5.x Release Notes
Release Notes for 5.xβ
To receive email notifications of new releases, please subscribe to this SUSE mailing list: https://lists.suse.com/mailman/listinfo/neuvector-updates
5.4.4 May 2025β
New Features:β
- NVSHAS-9915: Show scan results from the Harbor scanner module in the NeuVector UI.
- NVSHAS-9904: Expose
imagePullPolicy
tovalues.yaml
for each component. - NVSHAS-9869: UI: Move DDoS Controls to the Group Pane.
- NVSHAS-9840: [GCP] NeuVector Autopilot support for GCP.
- NVSHAS-9248: Display unused Process/Network Rules with counters and
Last Used
timestamp. - NVSHAS-8160: [Controller] Adjust some items for Security Risk Score calculation.
- NVSHAS-4673: Suggestion to add message before exporting groups.
Bug Fixes:β
- NVSHAS-9931: Add a warning if there are inconsistent versions of NeuVector products in multi-cluster.
- NVSHAS-9925:
/v1/scan/asset/images
API on the Registry Page fails. - NVSHAS-9913: Problem with deleting several Network Rules related to Workload:XYZ groups.
- NVSHAS-9912: Update Helm about some K8s RBAC permissions needed by the controller service account.
- NVSHAS-9909: "Signed Out - Go to loading page" message displayed when using NeuVector Rancher NavLink.
- NVSHAS-9898: In a federated environment, modifying the criteria of a customer-created fed.* group (e.g. fed.core-systems) doesn't work.
- NVSHAS-9894: [Enforcer]
Nv.protect
denies controller readiness probe commandcat /tmp/ready
. - NVSHAS-9886: Network activity does not resolve domain names for the custom external group connections.
- NVSHAS-9884: [Node Scan][Container Scan] Scan will fail.
- NVSHAS-9873: UI Advanced Filter search issue in NeuVector 5.4.2.
- NVSHAS-9865: Exported network policies differ, depending on the order of selection (same groups selected).
- NVSHAS-9828: [Enforcer: process] The NeuVector Enforcer is not able to detect short lived pods (Anything less than 5 seconds).
- NVSHAS-9783: After adding the network policy to deny icmp packets, NeuVector does not see any alerts in
Security Events
. - NVSHAS-9176: Show a script error in the Security Risks > Vulnerabilities page if a user permission with the namespace
rt_scan:w
role is logged in.
5.4.3 March 2025β
New Features:β
- NVSHAS-9793: Allow Fed Global roles in LDAP/userinitcfg when deploying NeuVector through the ConfigMap and Secret.
- NVSHAS-9764: [RFE] Add support for Azure for "Remote Repository Configuration".
- NVSHAS-9759: Add date details in the Ingress-Exposure Report.
- NVSHAS-9755: Request to display environment variable names alongside values in alerts for secrets.
- NVSHAS-9748: [Helm] NeuVector Helm update for supporting name referral for common groups in CRD (NVSHAS0-4717).
- NVSHAS-9426: Add hostPath for Scanner to Helm chart.
- NVSHAS-9326: NeuVector - Harbor Pluggable Scanner Module.
- NVSHAS-9835: UI for disable auto-scan for node.
- NVSHAS-7997: Scanner connector for ghcr.io.
- NVSHAS-7982: Assign WAF sensors from Federation Master.
Bug Fixes:β
- NVSHAS-9849: Enforcers not registering with controllers.
- NVSHAS-9847: Wildcard filters not working for Docker registry.
- NVSHAS-9833: Configuration restore fails in Rancher deployments.
- NVSHAS-9832: Problem with creating network rules using the Workload group.
- NVSHAS-9821: Process name is not matched from the command line for the Process Profit Rule Alert.
- NVSHAS-9817: Creating NvClusterSecurityRule CRD shows successful creation, but it was not actually created due to duplicated process rule entries.
- NVSHAS-9812: NeuVector prometheus-exporter wrong metrics.
- NVSHAS-9811: [Manager] Unable to access GUI when using a custom certificate (CA) with root CA and intermediate CA on the secret.
