<?xml version="1.0" encoding="UTF-8"?>
<!-- AUTOGENERATED FILE. DO NOT EDIT. -->
<feed xmlns="http://www.w3.org/2005/Atom">
  <id>tag:google.com,2016:servicemesh-release-notes</id>
  <title>Cloud Service Mesh - Release notes</title>
  <link rel="self" href="https://docs.cloud.google.com/feeds/servicemesh-release-notes.xml"/>
  <author>
    <name>Google Cloud Platform</name>
  </author>
  <updated>2025-11-18T00:00:00-08:00</updated>

  <entry>
    <title>November 18, 2025</title>
    <id>tag:google.com,2016:servicemesh-release-notes#November_18_2025</id>
    <updated>2025-11-18T00:00:00-08:00</updated>
    <link rel="alternate" href="https://docs.cloud.google.com/service-mesh/docs/release-notes#November_18_2025"/>
    <content type="html"><![CDATA[<strong class="release-note-product-version-title">Managed Cloud Service Mesh</strong>
<h3>Announcement</h3>
<p>The following rollouts have completed for managed Cloud Service Mesh:</p>
<ul>
<li>1.21.6-asm.4 has rolled out to the rapid release channel.</li>
<li>1.20.8-asm.56 has rolled out to the regular release channel.</li>
<li>1.19.10-asm.52 has rolled out to the stable release channel.</li>
<li>CNI and MDPC version 1.20.8-asm.56 has rolled out to all release channels.</li>
</ul>
<p>While the managed data plane automatically updates Envoy Proxies by restarting
workloads, you must manually restart any StatefulSets and Jobs.</p>
]]>
    </content>
  </entry>

  <entry>
    <title>October 28, 2025</title>
    <id>tag:google.com,2016:servicemesh-release-notes#October_28_2025</id>
    <updated>2025-10-28T00:00:00-07:00</updated>
    <link rel="alternate" href="https://docs.cloud.google.com/service-mesh/docs/release-notes#October_28_2025"/>
    <content type="html"><![CDATA[<strong class="release-note-product-version-title">1.25.x</strong>
<h3>Security</h3>
<p><strong>1.25.5-asm.9 is now available for in-cluster Cloud Service Mesh.</strong></p>
<p>This patch release contains fixes for the security vulnerabilities listed in <a href="https://docs.cloud.google.com/service-mesh/docs/security-bulletins#gcp-2025-064">GCP-2025-064</a>. For details on upgrading Cloud Service Mesh, refer to <a href="https://docs.cloud.google.com/service-mesh/v1.25/docs/upgrade/upgrade">Upgrade Cloud Service Mesh</a>. Cloud Service Mesh v1.25.5-asm.9 uses Envoy v1.33.12.</p>
<strong class="release-note-product-version-title">1.26.x</strong>
<h3>Security</h3>
<p><strong>1.26.5-asm.1 is now available for in-cluster Cloud Service Mesh.</strong></p>
<p>This patch release contains fixes for the security vulnerabilities listed in <a href="https://docs.cloud.google.com/service-mesh/docs/security-bulletins#gcp-2025-064">GCP-2025-064</a>. For details on upgrading Cloud Service Mesh, refer to <a href="https://docs.cloud.google.com/service-mesh/v1.26/docs/upgrade/upgrade">Upgrade Cloud Service Mesh</a>. Cloud Service Mesh v1.26.5-asm.1 uses Envoy v1.34.10.</p>
<strong class="release-note-product-version-title">1.27.x</strong>
<h3>Security</h3>
<p><strong>1.27.2-asm.1 is now available for in-cluster Cloud Service Mesh.</strong></p>
<p>This patch release contains fixes for the security vulnerabilities listed in <a href="https://docs.cloud.google.com/service-mesh/docs/security-bulletins#gcp-2025-064">GCP-2025-064</a>. For details on upgrading Cloud Service Mesh, refer to <a href="https://docs.cloud.google.com/service-mesh/docs/upgrade/upgrade">Upgrade Cloud Service Mesh</a>. Cloud Service Mesh v1.27.2-asm.1 uses Envoy v1.35.6.</p>
]]>
    </content>
  </entry>

  <entry>
    <title>October 27, 2025</title>
    <id>tag:google.com,2016:servicemesh-release-notes#October_27_2025</id>
    <updated>2025-10-27T00:00:00-07:00</updated>
    <link rel="alternate" href="https://docs.cloud.google.com/service-mesh/docs/release-notes#October_27_2025"/>
    <content type="html"><![CDATA[<strong class="release-note-product-version-title">Managed Cloud Service Mesh</strong>
<h3>Announcement</h3>
<p>The following images are now rolling out for managed Cloud Service Mesh:</p>
<ul>
<li>1.21.6-asm.4 is rolling out to the rapid release channel.</li>
<li>1.20.8-asm.56 is rolling out to the regular release channel.</li>
<li>1.19.10-asm.52 is rolling out to the stable release channel.</li>
</ul>
<p>CNI/managed data plane controller version 1.20.8-asm.56 is rolling out to all release channels.</p>
<h3>Fixed</h3>
<p>These patches contain fixes for the following CVEs:</p>
<p><strong>1.21.6-asm.4</strong></p>
<table>
<thead>
<tr>
<th>Name</th>
<th>Envoy Proxy</th>
<th>Envoy Proxy Distroless</th>
<th>Control plane</th>
</tr>
</thead>
<tbody>
<tr>
<td><a href="https://security-tracker.debian.org/tracker/CVE-2025-4802">CVE-2025-4802</a></td>
<td>-</td>
<td>Yes</td>
<td>-</td>
</tr>
<tr>
<td><a href="https://security-tracker.debian.org/tracker/CVE-2025-8058">CVE-2025-8058 </a></td>
<td>-</td>
<td>Yes</td>
<td>-</td>
</tr>
<tr>
<td><a href="http://people.ubuntu.com/%7Eubuntu-security/cve/CVE-2023-4039">CVE-2023-4039</a></td>
<td>Yes</td>
<td>-</td>
<td>-</td>
</tr>
<tr>
<td><a href="http://people.ubuntu.com/%7Eubuntu-security/cve/CVE-2024-10041">CVE-2024-10041</a></td>
<td>Yes</td>
<td>-</td>
<td>-</td>
</tr>
<tr>
<td><a href="http://people.ubuntu.com/%7Eubuntu-security/cve/CVE-2025-32988">CVE-2025-32988</a></td>
<td>Yes</td>
<td>-</td>
<td>-</td>
</tr>
<tr>
<td><a href="http://people.ubuntu.com/%7Eubuntu-security/cve/CVE-2025-6395">CVE-2025-6395</a></td>
<td>Yes</td>
<td>-</td>
<td>-</td>
</tr>
<tr>
<td><a href="http://people.ubuntu.com/%7Eubuntu-security/cve/CVE-2025-48964">CVE-2025-48964</a></td>
<td>Yes</td>
<td>-</td>
<td>-</td>
</tr>
<tr>
<td><a href="http://people.ubuntu.com/%7Eubuntu-security/cve/CVE-2025-32989">CVE-2025-32989</a></td>
<td>Yes</td>
<td>-</td>
<td>-</td>
</tr>
<tr>
<td><a href="http://people.ubuntu.com/%7Eubuntu-security/cve/CVE-2025-47268">CVE-2025-47268</a></td>
<td>Yes</td>
<td>-</td>
<td>-</td>
</tr>
<tr>
<td><a href="http://people.ubuntu.com/%7Eubuntu-security/cve/CVE-2025-40909">CVE-2025-40909</a></td>
<td>Yes</td>
<td>-</td>
<td>-</td>
</tr>
<tr>
<td><a href="http://people.ubuntu.com/%7Eubuntu-security/cve/CVE-2025-32990">CVE-2025-32990</a></td>
<td>Yes</td>
<td>-</td>
<td>-</td>
</tr>
</tbody>
</table>
<p><strong>1.20.8-asm.55</strong></p>
<table>
<thead>
<tr>
<th>Name</th>
<th>Envoy Proxy</th>
<th>Envoy Proxy Distroless</th>
<th>Control plane</th>
</tr>
</thead>
<tbody>
<tr>
<td><a href="https://security-tracker.debian.org/tracker/CVE-2023-4813">CVE-2023-4813</a></td>
<td>-</td>
<td>Yes</td>
<td>-</td>
</tr>
<tr>
<td><a href="https://security-tracker.debian.org/tracker/CVE-2025-8058">CVE-2025-8058</a></td>
<td>-</td>
<td>Yes</td>
<td>-</td>
</tr>
<tr>
<td><a href="https://security-tracker.debian.org/tracker/CVE-2023-4806">CVE-2023-4806</a></td>
<td>-</td>
<td>Yes</td>
<td>-</td>
</tr>
<tr>
<td><a href="http://people.ubuntu.com/%7Eubuntu-security/cve/CVE-2025-32989">CVE-2025-32989</a></td>
<td>Yes</td>
<td>-</td>
<td>-</td>
</tr>
<tr>
<td><a href="http://people.ubuntu.com/%7Eubuntu-security/cve/CVE-2025-32988">CVE-2025-32988</a></td>
<td>Yes</td>
<td>-</td>
<td>-</td>
</tr>
<tr>
<td><a href="http://people.ubuntu.com/%7Eubuntu-security/cve/CVE-2025-48964">CVE-2025-48964</a></td>
<td>Yes</td>
<td>-</td>
<td>-</td>
</tr>
<tr>
<td><a href="http://people.ubuntu.com/%7Eubuntu-security/cve/CVE-2024-10041">CVE-2024-10041</a></td>
<td>Yes</td>
<td>-</td>
<td>-</td>
</tr>
<tr>
<td><a href="http://people.ubuntu.com/%7Eubuntu-security/cve/CVE-2025-40909">CVE-2025-40909</a></td>
<td>Yes</td>
<td>-</td>
<td>-</td>
</tr>
<tr>
<td><a href="http://people.ubuntu.com/%7Eubuntu-security/cve/CVE-2025-32990">CVE-2025-32990</a></td>
<td>Yes</td>
<td>-</td>
<td>-</td>
</tr>
<tr>
<td><a href="http://people.ubuntu.com/%7Eubuntu-security/cve/CVE-2025-47268">CVE-2025-47268</a></td>
<td>Yes</td>
<td>-</td>
<td>-</td>
</tr>
<tr>
<td><a href="http://people.ubuntu.com/%7Eubuntu-security/cve/CVE-2025-6395">CVE-2025-6395</a></td>
<td>Yes</td>
<td>-</td>
<td>-</td>
</tr>
<tr>
<td><a href="http://people.ubuntu.com/%7Eubuntu-security/cve/CVE-2023-4039">CVE-2023-4039</a></td>
<td>Yes</td>
<td>-</td>
<td>-</td>
</tr>
</tbody>
</table>
<p><strong>1.19.10-asm.52</strong></p>
<table>
<thead>
<tr>
<th>Name</th>
<th>Envoy Proxy</th>
<th>Envoy Proxy Distroless</th>
<th>Control plane</th>
</tr>
</thead>
<tbody>
<tr>
<td><a href="https://security-tracker.debian.org/tracker/CVE-2023-4813">CVE-2023-4813</a></td>
<td>-</td>
<td>Yes</td>
<td>-</td>
</tr>
<tr>
<td><a href="https://security-tracker.debian.org/tracker/CVE-2025-8058">CVE-2025-8058</a></td>
<td>-</td>
<td>Yes</td>
<td>-</td>
</tr>
<tr>
<td><a href="https://security-tracker.debian.org/tracker/CVE-2023-4806">CVE-2023-4806</a></td>
<td>-</td>
<td>Yes</td>
<td>-</td>
</tr>
<tr>
<td><a href="http://people.ubuntu.com/%7Eubuntu-security/cve/CVE-2025-32989">CVE-2025-32989</a></td>
<td>Yes</td>
<td>-</td>
<td>-</td>
</tr>
<tr>
<td><a href="http://people.ubuntu.com/%7Eubuntu-security/cve/CVE-2025-48964">CVE-2025-48964</a></td>
<td>Yes</td>
<td>-</td>
<td>-</td>
</tr>
<tr>
<td><a href="http://people.ubuntu.com/%7Eubuntu-security/cve/CVE-2024-10041">CVE-2024-10041</a></td>
<td>Yes</td>
<td>-</td>
<td>-</td>
</tr>
<tr>
<td><a href="http://people.ubuntu.com/%7Eubuntu-security/cve/CVE-2025-32988">CVE-2025-32988</a></td>
<td>Yes</td>
<td>-</td>
<td>-</td>
</tr>
<tr>
<td><a href="http://people.ubuntu.com/%7Eubuntu-security/cve/CVE-2025-40909">CVE-2025-40909</a></td>
<td>Yes</td>
<td>-</td>
<td>-</td>
</tr>
<tr>
<td><a href="http://people.ubuntu.com/%7Eubuntu-security/cve/CVE-2025-32990">CVE-2025-32990</a></td>
<td>Yes</td>
<td>-</td>
<td>-</td>
</tr>
<tr>
<td><a href="http://people.ubuntu.com/%7Eubuntu-security/cve/CVE-2025-47268">CVE-2025-47268</a></td>
<td>Yes</td>
<td>-</td>
<td>-</td>
</tr>
<tr>
<td><a href="http://people.ubuntu.com/%7Eubuntu-security/cve/CVE-2025-6395">CVE-2025-6395</a></td>
<td>Yes</td>
<td>-</td>
<td>-</td>
</tr>
<tr>
<td><a href="http://people.ubuntu.com/%7Eubuntu-security/cve/CVE-2023-4039">CVE-2023-4039</a></td>
<td>Yes</td>
<td>-</td>
<td>-</td>
</tr>
</tbody>
</table>
<p><strong>CNI &amp; MDPC</strong></p>
<table>
<thead>
<tr>
<th>Name</th>
<th>CNI</th>
<th>MDPC</th>
</tr>
</thead>
<tbody>
<tr>
<td><a href="https://ubuntu.com/security/CVE-2024-56406">CVE-2024-56406</a></td>
<td>Yes</td>
<td>Yes</td>
</tr>
<tr>
<td><a href="https://ubuntu.com/security/CVE-2025-1372">CVE-2025-1372</a></td>
<td>Yes</td>
<td>Yes</td>
</tr>
<tr>
<td><a href="https://ubuntu.com/security/CVE-2025-46836">CVE-2025-46836</a></td>
<td>Yes</td>
<td>Yes</td>
</tr>
<tr>
<td><a href="https://ubuntu.com/security/CVE-2025-30258">CVE-2025-30258</a></td>
<td>Yes</td>
<td>Yes</td>
</tr>
<tr>
<td><a href="https://ubuntu.com/security/CVE-2023-4039">CVE-2023-4039</a></td>
<td>Yes</td>
<td>Yes</td>
</tr>
<tr>
<td><a href="https://ubuntu.com/security/CVE-2025-4802">CVE-2025-4802</a></td>
<td>Yes</td>
<td>Yes</td>
</tr>
<tr>
<td><a href="https://ubuntu.com/security/CVE-2025-1377">CVE-2025-1377</a></td>
<td>Yes</td>
<td>Yes</td>
</tr>
<tr>
<td><a href="https://ubuntu.com/security/CVE-2025-4598">CVE-2025-4598</a></td>
<td>Yes</td>
<td>Yes</td>
</tr>
<tr>
<td><a href="https://ubuntu.com/security/CVE-2025-3576">CVE-2025-3576</a></td>
<td>Yes</td>
<td>Yes</td>
</tr>
</tbody>
</table>
]]>
    </content>
  </entry>

