Maintained with ☕️ by
IcePanel logo

The following images are now rolling out for managed Cloud Service Mesh

Share

Services

## Security Security The following images are now rolling out for managed Cloud Service Mesh: * Sidecar version 1.21.6-asm.16 is rolling out to the rapid release channel. * Sidecar version 1.20.8-asm.68 is rolling out to the regular release channel. * Sidecar version 1.19.10-asm.61 is rolling out to the stable release channel. * CNI and managed data plane controller version 1.23.6-asm.31 is rolling out to all release channels. These rollouts will preempt those [previously announced on February 9, 2026](#February%5F09%5F2026). Managed Cloud Service Mesh will start using proxy version csm\_mesh\_proxy.20260304\_RC00 for Gateway API on GKE clusters for all channels. This proxy version maps closest to Envoy version 1.37. These patch releases contain the fixes for the vulnerabilities listed in[GCP-2026-013](https://docs.cloud.google.com/service-mesh/docs/security-bulletins#gcp-2026-013)as well as fixes for the following platform CVEs: | CVE | Proxy | Control Plane | Distroless | CNI | MDPC | Severity | | ------------------------------------------------------------ | ----- | ------------- | ---------- | --- | ---- | ------------- | | [CVE-2025-61726](https://ubuntu.com/security/CVE-2025-61726) | Yes | Yes | Yes | \- | \- | High (7.5) | | [CVE-2025-61728](https://ubuntu.com/security/CVE-2025-61728) | Yes | Yes | Yes | \- | \- | Medium (6.5) | | [CVE-2025-61730](https://ubuntu.com/security/CVE-2025-61730) | Yes | Yes | Yes | \- | \- | Medium (5.3) | | [CVE-2025-61731](https://ubuntu.com/security/CVE-2025-61731) | Yes | Yes | Yes | \- | \- | High (7.8) | | [CVE-2025-61732](https://ubuntu.com/security/CVE-2025-61732) | Yes | Yes | Yes | \- | \- | High (8.6) | | [CVE-2025-68121](https://ubuntu.com/security/CVE-2025-68121) | Yes | Yes | Yes | \- | \- | Critical (10) | | [CVE-2025-68160](https://ubuntu.com/security/CVE-2025-68160) | Yes | Yes | No | \- | \- | Low (4.7) | | [CVE-2025-69418](https://ubuntu.com/security/CVE-2025-69418) | Yes | Yes | No | \- | \- | Low (4.0) | | [CVE-2025-69419](https://ubuntu.com/security/CVE-2025-69419) | Yes | Yes | No | \- | \- | Low (7.4) | | [CVE-2025-69420](https://ubuntu.com/security/CVE-2025-69420) | Yes | Yes | No | \- | \- | Low (7.5) | | [CVE-2025-69421](https://ubuntu.com/security/CVE-2025-69421) | Yes | Yes | No | \- | \- | Low (7.5) | | [CVE-2025-8277](https://ubuntu.com/security/CVE-2025-8277) | \- | \- | \- | Yes | Yes | Low (0) | | [CVE-2025-9820](https://ubuntu.com/security/CVE-2025-9820) | \- | \- | \- | Yes | Yes | Low (4.0) | | [CVE-2025-14831](https://ubuntu.com/security/CVE-2025-14831) | \- | \- | \- | Yes | Yes | Medium (5.3) | | [CVE-2025-15281](https://ubuntu.com/security/CVE-2025-15281) | Yes | Yes | Yes | \- | \- | Medium (7.5) | | [CVE-2025-15467](https://ubuntu.com/security/CVE-2025-15467) | Yes | Yes | No | \- | \- | Medium (9.8) | | [CVE-2026-0861](https://ubuntu.com/security/CVE-2026-0861) | Yes | Yes | No | \- | \- | Medium (8.4) | | [CVE-2026-0915](https://ubuntu.com/security/CVE-2026-0915) | Yes | Yes | No | \- | \- | Medium (7.5) | | [CVE-2026-0964](https://ubuntu.com/security/CVE-2026-0964) | \- | \- | \- | Yes | Yes | Medium | | [CVE-2026-0965](https://ubuntu.com/security/CVE-2026-0965) | \- | \- | \- | Yes | Yes | Low | | [CVE-2026-0966](https://ubuntu.com/security/CVE-2026-0966) | \- | \- | \- | Yes | Yes | Low | | [CVE-2026-0967](https://ubuntu.com/security/CVE-2026-0967) | \- | \- | \- | Yes | Yes | Medium | | [CVE-2026-0968](https://ubuntu.com/security/CVE-2026-0968) | \- | \- | \- | Yes | Yes | Medium | | [CVE-2026-22795](https://ubuntu.com/security/CVE-2026-22795) | Yes | Yes | No | \- | \- | Low (5.5) | | [CVE-2026-22796](https://ubuntu.com/security/CVE-2026-22796) | Yes | Yes | No | \- | \- | Low (5.3) | | [CVE-2026-24051](https://ubuntu.com/security/CVE-2026-24051) | \- | \- | \- | Yes | Yes | High (7.0) | | [CVE-2026-25679](https://ubuntu.com/security/CVE-2026-25679) | Yes | Yes | \- | \- | \- | High (7.5) | ## Security Security **1.28.5-asm.9 is now available for in-cluster Cloud Service Mesh.** This patch release contains fixes for the security vulnerabilities listed in[GCP-2026-013](https://docs.cloud.google.com/service-mesh/docs/security-bulletins#gcp-2026-013)as well as fixes for the following platform CVEs: | CVE | Proxy | Control Plane | Distroless | CNI | Severity | | ------------------------------------------------------------ | ----- | ------------- | ---------- | --- | ------------- | | [CVE-2025-13151](https://ubuntu.com/security/CVE-2025-13151) | Yes | Yes | No | Yes | Medium (7.5) | | [CVE-2025-14831](https://ubuntu.com/security/CVE-2025-14831) | Yes | Yes | No | Yes | Medium (5.3) | | [CVE-2025-15281](https://ubuntu.com/security/CVE-2025-15281) | Yes | Yes | No | Yes | Medium (7.5) | | [CVE-2025-15467](https://ubuntu.com/security/CVE-2025-15467) | Yes | Yes | No | Yes | Medium (9.8) | | [CVE-2025-15558](https://ubuntu.com/security/CVE-2025-15558) | Yes | Yes | Yes | \- | High (8.0) | | [CVE-2025-61726](https://ubuntu.com/security/CVE-2025-61726) | Yes | Yes | Yes | Yes | High (7.5) | | [CVE-2025-61728](https://ubuntu.com/security/CVE-2025-61728) | Yes | Yes | Yes | Yes | Medium (6.5) | | [CVE-2025-61730](https://ubuntu.com/security/CVE-2025-61730) | Yes | Yes | Yes | Yes | Medium (5.3) | | [CVE-2025-61731](https://ubuntu.com/security/CVE-2025-61731) | Yes | Yes | Yes | Yes | High (7.8) | | [CVE-2025-61732](https://ubuntu.com/security/CVE-2025-61732) | Yes | Yes | Yes | Yes | High (8.6) | | [CVE-2025-68121](https://ubuntu.com/security/CVE-2025-68121) | Yes | Yes | Yes | Yes | Critical (10) | | [CVE-2025-68160](https://ubuntu.com/security/CVE-2025-68160) | Yes | Yes | No | Yes | Low (4.7) | | [CVE-2025-69418](https://ubuntu.com/security/CVE-2025-69418) | Yes | Yes | No | Yes | Low (4.0) | | [CVE-2025-69419](https://ubuntu.com/security/CVE-2025-69419) | Yes | Yes | No | Yes | Low (7.4) | | [CVE-2025-69420](https://ubuntu.com/security/CVE-2025-69420) | Yes | Yes | Yes | Yes | Low (7.5) | | [CVE-2025-69421](https://ubuntu.com/security/CVE-2025-69421) | Yes | Yes | Yes | Yes | Low (7.5) | | [CVE-2025-8277](https://ubuntu.com/security/CVE-2025-8277) | Yes | Yes | No | Yes | Low (0) | | [CVE-2025-9820](https://ubuntu.com/security/CVE-2025-9820) | Yes | Yes | No | Yes | Low (4) | | [CVE-2026-0861](https://ubuntu.com/security/CVE-2026-0861) | Yes | Yes | No | Yes | Medium (8.4) | | [CVE-2026-0915](https://ubuntu.com/security/CVE-2026-0915) | Yes | Yes | No | Yes | Medium (7.5) | | [CVE-2026-0964](https://ubuntu.com/security/CVE-2026-0964) | Yes | Yes | No | Yes | Medium | | [CVE-2026-0965](https://ubuntu.com/security/CVE-2026-0965) | Yes | Yes | No | Yes | Low | | [CVE-2026-0966](https://ubuntu.com/security/CVE-2026-0966) | Yes | Yes | No | Yes | Low | | [CVE-2026-0967](https://ubuntu.com/security/CVE-2026-0967) | Yes | Yes | No | Yes | Medium | | [CVE-2026-0968](https://ubuntu.com/security/CVE-2026-0968) | Yes | Yes | No | Yes | Medium | | [CVE-2026-22795](https://ubuntu.com/security/CVE-2026-22795) | Yes | Yes | No | Yes | Low (5.5) | | [CVE-2026-22796](https://ubuntu.com/security/CVE-2026-22796) | Yes | Yes | No | Yes | Low (5.3) | | [CVE-2026-24051](https://ubuntu.com/security/CVE-2026-24051) | Yes | Yes | Yes | Yes | High (7.0) | | [CVE-2026-25679](https://ubuntu.com/security/CVE-2026-25679) | Yes | Yes | Yes | Yes | High (7.5) | For details on upgrading Cloud Service Mesh, see[Upgrade Cloud Service Mesh](https://cloud.google.com/service-mesh/docs/upgrade/upgrade). Cloud Service Mesh 1.28.5-asm.9 uses Envoy 1.36.5. ## Security Security **1.27.8-asm.7 is now available for in-cluster Cloud Service Mesh.** This patch release contains fixes for the security vulnerabilities listed in[GCP-2026-013](https://docs.cloud.google.com/service-mesh/docs/security-bulletins#gcp-2026-013)as well as fixes for the following platform CVEs: | CVE | Proxy | Control Plane | Distroless | CNI | Severity | | ------------------------------------------------------------ | ----- | ------------- | ---------- | --- | ------------- | | [CVE-2025-13151](https://ubuntu.com/security/CVE-2025-13151) | Yes | Yes | No | Yes | Medium (7.5) | | [CVE-2025-14831](https://ubuntu.com/security/CVE-2025-14831) | Yes | Yes | No | Yes | Medium (5.3) | | [CVE-2025-15281](https://ubuntu.com/security/CVE-2025-15281) | Yes | Yes | No | Yes | Medium (7.5) | | [CVE-2025-15467](https://ubuntu.com/security/CVE-2025-15467) | Yes | Yes | Yes | Yes | Medium (9.8) | | [CVE-2025-15558](https://ubuntu.com/security/CVE-2025-15558) | Yes | Yes | Yes | \- | High (8.0) | | [CVE-2025-61726](https://ubuntu.com/security/CVE-2025-61726) | Yes | Yes | Yes | Yes | High (7.5) | | [CVE-2025-61728](https://ubuntu.com/security/CVE-2025-61728) | Yes | Yes | Yes | Yes | Medium (6.5) | | [CVE-2025-61730](https://ubuntu.com/security/CVE-2025-61730) | Yes | Yes | Yes | Yes | Medium (5.3) | | [CVE-2025-61731](https://ubuntu.com/security/CVE-2025-61731) | Yes | Yes | Yes | Yes | High (7.8) | | [CVE-2025-61732](https://ubuntu.com/security/CVE-2025-61732) | Yes | Yes | Yes | Yes | High (8.6) | | [CVE-2025-68121](https://ubuntu.com/security/CVE-2025-68121) | Yes | Yes | Yes | Yes | Critical (10) | | [CVE-2025-68160](https://ubuntu.com/security/CVE-2025-68160) | Yes | Yes | No | Yes | Low (4.7) | | [CVE-2025-69418](https://ubuntu.com/security/CVE-2025-69418) | Yes | Yes | No | Yes | Low (4.0) | | [CVE-2025-69419](https://ubuntu.com/security/CVE-2025-69419) | Yes | Yes | No | Yes | Low (7.4) | | [CVE-2025-69420](https://ubuntu.com/security/CVE-2025-69420) | Yes | Yes | Yes | Yes | Low (7.5) | | [CVE-2025-69421](https://ubuntu.com/security/CVE-2025-69421) | Yes | Yes | Yes | Yes | Low (7.5) | | [CVE-2025-8277](https://ubuntu.com/security/CVE-2025-8277) | Yes | Yes | No | Yes | Low (0) | | [CVE-2025-9820](https://ubuntu.com/security/CVE-2025-9820) | Yes | Yes | No | Yes | Low (4) | | [CVE-2026-0861](https://ubuntu.com/security/CVE-2026-0861) | Yes | Yes | No | Yes | Medium (8.4) | | [CVE-2026-0915](https://ubuntu.com/security/CVE-2026-0915) | Yes | Yes | No | Yes | Medium (7.5) | | [CVE-2026-0964](https://ubuntu.com/security/CVE-2026-0964) | Yes | Yes | No | Yes | Medium | | [CVE-2026-0965](https://ubuntu.com/security/CVE-2026-0965) | Yes | Yes | No | Yes | Low | | [CVE-2026-0966](https://ubuntu.com/security/CVE-2026-0966) | Yes | Yes | No | Yes | Low | | [CVE-2026-0967](https://ubuntu.com/security/CVE-2026-0967) | Yes | Yes | No | Yes | Medium | | [CVE-2026-0968](https://ubuntu.com/security/CVE-2026-0968) | Yes | Yes | No | Yes | Medium | | [CVE-2026-22795](https://ubuntu.com/security/CVE-2026-22795) | Yes | Yes | No | Yes | Low (5.5) | | [CVE-2026-22796](https://ubuntu.com/security/CVE-2026-22796) | Yes | Yes | No | Yes | Low (5.3) | | [CVE-2026-24051](https://ubuntu.com/security/CVE-2026-24051) | Yes | Yes | Yes | Yes | High (7.0) | | [CVE-2026-25679](https://ubuntu.com/security/CVE-2026-25679) | Yes | Yes | Yes | Yes | High (7.5) | For details on upgrading Cloud Service Mesh, see[Upgrade Cloud Service Mesh](https://cloud.google.com/service-mesh/v1.27/docs/upgrade/upgrade). Cloud Service Mesh 1.27.8-asm.7 uses Envoy 1.35.9. ## Security Security **1.26.8-asm.3 is now available for in-cluster Cloud Service Mesh.** This patch release contains fixes for the security vulnerabilities listed in[GCP-2026-013](https://docs.cloud.google.com/service-mesh/docs/security-bulletins#gcp-2026-013)as well as fixes for the following platform CVEs: | CVE | Proxy | Control Plane | Distroless | CNI | Severity | | ------------------------------------------------------------ | ----- | ------------- | ---------- | --- | ------------- | | [CVE-2025-13151](https://ubuntu.com/security/CVE-2025-13151) | Yes | Yes | No | Yes | Medium (7.5) | | [CVE-2025-14831](https://ubuntu.com/security/CVE-2025-14831) | Yes | Yes | No | Yes | Medium (5.3) | | [CVE-2025-15281](https://ubuntu.com/security/CVE-2025-15281) | Yes | Yes | No | Yes | Medium (7.5) | | [CVE-2025-15467](https://ubuntu.com/security/CVE-2025-15467) | Yes | Yes | Yes | Yes | Medium (9.8) | | [CVE-2025-15558](https://ubuntu.com/security/CVE-2025-15558) | Yes | Yes | Yes | \- | High (8.0) | | [CVE-2025-61726](https://ubuntu.com/security/CVE-2025-61726) | Yes | Yes | Yes | Yes | High (7.5) | | [CVE-2025-61728](https://ubuntu.com/security/CVE-2025-61728) | Yes | Yes | Yes | Yes | Medium (6.5) | | [CVE-2025-61730](https://ubuntu.com/security/CVE-2025-61730) | Yes | Yes | Yes | Yes | Medium (5.3) | | [CVE-2025-61731](https://ubuntu.com/security/CVE-2025-61731) | Yes | Yes | Yes | Yes | High (7.8) | | [CVE-2025-61732](https://ubuntu.com/security/CVE-2025-61732) | Yes | Yes | Yes | Yes | High (8.6) | | [CVE-2025-68121](https://ubuntu.com/security/CVE-2025-68121) | Yes | Yes | Yes | Yes | Critical (10) | | [CVE-2025-68160](https://ubuntu.com/security/CVE-2025-68160) | Yes | Yes | No | Yes | Low (4.7) | | [CVE-2025-68973](https://ubuntu.com/security/CVE-2025-68973) | Yes | Yes | Yes | Yes | High (7.8) | | [CVE-2025-69418](https://ubuntu.com/security/CVE-2025-69418) | Yes | Yes | No | Yes | Low (4.0) | | [CVE-2025-69419](https://ubuntu.com/security/CVE-2025-69419) | Yes | Yes | No | Yes | Low (7.4) | | [CVE-2025-69420](https://ubuntu.com/security/CVE-2025-69420) | Yes | Yes | Yes | Yes | Low (7.5) | | [CVE-2025-69421](https://ubuntu.com/security/CVE-2025-69421) | Yes | Yes | Yes | Yes | Low (7.5) | | [CVE-2025-8277](https://ubuntu.com/security/CVE-2025-8277) | Yes | Yes | No | Yes | Low (0) | | [CVE-2025-9820](https://ubuntu.com/security/CVE-2025-9820) | Yes | Yes | No | Yes | Low (4) | | [CVE-2026-0861](https://ubuntu.com/security/CVE-2026-0861) | Yes | Yes | No | Yes | Medium (8.4) | | [CVE-2026-0915](https://ubuntu.com/security/CVE-2026-0915) | Yes | Yes | No | Yes | Medium (7.5) | | [CVE-2026-0964](https://ubuntu.com/security/CVE-2026-0964) | Yes | Yes | No | Yes | Medium | | [CVE-2026-0965](https://ubuntu.com/security/CVE-2026-0965) | Yes | Yes | No | Yes | Low | | [CVE-2026-0966](https://ubuntu.com/security/CVE-2026-0966) | Yes | Yes | No | Yes | Low | | [CVE-2026-0967](https://ubuntu.com/security/CVE-2026-0967) | Yes | Yes | No | Yes | Medium | | [CVE-2026-0968](https://ubuntu.com/security/CVE-2026-0968) | Yes | Yes | No | Yes | Medium | | [CVE-2026-22795](https://ubuntu.com/security/CVE-2026-22795) | Yes | Yes | No | Yes | Low (5.5) | | [CVE-2026-22796](https://ubuntu.com/security/CVE-2026-22796) | Yes | Yes | No | Yes | Low (5.3) | | [CVE-2026-24051](https://ubuntu.com/security/CVE-2026-24051) | Yes | Yes | Yes | Yes | High (7.0) | | [CVE-2026-25679](https://ubuntu.com/security/CVE-2026-25679) | Yes | Yes | Yes | Yes | High (7.5) | For details on upgrading Cloud Service Mesh, see[Upgrade Cloud Service Mesh](https://cloud.google.com/service-mesh/v1.26/docs/upgrade/upgrade). Cloud Service Mesh 1.26.8-asm.3 uses Envoy 1.34.13.