-data-residency-with-apigee-hybrid">Using data residency with Apigee hybrid</a>.</p>
<p>See <a href="https://docs.cloud.google.com/apigee/docs/api-platform/get-started/drz-concepts#data-residency-and-apigee-hybrid">Introduction to data residency</a> for information on DRZ and Advanced API Security support across organization types.</p>
]]>
    </content>
  </entry>

  <entry>
    <title>March 12, 2025</title>
    <id>tag:google.com,2016:apigee-hybrid-release-notes#March_12_2025</id>
    <updated>2025-03-12T00:00:00-07:00</updated>
    <link rel="alternate" href="https://docs.cloud.google.com/apigee/docs/hybrid/release-notes#March_12_2025"/>
    <content type="html"><![CDATA[<strong class="release-note-product-version-title">v1.13.3 & v1.12.4 & v1.14.1</strong>
<h3>Issue</h3>
<h3 id="v1133_v1141_v1124">v1.13.3 , v1.14.1, v1.12.4</h3>
<p><strong>The <a href="https://connect2id.com/products/nimbus-jose-jwt">Nimbus JOSE + JWT</a> library may cause a java.lang.ClassCircularityError when using a JavaCallout policy.</strong><p>For more information, see <a href="https://docs.cloud.google.com/apigee/docs/release/known-issues">Apigee known issues</a>.</p></p>
<aside class="note"><strong>Note:</strong><span> If you have a Apigee hybrid-enabled organization with a JavaCallout policy that uses the Nimbus JOSE + JWT library, <strong>do not upgrade to hybrid versions 1.12.4, 1.13.3,  or 1.14.1</strong>.</span></aside>
]]>
    </content>
  </entry>

  <entry>
    <title>March 01, 2025</title>
    <id>tag:google.com,2016:apigee-hybrid-release-notes#March_01_2025</id>
    <updated>2025-03-01T00:00:00-08:00</updated>
    <link rel="alternate" href="https://docs.cloud.google.com/apigee/docs/hybrid/release-notes#March_01_2025"/>
    <content type="html"><![CDATA[<strong class="release-note-product-version-title">v1.14.1</strong>
<h3>Fixed</h3>
<table>
<thead>
<tr>
<th>Bug ID</th>
<th>Description</th>
</tr>
</thead>
<tbody>
<tr>
<td><strong>396886110</strong></td>
<td><strong>Fixed a bug where the HPA max replicas could be lower than min.</strong></td>
</tr>
<tr>
<td><strong>392547038</strong></td>
<td><strong>Add Helm chart template checks for non-existent environments and virtualhosts.</strong></td>
</tr>
<tr>
<td><strong>391861216</strong></td>
<td><strong>Restore for Google Cloud Platform and HYBRID Cloud Providers no longer affects system keyspaces. This fixes <a href="https://docs.cloud.google.com/apigee/docs/release/known-issues#391861216">Known Issue 391861216</a>.</strong></td>
</tr>
<tr>
<td><strong>390019667</strong></td>
<td><strong>Fixed bug where the daemonsets had an invalid pod disruption budget which prevented downscaling.</strong></td>
</tr>
<tr>
<td><strong>383441226</strong></td>
<td><strong>Added the following <code>metrics</code> configuration properties:</strong> <ul><li><a href="https://docs.cloud.google.com/apigee/docs/hybrid/v1.14/config-prop-ref#metrics-adapter-resources-limits-cpu">metrics.adapter.resources.limits.cpu</a></li> <li><a href="https://docs.cloud.google.com/apigee/docs/hybrid/v1.14/config-prop-ref#metrics-adapter-resources-limits-memory">metrics.adapter.resources.limits.memory</a></li> <li><a href="https://docs.cloud.google.com/apigee/docs/hybrid/v1.14/config-prop-ref#metrics-adapter-resources-requests-cpu">metrics.adapter.resources.requests.cpu</a></li> <li><a href="https://docs.cloud.google.com/apigee/docs/hybrid/v1.14/config-prop-ref#metrics-adapter-resources-requests-memory">metrics.adapter.resources.requests.memory</a></li> <li><a href="https://docs.cloud.google.com/apigee/docs/hybrid/v1.14/config-prop-ref#metrics-prometheus-resources-limits-cpu">metrics.prometheus.resources.limits.cpu</a></li> <li><a href="https://docs.cloud.google.com/apigee/docs/hybrid/v1.14/config-prop-ref#metrics-prometheus-resources-limits-memory">metrics.prometheus.resources.limits.memory</a></li> <li><a href="https://docs.cloud.google.com/apigee/docs/hybrid/v1.14/config-prop-ref#metrics-prometheus-resources-requests-cpu">metrics.prometheus.resources.requests.cpu</a></li> <li><a href="https://docs.cloud.google.com/apigee/docs/hybrid/v1.14/config-prop-ref#metrics-prometheus-resources-requests-memory">metrics.prometheus.resources.requests.memory</a></li> </ul></td>
</tr>
<tr>
<td><strong>382565315</strong></td>
<td><strong>LogTimer usage in SecurityPolicy could cause a memory leak.</strong></td>
</tr>
</tbody>
</table>
<h3>Announcement</h3>
<p><strong>Manage process ID limits</strong></p>
<p>The procedure to manage the process ID limits in your clusters has been added to the documentation.</p>
<p>A Process ID limit is a Kubernetes resource constraint on nodes and pods to prevent excessive process creation, which can impact node stability. Setting process ID limits in Kubernetes can improve system stability, security, and resource management. This is also consistent with Kubernetes best practices. Apigee Hybrid supports the Kubernetes feature to set process ID limits.</p>
<p>See: <a href="https://docs.cloud.google.com/apigee/docs/hybrid/v1.14/manage-process-id-limit">Manage process ID limits</a>.</p>
<h3>Announcement</h3>
<h3 id="hybrid_v1141">hybrid v1.14.1</h3>
<p>On March 1, 2025 we released an updated version of the Apigee hybrid software, 1.14.1.</p>
<p>This release enhances the security posture within the <a href="https://docs.cloud.google.com/apigee/docs/api-platform/reference/policies/java-callout-policy">JavaCallout</a> and <a href="https://docs.cloud.google.com/apigee/docs/api-platform/reference/policies/python-script-policy">PythonScript</a> policies. This release does not include any new features or general bug fixes.</p>
<ul>
<li>For information on upgrading, see <a href="https://docs.cloud.google.com/apigee/docs/hybrid/v1.14/upgrade">Upgrading Apigee hybrid to version 1.14</a>.</li>
<li>For information on new installations, see <a href="https://docs.cloud.google.com/apigee/docs/hybrid/v1.14/big-picture">The big picture</a>.</li>
<li>For recommended actions after upgrading, see <a href="https://docs.cloud.google.com/apigee/docs/hybrid/v1.14/upgrade#recommended-actions-upgrade-1141">Validate policies after upgrade to 1.14.1</a>.</li>
</ul>
<h3>Security</h3>
<p><strong>Stricter class instantiation checks included in this release.</strong></p>
<p>JavaCallout policy now includes additional security during Java class instantiation. The enhanced security measure prevents the deployment of policies that directly or indirectly attempt actions that require permissions that are not allowed.</p>
<p>In most cases, existing policies will continue to function as expected without any issues. However, there is a possibility that policies relying on third-party libraries, or those with custom code that indirectly triggers operations requiring elevated permissions, could be affected.</p>
<p>To test your installation, follow the procedure in <a href="https://docs.cloud.google.com/apigee/docs/hybrid/v1.14/upgrade#recommended-actions-upgrade-1141">Validate policies after upgrade to 1.14.1</a> to validate policy behavior.</p>
<table>
<thead>
<tr>
<th>Bug ID</th>
<th>Description</th>
</tr>
</thead>
<tbody>
<tr>
<td><strong>385394193</strong>, <strong>383850393</strong>, <strong>383778273</strong></td>
<td><strong>Security fixes for <code>apigee-cassandra-backup-utility</code>, <code>apigee-cassandra-client</code>, and <code>apigee-hybrid-cassandra</code>.</strong> <br/>This addresses the following vulnerabilities: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2024-0727">CVE-2024-0727</a> </li> <li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-5678">CVE-2023-5678</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3715">CVE-2022-3715</a> </li></ul></td>
</tr>
<tr>
<td><strong>383113773, 382967738</strong></td>
<td><strong>Fixed a vulnerability in PythonScript policy.</strong></td>
</tr>
<tr>
<td><strong>365178914</strong></td>
<td><strong>Security fixes for <code>apigee-cassandra-backup-utility</code> and <code>apigee-hybrid-cassandra</code>.</strong> <br/>This addresses the following vulnerability: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-37920">CVE-2023-37920</a> </li></ul></td>
</tr>
<tr>
<td><strong>N/A</strong></td>
<td><strong>Security fixes for <code>apigee-asm-istiod</code>.</strong> <br/>This addresses the following vulnerability: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2024-45338">CVE-2024-45338</a> </li></ul></td>
</tr>
<tr>
<td><strong>N/A</strong></td>
<td><strong>Security fixes for <code>apigee-hybrid-cassandra</code>.</strong> <br/>This addresses the following vulnerability: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-37920">CVE-2023-37920</a> </li></ul></td>
</tr>
<tr>
<td><strong>N/A</strong></td>
<td><strong>Security fixes for <code>apigee-mint-task-scheduler</code>.</strong> <br/>This addresses the following vulnerabilities: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-24970">CVE-2025-24970</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2024-47535">CVE-2024-47535</a> </li></ul></td>
</tr>
<tr>
<td><strong>N/A</strong></td>
<td><strong>Security fixes for <code>apigee-open-telemetry-collector</code>.</strong> <br/>This addresses the following vulnerability: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2024-45338">CVE-2024-45338</a> </li></ul></td>
</tr>
<tr>
<td><strong>392174215</strong></td>
<td><strong>Security fixes for <code>apigee-operator</code>.</strong> <br/>This addresses the following vulnerabilities: <ul> <li><a href="https://nvd.nist.gov/vuln/detail/CVE-2024-45337">CVE-2024-45337</a></li> <li><a href="https://nvd.nist.gov/vuln/detail/CVE-2024-45338">CVE-2024-45338</a></li></ul></td>
</tr>
<tr>
<td><strong>N/A</strong></td>
<td><strong>Security fixes for <code>apigee-prometheus-adapter</code>.</strong> <br/>This addresses the following vulnerabilities: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2024-45338">CVE-2024-45338</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2024-45337">CVE-2024-45337</a> </li></ul></td>
</tr>
<tr>
<td><strong>391786033</strong></td>
<td><strong>Security fixes for <code>apigee-watcher</code>.</strong> <br/>This addresses the following vulnerability: <ul> <li><a href="https://nvd.nist.gov/vuln/detail/CVE-2024-45338">CVE-2024-45338</a></li></ul></td>
</tr>
<tr>
<td><strong>388271708</strong></td>
<td><strong>Security fix for Apigee infrastructure</strong> <p>This addresses the following vulnerability:<ul><li>CVE-2025-13426<p>Fixed an issue with the JavaCallout policy that could result in remote code execution.</p></li></ul></p></td>
</tr>
</tbody>
</table>
<strong class="release-note-product-version-title">v1.13.3</strong>
<h3>Security</h3>
<p><strong>Stricter class instantiation checks included in this release.</strong></p>
<p>JavaCallout policy now includes additional security during Java class instantiation. The enhanced security measure prevents the deployment of policies that directly or indirectly attempt actions that require permissions that are not allowed.</p>
<p>In most cases, existing policies will continue to function as expected without any issues. However, there is a possibility that policies relying on third-party libraries, or those with custom code that indirectly triggers operations requiring elevated permissions, could be affected.</p>
<p>To test your installation, follow the procedure in <a href="https://docs.cloud.google.com/apigee/docs/hybrid/v1.13/upgrade#recommended-actions-upgrade-1133">Validate policies after upgrade to 1.13.3</a> to validate policy behavior.</p>
<table>
<thead>
<tr>
<th>Bug ID</th>
<th>Description</th>
</tr>
</thead>
<tbody>
<tr>
<td>Bug ID</td>
<td>Description</td>
</tr>
<tr>
<td><strong>385394193</strong>, <strong>383850393</strong>, <strong>383778273</strong></td>
<td><strong>Security fixes for <code>apigee-cassandra-backup-utility</code>, <code>apigee-cassandra-client</code>, and <code>apigee-hybrid-cassandra</code>.</strong> <br/>This addresses the following vulnerabilities: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2024-0727">CVE-2024-0727</a> </li> <li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-5678">CVE-2023-5678</a> </li> <li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3715">CVE-2022-3715</a> </li> </ul></td>
</tr>
<tr>
<td><strong>382967738</strong></td>
<td><strong>Fixed a vulnerability in PythonScript policy.</strong></td>
</tr>
<tr>
<td><strong>N/A</strong></td>
<td><strong>Security fixes for <code>apigee-envoy</code>.</strong> <br/>This addresses the following vulnerability: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-1010024">CVE-2019-1010024</a> </li></ul></td>
</tr>
<tr>
<td><strong>N/A</strong></td>
<td><strong>Security fixes for <code>apigee-fluent-bit</code>.</strong> <br/>This addresses the following vulnerability: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2024-10979">CVE-2024-10979</a> </li></ul></td>
</tr>
<tr>
<td><strong>N/A</strong></td>
<td><strong>Security fixes for <code>apigee-mint-task-scheduler</code>.</strong> <br/>This addresses the following vulnerabilities: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-24970">CVE-2025-24970</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2024-47535">CVE-2024-47535</a> </li></ul></td>
</tr>
<tr>
<td><strong>N/A</strong></td>
<td><strong>Security fixes for <code>apigee-open-telemetry-collector</code>.</strong> <br/>This addresses the following vulnerability: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2024-45338">CVE-2024-45338</a> </li></ul></td>
</tr>
<tr>
<td><strong>392174215</strong></td>
<td><strong>Security fixes for <code>apigee-operator</code>.</strong> <br/>This addresses the following vulnerabilities: <ul> <li><a href="https://nvd.nist.gov/vuln/detail/CVE-2024-45337">CVE-2024-45337</a></li> <li><a href="https://nvd.nist.gov/vuln/detail/CVE-2024-45338">CVE-2024-45338</a></li></ul></td>
</tr>
<tr>
<td><strong>N/A</strong></td>
<td><strong>Security fixes for <code>apigee-redis</code>.</strong> <br/>This addresses the following vulnerabilities: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-24834">CVE-2022-24834</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-24735">CVE-2022-24735</a> </li></ul></td>
</tr>
<tr>
<td><strong>391786033</strong></td>
<td><strong>Security fixes for <code>apigee-watcher</code>.</strong> <br/>This addresses the following vulnerability: <ul> <li><a href="https://nvd.nist.gov/vuln/detail/CVE-2024-45338">CVE-2024-45338</a></li></ul></td>
</tr>
<tr>
<td><strong>N/A</strong></td>
<td><strong>Security fixes for <code>livenessprobe</code>.</strong> <br/>This addresses the following vulnerability: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-45288">CVE-2023-45288</a> </li></ul></td>
</tr>
<tr>
<td><strong>388271708</strong></td>
<td><strong>Security fix for Apigee infrastructure</strong> <p>This addresses the following vulnerability:<ul><li>CVE-2025-13426<p>Fixed an issue with the JavaCallout policy that could result in remote code execution.</p></li></ul></p></td>
</tr>
</tbody>
</table>
<h3>Announcement</h3>
<h3 id="hybrid_v1133">hybrid v1.13.3</h3>
<p>On March 1, 2025 we released an updated version of the Apigee hybrid software, 1.13.3.</p>
<p>This release enhances the security posture within the <a href="https://docs.cloud.google.com/apigee/docs/api-platform/reference/policies/java-callout-policy">JavaCallout</a> and <a href="https://docs.cloud.google.com/apigee/docs/api-platform/reference/policies/python-script-policy">PythonScript</a> policies. This release does not include any new features or general bug fixes.</p>
<ul>
<li>For information on upgrading, see <a href="https://docs.cloud.google.com/apigee/docs/hybrid/v1.13/upgrade">Upgrading Apigee hybrid to version 1.13</a>.</li>
<li>For information on new installations, see <a href="https://docs.cloud.google.com/apigee/docs/hybrid/v1.13/big-picture">The big picture</a>.</li>
<li>For recommended actions after upgrading, see <a href="https://docs.cloud.google.com/apigee/docs/hybrid/v1.13/upgrade#recommended-actions-upgrade-1133">Validate policies after upgrade to 1.13.3</a>.</li>
</ul>
<h3>Announcement</h3>
<p><strong>Manage process ID limits</strong></p>
<p>The procedure to manage the process ID limits in your clusters has been added to the documentation.</p>
<p>A Process ID limit is a Kubernetes resource constraint on nodes and pods to prevent excessive process creation, which can impact node stability. Setting process ID limits in Kubernetes can improve system stability, security, and resource management. This is also consistent with Kubernetes best practices. Apigee Hybrid supports the Kubernetes feature to set process ID limits.</p>
<p>See: <a href="https://docs.cloud.google.com/apigee/docs/hybrid/v1.13/manage-process-id-limit">Manage process ID limits</a>.</p>
<h3>Fixed</h3>
<table>
<thead>
<tr>
<th>Bug ID</th>
<th>Description</th>
</tr>
</thead>
<tbody>
<tr>
<td><strong>396886110</strong></td>
<td><strong>Fixed a bug where the HPA max replicas could be lower than min.</strong></td>
</tr>
<tr>
<td><strong>391861216</strong></td>
<td><strong>Restore for Google Cloud Platform and HYBRID Cloud Providers no longer affects system keyspaces. This fixes <a href="https://docs.cloud.google.com/apigee/docs/release/known-issues#391861216">Known Issue 391861216</a>.</strong></td>
</tr>
<tr>
<td><strong>390258745</strong>, <strong>388608440</strong></td>
<td><strong>Any left over Cassandra snapshots are automatically removed. This fixes <a href="https://docs.cloud.google.com/apigee/docs/release/known-issues#388608440">known issue 388608440</a>.</strong></td>
</tr>
<tr>
<td><strong>390019667</strong></td>
<td><strong>Fixed bug where the daemonsets had an invalid pod disruption budget which prevented downscaling.</strong></td>
</tr>
<tr>
<td><strong>383441226</strong></td>
<td><strong>Added the following <code>metrics</code> configuration properties:</strong> <ul><li><a href="https://docs.cloud.google.com/apigee/docs/hybrid/v1.13/config-prop-ref#metrics-adapter-resources-limits-cpu">metrics.adapter.resources.limits.cpu</a></li> <li><a href="https://docs.cloud.google.com/apigee/docs/hybrid/v1.13/config-prop-ref#metrics-adapter-resources-limits-memory">metrics.adapter.resources.limits.memory</a></li> <li><a href="https://docs.cloud.google.com/apigee/docs/hybrid/v1.13/config-prop-ref#metrics-adapter-resources-requests-cpu">metrics.adapter.resources.requests.cpu</a></li> <li><a href="https://docs.cloud.google.com/apigee/docs/hybrid/v1.13/config-prop-ref#metrics-adapter-resources-requests-memory">metrics.adapter.resources.requests.memory</a></li> <li><a href="https://docs.cloud.google.com/apigee/docs/hybrid/v1.13/config-prop-ref#metrics-prometheus-resources-limits-cpu">metrics.prometheus.resources.limits.cpu</a></li> <li><a href="https://docs.cloud.google.com/apigee/docs/hybrid/v1.13/config-prop-ref#metrics-prometheus-resources-limits-memory">metrics.prometheus.resources.limits.memory</a></li> <li><a href="https://docs.cloud.google.com/apigee/docs/hybrid/v1.13/config-prop-ref#metrics-prometheus-resources-requests-cpu">metrics.prometheus.resources.requests.cpu</a></li> <li><a href="https://docs.cloud.google.com/apigee/docs/hybrid/v1.13/config-prop-ref#metrics-prometheus-resources-requests-memory">metrics.prometheus.resources.requests.memory</a></li> </ul></td>
</tr>
<tr>
<td><strong>382565315</strong></td>
<td><strong>LogTimer usage in SecurityPolicy could cause a memory leak.</strong></td>
</tr>
</tbody>
</table>
<strong class="release-note-product-version-title">v1.12.4</strong>
<h3>Announcement</h3>
<h3 id="hybrid_v1124">hybrid v1.12.4</h3>
<p>On March 1, 2025 we released an updated version of the Apigee hybrid software, 1.12.4.</p>
<p>This release enhances the security posture within the <a href="https://docs.cloud.google.com/apigee/docs/api-platform/reference/policies/java-callout-policy">JavaCallout</a> and <a href="https://docs.cloud.google.com/apigee/docs/api-platform/reference/policies/python-script-policy">PythonScript</a> policies. This release does not include any new features or general bug fixes.</p>
<ul>
<li>For information on upgrading, see <a href="https://docs.cloud.google.com/apigee/docs/hybrid/v1.12/upgrade">Upgrading Apigee hybrid to version 1.12</a>.</li>
<li>For information on new installations, see <a href="https://docs.cloud.google.com/apigee/docs/hybrid/v1.12/big-picture">The big picture</a>.</li>
<li>For recommended actions after upgrading, see <a href="https://docs.cloud.google.com/apigee/docs/hybrid/v1.12/upgrade#recommended-actions-upgrade-1124">Validate policies after upgrade to 1.12.4</a>.</li>
</ul>
<h3>Security</h3>
<p><strong>Stricter class instantiation checks included in this release.</strong></p>
<p>JavaCallout policy now includes additional security during Java class instantiation. The enhanced security measure prevents the deployment of policies that directly or indirectly attempt actions that require permissions that are not allowed.</p>
<p>In most cases, existing policies will continue to function as expected without any issues. However, there is a possibility that policies relying on third-party libraries, or those with custom code that indirectly triggers operations requiring elevated permissions, could be affected.</p>
<p>To test your installation, follow the procedure in <a href="https://docs.cloud.google.com/apigee/docs/hybrid/v1.12/upgrade#recommended-actions-upgrade-1124">Validate policies after upgrade to 1.12.4</a> to validate policy behavior.</p>
<table>
<thead>
<tr>
<th>Bug ID</th>
<th>Description</th>
</tr>
</thead>
<tbody>
<tr>
<td><strong>391923260</strong></td>
<td><strong>Security fixes for <code>apigee-watcher</code>.</strong> <br/>This addresses the following vulnerabilities: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2024-24789">CVE-2024-24789</a></li> <li><a href="https://nvd.nist.gov/vuln/detail/CVE-2024-45337">CVE-2024-45337</a></li> <li><a href="https://nvd.nist.gov/vuln/detail/CVE-2024-45338">CVE-2024-45338</a></li> <li><a href="https://nvd.nist.gov/vuln/detail/CVE-2024-24790">CVE-2024-24790</a></li> <li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-23635">CVE-2022-23635</a></li> <li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-31045">CVE-2022-31045</a></li> <li><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-39156">CVE-2021-39156</a></li> <li><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-39155">CVE-2021-39155</a></li> <li><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-14993">CVE-2019-14993</a> </li></ul></td>
</tr>
<tr>
<td><strong>385394193</strong>, <strong>383850393</strong>, <strong>383778273</strong></td>
<td><strong>Security fixes for <code>apigee-cassandra-backup-utility</code>, <code>apigee-cassandra-client</code>, and <code>apigee-hybrid-cassandra</code>.</strong> <br/>This addresses the following vulnerabilities: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2024-0727">CVE-2024-0727</a> </li> <li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-5678">CVE-2023-5678</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3715">CVE-2022-3715</a> </li> </ul></td>
</tr>
<tr>
<td><strong>382967738</strong></td>
<td><strong>Fixed a vulnerability in PythonScript policy.</strong></td>
</tr>
<tr>
<td><strong>365178914</strong></td>
<td><strong>Security fixes for <code>apigee-cassandra-backup-utility</code> and <code>apigee-hybrid-cassandra</code>.</strong> <br/>This addresses the following vulnerability: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-37920">CVE-2023-37920</a> </li></ul></td>
</tr>
<tr>
<td><strong>N/A</strong></td>
<td><strong>Security fixes for <code>apigee-fluent-bit</code>.</strong> <br/>This addresses the following vulnerability: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2024-10979">CVE-2024-10979</a> </li></ul></td>
</tr>
<tr>
<td><strong>N/A</strong></td>
<td><strong>Security fixes for <code>apigee-kube-rbac-proxy</code>.</strong> <br/>This addresses the following vulnerabilities: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2024-24790">CVE-2024-24790</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-9192">CVE-2019-9192</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-1010023">CVE-2019-1010023</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-1010022">CVE-2019-1010022</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2018-20796">CVE-2018-20796</a> </li></ul></td>
</tr>
<tr>
<td><strong>N/A</strong></td>
<td><strong>Security fixes for <code>apigee-fluent-bit</code>.</strong> <br/>This addresses the following vulnerability: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2024-10979">CVE-2024-10979</a> </li></ul></td>
</tr>
<tr>
<td><strong>N/A</strong></td>
<td><strong>Security fixes for <code>apigee-kube-rbac-proxy</code>.</strong> <br/>This addresses the following vulnerabilities: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2024-24790">CVE-2024-24790</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-9192">CVE-2019-9192</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-1010023">CVE-2019-1010023</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-1010022">CVE-2019-1010022</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2018-20796">CVE-2018-20796</a> </li></ul></td>
</tr>
<tr>
<td><strong>N/A</strong></td>
<td><strong>Security fixes for <code>apigee-mint-task-scheduler</code>.</strong> <br/>This addresses the following vulnerability: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2024-47535">CVE-2024-47535</a> </li></ul></td>
</tr>
<tr>
<td><strong>N/A</strong></td>
<td><strong>Security fixes for <code>apigee-open-telemetry-collector</code>.</strong> <br/>This addresses the following vulnerability: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2024-36129">CVE-2024-36129</a> </li></ul></td>
</tr>
<tr>
<td><strong>N/A</strong></td>
<td><strong>Security fixes for <code>apigee-udca</code>.</strong> <br/>This addresses the following vulnerability: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2024-24790">CVE-2024-24790</a> </li></ul></td>
</tr>
<tr>
<td><strong>388271708</strong></td>
<td><strong>Security fix for Apigee infrastructure</strong> <p>This addresses the following vulnerability:<ul><li>CVE-2025-13426<p>Fixed an issue with the JavaCallout policy that could result in remote code execution.</p></li></ul></p></td>
</tr>
</tbody>
</table>
<h3>Fixed</h3>
<table>
<thead>
<tr>
<th>Bug ID</th>
<th>Description</th>
</tr>
</thead>
<tbody>
<tr>
<td><strong>390258745</strong>, <strong>388608440</strong></td>
<td><strong>Any left over Cassandra snapshots are automatically removed. This fixes <a href="https://docs.cloud.google.com/apigee/docs/release/known-issues#388608440">known issue 388608440</a>.</strong></td>
</tr>
</tbody>
</table>
]]>
    </content>
  </entry>

