1.28.4
Solo build of Istio version 1.28.4 patch release.
This release note describes what’s different between Solo builds of Istio versions 1.28.3 and 1.28.4.
Security Notice
- CVE-2025-61732 (CVSS score 8.6, High): A discrepancy between how Go and C/C++ comments were parsed allowed for code smuggling into the resulting cgo binary.
- CVE-2025-68121 (CVSS score 4.8, Moderate): A flaw in
crypto/tlssession resumption allows resumed handshakes to succeed when they should fail if ClientCAs or RootCAs are mutated between the initial and resumed handshake. This can occur when usingConfig.Clonewith mutations orConfig.GetConfigForClient. As a result, clients may resume sessions with unintended servers, and servers may resume sessions with unintended clients.
General Changes
- Built against upstream Istio commit
4ae866ba2a361ecfa4de835136c13895437364d0. Compare.
Solo Flavor Changes
Improved
istioctl multicluster checkto show gateway addresses, peer cluster addresses, and globally shared services.Added ztunnel helm support for
dnsPolicyanddnsConfigcustomization.Added support to retrieve connections from east-west gateway via the
istioctl ztunnel-config connectionssubcommand.Added enhanced validation checks in
istioctl multicluster checkfor flat-network configurations.Added support for the east-west gateway to break connections to pods that are terminated.
Added the ability to specify authorized namespaces for debug endpoints when
ENABLE_DEBUG_ENDPOINT_AUTH=true. Enable by settingDEBUG_ENDPOINT_AUTH_ALLOWED_NAMESPACESto a comma separated list of authorized namespaces. The system namespace (typicallyistio-system) is always authorized.Fixed sending traffic to pods peered for flat-network multi-cluster which are
Not ReadyorTerminating.Fixed an issue in NodePort peering where a comma-delimited value for the Solo annotation
peering.solo.io/data-plane-service-typewould prevent node workloads from being sent to peers.Fixed an issue causing Envoy clusters for peered global services to not have the
tlsMode-istiotransport socket configured.Fixed an issue in NodePort peering where simultaneous processing of node
WorkloadEntryand gateway-derivedServiceEntrydelete events could cause the nodeWorkloadEntryto persist.Fixed an issue in NodePort peering where the generated
ServiceEntryand nodeWorkloadEntryfail to be cleaned up when the istio-remote gateway’speering.solo.io/preferred-data-plane-service-typeannotation was no longer set toNodePort.Fixed an issue where updating the address in the istio-remote Gateway resource would not prompt the control plane to connect to the new address.
Fixed the
istioctl bootstrapcommand to respect the-iistio system namespace flag.Fixed the
istioctl ecs add-servicecommand to respect the-iistio system namespace flag.Fixed an issue where node
WorkloadEntryresources failed to be created when NodePort peering was enabled after the peer initially connected via LoadBalancer for an extended period of time. Node events received before the NodePortServiceEntryexisted were eventually dropped and never re-processed once NodePort peering was enabled.
FIPS Flavor Changes
No changes in this section.