- NVSHAS-9801: FIPS mode +
manager.env.ssl=false
causes Manager to error out. - NVSHAS-9792: Federation policy syncing failing due to body size exceeding Consul max.
- NVSHAS-9784: NeuVector returning 404 during Jfrog image repository scanning.
- NVSHAS-9783: After adding the network policy to deny icmp packets the user does not see any alert in "Security Events".
- NVSHAS-9780: NeuVector single sign on not working with Rancher NavLink.
- NVSHAS-9777: Webhook JSON with duplicated "level" keys.
- NVSHAS-9770: Auto-Switch after Zero-Drift mode switches incorrect policy.
- NVSHAS-9765: File access doesn't get fully blocked in Protect mode.
- NVSHAS-9756: Enforcer reached maximum CPU and has several Memory Pressure alerts.
- NVSHAS-9668: Compliance test failing on RKE2.
- NVSHAS-9265: Incomplete and incorrect vulnerability scan results on PRE PCI environment.
- NVSHAS-9227: Registry scan gets stuck in the middle of scanning process and goes to "Idle" state.
- NVSHAS-9729: Incorrect count of vulnerabilities are observed when multiple statefulset with the "same name" in namespaces are deployed in a project.
- NVSHAS-9810: NeuVector controller not responding and UI not accessible.
5.4.2 January 2025β
New Features:β
- NVSHAS-9726: The monitor now passes proxy URL.
- NVSHAS-9719: Announces the retirement of built-in certificates.
- NVSHAS-9715: Helm Chart value support for setting nodeport on controller and manager.
- NVSHAS-9710: Include a sortable
feed_rating
column into the Vulnerabilities tab. - NVSHAS-9669: Overall security score through REST API.
- NVSHAS-9590: Ability to choose which vulnerability score for all assets.
- NVSHAS-7555: Include "Auto Refresh" option under Security Events.
Bug Fixes:β
- NVSHAS-9662: Inconsistent Role/RoleBinding logic in Helm chart 2.8.2.
- NVSHAS-9652: Observed difference in syslog format in splunk.
- NVSHAS-9649: Container link produces 404 response code in security-event.
- NVSHAS-9613: NeuVector Manager Pod Error / NeuVector Web UI Unavailable.
- NVSHAS-9507: OCI container not getting scanned.
- NVSHAS-9443: Upgrade/Install through ArgoCD fails as it cannot create leases.coordination.k8s.io object.
- NVSHAS-9436: Possible CVE false negative against CVE-2024-7347.
- NVSHAS-8386: Private keys and self-signed certs still shipped in multiple images.
- NVSHAS-9754: [UI] Prevent Rancher relates SSO user disable Authentication of OpenShift or Rancher's RBAC.
- NVSHAS-9751: [Runtime Protection] Monitor Mode + Zero-Drift is not generating any alerts when a child process is executed.
- NVSHAS-9721: UI should pop up appropriate error message when user inputs wrong registry name.
- NVSHAS-9696: Inconsistent colour indication of assets on vulnerability page.
- NVSHAS-9686: Hardcoded namespace for the registry adapter certificate in the Neuvector Helm chart.
- NVSHAS-9678: Excessive error traces after the linter changes.
- NVSHAS-9670: Manager: Plain text response double quotes issue and java unnamed library issue in sbt run.
- NVSHAS-9667: Setting
CTRL_PATH_DEBUG
env variable to error in controller deployment is not working. - NVSHAS-9665: File Access rule: Delete predefined rules produces "setRowData" error.
- NVSHAS-9664: Policy Group: Delete custom script produces "setRowData" TypeError.
The default types of manager and registry adapter service have been changed to ClusterIP. Users are still able to override the setting by overridding the manager.svc.type
and cve.adapter.svc.type
if NodePort is preferred.
In the NeuVector 5.4.2 release, support is discontinued for deployments using the built-in internal certificate. The certificate found at /etc/neuvector/certs/internal
within NeuVector 5.4.2 container images will be removed. To continue using NeuVector, users should:
5.4.2 New Installation:β
Using Helm:β
- Enable the
internal.autoGenerateCert
andinternal.autoRotateCert
flags in the Helm charts (these will be enabled by default starting with the 5.4.2 release). Alternatively, a YAML method is linked below.