  <entry>
    <title>January 09, 2025</title>
    <id>tag:google.com,2016:apigee-hybrid-release-notes#January_09_2025</id>
    <updated>2025-01-09T00:00:00-08:00</updated>
    <link rel="alternate" href="https://docs.cloud.google.com/apigee/docs/hybrid/release-notes#January_09_2025"/>
    <content type="html"><![CDATA[<strong class="release-note-product-version-title">1.14.0-hotfix.1</strong>
<h3>Announcement</h3>
<h3 id="hybrid_1140-hotfix1">hybrid 1.14.0-hotfix.1</h3>
<p>On January 9, 2025 we released an updated version of the Apigee hybrid software, 1.14.0-hotfix.1.</p>
<ul>
<li>For information on upgrading, see <a href="https://docs.cloud.google.com/apigee/docs/hybrid/v1.14/upgrade">Upgrading Apigee hybrid to version v1.14</a>.</li>
<li>For information on new installations, see <a href="https://docs.cloud.google.com/apigee/docs/hybrid/v1.14/big-picture">The big picture</a>.</li>
</ul>
<aside class="note"><strong>Note:</strong><span> This release only affects the <code>apigee-telemetry</code> chart.</span></aside>
<h4 id="instructions"><strong>Instructions</strong>:</h4>
<p>To install 1.14.0-hotfix.1:</p>
<ol>
<li><p>In your <code>overrides.yaml</code> file update the value of <code>metrics.sdSidecar.image.tag</code> to <code>0.10.0</code>. Add the following stanza:</p>
<pre class="prettyprint"><code>metrics:
  sdSidecar:
    image:
      url: "gcr.io/apigee-release/hybrid/apigee-stackdriver-prometheus-sidecar"
      tag: "0.10.0"
</code></pre></li>
<li><p>Apply the changes to the <code>apigee-telemetry</code> chart:</p>
<ol>
<li><p>Dry run:</p>
<pre class="prettyprint"><code>helm upgrade telemetry apigee-telemetry/ \
  --install \
  --namespace APIGEE_NAMESPACE \
  --atomic \
  -f overrides.yaml \
  --dry-run=server
</code></pre></li>
<li><p>Install the chart:</p>
<pre class="prettyprint"><code>helm upgrade telemetry apigee-telemetry/ \
  --install \
  --namespace APIGEE_NAMESPACE \
  --atomic \
  -f overrides.yaml
</code></pre></li>
<li><p>Verify the change by checking its state:</p>
<pre class="prettyprint"><code>kubectl -n APIGEE_NAMESPACE get apigeetelemetry apigee-telemetry
</code></pre></li>
</ol></li>
</ol>
<h3>Fixed</h3>
<table>
<thead>
<tr>
<th>Bug ID</th>
<th>Description</th>
</tr>
</thead>
<tbody>
<tr>
<td><strong>367681534</strong></td>
<td><strong>Tagging <a href="http://gcr.io/apigee-release/hybrid/apigee-stackdriver-prometheus-sidecar:0.10.0"><code>apigee-stackdriver-prometheus-sidecar</code></a> to prevent removal from customer repos after 2 years due to infrequent updates.</strong></td>
</tr>
</tbody>
</table>
]]>
    </content>
  </entry>