  <entry>
    <title>October 16, 2025</title>
    <id>tag:google.com,2016:servicemesh-release-notes#October_16_2025</id>
    <updated>2025-10-16T00:00:00-07:00</updated>
    <link rel="alternate" href="https://docs.cloud.google.com/service-mesh/docs/release-notes#October_16_2025"/>
    <content type="html"><![CDATA[<strong class="release-note-product-version-title">Managed Cloud Service Mesh</strong>
<h3>Announcement</h3>
<p>The promotion of <a href="https://docs.cloud.google.com/service-mesh/docs/release-notes#May_06_2025">1.21 to the Rapid release channel</a> included upstream breaking changes to <a href="https://istio.io/latest/news/releases/1.21.x/announcing-1.21/upgrade-notes/#externalname-support-changes">ExternalName</a> and <a href="https://istio.io/latest/news/releases/1.21.x/announcing-1.21/upgrade-notes/#default-value-of-the-feature-flag-enable_auto_sni-to-true">auto-sni</a> when using the <code>ISTIOD</code> <a href="https://docs.cloud.google.com/service-mesh/docs/check-control-plane-implementation">implementation</a>. After considering the impact on customers, we have decided to restore the previous behavior from 1.20 and earlier for managed Cloud Service Mesh clusters using the <code>ISTIOD</code> implementation to match Rapid clusters using the <code>TRAFFIC_DIRECTOR</code> implementation. These changes are rolling out to the Rapid release channel in version 1.21.5-asm.55 or later.</p>
<ul>
<li><p>If you are using an <code>ExternalName</code> service in the Rapid channel without a port description, the <code>ExternalName</code> service will not be translated into <code>Cluster</code> in the Envoy configuration. If the <code>ExternalName</code> service is a destination of <code>VirtualService</code> or <code>ExternalName</code> service is used with <code>REGISTRY_ONLY</code> mode, you must specify the port in the service like in 1.20 and earlier.</p></li>
<li><p>If you have an external service multiplexing traffic based on SNI but the corresponding <code>DestinationRule</code> doesn't have an explicit SNI, you must <a href="https://docs.cloud.google.com/service-mesh/docs/troubleshooting/troubleshoot-security#explicit_sni_setup">set SNI properly</a>.</p></li>
</ul>
]]>
    </content>
  </entry>