Using YAML:β
- Provide an internal certificate using the existing methods: https://open-docs.neuvector.com/deploying/production/internal
Upgrading from Previous Versions to 5.4.2:β
Please create and configure internal certificates from the scanner for the controller, enforcer, and registry-adapter to achieve a rolling update without losing data. It is still recommended to take a backup of your configuration before upgrading.
The following steps are only needed if your deployment uses a .yaml
file. Upgrading using Helm does not need these additional steps due to the internal certificates getting created by default via the following flags: internal.autoGenerateCert
and internal.autoRotateCert
.
docker run -it --entrypoint=bash neuvector/scanner:3.654 -c "cat /etc/neuvector/certs/internal/ca.cert" > ca.crt
docker run -it --entrypoint=bash neuvector/scanner:3.654 -c "cat /etc/neuvector/certs/internal/cert.pem" > tls.crt
docker run -it --entrypoint=bash neuvector/scanner:3.654 -c "cat /etc/neuvector/certs/internal/cert.key" > tls.key
kubectl create secret generic internal-cert -n neuvector --from-file=tls.key --from-file=tls.crt --from-file=ca.crt
Sample 5.4.2 yaml with internal certificate configured: https://github.com/neuvector/manifests/blob/main/kubernetes/5.4.0/neuvector-k8s.yaml
Additional information about internal certificates.
In the case of a PVC configuration, users can configure an existing PVC in the new installation to restore a configuration.
Additional Note for Scanner:
For current users with versions prior to 5.4.2, the certificate will remain available in the neuvector/scanner:latest
until March 31, 2025. After this date, it will be removed. Users should plan to provide the same internal certificate to the controller, enforcer, scanner, and registry adapter to continue using the scanner.
Please note the stand-alone scanner will not be affected by these changes.
5.4.1 November 2024β
New Featuresβ
- NVSHAS-8583: Setting granular policy modes for rule sets, separate network policy mode and profile mode at per group level.
- NVSHAS-9440: Support separate network mode and Process and File mode in CRD.
- NVSHAS-9369: Add debug log category via helm deployment support for controller.
- NVSHAS-9040: Improve syslog message when admission control rule is denied in monitor mode.
Bug Fixesβ
- NVSHAS-9416: [Scanner] activemq-all-5.8.0.redhat-60024.jar can NOT be detected with any vul (but previous scanner build can).
- NVSHAS-9447: Controller/Scanner pods crashing - "Unsupported system Exit".
- NVSHAS-9278: CVE-2024-41110 is found in the latest scanner image.
- NVSHAS-9467: Custom group defined by the pod label does not propagate its profile data on the children containers.
- NVSHAS-9442: Deployment issue on ArgoCD.
- NVSHAS-9436: Possible CVE false negative against CVE-2024-7347.
- NVSHAS-9468: Fix CVE-2020-26160 to replace jwt-go with jwt:v5.
- NVSHAS-9517: Admission control is not consistent, getting incorrect results.
- NVSHAS-9532: The image scan is completed but deployment is still not allowed.
- NVSHAS-9558: JWT token expire reports http.StatusRequestTimeout 408.
- NVSHAS-9576: Clear password field for registry data when user uses controller mode with Jenkins to scan.
- NVSHAS-9425: Create nfq when container has vxlan.
- NVSHAS-9571: [Registries] Filter for all scanned image does not work well.
- NVSHAS-9589: Managed clusters disconnected - Version mismatch with primary cluster.
- NVSHAS-8824: User fails to delete own groups, cannot create namespace-scoped groups.
- NVSHAS-9605: Export group with invalid policy mode & process profile mode values is mistakenly allowed.
- NVSHAS-9608: Scanner does not report any error when controller reports an error for huge scan results ~23MB.
- NVSHAS-9534: Display error in admission controls.
- NVSHAS-9600: Cannot disable controller debug.
- NVSHAS-9631: Reduce some enforcer errors.
- NVSHAS-9645: Pre-existing CRD processing fails.
- NVSHAS-9592: No new scan despite new DB version.