  <entry>
    <title>December 16, 2024</title>
    <id>tag:google.com,2016:apigee-hybrid-release-notes#December_16_2024</id>
    <updated>2024-12-16T00:00:00-08:00</updated>
    <link rel="alternate" href="https://docs.cloud.google.com/apigee/docs/hybrid/release-notes#December_16_2024"/>
    <content type="html"><![CDATA[<strong class="release-note-product-version-title">v1.14.0</strong>
<h3>Announcement</h3>
<h3 id="hybrid_v1140">hybrid v1.14.0</h3>
<p>On December 16, 2024 we released an updated version of the Apigee hybrid software, v1.14.0.</p>
<ul>
<li>For information on upgrading, see <a href="https://docs.cloud.google.com/apigee/docs/hybrid/v1.14/upgrade">Upgrading Apigee hybrid to version v1.14</a>. </li>
<li>For information on new installations, see <a href="https://docs.cloud.google.com/apigee/docs/hybrid/v1.14/big-picture">The big picture</a>.</li>
</ul>
<h3>Feature</h3>
<p><strong>Enhanced Per-environment Proxy Limits in Apigee Hybrid</strong></p>
<p>Starting in version v1.14, new Apigee hybrid organizations can be provisioned with the ability to deploy more than 50 proxies per environment enabled. This feature is already available for <a href="https://docs.cloud.google.com/apigee/docs/api-platform/reference/limits#api-proxies">Apigee X</a>.</p>
<p>Starting with Apigee hybrid version 1.14, the limits for Apigee hybrid organizations have increased:</p>
<ul>
<li>The maximum number of deployed API proxies and shared flows per organization is 6000.</li>
<li>The maximum number of proxy deployment units per Apigee instance is 6000.</li>
<li>The maximum number of API base paths per Apigee organization is 3000.</li>
</ul>
<p>When more than 50 proxies are deployed in an environment, Apigee will automatically partition the environment into several distinct replica sets, each containing a subset of proxies deployed in the environment. These replica subsets are equivalent in behavior and infrastructure resource usage to a single environment in the way it loads and runs a set of proxies and other environment resources. This will be transparent to the user, and you can continue to use the environment as you would a single environment.</p>
<aside class="note"><strong>Note:</strong><span> Enhanced per-environment proxy limits are only available for new hybrid organizations with the entitlement for the feature included in <a href="https://docs.cloud.google.com/apigee/docs/api-platform/reference/subscription-entitlements#subscription-2024-entitlements">Subscription 2024</a>. Enhanced per-environment proxy limits are not available in upgraded organizations. </span></aside>
<p>See: </p>
<ul>
<li><a href="https://docs.cloud.google.com/apigee/docs/hybrid/v1.14/enhanced-proxy-limits">Enhanced per-environment proxy limits</a></li>
<li><a href="https://docs.cloud.google.com/apigee/docs/api-platform/reference/subscription-entitlements#subscription-2024-entitlements">Subscription 2024</a></li>
</ul>
<h3>Feature</h3>
<p><strong>Forward Proxy allowlist access</strong></p>
<p>Starting in version v1.14, forward proxies pass through access to allowlisted URLs. Therefore you only need to configure allowlists to googleapis.com URLs on the server on which the forward proxy is configured. See:  </p>
<ul>
<li><a href="https://docs.cloud.google.com/apigee/docs/hybrid/v1.14/allow-gcp-urls">Google Cloud URLs to allow for Hybrid</a></li>
<li><a href="https://docs.cloud.google.com/apigee/docs/hybrid/v1.14/using-data-residency-with-apigee-hybrid#url-allowlisting">Using Data Residency with Apigee hybrid: URL allowlisting</a></li>
<li><a href="https://docs.cloud.google.com/apigee/docs/hybrid/v1.14/forward-proxy">Configure forward proxying for API proxies</a></li>
</ul>
<h3>Feature</h3>
<p><strong>Guardrails checks to ensure backups before upgrade</strong></p>
<p>Starting in version 1.14 new guardrails checks have been added to ensure a backup is enabled and has been made before proceeding with an upgrade. See: </p>
<ul>
<li><a href="https://docs.cloud.google.com/apigee/docs/hybrid/v1.14/upgrade#prepare">Upgrading Apigee hybrid to version v1.14</a></li>
<li><a href="https://docs.cloud.google.com/apigee/docs/hybrid/v1.14/guardrails">Diagnosing issues with guardrails</a></li>
</ul>
<h3>Feature</h3>
<p><strong>Enable and disable metrics-based scaling with <code>customAutoscaling.enabled</code></strong></p>
<p>Starting in version v1.14, you can enable and disable metrics-based auto-scaling with the <code>customAutoscaling.enabled</code> configuration property. See:</p>
<ul>
<li><a href="https://docs.cloud.google.com/apigee/docs/hybrid/v1.14/scale-and-autoscale#metrics-scaling">Scale and autoscale runtime services: Metrics-based scaling</a></li>
<li><a href="https://docs.cloud.google.com/apigee/docs/hybrid/v1.14/config-prop-ref#customautoscaling-enabled"><code>customAutoscaling.enabled</code></a></li>
</ul>
<h3>Feature</h3>
<p><strong>Cassandra credential rotation</strong></p>
<p>Starting in version v1.14, you can rotate Cassandra credentials in Kubernetes secrets. In addition, you can now roll back credential rotation before the cleanup job is initiated in both Vault and Kubernetes secrets. See:</p>
<ul>
<li><a href="https://docs.cloud.google.com/apigee/docs/hybrid/v1.14/rotating-cassandra-credentials-non-ess">Rotating Cassandra credentials in Kubernetes secrets</a></li>
<li><a href="https://docs.cloud.google.com/apigee/docs/hybrid/v1.14/rotating-cassandra-credentials-in-vault#rollback-rotation">Rotating Cassandra credentials in Vault: Rolling back a rotation</a></li>
<li><a href="https://docs.cloud.google.com/apigee/docs/hybrid/v1.14/rotating-cassandra-credentials-non-ess#rollback-rotation">Rotating Cassandra credentials in Kubernetes secrets: Rolling back a rotation</a></li>
</ul>
<h3>Feature</h3>
<p><strong>New analytics and debug data pipeline for hybrid orgs</strong></p>
<p>Starting with version 1.14, Apigee hybrid orgs can use a new data pipeline to collect analytics and debug data and allow various runtime components to write data directly to our control plane. Control plane access is required to enable the new data pipeline. </p>
<p>See:</p>
<ul>
<li><a href="https://docs.cloud.google.com/apigee/docs/hybrid/v1.14/install-enable-control-plane-access">Enable Control Plane access</a></li>
<li><a href="https://docs.cloud.google.com/apigee/docs/hybrid/v1.14/data-collection-with-data-residency">Configure hybrid to use the new data pipeline (v1.14.0 only)</a></li>
</ul>
<h3>Fixed</h3>
<table>
<thead>
<tr>
<th>Bug ID</th>
<th>Description</th>
</tr>
</thead>
<tbody>
<tr>
<td><strong>382323427</strong></td>
<td><strong>Added a guardrails check that requires backup to be enabled for Apigee Hybrid upgrades. Backups are required prior to upgrading to support restoring to the previous version, if necessary.</strong></td>
</tr>
<tr>
<td><strong>380346557</strong></td>
<td><strong>Added a guardrails check that requires the backup within the last 24 hours to be present if the CSI backup is enabled. This will minimize potential data loss if a restore to the previous version is needed.</strong></td>
</tr>
<tr>
<td><strong>377573589</strong></td>
<td><strong>Fix a bug where manually created rollbacks would interfere with existing rotations instead of cancelling them.</strong></td>
</tr>
<tr>
<td><strong>362305438</strong></td>
<td><strong>Users can now add additional env variables to the runtime component.</strong> See <a href="https://docs.cloud.google.com/apigee/docs/hybrid/v1.14/config-prop-ref#runtime-envvars"><code>runtime.envVars</code></a></td>
</tr>
<tr>
<td><strong>319152386</strong></td>
<td><strong>Fix <code>AccessTokenGenerationFailure</code> in runtime when using a forward proxy.</strong></td>
</tr>
<tr>
<td><strong>335357961</strong></td>
<td><strong>Fixed an issue where Apigee hybrid could claim uploads of backups with the Cloud provider when no bucket had been configured</strong></td>
</tr>
<tr>
<td><strong>290183372</strong></td>
<td><strong>The need to allowlist oauth2 and iamcredentials.googleapis.com directly from MP in fwd proxy setup is removed.</strong></td>
</tr>
<tr>
<td><strong>237656263</strong></td>
<td><strong>Resolved issue with ServiceCallout policy not working in async mode as expected.</strong></td>
</tr>
<tr>
<td><strong>373722434</strong></td>
<td><strong>Fixed support for backups to Google Cloud Storage buckets with retention policies.</strong> (Fixed in <a href="https://docs.cloud.google.com/apigee/docs/hybrid/release-notes#hybrid_v1132">v1.13.2</a>)</td>
</tr>
<tr>
<td><strong>368646378</strong></td>
<td><strong>Fixed an issue affecting control Plane connectivity testing in Guardrails.</strong> (Fixed in <a href="https://docs.cloud.google.com/apigee/docs/hybrid/release-notes#hybrid_v1123">v1.12.3</a>)</td>
</tr>
<tr>
<td><strong>364282883</strong></td>
<td><strong>Remove check for dc-expansion flag and add timeout to multi-region seed host connection test.</strong> (Fixed in <a href="https://docs.cloud.google.com/apigee/docs/hybrid/release-notes#hybrid_v1131">v1.13.1</a>)</td>
</tr>
<tr>
<td><strong>362979563</strong></td>
<td><strong>Fix for Ingress Health Check failure <code>/healthz/ingress - route_not_found</code>.</strong> (Fixed in <a href="https://docs.cloud.google.com/apigee/docs/hybrid/release-notes#hybrid_1130-hotfix1">1.13.0-hotfix.1</a>)</td>
</tr>
<tr>
<td><strong>362690729</strong></td>
<td><strong>Fix for aggressive scaling of runtime pods &amp; cpu spike.</strong> (Fixed in <a href="https://docs.cloud.google.com/apigee/docs/hybrid/release-notes#hybrid_1130-hotfix1">1.13.0-hotfix.1</a>)</td>
</tr>
<tr>
<td><strong>362305438</strong></td>
<td><strong>You can now add additional env variables to the runtime component.</strong> (Fixed in <a href="https://docs.cloud.google.com/apigee/docs/hybrid/release-notes#hybrid_v1131">v1.13.1</a>)</td>
</tr>
<tr>
<td><strong>361044374</strong></td>
<td><strong>Fixes assign message not correctly highlighting the set payload action in the debug trace.</strong> (Fixed in <a href="https://docs.cloud.google.com/apigee/docs/hybrid/release-notes#hybrid_v1132">v1.13.2</a>)</td>
</tr>
<tr>
<td><strong>355122464</strong></td>
<td><strong>This release contains a few error-handling fixes for CSI backup and restore.</strong> (Fixed in <a href="https://docs.cloud.google.com/apigee/docs/hybrid/release-notes#hybrid_v1132">v1.13.2</a>)</td>
</tr>
<tr>
<td><strong>353527851</strong></td>
<td><strong>WebSocket connection drops when using <code>VerifyJwt</code>  or <code>OAuthV2 VerifyJWTAccessToken</code> operations.</strong> (Fixed in <a href="https://docs.cloud.google.com/apigee/docs/hybrid/release-notes#hybrid_v1131">v1.13.1</a>)</td>
</tr>
<tr>
<td><strong>351440306</strong></td>
<td><strong>An issue was fixed where trace could not be viewed in the UI for orgs with DRZ enabled.</strong> (Fixed in <a href="https://docs.cloud.google.com/apigee/docs/hybrid/release-notes#hybrid_v1131">v1.13.1</a>)</td>
</tr>
<tr>
<td><strong>347798999</strong></td>
<td><strong>You can now configure forward proxy for opentelemetry pods in Apigee hybrid.</strong> (Fixed in <a href="https://docs.cloud.google.com/apigee/docs/hybrid/release-notes#hybrid_v1122">v1.12.2</a>)</td>
</tr>
<tr>
<td><strong>338638343</strong></td>
<td><strong>An ID is now added at the end of <code>apigee-env</code> and <code>virtualhost</code> guardrails pods to make the pod names unique.</strong> (Fixed in <a href="https://docs.cloud.google.com/apigee/docs/hybrid/release-notes#hybrid_v1131">v1.13.1</a>)</td>
</tr>
<tr>
<td><strong>237656263</strong></td>
<td><strong>Fix added to make use of asynchronous ServiceCallout execution when the <a href="https://cloud.google.com/apigee/docs/api-platform/reference/policies/service-callout-policy#response">ServiceCallout policy &lt;Response&gt; element</a> is not present</strong> (Fixed in <a href="https://docs.cloud.google.com/apigee/docs/hybrid/release-notes#hybrid_v1132">v1.13.2</a>)</td>
</tr>
<tr>
<td><strong>181569113</strong></td>
<td><strong>Fixed an issue in new debug session creation.</strong> (Fixed in <a href="https://docs.cloud.google.com/apigee/docs/hybrid/release-notes#hybrid_v1123">v1.12.3</a>)</td>
</tr>
</tbody>
</table>
<h3>Security</h3>
<table>
<thead>
<tr>
<th>Bug ID</th>
<th>Description</th>
</tr>
</thead>
<tbody>
<tr>
<td><strong>N/A</strong></td>
<td><strong>Security fixes for <code>apigee-redis</code>.</strong> <br/>This addresses the following vulnerabilities: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-24834">CVE-2022-24834</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-24735">CVE-2022-24735</a> </li></ul></td>
</tr>
<tr>
<td><strong>N/A</strong></td>
<td><strong>Security fixes for <code>livenessprobe</code>.</strong> <br/>This addresses the following vulnerability: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-45288">CVE-2023-45288</a> </li></ul></td>
</tr>
<tr>
<td><strong>376104926</strong></td>
<td><strong>Security fixes for <code>apigee-kube-rbac-proxy</code>.</strong> (Fixed in <a href="https://docs.cloud.google.com/apigee/docs/hybrid/release-notes#hybrid_v1123">v1.12.3</a>)  <br/>This addresses the following vulnerabilities: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41110">CVE-2024-41110</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2024-28180">CVE-2024-28180</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2024-24790">CVE-2024-24790</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2024-24789">CVE-2024-24789</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-4039">CVE-2023-4039</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-27943">CVE-2022-27943</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-1010025">CVE-2019-1010025</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-1010024">CVE-2019-1010024</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-1010023">CVE-2019-1010023</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-1010022">CVE-2019-1010022</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-9192">CVE-2019-9192</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2018-20796">CVE-2018-20796</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2012-2663">CVE-2012-2663</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2010-4756">CVE-2010-4756</a> </li></ul></td>
</tr>
<tr>
<td><strong>N/A</strong></td>
<td><strong>Security fixes for <code>apigee-redis</code>.</strong> (Fixed in <a href="https://docs.cloud.google.com/apigee/docs/hybrid/release-notes#hybrid_v1132">v1.13.2</a>)  <br/>This addresses the following vulnerabilities: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-24834">CVE-2022-24834</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-24735">CVE-2022-24735</a> </li></ul></td>
</tr>
<tr>
<td><strong>N/A</strong></td>
<td><strong>Security fixes for <code>apigee-open-telemetry-collector</code>.</strong> (Fixed in <a href="https://docs.cloud.google.com/apigee/docs/hybrid/release-notes#hybrid_v1131">v1.13.1</a>)  <br/>This addresses the following vulnerability: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2024-36129">CVE-2024-36129</a> </li></ul></td>
</tr>
<tr>
<td><strong>N/A</strong></td>
<td><strong>Security fixes for <code>apigee-open-telemetry-collector</code>.</strong> (Fixed in <a href="https://docs.cloud.google.com/apigee/docs/hybrid/release-notes#hybrid_v1123">v1.12.3</a>)  <br/>This addresses the following vulnerability: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2024-36129">CVE-2024-36129</a> </li></ul></td>
</tr>
<tr>
<td><strong>N/A</strong></td>
<td><strong>Security fixes for <code>apigee-cassandra-backup-utility</code> and <code>apigee-hybrid-cassandra</code>.</strong> (Fixed in <a href="https://docs.cloud.google.com/apigee/docs/hybrid/release-notes#hybrid_v1122">v1.12.2</a>)  <br/>This addresses the following vulnerability: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-37920">CVE-2023-37920</a> </li></ul></td>
</tr>
</tbody>
</table>
]]>
    </content>
  </entry>