  <entry>
    <title>October 15, 2025</title>
    <id>tag:google.com,2016:servicemesh-release-notes#October_15_2025</id>
    <updated>2025-10-15T00:00:00-07:00</updated>
    <link rel="alternate" href="https://docs.cloud.google.com/service-mesh/docs/release-notes#October_15_2025"/>
    <content type="html"><![CDATA[<strong class="release-note-product-version-title">1.26.x</strong>
<h3>Announcement</h3>
<p><strong>1.26.4-asm.7 is now available for in-cluster Cloud Service Mesh.</strong></p>
<p>You can now download 1.26.4-asm.7 for in-cluster Cloud Service Mesh. It includes the features of <a href="https://istio.io/latest/news/releases/1.26.x/announcing-1.26.4/">Istio 1.26.4</a> subject to the list of <a href="https://docs.cloud.google.com/service-mesh/docs/supported-features-in-cluster">supported features</a>. </p>
<p>For details on upgrading Cloud Service Mesh, see <a href="https://docs.cloud.google.com/service-mesh/docs/upgrade/upgrade">Upgrade Cloud Service Mesh</a>. Cloud Service Mesh version 1.26.4-asm.7 uses Envoy v1.34.8-dev.</p>
<h3>Fixed</h3>
<p>1.26.4-asm.7 includes the fixes for the following CVEs:</p>
<table>
<tr>
<th>CVE</th>
<th>Proxy</th>
<th>Control Plane</th>
<th>CNI</th>
<th>Distroless</th>
</tr>
<tr>
<td><a href="https://ubuntu.com/security/CVE-2024-10963">CVE-2024-10963</a></td>
<td>Yes</td>
<td>Yes</td>
<td>Yes</td>
<td>-</td>
</tr>
<tr>
<td><a href="https://ubuntu.com/security/CVE-2025-8058">CVE-2025-8058</a></td>
<td>Yes</td>
<td>Yes</td>
<td>Yes</td>
<td>Yes</td>
</tr>
<tr>
<td><a href="https://security-tracker.debian.org/tracker/CVE-2025-4802">CVE-2025-4802</a></td>
<td>-</td>
<td>-</td>
<td>-</td>
<td>Yes</td>
</tr>
</table>
<strong class="release-note-product-version-title">1.25.x</strong>
<h3>Fixed</h3>
<p>1.25.5-asm.7 includes the fixes for the following CVEs:</p>
<table>
<tr>
<th>CVE</th>
<th>Proxy</th>
<th>Control Plane</th>
<th>CNI</th>
<th>Distroless</th>
</tr>
<tr>
<td><a href="https://ubuntu.com/security/CVE-2025-6297">CVE-2025-6297</a></td>
<td>Yes</td>
<td>Yes</td>
<td>Yes</td>
<td>-</td>
</tr>
<tr>
<td><a href="https://ubuntu.com/security/CVE-2024-10963">CVE-2024-10963</a></td>
<td>Yes</td>
<td>Yes</td>
<td>Yes</td>
<td>-</td>
</tr>
<tr>
<td><a href="https://security-tracker.debian.org/tracker/CVE-2025-4802">CVE-2025-4802</a></td>
<td>-</td>
<td>-</td>
<td>-</td>
<td>Yes</td>
</tr>
<tr>
<td><a href="https://ubuntu.com/security/CVE-2025-8058">CVE-2025-8058</a></td>
<td>Yes</td>
<td>Yes</td>
<td>Yes</td>
<td>Yes</td>
</tr>
</table>
<h3>Announcement</h3>
<p><strong>1.25.5-asm.7 is now available for in-cluster Cloud Service Mesh.</strong></p>
<p>You can now download 1.25.5-asm.7 for in-cluster Cloud Service Mesh. It includes the features of <a href="https://istio.io/latest/news/releases/1.25.x/announcing-1.25.5/">Istio 1.25.5</a> subject to the list of <a href="https://docs.cloud.google.com/service-mesh/v1.25/docs/supported-features-in-cluster">supported features</a>. Cloud Service Mesh version 1.25.5-asm.7 uses envoy v1.33.10-dev.</p>
<p>For details on upgrading Cloud Service Mesh, see <a href="https://docs.cloud.google.com/service-mesh/v1.25/docs/upgrade/upgrade">Upgrade Cloud Service Mesh</a>.</p>
<strong class="release-note-product-version-title">1.27.x</strong>
<h3>Fixed</h3>
<p>1.27.1-asm.5 includes the fixes for the following CVEs:</p>
<table>
<tr>
<th>CVE</th>
<th>Proxy</th>
<th>Control Plane</th>
<th>CNI</th>
<th>Distroless</th>
</tr>
<tr>
<td><a href="http://people.ubuntu.com/~ubuntu-security/cve/CVE-2025-6297">CVE-2025-6297</a></td>
<td>Yes</td>
<td>Yes</td>
<td>Yes</td>
<td>-</td>
</tr>
<tr>
<td><a href="http://people.ubuntu.com/~ubuntu-security/cve/CVE-2024-10963">CVE-2024-10963</a></td>
<td>Yes</td>
<td>Yes</td>
<td>Yes</td>
<td>-</td>
</tr>
<tr>
<td><a href="http://people.ubuntu.com/~ubuntu-security/cve/CVE-2025-9230 ">CVE-2025-9230</a></td>
<td>Yes</td>
<td>Yes</td>
<td>Yes</td>
<td>-</td>
</tr>
<tr>
<td><a href="http://people.ubuntu.com/~ubuntu-security/cve/CVE-2025-8058">CVE-2025-8058</a></td>
<td>Yes</td>
<td>Yes</td>
<td>Yes</td>
<td>Yes</td>
</tr>
<tr>
<td><a href="https://security-tracker.debian.org/tracker/CVE-2025-4802 ">CVE-2025-4802</a></td>
<td>-
   </td><td>-</td>
<td>-</td>
<td>Yes</td>
</tr>
</table>
<h3>Announcement</h3>
<p><strong>1.27.1-asm.5 is now available for in-cluster Cloud Service Mesh.</strong></p>
<p>You can now download 1.27.1-asm.5 for in-cluster Cloud Service Mesh. It includes the features of <a href="https://istio.io/latest/news/releases/1.27.x/announcing-1.27/">Istio 1.27.1</a> subject to the list of <a href="https://docs.cloud.google.com/service-mesh/docs/supported-features-in-cluster">supported features</a>.</p>
<p>For details on upgrading Cloud Service Mesh, see <a href="https://docs.cloud.google.com/service-mesh/docs/upgrade/upgrade">Upgrade Cloud Service Mesh</a>. Cloud Service Mesh version 1.27.1-asm.5 uses Envoy v1.35.4-dev.</p>
<strong class="release-note-product-version-title">1.24.x</strong>
<h3>Announcement</h3>
<p>In-cluster Cloud Service Mesh 1.24 is no longer supported. For more information and to view the earliest end-of-life dates for other versions, see <a href="https://docs.cloud.google.com/service-mesh/docs/supported-features-in-cluster#supported_versions">Supported versions</a>.</p>
]]>
    </content>
  </entry>

  <entry>
    <title>September 30, 2025</title>
    <id>tag:google.com,2016:servicemesh-release-notes#September_30_2025</id>
    <updated>2025-09-30T00:00:00-07:00</updated>
    <link rel="alternate" href="https://docs.cloud.google.com/service-mesh/docs/release-notes#September_30_2025"/>
    <content type="html"><![CDATA[<strong class="release-note-product-version-title">Managed Cloud Service Mesh</strong>
<h3>Feature</h3>
<p>You can now configure traffic routing using <a href="https://docs.cloud.google.com/service-mesh/docs/configure-cloud-service-mesh-for-cloud-run#service_to_service">Cloud Service Mesh service routing APIs</a> between Cloud Run and Cloud Run, Google Kubernetes Engine, and Google Compute Engine services. (GA).</p>
<h3>Changed</h3>
<p>Managed Cloud Service Mesh with a TD control plane in the Rapid release channel will start using proxy images with an <a href="https://docs.cloud.google.com/service-mesh/docs/supported-features-managed#base_images">internal envoy version</a>.</p>
<p>All features supported by Managed (TD) control planes are supported by this proxy. To identify which proxy version is used in a cluster, see <a href="https://docs.cloud.google.com/service-mesh/docs/troubleshooting/troubleshoot-proxy#identify_the_proxy_version_used_in_the_cluster">Identify the proxy versions used in the cluster</a>.</p>
<p>This release uses the version <code>csm_istio_proxy_20250611.00_p0</code>. More details about the proxy version can be found on the <a href="https://docs.cloud.google.com/service-mesh/versions">Versions</a> page.</p>
]]>
    </content>
  </entry>

  <entry>
    <title>September 29, 2025</title>
    <id>tag:google.com,2016:servicemesh-release-notes#September_29_2025</id>
    <updated>2025-09-29T00:00:00-07:00</updated>
    <link rel="alternate" href="https://docs.cloud.google.com/service-mesh/docs/release-notes#September_29_2025"/>
    <content type="html"><![CDATA[<strong class="release-note-product-version-title">Managed Cloud Service Mesh</strong>
<h3>Fixed</h3>
<table>
<tr>
<td><strong>CVE</strong>
</td>
<td><strong>CNI</strong>
</td>
<td><strong>MDP Controller</strong>
</td>
</tr>
<tr>
<td><a href="http://people.ubuntu.com/~ubuntu-security/cve/CVE-2025-4802">CVE-2025-4802</a>
</td>
<td>Yes
   </td>
<td>Yes
   </td>
</tr>
<tr>
<td><a href="http://people.ubuntu.com/~ubuntu-security/cve/CVE-2023-29383">CVE-2023-29383</a>
</td>
<td>Yes
   </td>
<td>Yes
   </td>
</tr>
<tr>
<td><a href="http://people.ubuntu.com/~ubuntu-security/cve/CVE-2024-56406">CVE-2024-56406</a>
</td>
<td>Yes
   </td>
<td>Yes
   </td>
</tr>
<tr>
<td><a href="http://people.ubuntu.com/~ubuntu-security/cve/CVE-2023-7008">CVE-2023-7008</a>
</td>
<td>Yes
   </td>
<td>Yes
   </td>
</tr>
<tr>
<td><a href="http://people.ubuntu.com/~ubuntu-security/cve/CVE-2025-1377">CVE-2025-1377</a>
</td>
<td>Yes
   </td>
<td>Yes
   </td>
</tr>
<tr>
<td><a href="http://people.ubuntu.com/~ubuntu-security/cve/CVE-2023-4039">CVE-2023-4039</a>
</td>
<td>Yes
   </td>
<td>Yes
   </td>
</tr>
<tr>
<td><a href="http://people.ubuntu.com/~ubuntu-security/cve/CVE-2025-46836">CVE-2025-46836</a>
</td>
<td>Yes
   </td>
<td>Yes
   </td>
</tr>
<tr>
<td><a href=" http://people.ubuntu.com/~ubuntu-security/cve/CVE-2023-50495">CVE-2023-50495</a>
</td>
<td>Yes
   </td>
<td>Yes
   </td>
</tr>
<tr>
<td><a href="http://people.ubuntu.com/~ubuntu-security/cve/CVE-2025-4598">CVE-2025-4598</a>
</td>
<td>Yes
   </td>
<td>Yes
   </td>
</tr>
<tr>
<td><a href="http://people.ubuntu.com/~ubuntu-security/cve/CVE-2025-3576">CVE-2025-3576</a>
</td>
<td>Yes
   </td>
<td>Yes
   </td>
</tr>
<tr>
<td><a href="http://people.ubuntu.com/~ubuntu-security/cve/CVE-2025-30258">CVE-2025-30258</a>
</td>
<td>Yes
   </td>
<td>Yes
   </td>
</tr>
<tr>
<td><a href="http://people.ubuntu.com/~ubuntu-security/cve/CVE-2017-11164">CVE-2017-11164</a>
</td>
<td>Yes
   </td>
<td>Yes
   </td>
</tr>
<tr>
<td><a href="http://people.ubuntu.com/~ubuntu-security/cve/CVE-2022-41409">CVE-2022-41409</a>
</td>
<td>Yes
   </td>
<td>Yes
   </td>
</tr>
<tr>
<td><a href="http://people.ubuntu.com/~ubuntu-security/cve/CVE-2025-1372">CVE-2025-1372</a>
</td>
<td>Yes
   </td>
<td>Yes
   </td>
</tr>
<tr>
<td><a href=" http://people.ubuntu.com/~ubuntu-security/cve/CVE-2022-27943">CVE-2022-27943</a>
</td>
<td>Yes
   </td>
<td>Yes
   </td>
</tr>
<tr>
<td><a href="http://people.ubuntu.com/~ubuntu-security/cve/CVE-2022-4899">CVE-2022-4899</a>
</td>
<td>Yes
   </td>
<td>Yes
   </td>
</tr>
<tr>
<td><a href="http://people.ubuntu.com/~ubuntu-security/cve/CVE-2023-34969">CVE-2023-34969</a>
</td>
<td>Yes
   </td>
<td>Yes
   </td>
</tr>
<tr>
<td><a href="http://people.ubuntu.com/~ubuntu-security/cve/CVE-2023-45918">CVE-2023-45918</a>
</td>
<td>Yes
   </td>
<td>Yes
   </td>
</tr>
</table>
<h3>Announcement</h3>
<p>CNI/managed data plane controller version 1.23.6-asm.15 is rolling out to all release channels.</p>
]]>
    </content>
  </entry>

