Apigee hybrid
Security
| Bug ID | Description |
|---|---|
| 471502899, 471173561 | Security fixes for apigee-synchronizer. This addresses the following vulnerabilities: |
| 471502752, 471191392 | Security fixes for apigee-runtime. This addresses the following vulnerabilities: |
| 471502495, 471501875, 471126425 | Security fixes for apigee-mart-server. This addresses the following vulnerabilities: |
| 471016560, 471015664, 471015120 | Security fixes for apigee-hybrid-cassandra. This addresses the following vulnerabilities: |
| 451224723, 451224123 | Security fixes for apigee-fluent-bit. This addresses the following vulnerabilities:
|
| N/A | Security fixes for apigee-asm-ingress. This addresses the following vulnerability: |
| N/A | Security fixes for apigee-asm-istiod. This addresses the following vulnerability: |
| N/A | Security fixes for apigee-connect-agent. This addresses the following vulnerabilities: |
| N/A | Security fixes for apigee-hybrid-cassandra-client. This addresses the following vulnerabilities: |
| N/A | Security fixes for apigee-kube-rbac-proxy. This addresses the following vulnerabilities: |
| N/A | Security fixes for apigee-open-telemetry-collector. This addresses the following vulnerabilities: |
| N/A | Security fixes for apigee-open-telemetry-collector:. This addresses the following vulnerability: |
| N/A | Security fixes for apigee-operators. This addresses the following vulnerability: |
| N/A | Security fixes for apigee-prom-prometheus. This addresses the following vulnerabilities: |
| N/A | Security fixes for apigee-prometheus-adapter. This addresses the following vulnerabilities: |
| N/A | Security fixes for apigee-redis. This addresses the following vulnerabilities: |
| N/A | Security fixes for apigee-stackdriver-logging-agent. This addresses the following vulnerabilities: |
| N/A | Security fixes for apigee-udca. This addresses the following vulnerabilities: |
Fixed
Fixed in this release
| Bug ID | Description |
|---|---|
| 469694040 | Fixed an issue where custom Java security policies were intermittently not applied during runtime pod restarts or environment contract updates, which could lead to “Permission denied” errors in Java callouts. |
Announcement
hybrid v1.15.2
On March 11, 2026 we released an updated version of the Apigee hybrid software, v1.15.2.
- For information on upgrading, see Upgrading Apigee hybrid to version v1.15.2.
- For information on new installations, see The big picture.
Cloud Service Mesh
Security
1.27.8-asm.7 is now available for in-cluster Cloud Service Mesh.
This patch release contains fixes for the security vulnerabilities listed in GCP-2026-013 as well as fixes for the following platform CVEs:
| CVE | Proxy | Control Plane | Distroless | CNI | Severity |
|---|---|---|---|---|---|
| CVE-2025-13151 | Yes | Yes | No | Yes | Medium (7.5) |
| CVE-2025-14831 | Yes | Yes | No | Yes | Medium (5.3) |
| CVE-2025-15281 | Yes | Yes | No | Yes | Medium (7.5) |
| CVE-2025-15467 | Yes | Yes | Yes | Yes | Medium (9.8) |
| CVE-2025-15558 | Yes | Yes | Yes | – | High (8.0) |
| CVE-2025-61726 | Yes | Yes | Yes | Yes | High (7.5) |
| CVE-2025-61728 | Yes | Yes | Yes | Yes | Medium (6.5) |
| CVE-2025-61730 | Yes | Yes | Yes | Yes | Medium (5.3) |
| CVE-2025-61731 | Yes | Yes | Yes | Yes | High (7.8) |
| CVE-2025-61732 | Yes | Yes | Yes | Yes | High (8.6) |
| CVE-2025-68121 | Yes | Yes | Yes | Yes | Critical (10) |
| CVE-2025-68160 | Yes | Yes | No | Yes | Low (4.7) |
| CVE-2025-69418 | Yes | Yes | No | Yes | Low (4.0) |
| CVE-2025-69419 | Yes | Yes | No | Yes | Low (7.4) |
| CVE-2025-69420 | Yes | Yes | Yes | Yes | Low (7.5) |
| CVE-2025-69421 | Yes | Yes | Yes | Yes | Low (7.5) |
| CVE-2025-8277 | Yes | Yes | No | Yes | Low (0) |
| CVE-2025-9820 | Yes | Yes | No | Yes | Low (4) |
| CVE-2026-0861 | Yes | Yes | No | Yes | Medium (8.4) |
| CVE-2026-0915 | Yes | Yes | No | Yes | Medium (7.5) |
| CVE-2026-0964 | Yes | Yes | No | Yes | Medium |
| CVE-2026-0965 | Yes | Yes | No | Yes | Low |
| CVE-2026-0966 | Yes | Yes | No | Yes | Low |
| CVE-2026-0967 | Yes | Yes | No | Yes | Medium |
| CVE-2026-0968 | Yes | Yes | No | Yes | Medium |
| CVE-2026-22795 | Yes | Yes | No | Yes | Low (5.5) |
| CVE-2026-22796 | Yes | Yes | No | Yes | Low (5.3) |
| CVE-2026-24051 | Yes | Yes | Yes | Yes | High (7.0) |
| CVE-2026-25679 | Yes | Yes | Yes | Yes | High (7.5) |
For details on upgrading Cloud Service Mesh, see Upgrade Cloud Service Mesh. Cloud Service Mesh 1.27.8-asm.7 uses Envoy 1.35.9.