  <entry>
    <title>November 12, 2024</title>
    <id>tag:google.com,2016:apigee-hybrid-release-notes#November_12_2024</id>
    <updated>2024-11-12T00:00:00-08:00</updated>
    <link rel="alternate" href="https://docs.cloud.google.com/apigee/docs/hybrid/release-notes#November_12_2024"/>
    <content type="html"><![CDATA[<strong class="release-note-product-version-title">v1.13.2</strong>
<h3>Announcement</h3>
<h3 id="hybrid_v1132">hybrid v1.13.2</h3>
<p>On November 12, 2024 we released an updated version of the Apigee hybrid software, 1.13.2.</p>
<ul>
<li>For information on upgrading, see <a href="https://docs.cloud.google.com/apigee/docs/hybrid/v1.13/upgrade">Upgrading Apigee hybrid to version 1.13.2</a>. </li>
<li>For information on new installations, see <a href="https://docs.cloud.google.com/apigee/docs/hybrid/v1.13/big-picture">The big picture</a>.</li>
</ul>
<h3>Security</h3>
<table>
<thead>
<tr>
<th>Bug ID</th>
<th>Description</th>
</tr>
</thead>
<tbody>
<tr>
<td><strong>N/A</strong></td>
<td><strong>Security fixes for <code>apigee-redis</code>.</strong> <br/>This addresses the following vulnerabilities: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-24834">CVE-2022-24834</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-24735">CVE-2022-24735</a> </li></ul></td>
</tr>
</tbody>
</table>
<h3>Fixed</h3>
<table>
<thead>
<tr>
<th><b>Bug ID</b></th>
<th><b>Description</b></th>
</tr>
</thead>
<tbody>
<tr>
<td><b>373722434</b></td>
<td><b>Fixed support for backups to GCS buckets with retention policies.</b></td>
</tr>
<tr>
<td><b>361044374</b></td>
<td><b>Fixes assign message not correctly highlighting the set payload action in the debug trace.</b></td>
</tr>
<tr>
<td><b>355122464</b></td>
<td><b>This release contains a few error-handling fixes for CSI backup and restore.</b></td>
</tr>
<tr>
<td><b>237656263</b></td>
<td><b>Fix added to make use of asynchronous ServiceCallout execution when the <a href="https://cloud.google.com/apigee/docs/api-platform/reference/policies/service-callout-policy#response">ServiceCallout policy &lt;Response&gt; element</a> is not present</b>. 
        <p><b>Procedure:</b></p>
<ol>
<li>In the <code>apigee-env/values.yaml</code> file set <code>conf_system_servicecallout.expects.response</code> to <code>false</code> under  <code>runtime:cwcAppend:</code>. For example:
            <pre class="devsite-click-to-copy"># Apigee Runtime.
runtime:
  cwcAppend:
    conf_system_servicecallout.expects.response: false</pre></li>
<li>Upgrade the <code>apigee-env</code> chart for each environment to apply the change. For example: 
            <pre class="devsite-terminal">helm upgrade <var>ENV_RELEASE_NAME</var> apigee-env/ \
  --install \
  --namespace <var>APIGEE_NAMESPACE</var> \
  --set env=<var>ENV_NAME</var> \
  -f <var>OVERRIDES_FILE</var></pre>
</li>
</ol>
</td>
</tr>
</tbody>
</table>
]]>
    </content>
  </entry>

  <entry>
    <title>November 01, 2024</title>
    <id>tag:google.com,2016:apigee-hybrid-release-notes#November_01_2024</id>
    <updated>2024-11-01T00:00:00-07:00</updated>
    <link rel="alternate" href="https://docs.cloud.google.com/apigee/docs/hybrid/release-notes#November_01_2024"/>
    <content type="html"><![CDATA[<strong class="release-note-product-version-title">v1.12.3</strong>
<h3>Announcement</h3>
<h3 id="hybrid_v1123">hybrid v1.12.3</h3>
<p>On November 1, 2024 we released an updated version of the Apigee hybrid software, 1.12.3.</p>
<ul>
<li>For information on upgrading, see <a href="https://docs.cloud.google.com/apigee/docs/hybrid/v1.12/upgrade">Upgrading Apigee hybrid to version 1.12.3</a>. </li>
<li>For information on new installations, see <a href="https://docs.cloud.google.com/apigee/docs/hybrid/v1.12/big-picture">The big picture</a>.</li>
</ul>
<h3>Fixed</h3>
<table>
<thead>
<tr>
<th>Bug ID</th>
<th>Description</th>
</tr>
</thead>
<tbody>
<tr>
<td><strong>368646378</strong></td>
<td><strong>Fixed an issue affecting control Plane connectivity testing in Guardrails.</strong></td>
</tr>
<tr>
<td><strong>361044374</strong></td>
<td><strong>Fixes assign message not correctly highlighting the set payload action in the debug trace.</strong></td>
</tr>
<tr>
<td><strong>335357961</strong></td>
<td><strong>Fixed an issue where Apigee hybrid could claim uploads of backups with the Cloud provider when no bucket had been configured</strong></td>
</tr>
<tr>
<td><strong>181569113</strong></td>
<td><strong>Fixed an issue in new debug session creation.</strong></td>
</tr>
</tbody>
</table>
<h3>Security</h3>
<table>
<thead>
<tr>
<th>Bug ID</th>
<th>Description</th>
</tr>
</thead>
<tbody>
<tr>
<td><strong>376104926</strong></td>
<td><strong>Security fixes for <code>apigee-kube-rbac-proxy</code>.</strong> <br/>This addresses the following vulnerabilities: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41110">CVE-2024-41110</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2024-28180">CVE-2024-28180</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2024-24790">CVE-2024-24790</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2024-24789">CVE-2024-24789</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-4039">CVE-2023-4039</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-27943">CVE-2022-27943</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-1010025">CVE-2019-1010025</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-1010024">CVE-2019-1010024</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-1010023">CVE-2019-1010023</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-1010022">CVE-2019-1010022</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-9192">CVE-2019-9192</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2018-20796">CVE-2018-20796</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2012-2663">CVE-2012-2663</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2010-4756">CVE-2010-4756</a> </li></ul></td>
</tr>
<tr>
<td><strong>N/A</strong></td>
<td><strong>Security fixes for <code>apigee-open-telemetry-collector</code>.</strong> <br/>This addresses the following vulnerability: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2024-36129">CVE-2024-36129</a> </li></ul></td>
</tr>
</tbody>
</table>
]]>
    </content>
  </entry>

  <entry>
    <title>October 04, 2024</title>
    <id>tag:google.com,2016:apigee-hybrid-release-notes#October_04_2024</id>
    <updated>2024-10-04T00:00:00-07:00</updated>
    <link rel="alternate" href="https://docs.cloud.google.com/apigee/docs/hybrid/release-notes#October_04_2024"/>
    <content type="html"><![CDATA[<strong class="release-note-product-version-title">v1.13.1</strong>
<h3>Announcement</h3>
<h3 id="hybrid_v1131">hybrid v1.13.1</h3>
<p>On October 4, 2024 we released an updated version of the Apigee hybrid software, 1.13.1.</p>
<ul>
<li>For information on upgrading, see <a href="https://docs.cloud.google.com/apigee/docs/hybrid/v1.13/upgrade">Upgrading Apigee hybrid to version 1.13.1</a>. </li>
<li>For information on new installations, see <a href="https://docs.cloud.google.com/apigee/docs/hybrid/v1.13/big-picture">The big picture</a>.</li>
</ul>
<h3>Feature</h3>
<p><strong>New analytics and debug data pipeline for data residency-enabled orgs</strong></p>
<p>Starting in v1.13.1 hybrid organizations created with data residency enabled must use the new data pipeline to collect analytics and debug data and allow various runtime components to write data directly to our control plane. Changes to overrides file and control plane access are required to enable the new data pipeline. </p>
<p>For details, see:</p>
<ul>
<li><a href="https://docs.cloud.google.com/apigee/docs/hybrid/v1.13/using-data-residency-with-apigee-hybrid.html#newpipeline">Enabling the new data pipeline</a>.</li>
<li><a href="https://docs.cloud.google.com/apigee/docs/hybrid/v1.13/data-collection-with-data-residency">Configure hybrid to use the new data pipeline</a></li>
</ul>
<aside class="note"><strong>Note:</strong><span> The new data pipeline is only supported for data residency enabled organizations in versions 1.13.x. It is supported for non-data residency enabled organizations starting in <a href="https://docs.cloud.google.com/apigee/docs/release-notes#hybrid_v1140">Apigee hybrid version 1.14.0</a>.</span></aside>
<h3>Feature</h3>
<p><strong>Cassandra credential rotation in Vault</strong></p>
<p>Starting in version v1.3.1, You can set up automatic Cassandra credential rotation when your credentials are stored in Hashicorp Vault. See <a href="https://docs.cloud.google.com/apigee/docs/hybrid/v1.13/rotating-cassandra-credentials-in-vault">Rotating Cassandra credentials in Hashicorp Vault</a>.</p>
<h3>Fixed</h3>
<table>
<thead>
<tr>
<th>Bug ID</th>
<th>Description</th>
</tr>
</thead>
<tbody>
<tr>
<td><strong>364282883</strong></td>
<td><strong>Remove check for dc-expansion flag and add timeout to multi-region seed host connection test.</strong></td>
</tr>
<tr>
<td><strong>362305438</strong></td>
<td><strong>You can now add additional env variables to the runtime component.</strong></td>
</tr>
<tr>
<td><strong>353527851</strong></td>
<td><strong>WebSocket connection drops when using <code>VerifyJwt</code>  or <code>OAuthV2 VerifyJWTAccessToken</code> operations.</strong></td>
</tr>
<tr>
<td><strong>351440306</strong></td>
<td><strong>An issue was fixed where trace could not be viewed in the UI for orgs with DRZ enabled.</strong></td>
</tr>
<tr>
<td><strong>338638343</strong></td>
<td><strong>An ID is now added at the end of <code>apigee-env</code> and <code>virtualhost</code> guardrails pods to make the pod names unique.</strong></td>
</tr>
</tbody>
</table>
<h3>Security</h3>
<table>
<thead>
<tr>
<th>Bug ID</th>
<th>Description</th>
</tr>
</thead>
<tbody>
<tr>
<td><strong>N/A</strong></td>
<td><strong>Security fixes for <code>apigee-open-telemetry-collector</code>.</strong> <br/>This addresses the following vulnerability: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2024-36129">CVE-2024-36129</a> </li></ul></td>
</tr>
</tbody>
</table>
]]>
    </content>
  </entry>

  <entry>
    <title>September 13, 2024</title>
    <id>tag:google.com,2016:apigee-hybrid-release-notes#September_13_2024</id>
    <updated>2024-09-13T00:00:00-07:00</updated>
    <link rel="alternate" href="https://docs.cloud.google.com/apigee/docs/hybrid/release-notes#September_13_2024"/>
    <content type="html"><![CDATA[<strong class="release-note-product-version-title">v1.12.2</strong>
<h3>Announcement</h3>
<h3 id="hybrid_v1122">hybrid v1.12.2</h3>
<p>On September 13, 2024 we released an updated version of the Apigee hybrid software, 1.12.2.</p>
<ul>
<li>For information on upgrading, see <a href="https://docs.cloud.google.com/apigee/docs/hybrid/v1.12/upgrade">Upgrading Apigee hybrid to version 1.12.2</a>. </li>
<li>For information on new installations, see <a href="https://docs.cloud.google.com/apigee/docs/hybrid/v1.12/big-picture">The big picture</a>.</li>
</ul>
<h3>Fixed</h3>
<table>
<thead>
<tr>
<th>Bug ID</th>
<th>Description</th>
</tr>
</thead>
<tbody>
<tr>
<td><strong>362305438</strong></td>
<td><strong>You can now add additional env variables to the runtime component.</strong></td>
</tr>
<tr>
<td><strong>347798999</strong></td>
<td><strong>You can now configure forward proxy for opentelemetry pods in Apigee hybrid.</strong></td>
</tr>
</tbody>
</table>
<h3>Security</h3>
<table>
<thead>
<tr>
<th>Bug ID</th>
<th>Description</th>
</tr>
</thead>
<tbody>
<tr>
<td><strong>N/A</strong></td>
<td><strong>Security fixes for <code>apigee-cassandra-backup-utility</code> and <code>apigee-hybrid-cassandra</code>.</strong> <br/>This addresses the following vulnerability: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-37920">CVE-2023-37920</a> </li></ul></td>
</tr>
</tbody>
</table>
]]>
    </content>
  </entry>

  <entry>
    <title>September 05, 2024</title>
    <id>tag:google.com,2016:apigee-hybrid-release-notes#September_05_2024</id>
    <updated>2024-09-05T00:00:00-07:00</updated>
    <link rel="alternate" href="https://docs.cloud.google.com/apigee/docs/hybrid/release-notes#September_05_2024"/>
    <content type="html"><![CDATA[<strong class="release-note-product-version-title">1.13.0-hotfix.1</strong>
<h3>Announcement</h3>
<h3 id="hybrid_1130-hotfix1">hybrid 1.13.0-hotfix.1</h3>
<p>On September 5, 2024 we released an updated version of the Apigee hybrid software, 1.13.0-hotfix.1.</p>
<p>Apply this hotfix following the steps in <a href="https://docs.cloud.google.com/apigee/docs/hybrid/v1.13/upgrade">Upgrading Apigee hybrid to version 1.13</a>: </p>
<ol>
<li><a href="https://docs.cloud.google.com/apigee/docs/hybrid/v1.13/upgrade#prepare-for-the-helm-charts-upgrade">Prepare for the Helm charts upgrade</a></li>
<li><a href="https://docs.cloud.google.com/apigee/docs/hybrid/v1.13/upgrade#install-the-apigee-hybrid-helm-charts">Install the Apigee hybrid Helm charts</a></li>
</ol>
<ul>
<li>For information on upgrading, see <a href="https://docs.cloud.google.com/apigee/docs/hybrid/v1.13/upgrade">Upgrading Apigee hybrid to version 1.13</a>. </li>
<li>For information on new installations, see <a href="https://docs.cloud.google.com/apigee/docs/hybrid/v1.13/big-picture">The big picture</a>.</li>
</ul>
<h3>Fixed</h3>
<table>
<thead>
<tr>
<th>Bug ID</th>
<th>Description</th>
</tr>
</thead>
<tbody>
<tr>
<td><strong>362690729</strong></td>
<td><strong>Fix for aggressive scaling of runtime pods &amp; cpu spike.</strong></td>
</tr>
<tr>
<td><strong>362979563</strong></td>
<td><strong>Fix for Ingress Health Check failure <code>/healthz/ingress - route_not_found</code>.</strong></td>
</tr>
</tbody>
</table>
]]>
    </content>
  </entry>