  <entry>
    <title>September 25, 2025</title>
    <id>tag:google.com,2016:servicemesh-release-notes#September_25_2025</id>
    <updated>2025-09-25T00:00:00-07:00</updated>
    <link rel="alternate" href="https://docs.cloud.google.com/service-mesh/docs/release-notes#September_25_2025"/>
    <content type="html"><![CDATA[<strong class="release-note-product-version-title">1.21.x & 1.22.x & 1.23.x & 1.24.x & 1.25.x & 1.26.x & 1.27.x</strong>
<h3>Deprecated</h3>
<p>Support for the following features will end on <strong>March 17, 2027</strong>:</p>
<ul>
<li><a href="https://docs.cloud.google.com/kubernetes-engine/multi-cloud/docs/aws/deprecations/deprecation-announcement">GKE on AWS</a> </li>
<li><a href="https://docs.cloud.google.com/kubernetes-engine/multi-cloud/docs/azure/deprecations/deprecation-announcement">GKE on Azure</a> </li>
<li>EKS Attached Clusters on AWS</li>
<li>Azure Attached Clusters with AKS</li>
</ul>
<p>Note that there are no changes to the other features of GKE attached clusters or Google Distributed Cloud (software only or air-gapped), </p>
<p>You must migrate to an alternative service mesh solution or an alternative Istio-based solution using your existing CSM configuration files by March 17, 2027.</p>
]]>
    </content>
  </entry>

  <entry>
    <title>September 23, 2025</title>
    <id>tag:google.com,2016:servicemesh-release-notes#September_23_2025</id>
    <updated>2025-09-23T00:00:00-07:00</updated>
    <link rel="alternate" href="https://docs.cloud.google.com/service-mesh/docs/release-notes#September_23_2025"/>
    <content type="html"><![CDATA[<strong class="release-note-product-version-title">1.27.x</strong>
<h3>Announcement</h3>
<p><strong>1.27.1-asm.2 is now available for in-cluster Cloud Service Mesh.</strong></p>
<p>You can now download 1.27.1-asm.2 for in-cluster Cloud Service Mesh. It includes the features of <a href="https://istio.io/latest/news/releases/1.27.x/announcing-1.27/">Istio 1.27.1</a> subject to the list of <a href="https://docs.cloud.google.com/service-mesh/docs/supported-features-in-cluster">supported features</a>. </p>
<p>The following environment variables and annotations are not supported:</p>
<ul>
<li><code>ENVOY_STATUS_PORT_ENABLE_PROXY_PROTOCOL</code></li>
<li><code>PILOT_DNS_CARES_UDP_MAX_QUERIES</code></li>
<li><code>PILOT_IP_AUTOALLOCATE_IPV4_PREFIX</code> and <code>PILOT_IP_AUTOALLOCATE_IPV6_PREFIX</code></li>
<li><code>sidecar.istio.io/bootstrapOverride</code></li>
</ul>
<p>For details on upgrading Cloud Service Mesh, see <a href="https://docs.cloud.google.com/service-mesh/docs/upgrade/upgrade">Upgrade Cloud Service Mesh</a>. Cloud Service Mesh version 1.27.1-asm.2 uses Envoy v 1.35.3-dev.</p>
]]>
    </content>
  </entry>

  <entry>
    <title>September 17, 2025</title>
    <id>tag:google.com,2016:servicemesh-release-notes#September_17_2025</id>
    <updated>2025-09-17T00:00:00-07:00</updated>
    <link rel="alternate" href="https://docs.cloud.google.com/service-mesh/docs/release-notes#September_17_2025"/>
    <content type="html"><![CDATA[<strong class="release-note-product-version-title">Managed Cloud Service Mesh</strong>
<h3>Announcement</h3>
<p>The following rollouts have completed for managed Cloud Service Mesh:</p>
<ul>
<li>1.21.5-asm.55 has rolled out to the rapid release channel.</li>
<li>1.20.8-asm.48 has rolled out to the regular release channel.</li>
<li>1.19.10-asm.48 has rolled out to the stable release channel.</li>
</ul>
<p>While the managed data plane automatically updates Envoy Proxies by restarting workloads, you must manually restart any StatefulSets and Jobs.</p>
]]>
    </content>
  </entry>

  <entry>
    <title>September 10, 2025</title>
    <id>tag:google.com,2016:servicemesh-release-notes#September_10_2025</id>
    <updated>2025-09-10T00:00:00-07:00</updated>
    <link rel="alternate" href="https://docs.cloud.google.com/service-mesh/docs/release-notes#September_10_2025"/>
    <content type="html"><![CDATA[<strong class="release-note-product-version-title">1.25.x</strong>
<h3>Announcement</h3>
<p><strong>1.25.4-asm.0 is now available for in-cluster Cloud Service Mesh.</strong></p>
<p>You can now download 1.25.4-asm.0 for in-cluster Cloud Service Mesh. It includes the features of <a href="https://istio.io/latest/news/releases/1.25.x/announcing-1.25.4/">Istio 1.25.4</a> subject to the list of <a href="https://docs.cloud.google.com/service-mesh/v1.25/docs/supported-features-in-cluster">supported features</a>. Cloud Service Mesh version 1.25.4-asm.0 uses envoy v1.33.8-dev.</p>
<p>For details on upgrading Cloud Service Mesh, see <a href="https://docs.cloud.google.com/service-mesh/v1.25/docs/upgrade/upgrade">Upgrade Cloud Service Mesh</a>.</p>
<strong class="release-note-product-version-title">1.24.x</strong>
<h3>Announcement</h3>
<p><strong>1.24.6-asm.12 is now available for in-cluster Cloud Service Mesh.</strong></p>
<p>You can now download 1.24.6-asm.12 for in-cluster Cloud Service Mesh. It includes the features of <a href="https://istio.io/latest/news/releases/1.24.x/announcing-1.24.6/">Istio 1.24.6</a> subject to the list of <a href="https://docs.cloud.google.com/service-mesh/v1.24/docs/supported-features-in-cluster">supported features</a>. Cloud Service Mesh version 1.24.6-asm.12 uses envoy v1.33.8-dev.</p>
<p>For details on upgrading Cloud Service Mesh, see <a href="https://docs.cloud.google.com/service-mesh/v1.24/docs/upgrade/upgrade">Upgrade Cloud Service Mesh</a>.</p>
<strong class="release-note-product-version-title">1.24.x & 1.25.x & 1.26.x</strong>
<h3>Fixed</h3>
<p>These patches address the following CVEs:</p>
<table>
<tr>
<td>CVE
   </td>
<td>Proxy
   </td>
<td>Control Plane
   </td>
<td>CNI
   </td>
<td>Distroless
   </td>
</tr>
<tr>
<td><a href="http://people.ubuntu.com/~ubuntu-security/cve/CVE-2025-32990">CVE-2025-32990</a>
</td>
<td>Yes
   </td>
<td>Yes
   </td>
<td>Yes
   </td>
<td>- 
   </td>
</tr>
<tr>
<td><a href="http://people.ubuntu.com/~ubuntu-security/cve/CVE-2025-32988">CVE-2025-32988</a>
</td>
<td>Yes
   </td>
<td>Yes
   </td>
<td>Yes
   </td>
<td>- 
   </td>
</tr>
<tr>
<td><a href="http://people.ubuntu.com/~ubuntu-security/cve/CVE-2025-40909">CVE-2025-40909</a>
</td>
<td>Yes
   </td>
<td>Yes
   </td>
<td>Yes
   </td>
<td>- 
   </td>
</tr>
<tr>
<td><a href="http://people.ubuntu.com/~ubuntu-security/cve/CVE-2025-32989">CVE-2025-32989</a>
</td>
<td>Yes
   </td>
<td>Yes
   </td>
<td>Yes
   </td>
<td>- 
   </td>
</tr>
<tr>
<td><a href="http://people.ubuntu.com/~ubuntu-security/cve/CVE-2025-47268">CVE-2025-47268</a>
</td>
<td>Yes
   </td>
<td>Yes
   </td>
<td>Yes
   </td>
<td>- 
   </td>
</tr>
<tr>
<td><a href="http://people.ubuntu.com/~ubuntu-security/cve/CVE-2025-5702">CVE-2025-5702</a>
</td>
<td>Yes
   </td>
<td>Yes
   </td>
<td>Yes
   </td>
<td>- 
   </td>
</tr>
<tr>
<td><a href="http://people.ubuntu.com/~ubuntu-security/cve/CVE-2025-6395">CVE-2025-6395</a>
</td>
<td>Yes
   </td>
<td>Yes
   </td>
<td>Yes
   </td>
<td>- 
   </td>
</tr>
<tr>
<td><a href="http://people.ubuntu.com/~ubuntu-security/cve/CVE-2025-48964">CVE-2025-48964</a>
</td>
<td>Yes
   </td>
<td>Yes
   </td>
<td>Yes
   </td>
<td>- 
   </td>
</tr>
</table>
<strong class="release-note-product-version-title">1.26.x</strong>
<h3>Announcement</h3>
<p>1.26.4-asm.1 in-cluster Cloud Service Mesh already includes the fixes for these CVEs.</p>
]]>
    </content>
  </entry>

