Skip to content

Commit a498b09

Browse files
dhawtonkeithmattix
andauthored
Release Notes for 12/3/2025 Releases (#17021) (#17024)
* Add draft release notes for the Envoy CVEs * Make gen again * Fix date * Fix typo in sec release * Add .spelling changes * Fix typo * Update .spelling * Update .spelling * Update .spelling * Another spelling * backport bandaid for MWC not being deleted properly in helm uninstalls --------- Signed-off-by: Keith Mattix II <[email protected]> Co-authored-by: Keith Mattix II <[email protected]>
1 parent 454ec03 commit a498b09

File tree

5 files changed

+146
-0
lines changed

5 files changed

+146
-0
lines changed

.spelling

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -435,6 +435,9 @@ CVE-2025-54588
435435
CVE-2025-55162
436436
CVE-2025-62409
437437
CVE-2025-62504
438+
CVE-2025-64527
439+
CVE-2025-64763
440+
CVE-2025-66220
438441
CVEs
439442
cves
440443
cvss
@@ -589,6 +592,7 @@ Gergely
589592
GHSA-8mq4-c2v5-3h39
590593
GiB
591594
GIDs
595+
GIE
592596
git
593597
GitHub
594598
GitOps
@@ -797,6 +801,7 @@ Kops
797801
Korczynski
798802
Krishnan
799803
Kristián
804+
krt
800805
KServe
801806
Kuat
802807
Kube
@@ -1379,6 +1384,7 @@ v1.0
13791384
v1.0.0
13801385
v1.0.0.
13811386
v1.1
1387+
v1.1.0.
13821388
v1.19
13831389
v1.2.
13841390
v1.21
Lines changed: 24 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,24 @@
1+
---
2+
title: Announcing Istio 1.26.7
3+
linktitle: 1.26.7
4+
subtitle: Patch Release
5+
description: Istio 1.26.7 patch release.
6+
publishdate: 2025-12-03
7+
release: 1.26.7
8+
aliases:
9+
- /news/announcing-1.26.7
10+
---
11+
12+
This release contains bug fixes to improve robustness. This release note describes what’s different between Istio 1.26.6 and 1.26.7.
13+
14+
This release implements the security updates described in our 3rd of December post, [`ISTIO-SECURITY-2025-001`](/news/security/istio-security-2025-003).
15+
16+
{{< relnote >}}
17+
18+
## Changes
19+
20+
- **Fixed** a goroutine leak in multicluster where krt collections with data from remote clusters would stay in memory even after that cluster was removed.
21+
([Issue #57269](https://github.com/istio/istio/issues/57269))
22+
23+
- **Fixed** an issue where Envoy Secret resources could get stuck in `WARMING` state when the same Kubernetes Secret is referenced from Istio Gateway objects using both `secret-name` and `namespace/secret-name` formats.
24+
([Issue #58146](https://github.com/istio/istio/issues/58146))
Lines changed: 35 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,35 @@
1+
---
2+
title: Announcing Istio 1.27.4
3+
linktitle: 1.27.4
4+
subtitle: Patch Release
5+
description: Istio 1.27.4 patch release.
6+
publishdate: 2025-12-03
7+
release: 1.27.4
8+
aliases:
9+
- /news/announcing-1.27.4
10+
---
11+
12+
This release contains bug fixes to improve robustness. This release note describes what’s different between Istio 1.27.3 and 1.27.4.
13+
14+
This release implements the security updates described in our 3rd of December post, [`ISTIO-SECURITY-2025-003`](/news/security/istio-security-2025-003).
15+
16+
{{< relnote >}}
17+
18+
## Changes
19+
20+
- **Fixed** status conflicts on Route resources when multiple istio revisions are installed.
21+
([Issue #57734](https://github.com/istio/istio/issues/57734))
22+
23+
- **Fixed** an issue with waypoints where an `EnvoyFilter` with `targetRef` kind `GatewayClass` and group `gateway.networking.k8s.io` in the root namespace would not work.
24+
25+
- **Fixed** a failure in `istio-init` when using native nftables with TPROXY mode and had an empty `traffic.sidecar.istio.io/includeInboundPorts` annotation.
26+
([Issue #58135](https://github.com/istio/istio/issues/58135))
27+
28+
- **Fixed** an issue where Envoy Secret resources could get stuck in `WARMING` state when the same Kubernetes Secret is referenced from Istio Gateway objects using both `secret-name` and `namespace/secret-name` formats.
29+
([Issue #58146](https://github.com/istio/istio/issues/58146))
30+
31+
- **Fixed** DNS name table creation for headless services where pods entries did not account for pods having multiple IPs. ([Issue #58397](https://github.com/istio/istio/issues/58397))
32+
33+
- **Fixed** an issue where HTTPS servers processed first prevented HTTP servers from creating routes on the same port with different bind addresses. ([Issue #57706](https://github.com/istio/istio/issues/57706))
34+
35+
- **Fixed** a bug causing the experimental `XListenerSet` resources to not be able to access TLS Secrets.
Lines changed: 52 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,52 @@
1+
---
2+