- NVSHAS-9212: Display alerting msg in GET(/v1/eula) if the neuvector-binding-secret role(binding) is incorrect.
- NVSHAS-9367: Enhance error messages when registry fails to be connected.
- NVSHAS-9475: Background grid print is not fully covering when menu is collapsed.
- NVSHAS-9485: Incorrect message for 'Network Security Policy Mode' in UI.
- NVSHAS-9480: NV UI deployed on Rancher downstream cluster throws HTTP/403 after Rancher logout.
- NVSHAS-9547: Sorting is broken on the security risks --> vulnerabilities table.
- NVSHAS-9570: [Vulnerabilities] Change the legend description for different statuses on assets.
- NVSHAS-9561: Dashboard board overall security score should match the actual score.
- NVSHAS-9572: [Vulnerabilities] Filtered data was kept no matter user refresh or re-login on page.
- NVSHAS-9597: UI doesn't respond to any error when the controller returns 403 for POST(v1/group).
- NVSHAS-8682: CRD webhook service needs to be moved from crd helm chart to application helm chart.
Known issuesβ
- In the 2.8.3 chart release, we have moved a previously misallocated resource from crds to core. If you use both crds and core charts, you might see issues during upgrade if you deploy core first. To resolve this, upgrade the crds first and then core charts.
5.4 September 2024β
Overviewβ
- UI Improvements:
- Display Rancher SSO users.
- Manage JWT tokens.
- Enhanced image navigation, and scan result links.
- Security Enhancements:
- New compliance filters.
- Support for CIS benchmarks, and OCI image signing.
- Network & Monitoring:
- Advanced bandwidth and session tracking.
- DDoS monitoring.
- Multus network support.
- Cert Management:
- New notifications for expiring internal certificates, including rotation capabilities.
- Automation & Integration:
- Federation automation.
- Rancher RBAC integration.
- Improved admission control.
- Performance & Efficiency:
- Reduced memory usage.
- ISP data charge reduction.
- Scanner cache stats exposure.
- Usability Improvements:
- Bootstrap password support.
- Cloud billing data archiving.
- Namespace boundary enforcement.
New Features:β
- NVSHAS-9012: Displaying Rancher SSO users on NV UI that have the same user name.
- NVSHAS-8939: Provide an option on NV UI so that Rancher SSO session users can drop the current JWT token (i.e. logout).
- NVSHAS-7522: Easy image navigation through registries.
- NVSHAS-8148: Link from container image to registry image scan results.
- NVSHAS-9258: Add a new notification for expiring certificates and internal certs.
- NVSHAS-8915: Support for new compliance filters and Compliance report.
- NVSHAS-9403: Filemonitor-UI: Allow user to delete predefined file monitor rule.
- NVSHAS-8423: Detect group-level bandwidth, active session count, and session-rate violation based on configured thresholds.
- NVSHAS-9218: Support for federal and CRD groups for DDoS monitoring.
- NVSHAS-8461: Support CIS benchmarks for managed k8s services in the cloud.
- NVSHAS-7664: Reduce ISP data charges during registry scanning.
- NVSHAS-8868: Expose scanner cache statistics.
- NVSHAS-8676: NV Protect improvement for benchmark scripts.
- NVSHAS-9255: Customize Admission control search registries for image names without FQDN.
- NVSHAS-9144: ID added for vulnerability profile for easy identification.
- NVSHAS-7687: Support configuring log level (debug/error/info/warn) for enforcer and controller from CLI.
- NVSHAS-7518: Change internal certificates for NeuVector components.
- NVSHAS-9287: Enable internal cert rotation.
- NVSHAS-8562: Add internal cert expiration notification.
- NVSHAS-8486: Support Multus network interface.
- NVSHAS-7447: Rancher RBAC integration with NeuVector.
- NVSHAS-7822: Federation automation without scripting API calls.
- NVSHAS-8799: Create a Compliance Framework for importing Compliance Templates.
- NVSHAS-8773: Bootstrap password support during initial deployment.
- NVSHAS-6740: Improvement of zero-drift baseline profile by enforcing the learned list in protect mode.
- NVSHAS-8325: Enforce container namespace boundary for network rule.