  <entry>
    <title>September 09, 2025</title>
    <id>tag:google.com,2016:servicemesh-release-notes#September_09_2025</id>
    <updated>2025-09-09T00:00:00-07:00</updated>
    <link rel="alternate" href="https://docs.cloud.google.com/service-mesh/docs/release-notes#September_09_2025"/>
    <content type="html"><![CDATA[<strong class="release-note-product-version-title">Managed Cloud Service Mesh</strong>
<h3>Security</h3>
<p>The managed Cloud Service Mesh rollouts <a href="https://docs.cloud.google.com/service-mesh/docs/release-notes#August_12_2025">previously announced</a> address the following vulnerabilities. While the managed data plane automatically updates Envoy Proxies by restarting workloads, you must manually restart any StatefulSets and Jobs.</p>
<p><strong>1.21.5-asm.55</strong> </p>
<table>
<thead>
<tr>
<th>Name</th>
<th>Envoy Proxy</th>
<th>Envoy Proxy distroless</th>
<th>Control plane</th>
</tr>
</thead>
<tbody>
<tr>
<td><a href="http://people.ubuntu.com/%7Eubuntu-security/cve/CVE-2025-32462">CVE-2025-32462</a></td>
<td>Yes</td>
<td>-</td>
<td>-</td>
</tr>
<tr>
<td><a href="http://people.ubuntu.com/%7Eubuntu-security/cve/CVE-2025-4877">CVE-2025-4877</a></td>
<td>Yes</td>
<td>-</td>
<td>-</td>
</tr>
<tr>
<td><a href="http://people.ubuntu.com/%7Eubuntu-security/cve/CVE-2025-3576">CVE-2025-3576</a></td>
<td>Yes</td>
<td>-</td>
<td>-</td>
</tr>
<tr>
<td><a href="http://people.ubuntu.com/%7Eubuntu-security/cve/CVE-2025-4802">CVE-2025-4802</a></td>
<td>Yes</td>
<td>-</td>
<td>-</td>
</tr>
<tr>
<td><a href="http://people.ubuntu.com/%7Eubuntu-security/cve/CVE-2025-4878">CVE-2025-4878</a></td>
<td>Yes</td>
<td>-</td>
<td>-</td>
</tr>
<tr>
<td><a href="http://people.ubuntu.com/%7Eubuntu-security/cve/CVE-2025-5318">CVE-2025-5318</a></td>
<td>Yes</td>
<td>-</td>
<td>-</td>
</tr>
<tr>
<td><a href="http://people.ubuntu.com/%7Eubuntu-security/cve/CVE-2025-6020">CVE-2025-6020</a></td>
<td>Yes</td>
<td>-</td>
<td>-</td>
</tr>
<tr>
<td><a href="http://people.ubuntu.com/%7Eubuntu-security/cve/CVE-2025-46836">CVE-2025-46836</a></td>
<td>Yes</td>
<td>-</td>
<td>-</td>
</tr>
<tr>
<td><a href="http://people.ubuntu.com/%7Eubuntu-security/cve/CVE-2025-4598">CVE-2025-4598</a></td>
<td>Yes</td>
<td>-</td>
<td>-</td>
</tr>
<tr>
<td><a href="http://people.ubuntu.com/%7Eubuntu-security/cve/CVE-2024-56406">CVE-2024-56406</a></td>
<td>Yes</td>
<td>-</td>
<td>-</td>
</tr>
<tr>
<td><a href="http://people.ubuntu.com/%7Eubuntu-security/cve/CVE-2025-30258">CVE-2025-30258</a></td>
<td>Yes</td>
<td>-</td>
<td>-</td>
</tr>
<tr>
<td><a href="http://people.ubuntu.com/%7Eubuntu-security/cve/CVE-2025-5372">CVE-2025-5372</a></td>
<td>Yes</td>
<td>-</td>
<td>-</td>
</tr>
<tr>
<td><a href="http://people.ubuntu.com/%7Eubuntu-security/cve/CVE-2025-1372">CVE-2025-1372</a></td>
<td>Yes</td>
<td>-</td>
<td>-</td>
</tr>
<tr>
<td><a href="http://people.ubuntu.com/%7Eubuntu-security/cve/CVE-2025-1377">CVE-2025-1377</a></td>
<td>Yes</td>
<td>-</td>
<td>-</td>
</tr>
<tr>
<td><a href="https://security-tracker.debian.org/tracker/CVE-2023-4039">CVE-2023-4039</a></td>
<td>-</td>
<td>Yes</td>
<td>-</td>
</tr>
</tbody>
</table>
<p><strong>1.20.8-asm.48</strong> </p>
<table>
<thead>
<tr>
<th>Name</th>
<th>Envoy Proxy</th>
<th>Envoy Proxy distroless</th>
<th>Control plane</th>
</tr>
</thead>
<tbody>
<tr>
<td><a href="http://people.ubuntu.com/%7Eubuntu-security/cve/CVE-2025-32462">CVE-2025-32462</a></td>
<td>Yes</td>
<td>-</td>
<td>-</td>
</tr>
<tr>
<td><a href="http://people.ubuntu.com/%7Eubuntu-security/cve/CVE-2025-4877">CVE-2025-4877</a></td>
<td>Yes</td>
<td>-</td>
<td>-</td>
</tr>
<tr>
<td><a href="http://people.ubuntu.com/%7Eubuntu-security/cve/CVE-2025-3576">CVE-2025-3576</a></td>
<td>Yes</td>
<td>-</td>
<td>-</td>
</tr>
<tr>
<td><a href="http://people.ubuntu.com/%7Eubuntu-security/cve/CVE-2025-4802">CVE-2025-4802</a></td>
<td>Yes</td>
<td>-</td>
<td>-</td>
</tr>
<tr>
<td><a href="http://people.ubuntu.com/%7Eubuntu-security/cve/CVE-2025-4878">CVE-2025-4878</a></td>
<td>Yes</td>
<td>-</td>
<td>-</td>
</tr>
<tr>
<td><a href="http://people.ubuntu.com/%7Eubuntu-security/cve/CVE-2025-5318">CVE-2025-5318</a></td>
<td>Yes</td>
<td>-</td>
<td>-</td>
</tr>
<tr>
<td><a href="http://people.ubuntu.com/%7Eubuntu-security/cve/CVE-2025-6020">CVE-2025-6020</a></td>
<td>Yes</td>
<td>-</td>
<td>-</td>
</tr>
<tr>
<td><a href="http://people.ubuntu.com/%7Eubuntu-security/cve/CVE-2025-46836">CVE-2025-46836</a></td>
<td>Yes</td>
<td>-</td>
<td>-</td>
</tr>
<tr>
<td><a href="http://people.ubuntu.com/%7Eubuntu-security/cve/CVE-2025-4598">CVE-2025-4598</a></td>
<td>Yes</td>
<td>-</td>
<td>-</td>
</tr>
<tr>
<td><a href="http://people.ubuntu.com/%7Eubuntu-security/cve/CVE-2024-56406">CVE-2024-56406</a></td>
<td>Yes</td>
<td>-</td>
<td>-</td>
</tr>
<tr>
<td><a href="http://people.ubuntu.com/%7Eubuntu-security/cve/CVE-2025-30258">CVE-2025-30258</a></td>
<td>Yes</td>
<td>-</td>
<td>-</td>
</tr>
<tr>
<td><a href="http://people.ubuntu.com/%7Eubuntu-security/cve/CVE-2025-5372">CVE-2025-5372</a></td>
<td>Yes</td>
<td>-</td>
<td>-</td>
</tr>
<tr>
<td><a href="http://people.ubuntu.com/%7Eubuntu-security/cve/CVE-2025-1372">CVE-2025-1372</a></td>
<td>Yes</td>
<td>-</td>
<td>-</td>
</tr>
<tr>
<td><a href="http://people.ubuntu.com/%7Eubuntu-security/cve/CVE-2025-1377">CVE-2025-1377</a></td>
<td>Yes</td>
<td>-</td>
<td>-</td>
</tr>
</tbody>
</table>
<p><strong>1.19.10-asm.48</strong></p>
<table>
<thead>
<tr>
<th>Name</th>
<th>Envoy Proxy</th>
<th>Envoy Proxy distroless</th>
<th>Control plane</th>
</tr>
</thead>
<tbody>
<tr>
<td><a href="http://people.ubuntu.com/%7Eubuntu-security/cve/CVE-2025-32462">CVE-2025-32462</a></td>
<td>Yes</td>
<td>-</td>
<td>-</td>
</tr>
<tr>
<td><a href="https://github.com/advisories/GHSA-vvgc-356p-c3xw">CVE-2025-22872</a></td>
<td>Yes</td>
<td>Yes</td>
<td>Yes</td>
</tr>
<tr>
<td><a href="http://people.ubuntu.com/%7Eubuntu-security/cve/CVE-2025-4877">CVE-2025-4877</a></td>
<td>Yes</td>
<td>-</td>
<td>-</td>
</tr>
<tr>
<td><a href="http://people.ubuntu.com/%7Eubuntu-security/cve/CVE-2025-3576">CVE-2025-3576</a></td>
<td>Yes</td>
<td>-</td>
<td>-</td>
</tr>
<tr>
<td><a href="http://people.ubuntu.com/%7Eubuntu-security/cve/CVE-2025-4802">CVE-2025-4802</a></td>
<td>Yes</td>
<td>-</td>
<td>-</td>
</tr>
<tr>
<td><a href="http://people.ubuntu.com/%7Eubuntu-security/cve/CVE-2025-4878">CVE-2025-4878</a></td>
<td>Yes</td>
<td>-</td>
<td>-</td>
</tr>
<tr>
<td><a href="http://people.ubuntu.com/%7Eubuntu-security/cve/CVE-2025-5318">CVE-2025-5318</a></td>
<td>Yes</td>
<td>-</td>
<td>-</td>
</tr>
<tr>
<td><a href="http://people.ubuntu.com/%7Eubuntu-security/cve/CVE-2025-6020">CVE-2025-6020</a></td>
<td>Yes</td>
<td>-</td>
<td>-</td>
</tr>
<tr>
<td><a href="http://people.ubuntu.com/%7Eubuntu-security/cve/CVE-2025-46836">CVE-2025-46836</a></td>
<td>Yes</td>
<td>-</td>
<td>-</td>
</tr>
<tr>
<td><a href="http://people.ubuntu.com/%7Eubuntu-security/cve/CVE-2025-4598">CVE-2025-4598</a></td>
<td>Yes</td>
<td>-</td>
<td>-</td>
</tr>
<tr>
<td><a href="http://people.ubuntu.com/%7Eubuntu-security/cve/CVE-2024-56406">CVE-2024-56406</a></td>
<td>Yes</td>
<td>-</td>
<td>-</td>
</tr>
<tr>
<td><a href="http://people.ubuntu.com/%7Eubuntu-security/cve/CVE-2025-30258">CVE-2025-30258</a></td>
<td>Yes</td>
<td>-</td>
<td>-</td>
</tr>
<tr>
<td><a href="http://people.ubuntu.com/%7Eubuntu-security/cve/CVE-2025-5372">CVE-2025-5372</a></td>
<td>Yes</td>
<td>-</td>
<td>-</td>
</tr>
</tbody>
</table>
]]>
    </content>
  </entry>