  <entry>
    <title>August 23, 2024</title>
    <id>tag:google.com,2016:apigee-hybrid-release-notes#August_23_2024</id>
    <updated>2024-08-23T00:00:00-07:00</updated>
    <link rel="alternate" href="https://docs.cloud.google.com/apigee/docs/hybrid/release-notes#August_23_2024"/>
    <content type="html"><![CDATA[<strong class="release-note-product-version-title">v1.13.0</strong>
<h3>Announcement</h3>
<h3 id="hybrid_v1130">hybrid v1.13.0</h3>
<p>On August 23, 2024 we released an updated version of the Apigee hybrid software, v1.13.0.</p>
<ul>
<li>For information on upgrading, see <a href="https://docs.cloud.google.com/apigee/docs/hybrid/v1.13/upgrade">Upgrading Apigee hybrid to version v1.13.0</a>. </li>
<li>For information on new installations, see <a href="https://docs.cloud.google.com/apigee/docs/hybrid/v1.13/big-picture">The big picture</a>.</li>
</ul>
<h3>Feature</h3>
<p><strong>Storing additional secrets in an external secret store</strong></p>
<p>Starting in version v1.13, You can now store AX Hash Salt, Redis password, and Encryption keys in an external secret store like Hashicorp Vault. See <a href="https://docs.cloud.google.com/apigee/docs/hybrid/v1.13/storing-secrets-in-vault">Storing Secrets in Vault</a>.</p>
<h3>Feature</h3>
<p><strong>Apigee Operator now runs in the Apigee Kubernetes namespace</strong></p>
<p>Starting in version v1.13,  <code>apigee-operator</code> runs in the same name space as the other Apigee hybrid components instead of the <code>apigee-system</code> namespace. You can use <code>apigee</code> or your own custom Apigee namespace. See <a href="https://docs.cloud.google.com/apigee/docs/hybrid/v1.13/upgrade">Upgrading Apigee hybrid to version v1.13.0</a> and <a href="https://docs.cloud.google.com/apigee/docs/hybrid/v1.13/install-create-namespace">Step 3: Create the apigee namespace</a>.</p>
<h3>Feature</h3>
<p><strong>Leader election enabled for <code>apigee-watcher</code> component</strong></p>
<p>Starting in version v1.13.0, leader election is enabled for the <code>apigee-watcher</code> component.  For proper functioning of the leader election, make sure that the <code>apigee-watcher</code> component uses only one replica set.</p>
<h3>Feature</h3>
<p><strong>Improved backup and restore</strong></p>
<p>Starting in version v1.13.0, Apigee hybrid introduces a new backup and restore system. The new system removes the need for pod exec permission and use of a Kubernetes ClusterRole, and requires fewer Kubernetes Service Accounts when using Workload Identity. The new system replaces use of the apigee-cassandra-backup-utility image by using the apigee-hybrid-cassandra-client image. The apigee-cassandra-backup-utility image will no longer be provided starting with this release. </p>
<p>To use the new functionality if you are overriding the image used, update your <code>overrides.yaml</code> file.</p>
<p>Replace:</p>
<ul>
<li><code>repo.sample.com/gcr-docker/apigee-release/hybrid/apigee-cassandra-backup-utility</code></li>
</ul>
<p>with </p>
<ul>
<li><code>repo.sample.com/gcr-docker/apigee-release/hybrid/apigee-hybrid-cassandra-client</code></li>
</ul>
<p>under <code>cassandra.backup.image.url</code> and <code>cassandra.restore.image.url</code>.</p>
<p>See <a href="https://docs.cloud.google.com/apigee/docs/hybrid/v1.13/cassandra-backup-overview">Scheduling backups in a remote server</a> for more information.</p>
<h3>Fixed</h3>
<table>
<thead>
<tr>
<th>Bug ID</th>
<th>Description</th>
</tr>
</thead>
<tbody>
<tr>
<td><strong>352070616</strong></td>
<td><strong>Update Go language version.</strong></td>
</tr>
<tr>
<td><strong>351868444</strong></td>
<td><strong>Tolerations are now working for Redis's Envoy pod.</strong> (Fixed in 1.12.1-hotfix.1)</td>
</tr>
<tr>
<td><strong>347997965</strong></td>
<td><strong>Upgrading to Apigee Hybrid 1.11.2 and 1.10.5 can cause missing metrics.</strong> (Fixed in 1.11.2-hotfix.1)</td>
</tr>
<tr>
<td><strong>347798999</strong></td>
<td><strong>Fixed issue preventing configuration of forward proxy for <code>opentelemetry</code> pods.</strong> (Fixed in Apigee hybrid v 1.12.1)</td>
</tr>
<tr>
<td><strong>346589998</strong></td>
<td><strong>Check Cassandra DNS hostname resolution during Hybrid region expansion.</strong></td>
</tr>
<tr>
<td><strong>345501069</strong></td>
<td><strong>Fixed issue with Hybrid Guardrails resource configuration preventing the Guardails pod from starting.</strong> (Fixed in Apigee hybrid v 1.12.1)</td>
</tr>
<tr>
<td><strong>341797795</strong></td>
<td><strong>Autofill the Hybrid Guardrails checkpoint value if a checkpoint is not provided.</strong> (Fixed in Apigee hybrid v 1.12.1)</td>
</tr>
<tr>
<td><strong>340889560</strong></td>
<td><strong>Added <code>csi</code> to the <code>apigee-logger</code> SCC.</strong> (Fixed in Apigee hybrid v 1.12.0-hotfix.1)</td>
</tr>
<tr>
<td><strong>340248314</strong></td>
<td><strong>Added support for <code>targetCPUUtilizationPercentage</code> to <a href="https://docs.cloud.google.com/apigee/docs/hybrid/v1.13/config-prop-ref.html#apigeeingressgateway-targetcpuutilizationpercentage"><code>apigeeIngressGateway</code></a> and <a href="https://docs.cloud.google.com/apigee/docs/hybrid/v1.13/config-prop-ref.html#ingressgateways-targetcpuutilizationpercentage"><code>ingressGateways</code></a>.</strong> The default value is 75. (Fixed in Apigee hybrid v 1.12.1)</td>
</tr>
<tr>
<td><strong>339849002</strong></td>
<td><strong>Hashicorp Vault integration issues fixed for Google Service Account for Cassandra Backup/Restore.</strong> (Fixed in Apigee hybrid v 1.12.0-hotfix.1)</td>
</tr>
<tr>
<td><strong>324779388</strong></td>
<td><strong>Improved error handling for backup and restore.</strong> (Fixed in Apigee hybrid v 1.12.1)</td>
</tr>
<tr>
<td><strong>311489774</strong></td>
<td><strong>Removed inclusion of Java in Cassandra client image..</strong> (Fixed in Apigee hybrid v 1.12.1)</td>
</tr>
<tr>
<td><strong>310338146</strong></td>
<td><strong>Fixed invalid download directory output from the <a href="https://docs.cloud.google.com/apigee/docs/hybrid/v1.12/create-service-account"><code>create-service-account</code></a> tool.</strong> (Fixed in Apigee hybrid v 1.12.1)</td>
</tr>
<tr>
<td><strong>300135626</strong></td>
<td><strong>Removed inclusion of Java in Cassandra Backup Utility image.</strong> (Fixed in Apigee hybrid v 1.12.1)</td>
</tr>
<tr>
<td><strong>297539870</strong></td>
<td><strong><code>HTTPTargetConnection</code> property <code>io.timeout.millis</code> is now honored correctly when using websockets.</strong> (Fixed in 1.11.2-hotfix.2)</td>
</tr>
<tr>
<td><strong>239523766</strong></td>
<td><strong>Remove "Unable to evaluate jsonVariable, returning null" logging string from <em>ExtractVariables</em> Policy</strong> (Fixed in Apigee hybrid v 1.12.1)</td>
</tr>
<tr>
<td><strong>181569113</strong></td>
<td><strong>Fixed an issue in new debug session creation.</strong> (Fixed in Apigee hybrid v 1.11.2)</td>
</tr>
</tbody>
</table>
<h3>Security</h3>
<table>
<thead>
<tr>
<th>Bug ID</th>
<th>Description</th>
</tr>
</thead>
<tbody>
<tr>
<td><strong>N/A</strong></td>
<td><strong>Security fixes for <code>apigee-asm-istiod</code>.</strong> <br/>This addresses the following vulnerability: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26147">CVE-2024-26147</a> </li></ul></td>
</tr>
<tr>
<td><strong>N/A</strong></td>
<td><strong>Security fixes for <code>apigee-cassandra-backup-utility</code>.</strong> <br/>This addresses the following vulnerability: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-37920">CVE-2023-37920</a> </li></ul></td>
</tr>
<tr>
<td><strong>N/A</strong></td>
<td><strong>Security fixes for <code>apigee-connect-agent</code>.</strong> <br/>This addresses the following vulnerabilities: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-45285">CVE-2023-45285</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-39323">CVE-2023-39323</a> </li></ul></td>
</tr>
<tr>
<td><strong>N/A</strong></td>
<td><strong>Security fixes for <code>apigee-envoy</code>.</strong> <br/>This addresses the following vulnerability: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-4911">CVE-2023-4911</a> </li></ul></td>
</tr>
<tr>
<td><strong>N/A</strong></td>
<td><strong>Security fixes for <code>apigee-fluent-bit</code>.</strong> <br/>This addresses the following vulnerability: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-50387">CVE-2023-50387</a> </li></ul></td>
</tr>
<tr>
<td><strong>N/A</strong></td>
<td><strong>Security fixes for <code>apigee-hybrid-cassandra</code>.</strong> <br/>This addresses the following vulnerabilities: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-37920">CVE-2023-37920</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-21930">CVE-2023-21930</a> </li></ul></td>
</tr>
<tr>
<td><strong>N/A</strong></td>
<td><strong>Security fixes for <code>apigee-hybrid-cassandra-client</code>.</strong> <br/>This addresses the following vulnerability: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2024-24790">CVE-2024-24790</a> </li></ul></td>
</tr>
<tr>
<td><strong>N/A</strong></td>
<td><strong>Security fixes for <code>apigee-mart-server</code>.</strong> <br/>This addresses the following vulnerabilities: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2024-22201">CVE-2024-22201</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-44487">CVE-2023-44487</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-36478">CVE-2023-36478</a> </li></ul></td>
</tr>
<tr>
<td><strong>N/A</strong></td>
<td><strong>Security fixes for <code>apigee-mint-task-scheduler</code>.</strong> <br/>This addresses the following vulnerabilities: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2024-22201">CVE-2024-22201</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-44487">CVE-2023-44487</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-36478">CVE-2023-36478</a> </li></ul></td>
</tr>
<tr>
<td><strong>N/A</strong></td>
<td><strong>Security fixes for <code>apigee-operators</code>.</strong> <br/>This addresses the following vulnerabilities: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-30123">CVE-2022-30123</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-8165">CVE-2020-8165</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-14001">CVE-2020-14001</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-5477">CVE-2019-5477</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-11068">CVE-2019-11068</a> </li></ul></td>
</tr>
<tr>
<td><strong>N/A</strong></td>
<td><strong>Security fixes for <code>apigee-prom-prometheus</code>.</strong> <br/>This addresses the following vulnerability: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2024-24790">CVE-2024-24790</a> </li></ul></td>
</tr>
<tr>
<td><strong>N/A</strong></td>
<td><strong>Security fixes for <code>apigee-prometheus-adapter</code>.</strong> <br/>This addresses the following vulnerability: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2024-24790">CVE-2024-24790</a> </li></ul></td>
</tr>
<tr>
<td><strong>N/A</strong></td>
<td><strong>Security fixes for <code>apigee-redis</code>.</strong> <br/>This addresses the following vulnerabilities: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-45285">CVE-2023-45285</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-44487">CVE-2023-44487</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-39325">CVE-2023-39325</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-39323">CVE-2023-39323</a> </li></ul></td>
</tr>
<tr>
<td><strong>N/A</strong></td>
<td><strong>Security fixes for <code>apigee-udca</code>.</strong> <br/>This addresses the following vulnerability: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2024-24790">CVE-2024-24790</a> </li></ul></td>
</tr>
<tr>
<td><strong>N/A</strong></td>
<td><strong>Security fixes for <code>apigee-watcher</code>.</strong> <br/>This addresses the following vulnerability: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2024-24790">CVE-2024-24790</a> </li></ul></td>
</tr>
<tr>
<td><strong>N/A</strong></td>
<td><strong>Security fixes for <code>cassandra-backup-utility</code>.</strong> <br/>This addresses the following vulnerability: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2024-24790">CVE-2024-24790</a> </li></ul></td>
</tr>
</tbody>
</table>
]]>
    </content>
  </entry>

  <entry>
    <title>July 31, 2024</title>
    <id>tag:google.com,2016:apigee-hybrid-release-notes#July_31_2024</id>
    <updated>2024-07-31T00:00:00-07:00</updated>
    <link rel="alternate" href="https://docs.cloud.google.com/apigee/docs/hybrid/release-notes#July_31_2024"/>
    <content type="html"><![CDATA[<strong class="release-note-product-version-title">1.11.2-hotfix.2</strong>
<h3>Announcement</h3>
<h3 id="hybrid_1112-hotfix2">hybrid 1.11.2-hotfix.2</h3>
<p>On July 31, 2024 we released an updated version of the Apigee hybrid software, 1.11.2-hotfix.2.</p>
<p><strong>Note:</strong> This release reflects a change to the component images and not the Helm chart templates. If your hybrid installation is currently on Apigee hybrid v1.11.2, Apply this hotfix with the following steps: </p>
<ol>
<li><p>In your overrides file, update the <code>image.url</code> and <code>image.tag</code> properties of <code>ao</code> and <code>runtime</code>: </p>
<pre class="prettyprint"><code>ao:
  image:
    url: "gcr.io/apigee-release/hybrid/apigee-operators"
    tag: "1.11.2-hotfix.2"

runtime:
  image:
    url: "gcr.io/apigee-release/hybrid/apigee-runtime"
    tag: "1.11.2-hotfix.2"
</code></pre></li>
<li><p>Install the hotfix release:</p>
<ul>
<li><p>For Helm-managed releases, update the <code>apigee-operator</code> with the <code>helm upgrade</code> command and your current overrides files: </p>
<pre class="prettyprint"><code>helm upgrade operator apigee-operator/ \
  --namespace apigee-system \
  --atomic \
  -f overrides.yaml 
</code></pre>
<p>For each environment in your Apigee org:</p>
<pre class="prettyprint"><code>helm upgrade ENV_RELEASE_NAME apigee-env/ \
  --namespace APIGEE_NAMESPACE \
  --set env=ENV_NAME \
  --atomic \
  -f overrides.yaml 
</code></pre>
<ul>
<li><var>ENV_RELEASE_NAME</var> is a name used to keep track of installation and upgrades of the <code>apigee-env chart</code>. This name must be unique from the other Helm release names in your installation. Usually this is the same as <var>ENV_NAME</var>. However, if your environment has the same name as your environment group, you must use different release names for the environment and environment group, for example <code>dev-env-release</code> and <code>dev-envgroup-release</code>. For more information on releases in Helm, see <a href="https://helm.sh/docs/intro/using_helm/#three-big-concepts">Three big concepts</a> in the Helm documentation.</li>
<li><var>APIGEE_NAMESPACE</var> is your installation's namespace. The default is <code>apigee</code>.</li>
<li><var>ENV_NAME</var> is the name of the environment you are upgrading.</li>
</ul></li>
<li><p>For <code>apigeectl</code>-managed releases:</p>
<ol>
<li><p>install the hotfix release with <code>apigeectl init</code> using your updated overrides file: </p>
<pre class="prettyprint"><code>${APIGEECTL_HOME}/apigeectl init -f OVERRIDES_FILE --dry-run=client 
</code></pre>
<p>Followed by:</p>
<pre class="prettyprint"><code>${APIGEECTL_HOME}/apigeectl init -f OVERRIDES_FILE 
</code></pre></li>
<li><p>Apply the hotfix release with <code>apigeectl apply</code>: </p>
<pre class="prettyprint"><code>${APIGEECTL_HOME}/apigeectl apply -f OVERRIDES_FILE --all-envs --dry-run=client 
</code></pre>
<p>Followed by:</p>
<pre class="prettyprint"><code>${APIGEECTL_HOME}/apigeectl apply -f OVERRIDES_FILE --all-envs
</code></pre></li>
</ol></li>
</ul></li>
</ol>
<ul>
<li>For information on upgrading, see <a href="https://docs.cloud.google.com/apigee/docs/hybrid/v1.11/upgrade">Upgrading Apigee hybrid to version 1.11</a>. </li>
<li>For information on new installations, see <a href="https://docs.cloud.google.com/apigee/docs/hybrid/v1.11/big-picture">The big picture</a>.</li>
</ul>
<h3>Fixed</h3>
<table>
<thead>
<tr>
<th>Bug ID</th>
<th>Description</th>
</tr>
</thead>
<tbody>
<tr>
<td><strong>351868444</strong></td>
<td><strong>Tolerations are now working for Redis's Envoy pod.</strong></td>
</tr>
<tr>
<td><strong>297539870</strong></td>
<td><strong><code>HTTPTargetConnection</code> property <code>io.timeout.millis</code> is now honored correctly when using websockets.</strong></td>
</tr>
</tbody>
</table>
]]>
    </content>
  </entry>

  <entry>
    <title>July 30, 2024</title>
    <id>tag:google.com,2016:apigee-hybrid-release-notes#July_30_2024</id>
    <updated>2024-07-30T00:00:00-07:00</updated>
    <link rel="alternate" href="https://docs.cloud.google.com/apigee/docs/hybrid/release-notes#July_30_2024"/>
    <content type="html"><![CDATA[<strong class="release-note-product-version-title">1.12.1-hotfix.1</strong>
<h3>Announcement</h3>
<h3 id="hybrid_1121-hotfix1">hybrid 1.12.1-hotfix.1</h3>
<p>On July 30, 2024 we released an updated version of the Apigee hybrid software, 1.12.1-hotfix.1.</p>
<p><strong>Note:</strong> This release reflects a change to the component images and not the Helm chart templates. If your hybrid installation is currently on Apigee hybrid v1.12.1, Apply this hotfix with the following steps: </p>
<ol>
<li><p>In your overrides file, update the <code>ao.image.url</code> and <code>ao.image.tag</code> properties: </p>
<pre class="prettyprint"><code>ao:
  image:
    url: "gcr.io/apigee-release/hybrid/apigee-operators"
    tag: "1.12.1-hotfix.1"
</code></pre></li>
<li><p>Install the hotfix release. Update the <code>apigee-operator</code> component with the <code>helm upgrade</code> command and your current overrides files: </p>
<pre class="prettyprint"><code>   helm upgrade operator apigee-operator/ \
     --namespace apigee-system \
     --atomic \
     -f overrides.yaml 
</code></pre></li>
</ol>
<ul>
<li>For information on upgrading, see <a href="https://docs.cloud.google.com/apigee/docs/hybrid/v1.12/upgrade">Upgrading Apigee hybrid to version 1.12</a>. </li>
<li>For information on new installations, see <a href="https://docs.cloud.google.com/apigee/docs/hybrid/v1.12/big-picture">The big picture</a>.</li>
</ul>
<h3>Fixed</h3>
<table>
<thead>
<tr>
<th>Bug ID</th>
<th>Description</th>
</tr>
</thead>
<tbody>
<tr>
<td><strong>351868444</strong></td>
<td><strong>Tolerations are now working for Redis's Envoy pod.</strong></td>
</tr>
</tbody>
</table>
]]>
    </content>
  </entry>