Security
1.28.5-asm.9 is now available for in-cluster Cloud Service Mesh.
This patch release contains fixes for the security vulnerabilities listed in GCP-2026-013 as well as fixes for the following platform CVEs:
| CVE | Proxy | Control Plane | Distroless | CNI | Severity |
|---|---|---|---|---|---|
| CVE-2025-13151 | Yes | Yes | No | Yes | Medium (7.5) |
| CVE-2025-14831 | Yes | Yes | No | Yes | Medium (5.3) |
| CVE-2025-15281 | Yes | Yes | No | Yes | Medium (7.5) |
| CVE-2025-15467 | Yes | Yes | No | Yes | Medium (9.8) |
| CVE-2025-15558 | Yes | Yes | Yes | – | High (8.0) |
| CVE-2025-61726 | Yes | Yes | Yes | Yes | High (7.5) |
| CVE-2025-61728 | Yes | Yes | Yes | Yes | Medium (6.5) |
| CVE-2025-61730 | Yes | Yes | Yes | Yes | Medium (5.3) |
| CVE-2025-61731 | Yes | Yes | Yes | Yes | High (7.8) |
| CVE-2025-61732 | Yes | Yes | Yes | Yes | High (8.6) |
| CVE-2025-68121 | Yes | Yes | Yes | Yes | Critical (10) |
| CVE-2025-68160 | Yes | Yes | No | Yes | Low (4.7) |
| CVE-2025-69418 | Yes | Yes | No | Yes | Low (4.0) |
| CVE-2025-69419 | Yes | Yes | No | Yes | Low (7.4) |
| CVE-2025-69420 | Yes | Yes | Yes | Yes | Low (7.5) |
| CVE-2025-69421 | Yes | Yes | Yes | Yes | Low (7.5) |
| CVE-2025-8277 | Yes | Yes | No | Yes | Low (0) |
| CVE-2025-9820 | Yes | Yes | No | Yes | Low (4) |
| CVE-2026-0861 | Yes | Yes | No | Yes | Medium (8.4) |
| CVE-2026-0915 | Yes | Yes | No | Yes | Medium (7.5) |
| CVE-2026-0964 | Yes | Yes | No | Yes | Medium |
| CVE-2026-0965 | Yes | Yes | No | Yes | Low |
| CVE-2026-0966 | Yes | Yes | No | Yes | Low |
| CVE-2026-0967 | Yes | Yes | No | Yes | Medium |
| CVE-2026-0968 | Yes | Yes | No | Yes | Medium |
| CVE-2026-22795 | Yes | Yes | No | Yes | Low (5.5) |
| CVE-2026-22796 | Yes | Yes | No | Yes | Low (5.3) |
| CVE-2026-24051 | Yes | Yes | Yes | Yes | High (7.0) |
| CVE-2026-25679 | Yes | Yes | Yes | Yes | High (7.5) |
For details on upgrading Cloud Service Mesh, see Upgrade Cloud Service Mesh. Cloud Service Mesh 1.28.5-asm.9 uses Envoy 1.36.5.
Security
1.26.8-asm.3 is now available for in-cluster Cloud Service Mesh.