  <entry>
    <title>September 02, 2025</title>
    <id>tag:google.com,2016:servicemesh-release-notes#September_02_2025</id>
    <updated>2025-09-02T00:00:00-07:00</updated>
    <link rel="alternate" href="https://docs.cloud.google.com/service-mesh/docs/release-notes#September_02_2025"/>
    <content type="html"><![CDATA[<strong class="release-note-product-version-title">1.26.x</strong>
<h3>Security</h3>
<p><strong>1.26.4-asm.1 is now available for in-cluster Cloud Service Mesh.</strong></p>
<p>This patch release contains a fix for a <a href="https://www.cve.org/CVERecord?id=CVE-2025-54588">use-after-free (UAF) vulnerability in the DNS cache</a>. For more information, see the <a href="https://docs.cloud.google.com/service-mesh/docs/security-bulletins#gcp-2025-048">security bulletin</a>.</p>
<p>Only clusters running in-cluster Cloud Service Mesh version 1.26 are affected. If you are running an earlier in-cluster version or managed Cloud Service Mesh, you are not affected and do not need to take any action.</p>
<p>For details on upgrading Cloud Service Mesh, refer to <a href="https://docs.cloud.google.com/service-mesh/docs/upgrade/upgrade">Upgrade Cloud Service Mesh</a>.</p>
]]>
    </content>
  </entry>

  <entry>
    <title>August 12, 2025</title>
    <id>tag:google.com,2016:servicemesh-release-notes#August_12_2025</id>
    <updated>2025-08-12T00:00:00-07:00</updated>
    <link rel="alternate" href="https://docs.cloud.google.com/service-mesh/docs/release-notes#August_12_2025"/>
    <content type="html"><![CDATA[<strong class="release-note-product-version-title">Managed Cloud Service Mesh</strong>
<h3>Announcement</h3>
<p>The following images are now rolling out for managed Cloud Service Mesh:</p>
<ul>
<li>1.21.5-asm.55 is rolling out to the rapid release channel.</li>
<li>1.20.8-asm.48 is rolling out to the regular release channel.</li>
<li>1.19.10-asm.48 is rolling out to the stable release channel.</li>
</ul>
]]>
    </content>
  </entry>

  <entry>
    <title>July 25, 2025</title>
    <id>tag:google.com,2016:servicemesh-release-notes#July_25_2025</id>
    <updated>2025-07-25T00:00:00-07:00</updated>
    <link rel="alternate" href="https://docs.cloud.google.com/service-mesh/docs/release-notes#July_25_2025"/>
    <content type="html"><![CDATA[<strong class="release-note-product-version-title">Managed Cloud Service Mesh</strong>
<h3>Feature</h3>
<p><a href="https://docs.cloud.google.com/service-mesh/docs/operate-and-maintain/advanced-load-balancing-istio">Advanced load balancing</a> for managed Cloud Service Mesh (TD) now generally available (GA).</p>
]]>
    </content>
  </entry>

  <entry>
    <title>July 21, 2025</title>
    <id>tag:google.com,2016:servicemesh-release-notes#July_21_2025</id>
    <updated>2025-07-21T00:00:00-07:00</updated>
    <link rel="alternate" href="https://docs.cloud.google.com/service-mesh/docs/release-notes#July_21_2025"/>
    <content type="html"><![CDATA[<strong class="release-note-product-version-title">Managed Cloud Service Mesh</strong>
<h3>Changed</h3>
<p>Managed Cloud Service Mesh will start using proxy version <code>csm_mesh_proxy.20250623b_RC00</code> for Gateway API on GKE clusters. This proxy version maps closest to Envoy version 1.35. This change is rolling out to all release channels.</p>
]]>
    </content>
  </entry>

  <entry>
    <title>July 16, 2025</title>
    <id>tag:google.com,2016:servicemesh-release-notes#July_16_2025</id>
    <updated>2025-07-16T00:00:00-07:00</updated>
    <link rel="alternate" href="https://docs.cloud.google.com/service-mesh/docs/release-notes#July_16_2025"/>
    <content type="html"><![CDATA[<strong class="release-note-product-version-title">1.25.x</strong>
<h3>Announcement</h3>
<p><strong>1.25.3-asm.11 is now available for in-cluster Cloud Service Mesh.</strong></p>
<p>You can now download 1.25.3-asm.11 for in-cluster Cloud Service Mesh. It includes the features of <a href="https://istio.io/latest/news/releases/1.25.x/announcing-1.25.3/">Istio 1.25.3</a> subject to the list of <a href="https://docs.cloud.google.com/service-mesh/docs/supported-features-in-cluster">supported features</a>. Cloud Service Mesh version 1.25.3-asm.11 uses envoy v1.33.4-dev.</p>
<p>For details on upgrading Cloud Service Mesh, see <a href="https://docs.cloud.google.com/service-mesh/v1.25/docs/upgrade/upgrade">Upgrade Cloud Service Mesh</a>.</p>
<strong class="release-note-product-version-title">1.26.x</strong>
<h3>Announcement</h3>
<p><strong>1.26.0-asm.11 is now available for in-cluster Cloud Service Mesh.</strong></p>
<p>You can now download 1.26.0-asm.11 for in-cluster Cloud Service Mesh. It includes the features of <a href="https://istio.io/latest/news/releases/1.26.x/announcing-1.26/">Istio 1.26.0</a> subject to the list of <a href="https://docs.cloud.google.com/service-mesh/docs/supported-features-in-cluster">supported features</a>. </p>
<p>The following environment variables and annotations are not supported:</p>
<ul>
<li><code>ENABLE_GATEWAY_API_MANUAL_DEPLOYMENT</code></li>
<li><code>RETRY_IGNORE_PREVIOUS_HOSTS</code></li>
<li><code>ENABLE_CLUSTER_TRUST_BUNDLE_API</code></li>
<li><code>OMIT_EMPTY_VALUES</code></li>
<li><code>PILOT_SPAWN_UPSTREAM_SPAN_FOR_GATEWAY</code></li>
<li><code>MAX_CONNECTIONS_PER_SOCKET_EVENT_LOOP</code> with the value 1</li>
<li>Referencing ConfigMaps in a DestinationRule with TLS mode set to SIMPLE mode is not supported</li>
</ul>
<p>The <code>ENABLE_AUTO_SNI</code> flag is still supported to stay aligned with the legacy behavior.</p>
<p>For details on upgrading Cloud Service Mesh, see <a href="https://docs.cloud.google.com/service-mesh/docs/upgrade/upgrade">Upgrade Cloud Service Mesh</a>. Cloud Service Mesh version 1.26.0-asm.11 uses Envoy v1.34.2-dev.</p>
<strong class="release-note-product-version-title">1.23.x</strong>
<h3>Announcement</h3>
<p>In-cluster Cloud Service Mesh 1.23 is no longer supported. For more information and to view the earliest end-of-life dates for other versions, see <a href="https://docs.cloud.google.com/service-mesh/docs/supported-features-in-cluster#supported_versions">Supported versions</a>.</p>
<strong class="release-note-product-version-title">1.24.x</strong>
<h3>Announcement</h3>
<p><strong>1.24.6-asm.9 is now available for in-cluster Cloud Service Mesh.</strong></p>
<p>You can now download 1.24.6-asm.9 for in-cluster Cloud Service Mesh. It includes the features of <a href="https://istio.io/latest/news/releases/1.24.x/announcing-1.24.6/">Istio 1.24.6</a> subject to the list of <a href="https://docs.cloud.google.com/service-mesh/v1.24/docs/supported-features-in-cluster">supported features</a>. Cloud Service Mesh version 1.24.6-asm.9 uses envoy v1.32.7-dev.</p>
<p>For details on upgrading Cloud Service Mesh, see <a href="https://docs.cloud.google.com/service-mesh/v1.24/docs/upgrade/upgrade">Upgrade Cloud Service Mesh</a>.</p>
]]>
    </content>
  </entry>

  <entry>
    <title>July 09, 2025</title>
    <id>tag:google.com,2016:servicemesh-release-notes#July_09_2025</id>
    <updated>2025-07-09T00:00:00-07:00</updated>
    <link rel="alternate" href="https://docs.cloud.google.com/service-mesh/docs/release-notes#July_09_2025"/>
    <content type="html"><![CDATA[<strong class="release-note-product-version-title">1.23.x</strong>
<h3>Changed</h3>
<p><strong>1.23.6-asm.11 is now available for in-cluster Cloud Service Mesh.</strong></p>
<p>You can now download 1.23.6-asm.11 for in-cluster Cloud Service Mesh. It includes the features of <a href="https://istio.io/latest/news/releases/1.23.x/announcing-1.23.6/">Istio 1.23.6</a> subject to the list of <a href="https://docs.cloud.google.com/service-mesh/v1.23/docs/supported-features-in-cluster">supported features</a>. Cloud Service Mesh version 1.23.6-asm.11 uses envoy v1.31.9-dev.</p>
<p>For details on upgrading Cloud Service Mesh, see <a href="https://docs.cloud.google.com/service-mesh/v1.23/docs/upgrade/upgrade">Upgrade Cloud Service Mesh</a>.</p>
<strong class="release-note-product-version-title">1.25.x</strong>
<h3>Announcement</h3>
<p><strong>1.25.3-asm.8 is now available for in-cluster Cloud Service Mesh.</strong></p>
<p>You can now download 1.25.3-asm.8 for in-cluster Cloud Service Mesh. It includes the features of <a href="https://istio.io/latest/news/releases/1.25.x/announcing-1.25.3/">Istio 1.25.3</a> subject to the list of <a href="https://docs.cloud.google.com/service-mesh/docs/supported-features-in-cluster">supported features</a>. Cloud Service Mesh version 1.25.3-asm.8 uses envoy v1.33.4-dev.</p>
<p>For details on upgrading Cloud Service Mesh, see <a href="https://docs.cloud.google.com/service-mesh/docs/upgrade/upgrade">Upgrade Cloud Service Mesh</a>.</p>
<strong class="release-note-product-version-title">1.24.x</strong>
<h3>Announcement</h3>
<p><strong>1.24.6-asm.4 is now available for in-cluster Cloud Service Mesh.</strong></p>
<p>You can now download 1.24.6-asm.4 for in-cluster Cloud Service Mesh. It includes the features of <a href="https://istio.io/latest/news/releases/1.24.x/announcing-1.24.6/">Istio 1.24.6</a> subject to the list of <a href="https://docs.cloud.google.com/service-mesh/v1.24/docs/supported-features-in-cluster">supported features</a>. Cloud Service Mesh version 1.24.6-asm.4 uses envoy v1.32.7-dev.</p>
<p>For details on upgrading Cloud Service Mesh, see <a href="https://docs.cloud.google.com/service-mesh/v1.24/docs/upgrade/upgrade">Upgrade Cloud Service Mesh</a>.</p>
]]>
    </content>
  </entry>