- NVSHAS-8723: Archive cloud billing data.
- NVSHAS-9086: Reduce controller process memory usage by eliminating vulTrait data structure.
- NVSHAS-6979: Ability to include comment of response rule in alert content.
- NVSHAS-8845: Create APIKEY with role FedReader and FedAdmin.
- NVSHAS-9306: Admission Control configuration assessment shows rule ID responsible for allowed or denied deployments.
- NVSHAS-9078: Support for image signing for OCI images.
- NVSHAS-7945: (Available when deployed from a Rancher Chart.) Support DISA STIG benchmark for Kubernetes.
- NVSHAS-8234: Admission Control Logic allowing images that should be denied.
Bug Fixes:β
- NVSHAS-9005: TypeError in registries: Cannot read properties of undefined (reading 'total_records').
- NVSHAS-9085: Assets View PDF report shows 0% vulnerability even with present vulnerabilities.
- NVSHAS-9084: Assets View PDF report shows NaN when image list is empty.
- NVSHAS-9128: Security Events: Container cannot be displayed if there is no workload's namespace value.
- NVSHAS-9025: Neuvector vulnerability acceptance scope for containers.
- NVSHAS-9155: Registry Scan Image incorrect column name and missing File Name
- NVSHAS-9122: Neuvector master logs out any time when using "Multiple Cluster" with Rancher SSO login.
- NVSHAS-9266: Registry scan: Scan Report by Layer button should be hidden or disabled when there's no vulnerability.
- NVSHAS-9219: Allow users to enable server cert validation for auth servers.
- NVSHAS-9246: Filtering for CSV/PDF export does not work.
- NVSHAS-8947: Cannot import NV configuration when authenticated through Rancher SSO.
- NVSHAS-9282: UI: Editing OpenShift registry entry fails due to a missing token.
- NVSHAS-9098: Enhance risk page loading user experience.
- NVSHAS-9267: Do not allow UI on 5.4 master cluster to switch to pre-5.4 managed clusters because of REST API changes.
- NVSHAS-9285: UI: Dropdown list button overlaps with other elements.
- NVSHAS-9302: Cannot create APIKEY with role FedReader and FedAdmin.
- NVSHAS-8539: Reconfigure proxy setting loses password.
- NVSHAS-9293: Removal of unrelated image details in the vulnerability reports.
- NVSHAS-9238: UI doesn't refresh the displayed cluster name after it's changed.
- NVSHAS-9363: Notification Configuration > Webhooks grid are not properly aligned.
- NVSHAS-9362: Security Risk Vulnerabilities filter returns 0 results.
- NVSHAS-8699: Unable to distinguish the user if Rancher AD user is the same.
- NVSHAS-9062: Displaying Rancher SSO users on NV UI that have the same username (Conversion on controller).
- NVSHAS-9071: Some modules are not reported in the container scan only.
- NVSHAS-8242: gRPC call to test if controller handles critical severity.
- NVSHAS-8908: Parse X-Forwarded-Port correctly considering comma separator.
- NVSHAS-9024: AdmissionControl Risky Role Perf.
- NVSHAS-9091: Unable to report all modules under ol:9.1, photon:5.0, rhel:9.1, and amzn:2023 source in repo, registry, and standalone scan.
- NVSHAS-8997: Largely reduce per node policy slot number to improve performance.
- NVSHAS-9059: CRD groups visible in NV even after deletion from K8s.
- NVSHAS-9107: Goroutine crash at rest.handlerConfigLocalCluster.
- NVSHAS-9108: Port 18500 shouldn't be open.
- NVSHAS-9119: Goroutine crash at probe.(*FileNotificationCtr).AddContainer().
- NVSHAS-9125: CRD entry with invalid settings should not be allowed to create.
- NVSHAS-9124: Docker: many unexpected healthcheck process incidents are reported.
- NVSHAS-9111: NV should check
--event-qps > 0
. - NVSHAS-9130: Unexpected Container.Package.Updated incidents are found after a specific container is started.
- NVSHAS-9080: Fed reader user is unable to access some REST APIs.
- NVSHAS-9092: Namespaced user should not see global assets.
