5.x Release Notes
Release Notes for 5.xβ
To receive email notifications of new releases, please subscribe to this SUSE mailing list: https://lists.suse.com/mailman/listinfo/neuvector-updates
5.4.8 December 2025β
New Featuresβ
- NVSHAS-10186: Return file_path after export to remote repository successfully
- NVSHAS-10168: Add remote export option to system configurations page - Federation only
- NVSHAS-10142: Make 'enforce TLS verification' enabled by default for new NV deployment (6)
- NVSHAS-10068: [UI] Support "Export"/"Import" buttons on all fed-related policy pages
- NVSHAS-10026: Possibility of creating Federation rules through automation RESTAPI only
- NVSHAS-9300: Helm chart: manager-service and controller-service customizable TCP ports
Bugs Fixedβ
- NVSHAS-10196: Replace country flag images to avoid CVE-2025-66412 / GHSA-v4hv-rgfq-gp49
- NVSHAS-10185: Suggest add "Fed" in exported file name when exporting fed policy to local or remote in NV UI
- NVSHAS-10180: [C03084][C03092][C03085] [Container Scan] It fails to detect package.json related modules
- NVSHAS-10174: Controller wrongly allows 'Committer Name' & 'Email' in Remote Repository Configuration to be empty in POST request
- NVSHAS-10173: [UI] Newly-created rule in fed DLP/WAF sensor page cannot be edited
- NVSHAS-10172: [UI] Incorrect floating message when try to delete a fed webhook that is in-use
- NVSHAS-10171: [UI] strange behavior for Federated Policy -> Configuration page
- NVSHAS-10169: [Federated policy][Configuration] After webhook is updated, the reflected record shows the type is user created
- NVSHAS-10167: [UI] Incorrect response rules displayed after selecting a fed group
- NVSHAS-10166: [UI] Incorrect floating message after importing fed configuration
- NVSHAS-10165: [UI] Network policy mode and Process profile mode should not be in the export federated groups modal
- NVSHAS-10164: [Groups] Hide selection checkbox on federated groups on local group page
- NVSHAS-10163: [UI] 'Export to Remote Repository' is missing for all fed policy pages' export
- NVSHAS-10162: HIGH CVEs FOUND in NV Images
- NVSHAS-10157: [Scan] Fixed Version is empty in some image
- NVSHAS-10156: NeuVector Scanner is not reporting CVEs for the npm repository tinymce
- NVSHAS-10154: Only response rules without group can be exported in response rules page
- NVSHAS-10151: Incorrect payload for creating fed WAF sensor
- NVSHAS-10140: Unexpected checkbox for DLP/WAF export
- NVSHAS-10139: [Controller] Controller does not initialize when enforcer is not deployed
- NVSHAS-10133: Enforcer pods crashing
- NVSHAS-10128: [Controller] Controller doesnt initialize when disabling scanner using cve.scanner.enabled=false parameter
- NVSHAS-10116: Controller throwing errors "...Watch failure - error..."
- NVSHAS-10113: [UI] 'View Federated Repositories' on Assets -> Registries page
References:β
5.4.7 October 2025β
In NeuVector v5.4.6 and later, the Compliance feature requires NeuVector Prime and must have controller.prime.enabled: true set in the values.yaml file. If the Compliance feature is missing after upgrade, refer toCompliance Feature Behavior Across NeuVector Versions.
New Featuresβ
- NVSHAS-10085: Add a configuration setting on UI for allowing groups switch between least privileged & more privileged.
- NVSHAS-10084: Move admission control related crd structs in
nvsecurityrule_def.gofromresource/toapi/for dependency issue when buildingneuvector-kubewarden-policy-converter. - NVSHAS-10073: Add a new field for exported admission control rules in the yaml file.
- NVSHAS-10067: Cli for new configuration setting that allows ns user to export.
- NVSHAS-10065: Add a configuration setting on UI for allowing namespace user to export.
- NVSHAS-9918 : Add ability to control policy restriction mode.
Bugs Fixedβ
- NVSHAS-10080: Cannot create a federal response rule for Admission event
- NVSHAS-10077: Unexpected checkbox for admission control export
- NVSHAS-10071: process rule missing in enforcer pod
- NVSHAS-10070: Creating multiple response rule fail on some cluster
- NVSHAS-10066: First time login does not show link for bootstrap helper when user directly access UI in Rancher deployment
- NVSHAS-10054: Do not always reset k8s ValidatingWebhookConfiguration to avoid infinite updating loops
- NVSHAS-10049: Follow up on the NV scan JFrog Subdomain mode issue
- NVSHAS-10006: Group export is empty for namespace users.
- NVSHAS-9761 : Harbor registry with s3 storage backend repository scan error
References:β
- Removal of hard-coded encryption key
- Enforce TLS verification for requests to Telemetry server
- Check consul ports for enforcer
Refer to the Security Advisory and CVEs documentation for more information.
5.4.6 August 2025β
In NeuVector v5.4.6 and later, the Compliance feature requires NeuVector Prime and must have controller.prime.enabled: true set in the values.yaml file. If the Compliance feature is missing after upgrade, refer toCompliance Feature Behavior Across NeuVector Versions.
