The following images are now rolling out for managed Cloud Service Mesh
Share
Services
## Security
Security
The following images are now rolling out for managed Cloud Service Mesh:
* Sidecar version 1.21.6-asm.16 is rolling out to the rapid release channel.
* Sidecar version 1.20.8-asm.68 is rolling out to the regular release channel.
* Sidecar version 1.19.10-asm.61 is rolling out to the stable release channel.
* CNI and managed data plane controller version 1.23.6-asm.31 is rolling out to all release channels.
These rollouts will preempt those [previously announced on February 9, 2026](#February%5F09%5F2026).
Managed Cloud Service Mesh will start using proxy version csm\_mesh\_proxy.20260304\_RC00 for Gateway API on GKE clusters for all channels. This proxy version maps closest to Envoy version 1.37.
These patch releases contain the fixes for the vulnerabilities listed in[GCP-2026-013](https://docs.cloud.google.com/service-mesh/docs/security-bulletins#gcp-2026-013)as well as fixes for the following platform CVEs:
| CVE | Proxy | Control Plane | Distroless | CNI | MDPC | Severity |
| ------------------------------------------------------------ | ----- | ------------- | ---------- | --- | ---- | ------------- |
| [CVE-2025-61726](https://ubuntu.com/security/CVE-2025-61726) | Yes | Yes | Yes | \- | \- | High (7.5) |
| [CVE-2025-61728](https://ubuntu.com/security/CVE-2025-61728) | Yes | Yes | Yes | \- | \- | Medium (6.5) |
| [CVE-2025-61730](https://ubuntu.com/security/CVE-2025-61730) | Yes | Yes | Yes | \- | \- | Medium (5.3) |
| [CVE-2025-61731](https://ubuntu.com/security/CVE-2025-61731) | Yes | Yes | Yes | \- | \- | High (7.8) |
| [CVE-2025-61732](https://ubuntu.com/security/CVE-2025-61732) | Yes | Yes | Yes | \- | \- | High (8.6) |
| [CVE-2025-68121](https://ubuntu.com/security/CVE-2025-68121) | Yes | Yes | Yes | \- | \- | Critical (10) |
| [CVE-2025-68160](https://ubuntu.com/security/CVE-2025-68160) | Yes | Yes | No | \- | \- | Low (4.7) |
| [CVE-2025-69418](https://ubuntu.com/security/CVE-2025-69418) | Yes | Yes | No | \- | \- | Low (4.0) |
| [CVE-2025-69419](https://ubuntu.com/security/CVE-2025-69419) | Yes | Yes | No | \- | \- | Low (7.4) |
| [CVE-2025-69420](https://ubuntu.com/security/CVE-2025-69420) | Yes | Yes | No | \- | \- | Low (7.5) |
| [CVE-2025-69421](https://ubuntu.com/security/CVE-2025-69421) | Yes | Yes | No | \- | \- | Low (7.5) |
| [CVE-2025-8277](https://ubuntu.com/security/CVE-2025-8277) | \- | \- | \- | Yes | Yes | Low (0) |
| [CVE-2025-9820](https://ubuntu.com/security/CVE-2025-9820) | \- | \- | \- | Yes | Yes | Low (4.0) |
| [CVE-2025-14831](https://ubuntu.com/security/CVE-2025-14831) | \- | \- | \- | Yes | Yes | Medium (5.3) |
| [CVE-2025-15281](https://ubuntu.com/security/CVE-2025-15281) | Yes | Yes | Yes | \- | \- | Medium (7.5) |
| [CVE-2025-15467](https://ubuntu.com/security/CVE-2025-15467) | Yes | Yes | No | \- | \- | Medium (9.8) |
| [CVE-2026-0861](https://ubuntu.com/security/CVE-2026-0861) | Yes | Yes | No | \- | \- | Medium (8.4) |
| [CVE-2026-0915](https://ubuntu.com/security/CVE-2026-0915) | Yes | Yes | No | \- | \- | Medium (7.5) |