This patch release contains fixes for the security vulnerabilities listed in GCP-2026-013 as well as fixes for the following platform CVEs:
| CVE | Proxy | Control Plane | Distroless | CNI | Severity |
|---|---|---|---|---|---|
| CVE-2025-13151 | Yes | Yes | No | Yes | Medium (7.5) |
| CVE-2025-14831 | Yes | Yes | No | Yes | Medium (5.3) |
| CVE-2025-15281 | Yes | Yes | No | Yes | Medium (7.5) |
| CVE-2025-15467 | Yes | Yes | Yes | Yes | Medium (9.8) |
| CVE-2025-15558 | Yes | Yes | Yes | – | High (8.0) |
| CVE-2025-61726 | Yes | Yes | Yes | Yes | High (7.5) |
| CVE-2025-61728 | Yes | Yes | Yes | Yes | Medium (6.5) |
| CVE-2025-61730 | Yes | Yes | Yes | Yes | Medium (5.3) |
| CVE-2025-61731 | Yes | Yes | Yes | Yes | High (7.8) |
| CVE-2025-61732 | Yes | Yes | Yes | Yes | High (8.6) |
| CVE-2025-68121 | Yes | Yes | Yes | Yes | Critical (10) |
| CVE-2025-68160 | Yes | Yes | No | Yes | Low (4.7) |
| CVE-2025-68973 | Yes | Yes | Yes | Yes | High (7.8) |
| CVE-2025-69418 | Yes | Yes | No | Yes | Low (4.0) |
| CVE-2025-69419 | Yes | Yes | No | Yes | Low (7.4) |
| CVE-2025-69420 | Yes | Yes | Yes | Yes | Low (7.5) |
| CVE-2025-69421 | Yes | Yes | Yes | Yes | Low (7.5) |
| CVE-2025-8277 | Yes | Yes | No | Yes | Low (0) |
| CVE-2025-9820 | Yes | Yes | No | Yes | Low (4) |
| CVE-2026-0861 | Yes | Yes | No | Yes | Medium (8.4) |
| CVE-2026-0915 | Yes | Yes | No | Yes | Medium (7.5) |
| CVE-2026-0964 | Yes | Yes | No | Yes | Medium |
| CVE-2026-0965 | Yes | Yes | No | Yes | Low |
| CVE-2026-0966 | Yes | Yes | No | Yes | Low |
| CVE-2026-0967 | Yes | Yes | No | Yes | Medium |
| CVE-2026-0968 | Yes | Yes | No | Yes | Medium |
| CVE-2026-22795 | Yes | Yes | No | Yes | Low (5.5) |
| CVE-2026-22796 | Yes | Yes | No | Yes | Low (5.3) |
| CVE-2026-24051 | Yes | Yes | Yes | Yes | High (7.0) |
| CVE-2026-25679 | Yes | Yes | Yes | Yes | High (7.5) |
For details on upgrading Cloud Service Mesh, see Upgrade Cloud Service Mesh. Cloud Service Mesh 1.26.8-asm.3 uses Envoy 1.34.13.
Security
The following images are now rolling out for managed Cloud Service Mesh:
- Sidecar version 1.21.6-asm.16 is rolling out to the rapid release channel.
- Sidecar version 1.20.8-asm.68 is rolling out to the regular release channel.
- Sidecar version 1.19.10-asm.61 is rolling out to the stable release channel.
- CNI and managed data plane controller version 1.23.6-asm.31 is rolling out to all release channels.
These rollouts will preempt those previously announced on February 9, 2026.
Managed Cloud Service Mesh will start using proxy version csm_mesh_proxy.20260304_RC00 for Gateway API on GKE clusters for all channels. This proxy version maps closest to Envoy version 1.37.