  <entry>
    <title>June 28, 2024</title>
    <id>tag:google.com,2016:apigee-hybrid-release-notes#June_28_2024</id>
    <updated>2024-06-28T00:00:00-07:00</updated>
    <link rel="alternate" href="https://docs.cloud.google.com/apigee/docs/hybrid/release-notes#June_28_2024"/>
    <content type="html"><![CDATA[<strong class="release-note-product-version-title">v1.12.1</strong>
<h3>Announcement</h3>
<h3 id="hybrid_v1121">hybrid v1.12.1</h3>
<p>On June 28, 2024 we released an updated version of the Apigee hybrid software, 1.12.1.</p>
<ul>
<li>For information on upgrading, see <a href="https://docs.cloud.google.com/apigee/docs/hybrid/v1.12/upgrade">Upgrading Apigee hybrid to version 1.12.1</a>. </li>
<li>For information on new installations, see <a href="https://docs.cloud.google.com/apigee/docs/hybrid/v1.12/big-picture">The big picture</a>.</li>
</ul>
<h3>Fixed</h3>
<table>
<thead>
<tr>
<th>Bug ID</th>
<th>Description</th>
</tr>
</thead>
<tbody>
<tr>
<td><strong>347798999</strong></td>
<td><strong>Fixed an issue preventing configuration of forward proxies for OpenTelemetry collector pods.</strong></td>
</tr>
<tr>
<td><strong>345501069</strong></td>
<td><strong>Fixed issue with Hybrid Guardrails resource configuration preventing the Guardails pod from starting.</strong></td>
</tr>
<tr>
<td><strong>341797795</strong></td>
<td><strong>Autofill the Hybrid Guardrails checkpoint value if a checkpoint is not provided.</strong></td>
</tr>
<tr>
<td><strong>340248314</strong></td>
<td><strong>Added support for <code>targetCPUUtilizationPercentage</code> to <a href="https://docs.cloud.google.com/apigee/docs/hybrid/v1.12/config-prop-ref.html#apigeeingressgateway-targetcpuutilizationpercentage"><code>apigeeIngressGateway</code></a> and <a href="https://docs.cloud.google.com/apigee/docs/hybrid/v1.12/config-prop-ref.html#ingressgateways-targetcpuutilizationpercentage"><code>ingressGateways</code></a>.</strong> The default value is 75.</td>
</tr>
<tr>
<td><strong>324779388</strong></td>
<td><strong>Improved error handling for backup and restore.</strong></td>
</tr>
<tr>
<td><strong>311489774</strong></td>
<td><strong>Removed inclusion of Java in Cassandra client image..</strong></td>
</tr>
<tr>
<td><strong>310338146</strong></td>
<td><strong>Fixed invalid download directory output from the <a href="https://docs.cloud.google.com/apigee/docs/hybrid/v1.12/create-service-account"><code>create-service-account</code></a> tool.</strong></td>
</tr>
<tr>
<td><strong>300135626</strong></td>
<td><strong>Removed inclusion of Java in Cassandra Backup Utility image.</strong></td>
</tr>
<tr>
<td><strong>239523766</strong></td>
<td><strong>Remove "Unable to evaluate jsonVariable, returning null" logging string from <em>ExtractVariables</em> Policy</strong></td>
</tr>
</tbody>
</table>
<h3>Security</h3>
<table>
<thead>
<tr>
<th>Bug ID</th>
<th>Description</th>
</tr>
</thead>
<tbody>
<tr>
<td><strong>345791712</strong></td>
<td><strong>Security fix for <code>fluent-bit</code>.</strong> <br/>This addresses the following vulnerability: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2024-4323">CVE-2024-4323</a> </li></ul></td>
</tr>
<tr>
<td><strong>335910066</strong></td>
<td><strong>Security fixes for <code>apigee-kube-rbac-proxy</code>.</strong> <br/>This addresses the following vulnerability: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-47108">CVE-2023-47108</a> </li></ul></td>
</tr>
<tr>
<td><strong>335909737</strong></td>
<td><strong>Security fixes for <code>apigee-asm-ingress</code>.</strong> <br/>This addresses the following vulnerabilities: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2024-24557">CVE-2024-24557</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2024-21664">CVE-2024-21664</a></li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-6779">CVE-2023-6779</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-6246">CVE-2023-6246</a></li></ul></td>
</tr>
<tr>
<td><strong>335909397</strong></td>
<td><strong>Security fixes for <code>apigee-open-telemetry-collector</code>.</strong> <br/>This addresses the following vulnerability: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-47108">CVE-2023-47108</a> </li></ul></td>
</tr>
<tr>
<td><strong>335908990</strong></td>
<td><strong>Security fixes for <code>apigee-asm-istiod</code>.</strong> <br/>This addresses the following vulnerabilities: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2024-24557">CVE-2024-24557</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2024-21664">CVE-2024-21664</a></li></ul></td>
</tr>
<tr>
<td><strong>335908985</strong></td>
<td><strong>Security fix for <code>apigee-prometheus-adapter</code>.</strong> <br/>This addresses the following vulnerabilities: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-47108">CVE-2023-47108</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-45285">CVE-2023-45285</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-45142">CVE-2023-45142</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-44487">CVE-2023-44487</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-39325">CVE-2023-39325</a> </li></ul>.</td>
</tr>
<tr>
<td><strong>335908657</strong></td>
<td><strong>Security fixes for <code>apigee-prom-prometheus</code>.</strong> <br/>This addresses the following vulnerabilities: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2024-24557">CVE-2024-24557</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-45285">CVE-2023-45285</a></li></ul></td>
</tr>
<tr>
<td><strong>335908139</strong></td>
<td><strong>Security fix for <code>fluent-bit</code>.</strong> <br/>This addresses the following vulnerability: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2024-0985">CVE-2024-0985</a> </li></ul></td>
</tr>
<tr>
<td><strong>332821083</strong></td>
<td><strong>Security fix for <code>apigee-operators</code>.</strong> <br/>This addresses the following vulnerability: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2024-24786">CVE-2024-24786</a> </li></ul></td>
</tr>
<tr>
<td><strong>317528509</strong></td>
<td><strong>Security fixes for <code>apigee-synchronizer</code>.</strong> <br/>This addresses the following vulnerabilities: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-34462">CVE-2023-34462</a></li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-32732">CVE-2023-32732</a></li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-32731">CVE-2023-32731</a></li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-1428">CVE-2023-1428</a> </li></ul></td>
</tr>
<tr>
<td><strong>308835165</strong></td>
<td><strong>Security fix for <code>apigee-synchronizer</code>.</strong> <br/>This addresses the following vulnerability: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-34462">CVE-2023-34462</a> </li></ul></td>
</tr>
<tr>
<td><strong>N/A</strong></td>
<td><strong>Security fixes for <code>apigee-asm-ingress</code>.</strong> <br/>This addresses the following vulnerabilities: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-6779">CVE-2023-6779</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-6246">CVE-2023-6246</a> </li></ul></td>
</tr>
<tr>
<td><strong>N/A</strong></td>
<td><strong>Security fixes for <code>apigee-asm-istiod</code>.</strong> <br/>This addresses the following vulnerabilities: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2024-21664">CVE-2024-21664</a> </li></ul></td>
</tr>
<tr>
<td><strong>N/A</strong></td>
<td><strong>Security fixes for <code>apigee-cassandra-backup-utility</code>.</strong> <br/>This addresses the following vulnerabilities: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-50782">CVE-2023-50782</a> </li></ul></td>
</tr>
<tr>
<td><strong>N/A</strong></td>
<td><strong>Security fixes for <code>apigee-fluent-bit</code>.</strong> <br/>This addresses the following vulnerabilities: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-4899">CVE-2022-4899</a> </li></ul></td>
</tr>
<tr>
<td><strong>N/A</strong></td>
<td><strong>Security fixes for <code>apigee-hybrid-cassandra</code>.</strong> <br/>This addresses the following vulnerabilities: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-50782">CVE-2023-50782</a> </li></ul></td>
</tr>
<tr>
<td><strong>N/A</strong></td>
<td><strong>Security fixes for <code>apigee-kube-rbac-proxy</code>.</strong> <br/>This addresses the following vulnerabilities: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-47108">CVE-2023-47108</a> </li></ul></td>
</tr>
<tr>
<td><strong>N/A</strong></td>
<td><strong>Security fixes for <code>apigee-prometheus-adapter</code>.</strong> <br/>This addresses the following vulnerabilities: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-47108">CVE-2023-47108</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-45142">CVE-2023-45142</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-44487">CVE-2023-44487</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-39325">CVE-2023-39325</a> </li></ul></td>
</tr>
<tr>
<td><strong>N/A</strong></td>
<td><strong>Security fixes for <code>apigee-stackdriver-prometheus-sidecar</code>.</strong> <br/>This addresses the following vulnerabilities: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-45287">CVE-2023-45287</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-45285">CVE-2023-45285</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-45283">CVE-2023-45283</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-44487">CVE-2023-44487</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-39325">CVE-2023-39325</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-39323">CVE-2023-39323</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-29405">CVE-2023-29405</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-29404">CVE-2023-29404</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-29403">CVE-2023-29403</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-29402">CVE-2023-29402</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-29400">CVE-2023-29400</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-24540">CVE-2023-24540</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-24539">CVE-2023-24539</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-24538">CVE-2023-24538</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-24537">CVE-2023-24537</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-24536">CVE-2023-24536</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-24534">CVE-2023-24534</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-41725">CVE-2022-41725</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-41724">CVE-2022-41724</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-41723">CVE-2022-41723</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-41722">CVE-2022-41722</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-41720">CVE-2022-41720</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-41716">CVE-2022-41716</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-41715">CVE-2022-41715</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-32189">CVE-2022-32189</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-30635">CVE-2022-30635</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-30633">CVE-2022-30633</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-30632">CVE-2022-30632</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-30631">CVE-2022-30631</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-30630">CVE-2022-30630</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-30580">CVE-2022-30580</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-29804">CVE-2022-29804</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2880">CVE-2022-2880</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2879">CVE-2022-2879</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-28327">CVE-2022-28327</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-28131">CVE-2022-28131</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-27664">CVE-2022-27664</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-27536">CVE-2022-27536</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-27191">CVE-2022-27191</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-24921">CVE-2022-24921</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-24675">CVE-2022-24675</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-23806">CVE-2022-23806</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-23773">CVE-2022-23773</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-23772">CVE-2022-23772</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-21698">CVE-2022-21698</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-44716">CVE-2021-44716</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-43565">CVE-2021-43565</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-41772">CVE-2021-41772</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-41771">CVE-2021-41771</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-39293">CVE-2021-39293</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-38297">CVE-2021-38297</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-37219">CVE-2021-37219</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-33198">CVE-2021-33198</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-33196">CVE-2021-33196</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-33195">CVE-2021-33195</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-33194">CVE-2021-33194</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3121">CVE-2021-3121</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3115">CVE-2021-3115</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-27918">CVE-2021-27918</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-7919">CVE-2020-7919</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-29652">CVE-2020-29652</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-28852">CVE-2020-28852</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-28367">CVE-2020-28367</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-28366">CVE-2020-28366</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-26160">CVE-2020-26160</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-16845">CVE-2020-16845</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-14040">CVE-2020-14040</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-9634">CVE-2019-9634</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-17596">CVE-2019-17596</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-14809">CVE-2019-14809</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-11888">CVE-2019-11888</a> </li></ul></td>
</tr>
</tbody>
</table>
<strong class="release-note-product-version-title">1.10.5-hotfix.1</strong>
<h3>Announcement</h3>
<h3 id="hybrid_1105-hotfix1">hybrid 1.10.5-hotfix.1</h3>
<p>On June 28, 2024 we released an updated version of the Apigee hybrid software, 1.10.5-hotfix.1.</p>
<p><strong>Note:</strong> This release reflects a change to the Helm chart templates and not a change to the images. If your hybrid installation is currently on Apigee hybrid v1.10.5, Apply this hotfix with the following steps: </p>
<ol>
<li><p>In your overrides file, update the <code>ao.image</code> <code>url</code> and <code>tag</code>: </p>
<pre class="prettyprint"><code>ao:
  image:
    url: "gcr.io/apigee-release/hybrid/apigee-operators"
    tag: "1.10.5-hotfix.1"
</code></pre></li>
<li><p>Install the hotfix release with <code>apigeectl init</code> using your updated overrides files: </p>
<pre class="prettyprint"><code>${APIGEECTL_HOME}/apigeectl init -f OVERRIDES_FILE --dry-run=client 
</code></pre>
<p>Followed by:</p>
<pre class="prettyprint"><code>${APIGEECTL_HOME}/apigeectl init -f OVERRIDES_FILE 
</code></pre></li>
</ol>
<ul>
<li>For information on upgrading, see <a href="https://docs.cloud.google.com/apigee/docs/hybrid/v1.10/upgrade">Upgrading Apigee hybrid to version 1.10.5-hotfix.1</a>. </li>
<li>For information on new installations, see <a href="https://docs.cloud.google.com/apigee/docs/hybrid/v1.10/big-picture">The big picture</a>.</li>
</ul>
<h3>Fixed</h3>
<table>
<thead>
<tr>
<th>Bug ID</th>
<th>Description</th>
</tr>
</thead>
<tbody>
<tr>
<td><strong>347997965</strong></td>
<td><strong>Upgrading to Apigee Hybrid 1.11.2 and 1.10.5 can cause missing metrics.</strong></td>
</tr>
</tbody>
</table>
<strong class="release-note-product-version-title">1.11.2-hotfix.1</strong>
<h3>Announcement</h3>
<h3 id="hybrid_1112-hotfix1">hybrid 1.11.2-hotfix.1</h3>
<p>On June 28, 2024 we released an updated version of the Apigee hybrid software, 1.11.2-hotfix.1.</p>
<p><strong>Note:</strong> This release reflects a change to the Helm chart templates and not a change to the images. If your hybrid installation is currently on Apigee hybrid v1.11.2, Apply this hotfix with the following steps: </p>
<ol>
<li><p>In your overrides file, update the <code>ao.image</code> <code>url</code> and <code>tag</code>: </p>
<pre class="prettyprint"><code>ao:
  image:
    url: "gcr.io/apigee-release/hybrid/apigee-operators"
    tag: "1.11.2-hotfix.1"
</code></pre></li>
<li><p>Install the hotfix release:</p>
<ul>
<li><p>For Helm-managed releases, update the <code>apigee-operator</code> with the <code>helm upgrade</code> command and your current overrides files: </p>
<pre class="prettyprint"><code>helm upgrade operator apigee-operator/ \
  --namespace apigee-system \
  --atomic \
  -f overrides.yaml 
</code></pre></li>
<li><p>For <code>apigeectl</code>-managed releases, install the hotfix release with <code>apigeectl init</code> using your updated overrides files: </p>
<pre class="prettyprint"><code>${APIGEECTL_HOME}/apigeectl init -f OVERRIDES_FILE --dry-run=client 
</code></pre>
<p>Followed by:</p>
<pre class="prettyprint"><code>${APIGEECTL_HOME}/apigeectl init -f OVERRIDES_FILE 
</code></pre></li>
</ul></li>
</ol>
<ul>
<li>For information on upgrading, see <a href="https://docs.cloud.google.com/apigee/docs/hybrid/v1.11/upgrade">Upgrading Apigee hybrid to version 1.11.2-hotfix.1</a>. </li>
<li>For information on new installations, see <a href="https://docs.cloud.google.com/apigee/docs/hybrid/v1.11/big-picture">The big picture</a>.</li>
</ul>
]]>
    </content>
  </entry>