| [CVE-2026-0964](https://ubuntu.com/security/CVE-2026-0964) | \- | \- | \- | Yes | Yes | Medium |
| [CVE-2026-0965](https://ubuntu.com/security/CVE-2026-0965) | \- | \- | \- | Yes | Yes | Low |
| [CVE-2026-0966](https://ubuntu.com/security/CVE-2026-0966) | \- | \- | \- | Yes | Yes | Low |
| [CVE-2026-0967](https://ubuntu.com/security/CVE-2026-0967) | \- | \- | \- | Yes | Yes | Medium |
| [CVE-2026-0968](https://ubuntu.com/security/CVE-2026-0968) | \- | \- | \- | Yes | Yes | Medium |
| [CVE-2026-22795](https://ubuntu.com/security/CVE-2026-22795) | Yes | Yes | No | \- | \- | Low (5.5) |
| [CVE-2026-22796](https://ubuntu.com/security/CVE-2026-22796) | Yes | Yes | No | \- | \- | Low (5.3) |
| [CVE-2026-24051](https://ubuntu.com/security/CVE-2026-24051) | \- | \- | \- | Yes | Yes | High (7.0) |
| [CVE-2026-25679](https://ubuntu.com/security/CVE-2026-25679) | Yes | Yes | \- | \- | \- | High (7.5) |
## Security
Security
**1.28.5-asm.9 is now available for in-cluster Cloud Service Mesh.**
This patch release contains fixes for the security vulnerabilities listed in[GCP-2026-013](https://docs.cloud.google.com/service-mesh/docs/security-bulletins#gcp-2026-013)as well as fixes for the following platform CVEs:
| CVE | Proxy | Control Plane | Distroless | CNI | Severity |
| ------------------------------------------------------------ | ----- | ------------- | ---------- | --- | ------------- |
| [CVE-2025-13151](https://ubuntu.com/security/CVE-2025-13151) | Yes | Yes | No | Yes | Medium (7.5) |
| [CVE-2025-14831](https://ubuntu.com/security/CVE-2025-14831) | Yes | Yes | No | Yes | Medium (5.3) |
| [CVE-2025-15281](https://ubuntu.com/security/CVE-2025-15281) | Yes | Yes | No | Yes | Medium (7.5) |
| [CVE-2025-15467](https://ubuntu.com/security/CVE-2025-15467) | Yes | Yes | No | Yes | Medium (9.8) |
| [CVE-2025-15558](https://ubuntu.com/security/CVE-2025-15558) | Yes | Yes | Yes | \- | High (8.0) |
| [CVE-2025-61726](https://ubuntu.com/security/CVE-2025-61726) | Yes | Yes | Yes | Yes | High (7.5) |
| [CVE-2025-61728](https://ubuntu.com/security/CVE-2025-61728) | Yes | Yes | Yes | Yes | Medium (6.5) |
| [CVE-2025-61730](https://ubuntu.com/security/CVE-2025-61730) | Yes | Yes | Yes | Yes | Medium (5.3) |
| [CVE-2025-61731](https://ubuntu.com/security/CVE-2025-61731) | Yes | Yes | Yes | Yes | High (7.8) |
| [CVE-2025-61732](https://ubuntu.com/security/CVE-2025-61732) | Yes | Yes | Yes | Yes | High (8.6) |
| [CVE-2025-68121](https://ubuntu.com/security/CVE-2025-68121) | Yes | Yes | Yes | Yes | Critical (10) |
| [CVE-2025-68160](https://ubuntu.com/security/CVE-2025-68160) | Yes | Yes | No | Yes | Low (4.7) |
| [CVE-2025-69418](https://ubuntu.com/security/CVE-2025-69418) | Yes | Yes | No | Yes | Low (4.0) |
| [CVE-2025-69419](https://ubuntu.com/security/CVE-2025-69419) | Yes | Yes | No | Yes | Low (7.4) |
| [CVE-2025-69420](https://ubuntu.com/security/CVE-2025-69420) | Yes | Yes | Yes | Yes | Low (7.5) |
| [CVE-2025-69421](https://ubuntu.com/security/CVE-2025-69421) | Yes | Yes | Yes | Yes | Low (7.5) |