These patch releases contain the fixes for the vulnerabilities listed in GCP-2026-013 as well as fixes for the following platform CVEs:
| CVE | Proxy | Control Plane | Distroless | CNI | MDPC | Severity |
|---|---|---|---|---|---|---|
| CVE-2025-61726 | Yes | Yes | Yes | – | – | High (7.5) |
| CVE-2025-61728 | Yes | Yes | Yes | – | – | Medium (6.5) |
| CVE-2025-61730 | Yes | Yes | Yes | – | – | Medium (5.3) |
| CVE-2025-61731 | Yes | Yes | Yes | – | – | High (7.8) |
| CVE-2025-61732 | Yes | Yes | Yes | – | – | High (8.6) |
| CVE-2025-68121 | Yes | Yes | Yes | – | – | Critical (10) |
| CVE-2025-68160 | Yes | Yes | No | – | – | Low (4.7) |
| CVE-2025-69418 | Yes | Yes | No | – | – | Low (4.0) |
| CVE-2025-69419 | Yes | Yes | No | – | – | Low (7.4) |
| CVE-2025-69420 | Yes | Yes | No | – | – | Low (7.5) |
| CVE-2025-69421 | Yes | Yes | No | – | – | Low (7.5) |
| CVE-2025-8277 | – | – | – | Yes | Yes | Low (0) |
| CVE-2025-9820 | – | – | – | Yes | Yes | Low (4.0) |
| CVE-2025-14831 | – | – | – | Yes | Yes | Medium (5.3) |
| CVE-2025-15281 | Yes | Yes | Yes | – | – | Medium (7.5) |
| CVE-2025-15467 | Yes | Yes | No | – | – | Medium (9.8) |
| CVE-2026-0861 | Yes | Yes | No | – | – | Medium (8.4) |
| CVE-2026-0915 | Yes | Yes | No | – | – | Medium (7.5) |
| CVE-2026-0964 | – | – | – | Yes | Yes | Medium |
| CVE-2026-0965 | – | – | – | Yes | Yes | Low |
| CVE-2026-0966 | – | – | – | Yes | Yes | Low |
| CVE-2026-0967 | – | – | – | Yes | Yes | Medium |
| CVE-2026-0968 | – | – | – | Yes | Yes | Medium |
| CVE-2026-22795 | Yes | Yes | No | – | – | Low (5.5) |
| CVE-2026-22796 | Yes | Yes | No | – | – | Low (5.3) |
| CVE-2026-24051 | – | – | – | Yes | Yes | High (7.0) |
| CVE-2026-25679 | Yes | Yes | – | – | – | High (7.5) |
Looker
Feature
Beginning in Looker 26.4, customer-hosted Looker instances will use a new LookML parser with optimized performance. This parser is already in use for Looker-hosted instances. For customer-hosted instances on Looker 26.4, if you want to revert to the legacy parser, contact Looker Support for details on how to disable the new parser. The legacy parser will be fully deprecated in Looker 26.6.
Memorystore for Valkey
Feature
Support for version 9.0 of Valkey is Generally Available.
Oracle Database@Google Cloud
Feature
For Exadata Database Service, Oracle Database@Google Cloud adds zone europe-west8-a-r1 (Milan, Italy).
For a list of supported locations, see Supported regions and zones.
Sensitive Data Protection
Feature
The CRIME_STATUS infoType detector is available in Preview. For more information about all infoTypes, see InfoType detector reference.
Source: Google Cloud Platform
Latest Posts
- Power Pages – Power Pages version 9.8.3.x early Upgrade Release [MC1249613]
![Power Pages - Power Pages version 9.8.3.x early Upgrade Release [MC1249613] 2 pexels kevinbidwell 1373100](data:image/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==)
- GCP Release Notes: March 11, 2026

- Find your files quickly and easily on Word, Excel and PowerPoint App home pages [MC1249435]
![Find your files quickly and easily on Word, Excel and PowerPoint App home pages [MC1249435] 4 pexels e l 296481171 14209547](data:image/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==)
- Retirement of the Semi-Annual Enterprise Channel option in the Office Deployment Service [MC1249427]
![Retirement of the Semi-Annual Enterprise Channel option in the Office Deployment Service [MC1249427] 5 pexels jeshoots 234527](data:image/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==)

![Power Pages - Power Pages version 9.8.3.x early Upgrade Release [MC1249613] 2 pexels kevinbidwell 1373100](https://mwpro.co.uk/wp-content/uploads/2025/06/pexels-kevinbidwell-1373100-150x150.webp)

![Find your files quickly and easily on Word, Excel and PowerPoint App home pages [MC1249435] 4 pexels e l 296481171 14209547](https://mwpro.co.uk/wp-content/uploads/2025/06/pexels-e-l-296481171-14209547-150x150.webp)
![Retirement of the Semi-Annual Enterprise Channel option in the Office Deployment Service [MC1249427] 5 pexels jeshoots 234527](https://mwpro.co.uk/wp-content/uploads/2024/08/pexels-jeshoots-234527-150x150.webp)
![Power Pages - Power Pages version 9.8.3.x early Upgrade Release [MC1249613] 7 Power Pages – Power Pages version 9.8.3.x early Upgrade Release [MC1249613]](https://mwpro.co.uk/wp-content/uploads/2025/06/pexels-kevinbidwell-1373100-96x96.webp)