  <entry>
    <title>June 09, 2025</title>
    <id>tag:google.com,2016:servicemesh-release-notes#June_09_2025</id>
    <updated>2025-06-09T00:00:00-07:00</updated>
    <link rel="alternate" href="https://docs.cloud.google.com/service-mesh/docs/release-notes#June_09_2025"/>
    <content type="html"><![CDATA[<strong class="release-note-product-version-title">Managed Cloud Service Mesh</strong>
<h3>Feature</h3>
<p>You can now enforce cluster-local traffic for an individual service, all services in a particular namespace, or globally for all services in the mesh. For more information, see <a href="https://docs.cloud.google.com/service-mesh/docs/operate-and-maintain/multi-cluster#keeping_traffic_in-cluster">Keeping traffic in-cluster</a>.</p>
]]>
    </content>
  </entry>

  <entry>
    <title>June 06, 2025</title>
    <id>tag:google.com,2016:servicemesh-release-notes#June_06_2025</id>
    <updated>2025-06-06T00:00:00-07:00</updated>
    <link rel="alternate" href="https://docs.cloud.google.com/service-mesh/docs/release-notes#June_06_2025"/>
    <content type="html"><![CDATA[<strong class="release-note-product-version-title">Managed Cloud Service Mesh</strong>
<h3>Feature</h3>
<p><a href="https://docs.cloud.google.com/service-mesh/docs/operate-and-maintain/dns-proxy">DNS Proxy feature</a> is now available in the Rapid release channel. This feature requires sidecar version <code>1.21.5-asm.39</code> or later.</p>
<h3>Changed</h3>
<p>This change affects clusters using both the <code>TRAFFIC_DIRECTOR</code> and <code>ISTIOD</code> control plane implementations.</p>
<p>When using Cloud Service Mesh with Istio APIs, configuring an <a href="https://docs.cloud.google.com/service-mesh/docs/onboarding/unsupported-istio-apis">unsupported field</a> or value in an Istio Custom Resources will be reflected as an error in the Mesh status API. </p>
<p>In some cases, the validation webhook will also reject unsupported API usage with an error message indicating the specific unsupported API. For more information, see <a href="https://docs.cloud.google.com/service-mesh/docs/troubleshooting/troubleshoot-webhook#common_webhook_error_messages">Common webhook error messages</a>. You can mitigate these issues by amending the Istio Custom Resource to remove the specified unsupported API configuration.</p>
<h3>Feature</h3>
<p>Isolation support to prevent cross-region overflow is now available as a preview feature for <code>TRAFFIC_DIRECTOR</code> implementations of Cloud Service Mesh. For more information, see <a href="https://docs.cloud.google.com/service-mesh/docs/service-routing/isolation">Isolation for Cloud Service Mesh</a>.</p>
]]>
    </content>
  </entry>

  <entry>
    <title>May 21, 2025</title>
    <id>tag:google.com,2016:servicemesh-release-notes#May_21_2025</id>
    <updated>2025-05-21T00:00:00-07:00</updated>
    <link rel="alternate" href="https://docs.cloud.google.com/service-mesh/docs/release-notes#May_21_2025"/>
    <content type="html"><![CDATA[<strong class="release-note-product-version-title">1.22.x</strong>
<h3>Announcement</h3>
<p>In-cluster Cloud Service Mesh 1.22 is no longer supported. For more information and to view the earliest end-of-life dates for other versions, see <a href="https://docs.cloud.google.com/service-mesh/docs/supported-features-in-cluster#supported_versions">Supported versions</a>.</p>
<strong class="release-note-product-version-title">1.25.x</strong>
<h3>Announcement</h3>
<p><strong>1.25.2-asm.3 is now available for in-cluster Cloud Service Mesh.</strong></p>
<p>You can now download 1.25.2-asm.3 for in-cluster Cloud Service Mesh. It includes the features of <a href="https://istio.io/latest/news/releases/1.25.x/announcing-1.25.2/">Istio 1.25.2</a> subject to the list of <a href="https://docs.cloud.google.com/service-mesh/docs/supported-features-in-cluster">supported features</a>. Cloud Service Mesh version 1.25.2-asm.3 uses envoy v1.33.1-dev..</p>
<p>For details on upgrading Cloud Service Mesh, see <a href="https://docs.cloud.google.com/service-mesh/docs/upgrade/upgrade">Upgrade Cloud Service Mesh</a>.</p>
<strong class="release-note-product-version-title">1.23.x</strong>
<h3>Announcement</h3>
<p><strong>1.23.6-asm.3 is now available for in-cluster Cloud Service Mesh.</strong></p>
<p>You can now download 1.23.6-asm.3 for in-cluster Cloud Service Mesh. It includes the features of <a href="https://istio.io/latest/news/releases/1.23.x/announcing-1.23.6/">Istio 1.23.6</a> subject to the list of <a href="https://docs.cloud.google.com/service-mesh/v1.23/docs/supported-features-in-cluster">supported features</a>. Cloud Service Mesh version 1.23.6-asm.3 uses envoy v1.31.6.</p>
<p>For details on upgrading Cloud Service Mesh, see <a href="https://docs.cloud.google.com/service-mesh/v1.23/docs/upgrade/upgrade">Upgrade Cloud Service Mesh</a>.</p>
<strong class="release-note-product-version-title">1.24.x</strong>
<h3>Announcement</h3>
<p><strong>1.24.5-asm.3 is now available for in-cluster Cloud Service Mesh.</strong></p>
<p>You can now download 1.24.5-asm.3 for in-cluster Cloud Service Mesh. It includes the features of <a href="https://istio.io/latest/news/releases/1.24.x/announcing-1.24.5/">Istio 1.24.5</a> subject to the list of <a href="https://docs.cloud.google.com/service-mesh/v1.24/docs/supported-features-in-cluster">supported features</a>. Cloud Service Mesh version 1.24.5-asm.3 uses envoy v1.32.6-dev.</p>
<p>For details on upgrading Cloud Service Mesh, see <a href="https://docs.cloud.google.com/service-mesh/v1.24/docs/upgrade/upgrade">Upgrade Cloud Service Mesh</a>.</p>
]]>
    </content>
  </entry>

  <entry>
    <title>May 06, 2025</title>
    <id>tag:google.com,2016:servicemesh-release-notes#May_06_2025</id>
    <updated>2025-05-06T00:00:00-07:00</updated>
    <link rel="alternate" href="https://docs.cloud.google.com/service-mesh/docs/release-notes#May_06_2025"/>
    <content type="html"><![CDATA[<strong class="release-note-product-version-title">Managed Cloud Service Mesh</strong>
<h3>Announcement</h3>
<p>The following images are now rolling out for managed Cloud Service Mesh:</p>
<ul>
<li>1.21.5-asm.42 is rolling out to the rapid release channel.</li>
<li>1.20.8-asm.33 is rolling out to the regular release channel.</li>
<li>1.19.10-asm.33 is rolling out to the stable release channel.</li>
</ul>
<h3>Announcement</h3>
<p>A behavioral change regarding <a href="https://docs.cloud.google.com/service-mesh/docs/operate-and-maintain/gateway-tls-termination">user-provided credentials (private key and certificate) for TLS termination</a> at ingress is now rolling out to the Rapid release channel. Subsequent announcements will appear for additional release channels.</p>
<p>The Kubernetes Secrets denoted by <code>Gateway.servers.port.tls.credentialName</code> will be read by each ingress gateway pod directly instead of the Control Plane. This change enhances security because the user-provided secret is read directly by the workloads instead of passing any managed component.</p>
<p>This change is compatible with previous behavior aside from the propagation speed of the updated secrets. Previously, updated secrets would propagate immediately. Now, updated secrets will propagate within 60 minutes. If you need immediate secret rotation, restart the gateway pods. </p>
<p>Each gateway pod reads Kubernetes secrets, so the number of the gateway pods becomes a scalability factor. We recommend the following maximum number of gateway pods:</p>
<ul>
<li>If the GKE cluster is regional, 1500 or fewer pods</li>
<li>If the GKE cluster is zonal or using autopilot, 500 or fewer pods</li>
</ul>
<p>If this change in behavior doesn't work for you, consider using the <a href="https://docs.cloud.google.com/service-mesh/docs/operate-and-maintain/gateway-tls-termination#deployment_without_mounted_credentials">deployment with mounted credentials</a>.</p>
<p>This change only affects clusters using Traffic Director and version 1.21.5-asm.42 or later.</p>
]]>
    </content>
  </entry>

  <entry>
    <title>April 16, 2025</title>
    <id>tag:google.com,2016:servicemesh-release-notes#April_16_2025</id>
    <updated>2025-04-16T00:00:00-07:00</updated>
    <link rel="alternate" href="https://docs.cloud.google.com/service-mesh/docs/release-notes#April_16_2025"/>
    <content type="html"><![CDATA[<strong class="release-note-product-version-title">1.21.x</strong>
<h3>Announcement</h3>
<p>In-cluster Cloud Service Mesh 1.21 is no longer supported. For more information and to view the earliest end-of-life dates for other versions, see <a href="https://docs.cloud.google.com/service-mesh/docs/supported-features-in-cluster#supported_versions">Supported versions</a>.</p>
<strong class="release-note-product-version-title">Managed Cloud Service Mesh</strong>
<h3>Feature</h3>
<p>New troubleshooting tools for your service mesh are now available. You can get detailed error codes for your Istio resources and check the state of your mesh to identify and resolve configuration problems. Learn more about <a href="https://docs.cloud.google.com/service-mesh/docs/troubleshooting/troubleshoot-configuration">Resolving configuration issues</a> and <a href="https://docs.cloud.google.com/service-mesh/docs/troubleshooting/troubleshoot-with-feature-state-condition">Understanding Feature State Conditions</a>.</p>
]]>
    </content>
  </entry>