| [CVE-2025-8277](https://ubuntu.com/security/CVE-2025-8277) | Yes | Yes | No | Yes | Low (0) |
| [CVE-2025-9820](https://ubuntu.com/security/CVE-2025-9820) | Yes | Yes | No | Yes | Low (4) |
| [CVE-2026-0861](https://ubuntu.com/security/CVE-2026-0861) | Yes | Yes | No | Yes | Medium (8.4) |
| [CVE-2026-0915](https://ubuntu.com/security/CVE-2026-0915) | Yes | Yes | No | Yes | Medium (7.5) |
| [CVE-2026-0964](https://ubuntu.com/security/CVE-2026-0964) | Yes | Yes | No | Yes | Medium |
| [CVE-2026-0965](https://ubuntu.com/security/CVE-2026-0965) | Yes | Yes | No | Yes | Low |
| [CVE-2026-0966](https://ubuntu.com/security/CVE-2026-0966) | Yes | Yes | No | Yes | Low |
| [CVE-2026-0967](https://ubuntu.com/security/CVE-2026-0967) | Yes | Yes | No | Yes | Medium |
| [CVE-2026-0968](https://ubuntu.com/security/CVE-2026-0968) | Yes | Yes | No | Yes | Medium |
| [CVE-2026-22795](https://ubuntu.com/security/CVE-2026-22795) | Yes | Yes | No | Yes | Low (5.5) |
| [CVE-2026-22796](https://ubuntu.com/security/CVE-2026-22796) | Yes | Yes | No | Yes | Low (5.3) |
| [CVE-2026-24051](https://ubuntu.com/security/CVE-2026-24051) | Yes | Yes | Yes | Yes | High (7.0) |
| [CVE-2026-25679](https://ubuntu.com/security/CVE-2026-25679) | Yes | Yes | Yes | Yes | High (7.5) |
For details on upgrading Cloud Service Mesh, see[Upgrade Cloud Service Mesh](https://cloud.google.com/service-mesh/docs/upgrade/upgrade). Cloud Service Mesh 1.28.5-asm.9 uses Envoy 1.36.5.
## Security
Security
**1.27.8-asm.7 is now available for in-cluster Cloud Service Mesh.**
This patch release contains fixes for the security vulnerabilities listed in[GCP-2026-013](https://docs.cloud.google.com/service-mesh/docs/security-bulletins#gcp-2026-013)as well as fixes for the following platform CVEs:
| CVE | Proxy | Control Plane | Distroless | CNI | Severity |
| ------------------------------------------------------------ | ----- | ------------- | ---------- | --- | ------------- |
| [CVE-2025-13151](https://ubuntu.com/security/CVE-2025-13151) | Yes | Yes | No | Yes | Medium (7.5) |
| [CVE-2025-14831](https://ubuntu.com/security/CVE-2025-14831) | Yes | Yes | No | Yes | Medium (5.3) |
| [CVE-2025-15281](https://ubuntu.com/security/CVE-2025-15281) | Yes | Yes | No | Yes | Medium (7.5) |
| [CVE-2025-15467](https://ubuntu.com/security/CVE-2025-15467) | Yes | Yes | Yes | Yes | Medium (9.8) |
| [CVE-2025-15558](https://ubuntu.com/security/CVE-2025-15558) | Yes | Yes | Yes | \- | High (8.0) |
| [CVE-2025-61726](https://ubuntu.com/security/CVE-2025-61726) | Yes | Yes | Yes | Yes | High (7.5) |
| [CVE-2025-61728](https://ubuntu.com/security/CVE-2025-61728) | Yes | Yes | Yes | Yes | Medium (6.5) |
| [CVE-2025-61730](https://ubuntu.com/security/CVE-2025-61730) | Yes | Yes | Yes | Yes | Medium (5.3) |
| [CVE-2025-61731](https://ubuntu.com/security/CVE-2025-61731) | Yes | Yes | Yes | Yes | High (7.8) |
| [CVE-2025-61732](https://ubuntu.com/security/CVE-2025-61732) | Yes | Yes | Yes | Yes | High (8.6) |
| [CVE-2025-68121](https://ubuntu.com/security/CVE-2025-68121) | Yes | Yes | Yes | Yes | Critical (10) |