New Featuresβ
- NVSHAS-6733: Export response rules as CRD.
- NVSHAS-9899: NeuVector Process Profile Alerts for Java Services contain sensitive data.
- NVSHAS-9990: Adopt new hash algorithm for user passwords.
- NVSHAS-9968: Support setting default admin account's default password.
Bugs Fixedβ
- NVSHAS-10062: Manager not showing ERROR when failing to create admin password during 1st login.
- NVSHAS-10041: Federation operation failed "invalid data" when configuring federation through ConfigMap.
- NVSHAS-10018: Neuvector is not scanning all images in GitLab Registry.
- NVSHAS-10017: False Positive Security Alert related to allowed process.
- NVSHAS-10001: Protect/Monitor enforcements "linger" after group deletion.
- NVSHAS-9985: NeuVector (Fed Master) creates a problem for all requests coming from outside.
- NVSHAS-9981: Security Event is triggered whenever a new "Process Profile Rule" is added or changed in a group.
Security Advisoriesβ
- Admin account has insecure default password
- Insecure password management vulnerable to rainbow attacks
- Process with sensitive arguments lead to leakage
5.4.5 July 2025β
New Featuresβ
- NVSHAS-9776: Add etcd toleration in helm chart.
Bug Fixesβ
- NVSHAS-9507: OCI container not getting scanned.
- NVSHAS-9787: Remove unnecessary manager log.
- NVSHAS-9788: Refine algorithm for generating certificate.
- NVSHAS-9789: Remove unnecessary manager log on remote registry configuration.
- NVSHAS-9867: NeuVector shows
.NET Library System.Formats.Asn1 v8.013affected CVE 2024-38095. - NVSHAS-9883: [quay.io]Wildcard filters not working for docker registry.
- NVSHAS-9911: Scanning the repo using REST API results in an incorrect "message"
- NVSHAS-9930: CVE-2018-20796 for
glibc/libc-bin : 2.36-9+deb12u10- False positive. - NVSHAS-9933: Registry-adapter feature (Harbor) showing errors in target registry while scanning.
- NVSHAS-9934: Suspected zero-drift functionality malfunction.
- NVSHAS-9940: NV scan JFrog Subdomain mode issue.
- NVSHAS-9942: Images scans for customer images are failing.
- NVSHAS-9945: When the process name is too long, it's difficult to determine how to create the appropriate process profile rule.
- NVSHAS-9946: Display issue with Admission Control alert for Credential Type.
- NVSHAS-9947: [UI-ext] Compliance Chart Missing "Manual" Status in Rancher NeuVector.
- NVSHAS-9948: After upgrading to
5.4.3NeuVector configuration has been lost. - NVSHAS-9949: [Harbor][Incorrect user/pw] It still scan images even inputting incorrect user/pw.
- NVSHAS-9952: Remove 'signature' from usage report because NV no longer issues/checks the license key.
- NVSHAS-9953: Pods Enforcer keeps restarting.
- NVSHAS-9954: NeuVector prometheus-exporter generating duplicated metrics.
- NVSHAS-9958: Network rule enforcement takes long time.
- NVSHAS-9960: Scanners not working.
- NVSHAS-9969: fatal error: concurrent map writes results in enforcer component restart.
- NVSHAS-9971: NV UI about
Get Bootstrap Password. - NVSHAS-9975: [Manager] TypeError:
this.mousemoveListeneris not a function is observed on the NV GUI. - NVSHAS-9986: Process profile rules and File access rules cannot be edited and removed in Federated policy group view.
- NVSHAS-9988: UI: Group pages is not showing all groups when more than 2k groups present.
- NVSHAS-9991: The group
nv.gatekeeper-controller-manager.openshift-azure-guardrailsis missing from UI. - NVSHAS-9993: Replace md5 by sha256.
- NVSHAS-9994: The enforcer pod keeps restarting.
- NVSHAS-9996: NeuVector Helm chart should allow non-privileged mode of enforcer pods.
- NVSHAS-9998: Cannot export group from Neuvector federated master.
- NVSHAS-10000: Upgrade NV to BCI 15.7.
- NVSHAS-10003: Reload page does not work on standalone NV page while a Rancher UI is opening.
- NVSHAS-10008: Registry Scan - View menu is broken for Scanned Image.
- NVSHAS-10010: TCP SYN Flood blocks ingress causing complete ingress traffic being blocked.
5.4.4 May 2025β
New Featuresβ
- NVSHAS-9915: Show scan results from the Harbor scanner module in the NeuVector UI.
- NVSHAS-9904: Expose
imagePullPolicytovalues.yamlfor each component. - NVSHAS-9869: UI: Move DDoS Controls to the Group Pane.
- NVSHAS-9840: [GCP] NeuVector Autopilot support for GCP.
- NVSHAS-9248: Display unused Process/Network Rules with counters and
Last Usedtimestamp. - NVSHAS-8160: [Controller] Adjust some items for Security Risk Score calculation.
- NVSHAS-4673: Suggestion to add message before exporting groups.