  <entry>
    <title>April 04, 2025</title>
    <id>tag:google.com,2016:servicemesh-release-notes#April_04_2025</id>
    <updated>2025-04-04T00:00:00-07:00</updated>
    <link rel="alternate" href="https://docs.cloud.google.com/service-mesh/docs/release-notes#April_04_2025"/>
    <content type="html"><![CDATA[<strong class="release-note-product-version-title">1.25.x</strong>
<h3>Announcement</h3>
<p><strong>1.25.0-asm.8 is now available for in-cluster Cloud Service Mesh.</strong></p>
<p>You can now download 1.25.0-asm.8 for in-cluster Cloud Service Mesh. It includes the features of <a href="https://istio.io/latest/news/releases/1.25.x/announcing-1.25/">Istio 1.25.0</a> subject to the list of <a href="https://docs.cloud.google.com/service-mesh/docs/supported-features-in-cluster">supported features</a>. </p>
<p>The following environment variables are not supported:</p>
<ul>
<li>PILOT_MX_ADDITIONAL_LABELS</li>
<li>PILOT_DNS_CARES_UDP_MAX_QUERIES</li>
<li>PILOT_DNS_JITTER_DURATION</li>
<li>PILOT_SEND_UNHEALTHY_ENDPOINTS</li>
</ul>
<p>The following annotations are not supported:</p>
<ul>
<li>networking.istio.io/traffic-distribution</li>
<li>istio.io/reroute-virtual-interfaces </li>
</ul>
<p>For details on upgrading Cloud Service Mesh, see <a href="https://docs.cloud.google.com/service-mesh/docs/upgrade/upgrade">Upgrade Cloud Service Mesh</a>.  Cloud Service Mesh version 1.25.0-asm.8 uses Envoy v1.33.1-dev.</p>
<h3>Issue</h3>
<p>There is a <a href="https://github.com/istio/istio/issues/55787">known issue</a> where all gateway CRs will see a downtime for status updates when upgrading from 1.24.3 to 1.25.x .</p>
]]>
    </content>
  </entry>

  <entry>
    <title>March 27, 2025</title>
    <id>tag:google.com,2016:servicemesh-release-notes#March_27_2025</id>
    <updated>2025-03-27T00:00:00-07:00</updated>
    <link rel="alternate" href="https://docs.cloud.google.com/service-mesh/docs/release-notes#March_27_2025"/>
    <content type="html"><![CDATA[<strong class="release-note-product-version-title">1.22.x</strong>
<h3>Announcement</h3>
<p><strong>1.22.8-asm.5 is now available for in-cluster Cloud Service Mesh.</strong></p>
<p>You can now download 1.22.8-asm.5 for in-cluster Cloud Service Mesh. It includes the features of <a href="https://istio.io/latest/news/releases/1.22.x/announcing-1.22.8/">Istio 1.22.8</a> subject to the list of <a href="https://docs.cloud.google.com/service-mesh/v1.22/docs/supported-features-in-cluster">supported features</a>. Cloud Service Mesh version 1.22.8-asm.5 uses envoy v1.30.10-dev.</p>
<p>For details on upgrading Cloud Service Mesh, see <a href="https://docs.cloud.google.com/service-mesh/v1.22/docs/upgrade/upgrade">Upgrade Cloud Service Mesh</a>.</p>
<strong class="release-note-product-version-title">1.21.x</strong>
<h3>Announcement</h3>
<p><strong>1.21.5-asm.34 is now available for in-cluster Cloud Service Mesh.</strong></p>
<p>You can now download 1.21.5-asm.34 for in-cluster Cloud Service Mesh. It includes the features of <a href="https://istio.io/latest/news/releases/1.21.x/announcing-1.21.5/">Istio 1.21.5</a> subject to the list of <a href="https://docs.cloud.google.com/service-mesh/v1.21/docs/supported-features-in-cluster">supported features</a>. Cloud Service Mesh version 1.21.5-asm.34 uses envoy v1.29.12-dev.</p>
<p>For details on upgrading Cloud Service Mesh, see <a href="https://docs.cloud.google.com/service-mesh/v1.21/docs/upgrade/upgrade">Upgrade Cloud Service Mesh</a>.</p>
<strong class="release-note-product-version-title">1.24.x</strong>
<h3>Announcement</h3>
<p><strong>1.24.3-asm.6 is now available for in-cluster Cloud Service Mesh.</strong></p>
<p>You can now download 1.24.3-asm.6 for in-cluster Cloud Service Mesh. It includes the features of <a href="https://istio.io/latest/news/releases/1.24.x/announcing-1.24.3/">Istio 1.24.3</a> subject to the list of <a href="https://docs.cloud.google.com/service-mesh/docs/supported-features-in-cluster">supported features</a>. Cloud Service Mesh version 1.24.3-asm.6 uses envoy v1.32.4-dev.</p>
<p>For details on upgrading Cloud Service Mesh, see <a href="https://docs.cloud.google.com/service-mesh/docs/upgrade/upgrade">Upgrade Cloud Service Mesh</a>.</p>
<strong class="release-note-product-version-title">1.23.x</strong>
<h3>Announcement</h3>
<p><strong>1.23.5-asm.3 is now available for in-cluster Cloud Service Mesh.</strong></p>
<p>You can now download 1.23.5-asm.3 for in-cluster Cloud Service Mesh. It includes the features of <a href="https://istio.io/latest/news/releases/1.23.x/announcing-1.23.5/">Istio 1.23.5</a> subject to the list of <a href="https://docs.cloud.google.com/service-mesh/v1.23/docs/supported-features-in-cluster">supported features</a>. Cloud Service Mesh version 1.23.5-asm.3 uses envoy v1.31.6-dev.</p>
<p>For details on upgrading Cloud Service Mesh, see <a href="https://docs.cloud.google.com/service-mesh/v1.23/docs/upgrade/upgrade">Upgrade Cloud Service Mesh</a>.</p>
]]>
    </content>
  </entry>

  <entry>
    <title>March 20, 2025</title>
    <id>tag:google.com,2016:servicemesh-release-notes#March_20_2025</id>
    <updated>2025-03-20T00:00:00-07:00</updated>
    <link rel="alternate" href="https://docs.cloud.google.com/service-mesh/docs/release-notes#March_20_2025"/>
    <content type="html"><![CDATA[<strong class="release-note-product-version-title">Managed Cloud Service Mesh & 1.22.x & 1.23.x & 1.24.x</strong>
<h3>Feature</h3>
<p>Cloud Service Mesh now supports dual-stack, extending IPv6 capability to both proxy-based Envoy and proxyless gRPC. For more information, see <a href="https://docs.cloud.google.com/service-mesh/docs/service-routing/configure-dual-stack-ipv6">Configure IPv6 dual-stack for Cloud Service Mesh</a>.</p>
<h3>Feature</h3>
<p>You can now use <a href="https://docs.cloud.google.com/service-mesh/docs/service-routing/custom-constraints">custom constraints</a> with Organization Policy to provide more granular control over specific fields for some networksecurity and networkservices resources.</p>
<strong class="release-note-product-version-title">Managed Cloud Service Mesh</strong>
<h3>Announcement</h3>
<p>If you use the managed Cloud Service Mesh with the <code>ISTIOD</code> control plane implementation, important changes have been made to how and when you'll receive notifications of upcoming modernization. For details, see <a href="https://docs.cloud.google.com/service-mesh/docs/modernization#notifications-and-scheduling">Managed control plane modernization</a>.</p>
]]>
    </content>
  </entry>

  <entry>
    <title>March 12, 2025</title>
    <id>tag:google.com,2016:servicemesh-release-notes#March_12_2025</id>
    <updated>2025-03-12T00:00:00-07:00</updated>
    <link rel="alternate" href="https://docs.cloud.google.com/service-mesh/docs/release-notes#March_12_2025"/>
    <content type="html"><![CDATA[<strong class="release-note-product-version-title">Managed Cloud Service Mesh</strong>
<h3>Announcement</h3>
<p>The rollout of managed Cloud Service Mesh version 1.20 to the rapid channel has completed.</p>
]]>
    </content>
  </entry>

  <entry>
    <title>February 25, 2025</title>
    <id>tag:google.com,2016:servicemesh-release-notes#February_25_2025</id>
    <updated>2025-02-25T00:00:00-08:00</updated>
    <link rel="alternate" href="https://docs.cloud.google.com/service-mesh/docs/release-notes#February_25_2025"/>
    <content type="html"><![CDATA[<strong class="release-note-product-version-title">Managed Cloud Service Mesh</strong>
<h3>Announcement</h3>
<p>Managed Cloud Service Mesh with the Traffic Director control plane now supports <a href="https://istio.io/latest/docs/ops/configuration/traffic-management/network-topologies/#configuring-network-topologies">configuring the network topology</a> to use <code>X-Forwarded-For</code> and <code>X-Forwarded-Client-Cert</code> headers by MeshConfig or annotations of workloads.</p>
]]>
    </content>
  </entry>

  <entry>
    <title>February 24, 2025</title>
    <id>tag:google.com,2016:servicemesh-release-notes#February_24_2025</id>
    <updated>2025-02-24T00:00:00-08:00</updated>
    <link rel="alternate" href="https://docs.cloud.google.com/service-mesh/docs/release-notes#February_24_2025"/>
    <content type="html"><![CDATA[<strong class="release-note-product-version-title">Managed Cloud Service Mesh</strong>
<h3>Announcement</h3>
<p>If you're a user of managed Cloud Service Mesh with the <code>ISTIOD</code> control plane implementation, you can now fine-tune your control plane modernization. See the <a href="https://docs.cloud.google.com/service-mesh/docs/modernization">Managed control plane modernization</a> page for details.</p>
]]>
    </content>
  </entry>

  <entry>
    <title>February 19, 2025</title>
    <id>tag:google.com,2016:servicemesh-release-notes#February_19_2025</id>
    <updated>2025-02-19T00:00:00-08:00</updated>
    <link rel="alternate" href="https://docs.cloud.google.com/service-mesh/docs/release-notes#February_19_2025"/>
    <content type="html"><![CDATA[<strong class="release-note-product-version-title">Managed Cloud Service Mesh</strong>
<h3>Announcement</h3>
<p>Managed Cloud Service Mesh 1.20 is <strong>rolling out</strong> to the rapid channel.</p>
]]>
    </content>
  </entry>

</feed>