title: Announcing Istio 1.28.1
3+
linktitle: 1.28.1
4+
subtitle: Patch Release
5+
description: Istio 1.28.1 patch release.
6+
publishdate: 2025-12-03
7+
release: 1.28.1
8+
aliases:
9+
- /news/announcing-1.28.1
10+
---
11+
12+
This release contains bug fixes to improve robustness. This release note describes what’s different between Istio 1.28.0 and 1.28.1.
13+
14+
This release implements the security updates described in our 3rd of December post, [`ISTIO-SECURITY-2025-003`](/news/security/istio-security-2025-003).
15+
16+
{{< relnote >}}
17+
18+
## Changes
19+
20+
- **Added** support for multiple `targetPorts` in an `InferencePool`. The possibility to have >1 `targetPort` was added as part of GIE v1.1.0.
21+
([Issue #57638](https://github.com/istio/istio/issues/57638))
22+
23+
- **Fixed** status conflicts on Route resources when multiple Istio revisions are installed.
24+
([Issue #57734](https://github.com/istio/istio/issues/57734))
25+
26+
- **Fixed** `ServiceEntry` resources with overlapping hostnames within the same namespace causing unpredictable
27+
behavior in ambient mode.
28+
([Issue #57291](https://github.com/istio/istio/issues/57291))
29+
30+
- **Fixed** a failure in `istio-init` when using native nftables with TPROXY mode and had an empty `traffic.sidecar.istio.io/includeInboundPorts` annotation.
31+
([Issue #58135](https://github.com/istio/istio/issues/58135))
32+
33+
- **Fixed** an issue where EDS generation code did not consider service scope and, as a result, remote cluster endpoints that should not be accessible were included in waypoint configuration.
34+
([Issue #58139](https://github.com/istio/istio/issues/58139))
35+
36+
- **Fixed** an issue where, due to incorrect EDS caching in pilot, ambient E/W gateway or waypoints would be configured with unusable EDS endpoints.
37+
([Issue #58141](https://github.com/istio/istio/issues/58141))
38+
39+
- **Fixed** an issue where Envoy Secret resources could get stuck in `WARMING` state when the same Kubernetes Secret is referenced from Istio Gateway objects using both `secret-name` and `namespace/secret-name` formats.
40+
([Issue #58146](https://github.com/istio/istio/issues/58146))
41+
42+
- **Fixed** an issue where IPv6 nftables rules were programmed when IPv6 was explicitly disabled in ambient mode.
43+
([Issue #58249](https://github.com/istio/istio/issues/58249))
44+
45+
- **Fixed** DNS name table creation for headless services where pods entries did not account for pods having multiple IPs. ([Issue #58397](https://github.com/istio/istio/issues/58397))
46+
47+
- **Fixed** an issue causing ambient multi-network connections to fail when using a custom trust domain.
48+
([Issue #58427](https://github.com/istio/istio/issues/58427))
49+
50+
- **Fixed** an issue where HTTPS servers processed first prevented HTTP servers from creating routes on the same port with different bind addresses. ([Issue #57706](https://github.com/istio/istio/issues/57706))
51+
52+
- **Fixed** a bug causing the experimental `XListenerSet` resources to not be able to access TLS Secrets.
Lines changed: 29 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,29 @@
1+
---
2+
title: ISTIO-SECURITY-2025-003
3+
subtitle: Security Bulletin
4+
description: CVEs reported by Envoy.
5+
cves: [CVE-2025-66220, CVE-2025-64527, CVE-2025-64763]
6+
cvss: "8.1"
7+
vector: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N"
8+
releases: ["1.28.0", "1.27.0 to 1.27.3", "1.26.0 to 1.26.6"]
9+
publishdate: 2025-12-03
10+
keywords: [CVE]
11+
skip_seealso: true
12+
---
13+
14+
{{< security_bulletin >}}
15+
16+
## CVE
17+
18+
### Envoy CVEs
19+
20+
- __[CVE-2025-66220](https://nvd.nist.gov/vuln/detail/CVE-2025-66220)__: (CVSS score 8.1, High): TLS certificate matcher for `match_typed_subject_alt_names`
21+
may incorrectly treat certificates with `OTHERNAME` SANs containing an embedded null byte as valid.
22+
- __[CVE-2025-64527](https://nvd.nist.gov/vuln/detail/CVE-2025-64527)__: (CVSS score 6.5, Medium): Envoy crashes when JWT authentication is configured with
23+
the remote JWKS fetching.
24+
- __[CVE-2025-64763](https://nvd.nist.gov/vuln/detail/CVE-2025-64763)__: (CVSS score 5.3, Medium): Potential request smuggling from early data after the
25+
CONNECT upgrade
26+
27+
## Am I Impacted?
28+
29+
If you are using Istio to accept WebSocket traffic, you are potentially vulnerable to request smuggling from early data after the CONNECT upgrade. You may also be vulnerable if you are using custom certificates with OTHERNAME SANs or custom JWT authentication with remote JWKS fetching using `EnvoyFilter`.

0 commit comments

Comments
 (0)