Announcing Istio 1.28.1
Istio 1.28.1 patch release.
This release contains bug fixes to improve robustness. This release note describes what’s different between Istio 1.28.0 and 1.28.1.
This release implements the security updates described in our 3rd of December post, ISTIO-SECURITY-2025-003.
BEFORE YOU UPGRADE
Things to know and prepare before upgrading.
DOWNLOAD
Download and install this release.
DOCS
Visit the documentation for this release.
SOURCE CHANGES
Inspect the full set of source code changes.
Changes
Added support for multiple
targetPortsin anInferencePool. The possibility to have >1targetPortwas added as part of GIE v1.1.0. (Issue #57638)Fixed status conflicts on Route resources when multiple Istio revisions are installed. (Issue #57734)
Fixed
ServiceEntryresources with overlapping hostnames within the same namespace causing unpredictable behavior in ambient mode. (Issue #57291)Fixed a failure in
istio-initwhen using native nftables with TPROXY mode and had an emptytraffic.sidecar.istio.io/includeInboundPortsannotation. (Issue #58135)Fixed an issue where EDS generation code did not consider service scope and, as a result, remote cluster endpoints that should not be accessible were included in waypoint configuration. (Issue #58139)
Fixed an issue where, due to incorrect EDS caching in pilot, ambient E/W gateway or waypoints would be configured with unusable EDS endpoints. (Issue #58141)
Fixed an issue where Envoy Secret resources could get stuck in
WARMINGstate when the same Kubernetes Secret is referenced from Istio Gateway objects using bothsecret-nameandnamespace/secret-nameformats. (Issue #58146)Fixed an issue where IPv6 nftables rules were programmed when IPv6 was explicitly disabled in ambient mode. (Issue #58249)
Fixed DNS name table creation for headless services where pods entries did not account for pods having multiple IPs. (Issue #58397)
Fixed an issue causing ambient multi-network connections to fail when using a custom trust domain. (Issue #58427)
Fixed an issue where HTTPS servers processed first prevented HTTP servers from creating routes on the same port with different bind addresses. (Issue #57706)
Fixed a bug causing the experimental
XListenerSetresources to not be able to access TLS Secrets.