  <entry>
    <title>June 17, 2024</title>
    <id>tag:google.com,2016:apigee-hybrid-release-notes#June_17_2024</id>
    <updated>2024-06-17T00:00:00-07:00</updated>
    <link rel="alternate" href="https://docs.cloud.google.com/apigee/docs/hybrid/release-notes#June_17_2024"/>
    <content type="html"><![CDATA[<strong class="release-note-product-version-title">v1.10.5</strong>
<h3>Announcement</h3>
<h3 id="hybrid_v1105">hybrid v1.10.5</h3>
<p>On June 17, 2024 we released an updated version of the Apigee hybrid software, 1.10.5.</p>
<ul>
<li>For information on upgrading, see <a href="https://docs.cloud.google.com/apigee/docs/hybrid/v1.10/upgrade">Upgrading Apigee hybrid to version 1.10.5</a>. </li>
<li>For information on new installations, see <a href="https://docs.cloud.google.com/apigee/docs/hybrid/v1.10/big-picture">The big picture</a>.</li>
</ul>
<h3>Security</h3>
<table>
<thead>
<tr>
<th>Bug ID</th>
<th>Description</th>
</tr>
</thead>
<tbody>
<tr>
<td><strong>329540114</strong></td>
<td><strong>Security fix for <code>apigee-installer</code>.</strong> <br/>This addresses the following vulnerability: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2024-24786">CVE-2024-24786</a> </li></ul></td>
</tr>
<tr>
<td><strong>317528509</strong></td>
<td><strong>Security fix for <code>apigee-synchronizer</code>.</strong> <br/>This addresses the following vulnerabilities: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-34462">CVE-2023-34462</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-32732">CVE-2023-32732</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-32731">CVE-2023-32731</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-1428">CVE-2023-1428</a> </li></ul></td>
</tr>
<tr>
<td><strong>N/A</strong></td>
<td><strong>Security fixes for <code>apigee-synchronizer</code>.</strong> <br/>This addresses the following vulnerability: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-44487">CVE-2023-44487</a> </li></ul></td>
</tr>
<tr>
<td><strong>N/A</strong></td>
<td><strong>Security fixes for <code>apigee-asm-ingress</code> and <code>apigee-asm-istiod</code>.</strong> <br/>This addresses the following vulnerability: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-45285">CVE-2023-45285</a> </li></ul></td>
</tr>
<tr>
<td><strong>N/A</strong></td>
<td><strong>Security fixes for <code>apigee-cassandra-backup-utility</code>.</strong> <br/>This addresses the following vulnerabilities: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-6378">CVE-2023-6378</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-45285">CVE-2023-45285</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-44487">CVE-2023-44487</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-43642">CVE-2023-43642</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-39325">CVE-2023-39325</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-34455">CVE-2023-34455</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-34454">CVE-2023-34454</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-34453">CVE-2023-34453</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-30601">CVE-2023-30601</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-2976">CVE-2023-2976</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-42004">CVE-2022-42004</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-42003">CVE-2022-42003</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-25857">CVE-2022-25857</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1471">CVE-2022-1471</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-44521">CVE-2021-44521</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-20190">CVE-2021-20190</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-36518">CVE-2020-36518</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-36189">CVE-2020-36189</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-36188">CVE-2020-36188</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-36187">CVE-2020-36187</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-36186">CVE-2020-36186</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-36185">CVE-2020-36185</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-36184">CVE-2020-36184</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-36183">CVE-2020-36183</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-36182">CVE-2020-36182</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-36181">CVE-2020-36181</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-36180">CVE-2020-36180</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-36179">CVE-2020-36179</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-35728">CVE-2020-35728</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-35491">CVE-2020-35491</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-35490">CVE-2020-35490</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-25649">CVE-2020-25649</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-24750">CVE-2020-24750</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-24616">CVE-2020-24616</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-17516">CVE-2020-17516</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-14195">CVE-2020-14195</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-14062">CVE-2020-14062</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-14061">CVE-2020-14061</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-14060">CVE-2020-14060</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-16869">CVE-2019-16869</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2017-18640">CVE-2017-18640</a> </li></ul></td>
</tr>
<tr>
<td><strong>N/A</strong></td>
<td><strong>Security fixes for <code>apigee-connect-agent</code>.</strong> <br/>This addresses the following vulnerability: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-45283">CVE-2023-45283</a> </li></ul></td>
</tr>
<tr>
<td><strong>N/A</strong></td>
<td><strong>Security fixes for <code>apigee-diagnostics-collector</code>.</strong> <br/>This addresses the following vulnerabilities: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-44487">CVE-2023-44487</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-36478">CVE-2023-36478</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-32731">CVE-2023-32731</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-21930">CVE-2023-21930</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-1428">CVE-2023-1428</a> </li></ul></td>
</tr>
<tr>
<td><strong>N/A</strong></td>
<td><strong>Security fixes for <code>apigee-fluent-bit</code>.</strong> <br/>This addresses the following vulnerabilities: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-5869">CVE-2023-5869</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-39417">CVE-2023-39417</a> </li></ul></td>
</tr>
<tr>
<td><strong>N/A</strong></td>
<td><strong>Security fixes for <code>apigee-hybrid-cassandra</code>.</strong> <br/>This addresses the following vulnerabilities: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-49083">CVE-2023-49083</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-45285">CVE-2023-45285</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-45283">CVE-2023-45283</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-44487">CVE-2023-44487</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-36632">CVE-2023-36632</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-30601">CVE-2023-30601</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-24329">CVE-2023-24329</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-48565">CVE-2022-48565</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-48560">CVE-2022-48560</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-45061">CVE-2022-45061</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-41881">CVE-2022-41881</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-34169">CVE-2022-34169</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-26488">CVE-2022-26488</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-21476">CVE-2022-21476</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0391">CVE-2022-0391</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-44521">CVE-2021-44521</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-37137">CVE-2021-37137</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-37136">CVE-2021-37136</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-28667">CVE-2021-28667</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-20190">CVE-2021-20190</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-36518">CVE-2020-36518</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-36189">CVE-2020-36189</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-36188">CVE-2020-36188</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-36187">CVE-2020-36187</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-36186">CVE-2020-36186</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-36185">CVE-2020-36185</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-36184">CVE-2020-36184</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-36183">CVE-2020-36183</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-36182">CVE-2020-36182</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-36181">CVE-2020-36181</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-36180">CVE-2020-36180</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-36179">CVE-2020-36179</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-35728">CVE-2020-35728</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-35491">CVE-2020-35491</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-35490">CVE-2020-35490</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-25649">CVE-2020-25649</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-24750">CVE-2020-24750</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-24616">CVE-2020-24616</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-17516">CVE-2020-17516</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-14195">CVE-2020-14195</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-14062">CVE-2020-14062</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-14061">CVE-2020-14061</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-14060">CVE-2020-14060</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-10650">CVE-2020-10650</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-9674">CVE-2019-9674</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-20445">CVE-2019-20445</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-20444">CVE-2019-20444</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-0205">CVE-2019-0205</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2018-1320">CVE-2018-1320</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2017-5929">CVE-2017-5929</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2017-17522">CVE-2017-17522</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2016-5397">CVE-2016-5397</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2015-5652">CVE-2015-5652</a> </li></ul></td>
</tr>
<tr>
<td><strong>N/A</strong></td>
<td><strong>Security fixes for <code>apigee-hybrid-cassandra-client</code>.</strong> <br/>This addresses the following vulnerabilities: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-6378">CVE-2023-6378</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-44487">CVE-2023-44487</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-43642">CVE-2023-43642</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-36632">CVE-2023-36632</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-34455">CVE-2023-34455</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-34454">CVE-2023-34454</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-34453">CVE-2023-34453</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-30601">CVE-2023-30601</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-2976">CVE-2023-2976</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-24329">CVE-2023-24329</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-48565">CVE-2022-48565</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-48560">CVE-2022-48560</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-45061">CVE-2022-45061</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-42004">CVE-2022-42004</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-42003">CVE-2022-42003</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-41881">CVE-2022-41881</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-34169">CVE-2022-34169</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-26488">CVE-2022-26488</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-25857">CVE-2022-25857</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-21476">CVE-2022-21476</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1471">CVE-2022-1471</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0391">CVE-2022-0391</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-44521">CVE-2021-44521</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-37137">CVE-2021-37137</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-37136">CVE-2021-37136</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-28667">CVE-2021-28667</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-20190">CVE-2021-20190</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-36518">CVE-2020-36518</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-36189">CVE-2020-36189</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-36188">CVE-2020-36188</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-36187">CVE-2020-36187</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-36186">CVE-2020-36186</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-36185">CVE-2020-36185</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-36184">CVE-2020-36184</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-36183">CVE-2020-36183</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-36182">CVE-2020-36182</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-36181">CVE-2020-36181</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-36180">CVE-2020-36180</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-36179">CVE-2020-36179</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-35728">CVE-2020-35728</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-35491">CVE-2020-35491</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-35490">CVE-2020-35490</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-25649">CVE-2020-25649</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-24750">CVE-2020-24750</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-24616">CVE-2020-24616</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-17516">CVE-2020-17516</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-14195">CVE-2020-14195</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-14062">CVE-2020-14062</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-14061">CVE-2020-14061</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-14060">CVE-2020-14060</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-10650">CVE-2020-10650</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-9674">CVE-2019-9674</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-20445">CVE-2019-20445</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-20444">CVE-2019-20444</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-16869">CVE-2019-16869</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-0205">CVE-2019-0205</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2018-1320">CVE-2018-1320</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2017-5929">CVE-2017-5929</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2017-18640">CVE-2017-18640</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2017-17522">CVE-2017-17522</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2016-5397">CVE-2016-5397</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2015-5652">CVE-2015-5652</a> </li></ul></td>
</tr>
<tr>
<td><strong>N/A</strong></td>
<td><strong>Security fixes for <code>apigee-kube-rbac-proxy</code>.</strong> <br/>This addresses the following vulnerabilities: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-47108">CVE-2023-47108</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-45285">CVE-2023-45285</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-45142">CVE-2023-45142</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-44487">CVE-2023-44487</a> </li></ul></td>
</tr>
<tr>
<td><strong>N/A</strong></td>
<td><strong>Security fixes for <code>apigee-mart-server</code>.</strong> <br/>This addresses the following vulnerabilities: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-32731">CVE-2023-32731</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-1428">CVE-2023-1428</a> </li></ul></td>
</tr>
<tr>
<td><strong>N/A</strong></td>
<td><strong>Security fixes for <code>apigee-mint-task-scheduler</code>.</strong> <br/>This addresses the following vulnerabilities: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-32731">CVE-2023-32731</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-1428">CVE-2023-1428</a> </li></ul></td>
</tr>
<tr>
<td><strong>N/A</strong></td>
<td><strong>Security fixes for <code>apigee-prom-prometheus</code>.</strong> <br/>This addresses the following vulnerabilities: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-45285">CVE-2023-45285</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-45142">CVE-2023-45142</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-44487">CVE-2023-44487</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-39325">CVE-2023-39325</a> </li></ul></td>
</tr>
<tr>
<td><strong>N/A</strong></td>
<td><strong>Security fixes for <code>apigee-prometheus-adapter</code>.</strong> <br/>This addresses the following vulnerabilities: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-47108">CVE-2023-47108</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-45285">CVE-2023-45285</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-45283">CVE-2023-45283</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-45142">CVE-2023-45142</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-44487">CVE-2023-44487</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-39325">CVE-2023-39325</a> </li></ul></td>
</tr>
<tr>
<td><strong>N/A</strong></td>
<td><strong>Security fixes for <code>apigee-runtime</code>.</strong> <br/>This addresses the following vulnerabilities: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-44487">CVE-2023-44487</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-32731">CVE-2023-32731</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-1428">CVE-2023-1428</a> </li></ul></td>
</tr>
<tr>
<td><strong>N/A</strong></td>
<td><strong>Security fixes for <code>apigee-udca</code>.</strong> <br/>This addresses the following vulnerabilities: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-45285">CVE-2023-45285</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-45283">CVE-2023-45283</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-44487">CVE-2023-44487</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-39325">CVE-2023-39325</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-39323">CVE-2023-39323</a> </li></ul></td>
</tr>
</tbody>
</table>
]]>
    </content>
  </entry>