| [CVE-2025-68160](https://ubuntu.com/security/CVE-2025-68160) | Yes | Yes | No | Yes | Low (4.7) |
| [CVE-2025-69418](https://ubuntu.com/security/CVE-2025-69418) | Yes | Yes | No | Yes | Low (4.0) |
| [CVE-2025-69419](https://ubuntu.com/security/CVE-2025-69419) | Yes | Yes | No | Yes | Low (7.4) |
| [CVE-2025-69420](https://ubuntu.com/security/CVE-2025-69420) | Yes | Yes | Yes | Yes | Low (7.5) |
| [CVE-2025-69421](https://ubuntu.com/security/CVE-2025-69421) | Yes | Yes | Yes | Yes | Low (7.5) |
| [CVE-2025-8277](https://ubuntu.com/security/CVE-2025-8277) | Yes | Yes | No | Yes | Low (0) |
| [CVE-2025-9820](https://ubuntu.com/security/CVE-2025-9820) | Yes | Yes | No | Yes | Low (4) |
| [CVE-2026-0861](https://ubuntu.com/security/CVE-2026-0861) | Yes | Yes | No | Yes | Medium (8.4) |
| [CVE-2026-0915](https://ubuntu.com/security/CVE-2026-0915) | Yes | Yes | No | Yes | Medium (7.5) |
| [CVE-2026-0964](https://ubuntu.com/security/CVE-2026-0964) | Yes | Yes | No | Yes | Medium |
| [CVE-2026-0965](https://ubuntu.com/security/CVE-2026-0965) | Yes | Yes | No | Yes | Low |
| [CVE-2026-0966](https://ubuntu.com/security/CVE-2026-0966) | Yes | Yes | No | Yes | Low |
| [CVE-2026-0967](https://ubuntu.com/security/CVE-2026-0967) | Yes | Yes | No | Yes | Medium |
| [CVE-2026-0968](https://ubuntu.com/security/CVE-2026-0968) | Yes | Yes | No | Yes | Medium |
| [CVE-2026-22795](https://ubuntu.com/security/CVE-2026-22795) | Yes | Yes | No | Yes | Low (5.5) |
| [CVE-2026-22796](https://ubuntu.com/security/CVE-2026-22796) | Yes | Yes | No | Yes | Low (5.3) |
| [CVE-2026-24051](https://ubuntu.com/security/CVE-2026-24051) | Yes | Yes | Yes | Yes | High (7.0) |
| [CVE-2026-25679](https://ubuntu.com/security/CVE-2026-25679) | Yes | Yes | Yes | Yes | High (7.5) |
For details on upgrading Cloud Service Mesh, see[Upgrade Cloud Service Mesh](https://cloud.google.com/service-mesh/v1.27/docs/upgrade/upgrade). Cloud Service Mesh 1.27.8-asm.7 uses Envoy 1.35.9.
## Security
Security
**1.26.8-asm.3 is now available for in-cluster Cloud Service Mesh.**
This patch release contains fixes for the security vulnerabilities listed in[GCP-2026-013](https://docs.cloud.google.com/service-mesh/docs/security-bulletins#gcp-2026-013)as well as fixes for the following platform CVEs:
| CVE | Proxy | Control Plane | Distroless | CNI | Severity |
| ------------------------------------------------------------ | ----- | ------------- | ---------- | --- | ------------- |
| [CVE-2025-13151](https://ubuntu.com/security/CVE-2025-13151) | Yes | Yes | No | Yes | Medium (7.5) |
| [CVE-2025-14831](https://ubuntu.com/security/CVE-2025-14831) | Yes | Yes | No | Yes | Medium (5.3) |
| [CVE-2025-15281](https://ubuntu.com/security/CVE-2025-15281) | Yes | Yes | No | Yes | Medium (7.5) |
| [CVE-2025-15467](https://ubuntu.com/security/CVE-2025-15467) | Yes | Yes | Yes | Yes | Medium (9.8) |
| [CVE-2025-15558](https://ubuntu.com/security/CVE-2025-15558) | Yes | Yes | Yes | \- | High (8.0) |
| [CVE-2025-61726](https://ubuntu.com/security/CVE-2025-61726) | Yes | Yes | Yes | Yes | High (7.5) |
| [CVE-2025-61728](https://ubuntu.com/security/CVE-2025-61728) | Yes | Yes | Yes | Yes | Medium (6.5) |