  <entry>
    <title>June 10, 2024</title>
    <id>tag:google.com,2016:apigee-hybrid-release-notes#June_10_2024</id>
    <updated>2024-06-10T00:00:00-07:00</updated>
    <link rel="alternate" href="https://docs.cloud.google.com/apigee/docs/hybrid/release-notes#June_10_2024"/>
    <content type="html"><![CDATA[<strong class="release-note-product-version-title">v1.11.2</strong>
<h3>Announcement</h3>
<h3 id="hybrid_v1112">hybrid v1.11.2</h3>
<p>On June 10, 2024 we released an updated version of the Apigee hybrid software, 1.11.2.</p>
<ul>
<li>For information on upgrading, see <a href="https://docs.cloud.google.com/apigee/docs/hybrid/v1.11/upgrade">Upgrading Apigee hybrid to version 1.11.2</a>. </li>
<li>For information on new installations, see <a href="https://docs.cloud.google.com/apigee/docs/hybrid/v1.11/big-picture">The big picture</a>.</li>
</ul>
<h3>Fixed</h3>
<table>
<thead>
<tr>
<th>Bug ID</th>
<th>Description</th>
</tr>
</thead>
<tbody>
<tr>
<td><strong>340248314</strong></td>
<td><strong>Added support for <code>targetCPUUtilizationPercentage</code> to <a href="https://docs.cloud.google.com/apigee/docs/hybrid/v1.11/config-prop-ref.html#apigeeingressgateway-targetcpuutilizationpercentage"><code>apigeeIngressGateway</code></a> and <a href="https://docs.cloud.google.com/apigee/docs/hybrid/v1.11/config-prop-ref.html#ingressgateways-targetcpuutilizationpercentage"><code>ingressGateways</code></a> for hybrid installations managed with Helm.</strong> The default value is 75. <br/><strong>Note:</strong> <code>targetCPUUtilizationPercentage</code> is not supported for <code>apigeectl</code>.</td>
</tr>
<tr>
<td><strong>324779388</strong></td>
<td><strong>Improved error handling for backup and restore.</strong></td>
</tr>
<tr>
<td><strong>311489774</strong></td>
<td><strong>Removed inclusion of Java and Python installations in Cassandra client image.</strong></td>
</tr>
<tr>
<td><strong>300135626</strong></td>
<td><strong>Removed inclusion of Java and Python installations in Cassandra Backup Utility image.</strong></td>
</tr>
<tr>
<td><strong>181569113</strong></td>
<td><strong>Fixed an issue in new debug session creation.</strong></td>
</tr>
</tbody>
</table>
<h3>Security</h3>
<table>
<thead>
<tr>
<th>Bug ID</th>
<th>Description</th>
</tr>
</thead>
<tbody>
<tr>
<td><strong>345520525</strong></td>
<td><strong>Security fixes for <code>apigee-asm-ingress.</code> and <code>apigee-asm-istiod</code>.</strong> <br/>This addresses the following vulnerabilities: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2024-24557">CVE-2024-24557</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2024-21664">CVE-2024-21664</a></li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-6779">CVE-2023-6779</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-6246">CVE-2023-6246</a></li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2018-20796">CVE-2018-20796</a> </li></ul></td>
</tr>
<tr>
<td><strong>335908139</strong></td>
<td><strong>Security fixes for <code>apigee-fluent-bit</code>.</strong> <br/>This addresses the following vulnerability: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2024-0985">CVE-2024-0985</a> </li></ul></td>
</tr>
<tr>
<td><strong>333121802</strong></td>
<td><strong>Security fixes for <code>apigee-cassandra-backup-utility.</code> and <code>apigee-hybrid-cassandra</code>.</strong> <br/>This addresses the following vulnerability: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-50782">CVE-2023-50782</a> </li></ul></td>
</tr>
<tr>
<td><strong>317528509</strong></td>
<td><strong>Security fix for <code>apigee-synchronizer</code>.</strong> <br/>This addresses the following vulnerabilities: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-34462">CVE-2023-34462</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-32732">CVE-2023-32732</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-32731">CVE-2023-32731</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-1428">CVE-2023-1428</a> </li></ul></td>
</tr>
<tr>
<td><strong>317447390</strong></td>
<td><strong>Security fix for <code>apigee-operators</code>.</strong> <br/>This addresses the following vulnerability: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-48795">CVE-2023-48795</a> </li></ul></td>
</tr>
<tr>
<td><strong>329762216</strong></td>
<td><strong>Security fix for <code>apigee-installer</code>.</strong> <br/>This addresses the following vulnerability: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2024-24786">CVE-2024-24786</a> </li></ul></td>
</tr>
<tr>
<td><strong>308835165</strong></td>
<td><strong>Security fixes for <code>apigee-synchronizer</code>.</strong> <br/>This addresses the following vulnerability: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-34462">CVE-2023-34462</a> </li></ul></td>
</tr>
<tr>
<td><strong>308926079</strong></td>
<td><strong>Security fixes for <code>apigee-kube-rbac-proxy</code>.</strong> <br/>This addresses the following vulnerabilities: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-45142">CVE-2023-45142</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-44487">CVE-2023-44487</a> </li></ul></td>
</tr>
<tr>
<td><strong>300091388</strong></td>
<td><strong>Security fixes for Apigee Connect Agent.</strong> <br/>This addresses the following vulnerability: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-39323">CVE-2023-39323</a> </li></ul></td>
</tr>
<tr>
<td><strong>N/A</strong></td>
<td><strong>Security fixes for <code>apigee-cassandra-backup-utility</code>.</strong> <br/>This addresses the following vulnerability: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-6378">CVE-2023-6378</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-49083">CVE-2023-49083</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-45285">CVE-2023-45285</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-45283">CVE-2023-45283</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-44487">CVE-2023-44487</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-43642">CVE-2023-43642</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-39325">CVE-2023-39325</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-36632">CVE-2023-36632</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-34455">CVE-2023-34455</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-34454">CVE-2023-34454</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-34453">CVE-2023-34453</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-30601">CVE-2023-30601</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-2976">CVE-2023-2976</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-24329">CVE-2023-24329</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-2253">CVE-2023-2253</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-48565">CVE-2022-48565</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-48560">CVE-2022-48560</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-45061">CVE-2022-45061</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-42004">CVE-2022-42004</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-42003">CVE-2022-42003</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-41881">CVE-2022-41881</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-34169">CVE-2022-34169</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-26488">CVE-2022-26488</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-25857">CVE-2022-25857</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-21476">CVE-2022-21476</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1471">CVE-2022-1471</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0391">CVE-2022-0391</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-44521">CVE-2021-44521</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-37137">CVE-2021-37137</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-37136">CVE-2021-37136</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-28667">CVE-2021-28667</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-20190">CVE-2021-20190</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-36518">CVE-2020-36518</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-36189">CVE-2020-36189</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-36188">CVE-2020-36188</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-36187">CVE-2020-36187</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-36186">CVE-2020-36186</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-36185">CVE-2020-36185</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-36184">CVE-2020-36184</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-36183">CVE-2020-36183</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-36182">CVE-2020-36182</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-36181">CVE-2020-36181</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-36180">CVE-2020-36180</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-36179">CVE-2020-36179</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-35728">CVE-2020-35728</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-35491">CVE-2020-35491</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-35490">CVE-2020-35490</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-25649">CVE-2020-25649</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-24750">CVE-2020-24750</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-24616">CVE-2020-24616</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-17516">CVE-2020-17516</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-14195">CVE-2020-14195</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-14062">CVE-2020-14062</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-14061">CVE-2020-14061</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-14060">CVE-2020-14060</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-10650">CVE-2020-10650</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-9674">CVE-2019-9674</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-20445">CVE-2019-20445</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-20444">CVE-2019-20444</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-16869">CVE-2019-16869</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-0205">CVE-2019-0205</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2018-1320">CVE-2018-1320</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2017-5929">CVE-2017-5929</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2017-18640">CVE-2017-18640</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2017-17522">CVE-2017-17522</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2016-5397">CVE-2016-5397</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2015-5652">CVE-2015-5652</a> </li></ul></td>
</tr>
<tr>
<td><strong>N/A</strong></td>
<td><strong>Security fixes for <code>apigee-diagnostics-collector</code>.</strong> <br/>This addresses the following vulnerabilities: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-36478">CVE-2023-36478</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-32731">CVE-2023-32731</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-1428">CVE-2023-1428</a> </li></ul></td>
</tr>
<tr>
<td><strong>N/A</strong></td>
<td><strong>Security fixes for <code>apigee-fluent-bit</code>.</strong> <br/>This addresses the following vulnerabilities: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-5869">CVE-2023-5869</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-39417">CVE-2023-39417</a> </li></ul></td>
</tr>
<tr>
<td><strong>N/A</strong></td>
<td><strong>Security fixes for <code>apigee-hybrid-cassandra-client</code>.</strong> <br/>This addresses the following vulnerabilities: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-6378">CVE-2023-6378</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-44487">CVE-2023-44487</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-43642">CVE-2023-43642</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-36632">CVE-2023-36632</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-34455">CVE-2023-34455</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-34454">CVE-2023-34454</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-34453">CVE-2023-34453</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-30601">CVE-2023-30601</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-2976">CVE-2023-2976</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-24329">CVE-2023-24329</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-48565">CVE-2022-48565</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-48560">CVE-2022-48560</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-45061">CVE-2022-45061</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-42004">CVE-2022-42004</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-42003">CVE-2022-42003</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-41881">CVE-2022-41881</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-34169">CVE-2022-34169</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-26488">CVE-2022-26488</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-25857">CVE-2022-25857</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-21476">CVE-2022-21476</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1471">CVE-2022-1471</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0391">CVE-2022-0391</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-44521">CVE-2021-44521</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-37137">CVE-2021-37137</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-37136">CVE-2021-37136</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-28667">CVE-2021-28667</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-20190">CVE-2021-20190</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-36518">CVE-2020-36518</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-36189">CVE-2020-36189</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-36188">CVE-2020-36188</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-36187">CVE-2020-36187</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-36186">CVE-2020-36186</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-36185">CVE-2020-36185</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-36184">CVE-2020-36184</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-36183">CVE-2020-36183</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-36182">CVE-2020-36182</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-36181">CVE-2020-36181</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-36180">CVE-2020-36180</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-36179">CVE-2020-36179</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-35728">CVE-2020-35728</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-35491">CVE-2020-35491</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-35490">CVE-2020-35490</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-25649">CVE-2020-25649</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-24750">CVE-2020-24750</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-24616">CVE-2020-24616</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-17516">CVE-2020-17516</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-14195">CVE-2020-14195</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-14062">CVE-2020-14062</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-14061">CVE-2020-14061</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-14060">CVE-2020-14060</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-10650">CVE-2020-10650</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-9674">CVE-2019-9674</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-20445">CVE-2019-20445</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-20444">CVE-2019-20444</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-16869">CVE-2019-16869</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-0205">CVE-2019-0205</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2018-1320">CVE-2018-1320</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2017-5929">CVE-2017-5929</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2017-18640">CVE-2017-18640</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2017-17522">CVE-2017-17522</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2016-5397">CVE-2016-5397</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2015-5652">CVE-2015-5652</a> </li></ul></td>
</tr>
<tr>
<td><strong>N/A</strong></td>
<td><strong>Security fixes for <code>apigee-hybrid-cassandra</code>.</strong> <br/>This addresses the following vulnerabilities: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-49083">CVE-2023-49083</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-45285">CVE-2023-45285</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-45283">CVE-2023-45283</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-44487">CVE-2023-44487</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-36632">CVE-2023-36632</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-30601">CVE-2023-30601</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-24329">CVE-2023-24329</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-48565">CVE-2022-48565</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-48560">CVE-2022-48560</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-45061">CVE-2022-45061</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-41881">CVE-2022-41881</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-34169">CVE-2022-34169</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-26488">CVE-2022-26488</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-21476">CVE-2022-21476</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0391">CVE-2022-0391</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-44521">CVE-2021-44521</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-37137">CVE-2021-37137</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-37136">CVE-2021-37136</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-28667">CVE-2021-28667</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-20190">CVE-2021-20190</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-36518">CVE-2020-36518</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-36189">CVE-2020-36189</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-36188">CVE-2020-36188</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-36187">CVE-2020-36187</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-36186">CVE-2020-36186</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-36185">CVE-2020-36185</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-36184">CVE-2020-36184</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-36183">CVE-2020-36183</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-36182">CVE-2020-36182</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-36181">CVE-2020-36181</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-36180">CVE-2020-36180</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-36179">CVE-2020-36179</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-35728">CVE-2020-35728</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-35491">CVE-2020-35491</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-35490">CVE-2020-35490</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-25649">CVE-2020-25649</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-24750">CVE-2020-24750</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-24616">CVE-2020-24616</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-17516">CVE-2020-17516</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-14195">CVE-2020-14195</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-14062">CVE-2020-14062</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-14061">CVE-2020-14061</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-14060">CVE-2020-14060</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-10650">CVE-2020-10650</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-20445">CVE-2019-20445</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-20444">CVE-2019-20444</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-9674">CVE-2019-9674</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-0205">CVE-2019-0205</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2018-1320">CVE-2018-1320</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2017-17522">CVE-2017-17522</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2017-5929">CVE-2017-5929</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2016-5397">CVE-2016-5397</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2015-5652">CVE-2015-5652</a> </li></ul></td>
</tr>
<tr>
<td><strong>N/A</strong></td>
<td><strong>Security fixes for <code>apigee-kube-rbac-proxy</code>.</strong> <br/>This addresses the following vulnerabilities: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-45285">CVE-2023-45285</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-45283">CVE-2023-45283</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-45142">CVE-2023-45142</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-44487">CVE-2023-44487</a> </li></ul></td>
</tr>
<tr>
<td><strong>N/A</strong></td>
<td><strong>Security fixes for <code>apigee-mart-server</code>.</strong> <br/>This addresses the following vulnerabilities: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-32731">CVE-2023-32731</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-1428">CVE-2023-1428</a> </li></ul></td>
</tr>
<tr>
<td><strong>N/A</strong></td>
<td><strong>Security fixes for <code>apigee-mint-task-scheduler</code>.</strong> <br/>This addresses the following vulnerabilities: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-32731">CVE-2023-32731</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-1428">CVE-2023-1428</a> </li></ul></td>
</tr>
<tr>
<td><strong>N/A</strong></td>
<td><strong>Security fixes for <code>apigee-prom-prometheus</code>.</strong> <br/>This addresses the following vulnerabilities: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-45285">CVE-2023-45285</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-45142">CVE-2023-45142</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-44487">CVE-2023-44487</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-39325">CVE-2023-39325</a> </li></ul></td>
</tr>
<tr>
<td><strong>N/A</strong></td>
<td><strong>Security fixes for <code>apigee-prometheus-adapter</code>.</strong> <br/>This addresses the following vulnerabilities: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-47108">CVE-2023-47108</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-45285">CVE-2023-45285</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-45283">CVE-2023-45283</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-45142">CVE-2023-45142</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-44487">CVE-2023-44487</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-39325">CVE-2023-39325</a> </li></ul></td>
</tr>
<tr>
<td><strong>N/A</strong></td>
<td><strong>Security fixes for <code>apigee-redis</code>.</strong> <br/>This addresses the following vulnerabilities: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-45283">CVE-2023-45283</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-24834">CVE-2022-24834</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-24735">CVE-2022-24735</a> </li></ul></td>
</tr>
<tr>
<td><strong>N/A</strong></td>
<td><strong>Security fixes for <code>apigee-runtime</code>.</strong> <br/>This addresses the following vulnerabilities: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-44487">CVE-2023-44487</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-32731">CVE-2023-32731</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-1428">CVE-2023-1428</a> </li></ul></td>
</tr>
<tr>
<td><strong>N/A</strong></td>
<td><strong>Security fixes for <code>apigee-synchronizer</code>.</strong> <br/>This addresses the following vulnerabilities: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-44487">CVE-2023-44487</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-32731">CVE-2023-32731</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-1428">CVE-2023-1428</a> </li></ul></td>
</tr>
<tr>
<td><strong>N/A</strong></td>
<td><strong>Security fixes for <code>apigee-udca</code>.</strong> <br/>This addresses the following vulnerabilities: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-45285">CVE-2023-45285</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-45283">CVE-2023-45283</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-44487">CVE-2023-44487</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-39325">CVE-2023-39325</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-39323">CVE-2023-39323</a> </li></ul></td>
</tr>
<tr>
<td><strong>N/A</strong></td>
<td><strong>Security fixes for <code>apigee-watcher</code>.</strong> <br/>This addresses the following vulnerabilities: <ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-45285">CVE-2023-45285</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-44487">CVE-2023-44487</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-39325">CVE-2023-39325</a> </li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-39323">CVE-2023-39323</a> </li></ul></td>
</tr>
</tbody>
</table>
]]>
    </content>
  </entry>

  <entry>
    <title>May 28, 2024</title>
    <id>tag:google.com,2016:apigee-hybrid-release-notes#May_28_2024</id>
    <updated>2024-05-28T00:00:00-07:00</updated>
    <link rel="alternate" href="https://docs.cloud.google.com/apigee/docs/hybrid/release-notes#May_28_2024"/>
    <content type="html"><![CDATA[<strong class="release-note-product-version-title">1.12.0-hotfix.1</strong>
<h3>Announcement</h3>
<p>ANNOUNCEMENT</p>
<h3 id="hybrid_1120-hotfix1">hybrid 1.12.0-hotfix.1</h3>
<p>On May 28, 2024 we released an updated version of the Apigee hybrid software, 1.12.0-hotfix.1.</p>
<p><strong>Note:</strong> This release reflects a change to the Helm chart templates and not a change to the images. If your hybrid installation is currently on Apigee hybrid v1.12.0, you can install this hotfix release by downloading the charts with the version tag <code>1.12.0-hotfix.1</code> and updating the <code>apigee-operator</code> and <code>apigee-datastore</code> charts with the <code>helm upgrade</code> command and your current overrides files. </p>
<p>For example: </p>
<pre class="prettyprint"><code>export CHART_REPO=oci://us-docker.pkg.dev/apigee-release/apigee-hybrid-helm-charts
export CHART_VERSION=1.12.0-hotfix.1
helm pull $CHART_REPO/apigee-operator --version $CHART_VERSION --untar
helm pull $CHART_REPO/apigee-datastore --version $CHART_VERSION --untar
</code></pre><pre class="prettyprint"><code>helm upgrade operator apigee-operator/ \
  --namespace apigee-system \
  --atomic \
  -f overrides.yaml 

helm upgrade datastore apigee-datastore/ \
  --namespace apigee \
  --atomic \
  -f overrides.yaml
</code></pre>
<ul>
<li>For information on upgrading, see <a href="https://docs.cloud.google.com/apigee/docs/hybrid/v1.12/upgrade">Upgrading Apigee hybrid to version 1.12.0-hotfix.1</a>. </li>
<li>For information on new installations, see <a href="https://docs.cloud.google.com/apigee/docs/hybrid/v1.12/big-picture">The big picture</a>.</li>
</ul>
<h3>Fixed</h3>
<table>
<thead>
<tr>
<th>Bug ID</th>
<th>Description</th>
</tr>
</thead>
<tbody>
<tr>
<td><strong>340889560</strong></td>
<td><strong>Added <code>csi</code> to the <code>apigee-logger</code> SCC.</strong></td>
</tr>
<tr>
<td><strong>339849002</strong></td>
<td><strong>Hashicorp Vault integration issues fixed for Google Service Account for Cassandra Backup/Restore.</strong></td>
</tr>
</tbody>
</table>
]]>
    </content>
  </entry>

</feed>