| [CVE-2025-61730](https://ubuntu.com/security/CVE-2025-61730) | Yes | Yes | Yes | Yes | Medium (5.3) |
| [CVE-2025-61731](https://ubuntu.com/security/CVE-2025-61731) | Yes | Yes | Yes | Yes | High (7.8) |
| [CVE-2025-61732](https://ubuntu.com/security/CVE-2025-61732) | Yes | Yes | Yes | Yes | High (8.6) |
| [CVE-2025-68121](https://ubuntu.com/security/CVE-2025-68121) | Yes | Yes | Yes | Yes | Critical (10) |
| [CVE-2025-68160](https://ubuntu.com/security/CVE-2025-68160) | Yes | Yes | No | Yes | Low (4.7) |
| [CVE-2025-68973](https://ubuntu.com/security/CVE-2025-68973) | Yes | Yes | Yes | Yes | High (7.8) |
| [CVE-2025-69418](https://ubuntu.com/security/CVE-2025-69418) | Yes | Yes | No | Yes | Low (4.0) |
| [CVE-2025-69419](https://ubuntu.com/security/CVE-2025-69419) | Yes | Yes | No | Yes | Low (7.4) |
| [CVE-2025-69420](https://ubuntu.com/security/CVE-2025-69420) | Yes | Yes | Yes | Yes | Low (7.5) |
| [CVE-2025-69421](https://ubuntu.com/security/CVE-2025-69421) | Yes | Yes | Yes | Yes | Low (7.5) |
| [CVE-2025-8277](https://ubuntu.com/security/CVE-2025-8277) | Yes | Yes | No | Yes | Low (0) |
| [CVE-2025-9820](https://ubuntu.com/security/CVE-2025-9820) | Yes | Yes | No | Yes | Low (4) |
| [CVE-2026-0861](https://ubuntu.com/security/CVE-2026-0861) | Yes | Yes | No | Yes | Medium (8.4) |
| [CVE-2026-0915](https://ubuntu.com/security/CVE-2026-0915) | Yes | Yes | No | Yes | Medium (7.5) |
| [CVE-2026-0964](https://ubuntu.com/security/CVE-2026-0964) | Yes | Yes | No | Yes | Medium |
| [CVE-2026-0965](https://ubuntu.com/security/CVE-2026-0965) | Yes | Yes | No | Yes | Low |
| [CVE-2026-0966](https://ubuntu.com/security/CVE-2026-0966) | Yes | Yes | No | Yes | Low |
| [CVE-2026-0967](https://ubuntu.com/security/CVE-2026-0967) | Yes | Yes | No | Yes | Medium |
| [CVE-2026-0968](https://ubuntu.com/security/CVE-2026-0968) | Yes | Yes | No | Yes | Medium |
| [CVE-2026-22795](https://ubuntu.com/security/CVE-2026-22795) | Yes | Yes | No | Yes | Low (5.5) |
| [CVE-2026-22796](https://ubuntu.com/security/CVE-2026-22796) | Yes | Yes | No | Yes | Low (5.3) |
| [CVE-2026-24051](https://ubuntu.com/security/CVE-2026-24051) | Yes | Yes | Yes | Yes | High (7.0) |
| [CVE-2026-25679](https://ubuntu.com/security/CVE-2026-25679) | Yes | Yes | Yes | Yes | High (7.5) |
For details on upgrading Cloud Service Mesh, see[Upgrade Cloud Service Mesh](https://cloud.google.com/service-mesh/v1.26/docs/upgrade/upgrade). Cloud Service Mesh 1.26.8-asm.3 uses Envoy 1.34.13.
What else is happening at Google Cloud Platform?
Read update
Services
Share
Visualization cells Generally available You can use visualization cells to generate interactive and editable
about 9 hours ago
Services
Share
Visualization cells Generally available You can use visualization cells to generate interactive and editable
about 9 hours ago
Services
Share
The validation of the HealthCheckPolicy custom resource from the
about 11 hours ago
Services
Share
Support for NVIDIA RTX PRO 6000 Blackwell GPU is in General Availability
about 11 hours ago
Services
Share