- NVSHAS-9116: The worker cluster is able to leave if the connection is dropped.
- NVSHAS-8980: Get host and tunnel interface on node successfully in oc 4.15.
- NVSHAS-9188: Set mgmt-br interface as host interface for harvester node.
- NVSHAS-4858: Not expand containers group in controller to improve policy deployment performance and reduce CPU and memory usage.
- NVSHAS-8700: Rancher AD user is unable to log in to NeuVector sometimes.
- NVSHAS-9121: Group's Network Monitoring Threshold setting cannot be edited.
- NVSHAS-9189: Scan will get stuck in scheduling after controller is shutdown and restarted.
- NVSHAS-9019: Fix unsynchronized link state for host interface.
- NVSHAS-8305: Remove built-in certificate.
- NVSHAS-9013: Removing BPF filter on the process monitor.
- NVSHAS-7853: TLS handshake EOF.
- NVSHAS-9290: User-added process profile rule not taking effect with ZD enabled.
- NVSHAS-9301: NV deployed on Rancher Prime cannot tell it's Rancher flavor.
- NVSHAS-9289: Allow upgrade when RBAC is missing.
- NVSHAS-7601: Improve restore from PV config backup during scenarios.
- NVSHAS-7687: Add syslog level setting for enforcer.
- NVSHAS-9292: Fix Ingress Egress exposure shows 0 Vulnerabilities.
- NVSHAS-9270: Support k3s for CIS benchmark pipeline.
- NVSHAS-9338: Alert 'Managed cluster [id] is disconnected from primary'.
- NVSHAS-9358: Image scan using proxy would fail.
- NVSHAS-9337: Send log message when SYN flood is detected.
- NVSHAS-9209: Delete domain cache when namespace is deleted from k8s.
- NVSHAS-8985: Federated registries disappear after controller restart.
Known Issue:β
- NVSHAS-9443: Upgrade/Install through ArgoCD fails as it cannot create leases.coordination.k8s.io object.
- Workaround: Create the given lease objects before upgrading to 5.4.0 using ARGO CD. Change the namespace if it is different than neuvector.
cat <<EOF | kubectl apply -f -
apiVersion: coordination.k8s.io/v1
kind: Lease
metadata:
name: neuvector-controller
namespace: neuvector
spec:
leaseTransitions: 0
---
apiVersion: coordination.k8s.io/v1
kind: Lease
metadata:
name: neuvector-cert-upgrader
namespace: neuvector
spec:
leaseTransitions: 0
EOF
5.3.4 July 2024β
Bug Fixesβ
-
The
host
andtunnel
interface are successfully retrieved with OpenShift CLI v4.15. -
The IP range 169.254.x.x is excluded from the host interface IPs.
-
Reexam host interface after 1 minute of enforcer startup.
-
Fixed an issue where the OpenID issuer URL regex was failing.
-
Remediates following CVEs:
CVE | Applies to | Impact |
---|---|---|
CVE-2023-42364 | busybox | π‘ Medium |
CVE-2023-42365 | busybox | π‘ Medium |
CVE-2024-6197 | curl | π‘ Medium |
CVE-2024-6874 | curl | π‘ Medium |
CVE-2024-5535 | openssl | π΄ Critical |
CVE-2024-4741 | openssl | π‘ Medium |
5.2.4-s5 July 2024β
- Remediates following CVEs:
CVE | Applies to | Impact |
---|---|---|
CVE-2023-42363 | busybox | π‘ Medium |
CVE-2023-42364 | busybox | π‘ Medium |
CVE-2023-42365 | busybox | π‘ Medium |
CVE-2023-42366 | busybox | π‘ Medium |
CVE-2024-6197 | curl | π‘ Medium |
CVE-2024-6874 | curl | π‘ Medium |
CVE-2024-5535 | openssl | π΄ Critical |
CVE-2024-4603 | openssl | π‘ Medium |
CVE-2024-4741 | openssl | π‘ Medium |
5.3.3 June 2024β
Enhancementsβ
- Allow users to block the usage of specific storage classes from the
Admission Controls
page. - The
LDAP Authentication
has separated fields forbaseDN
andgroupDN
configuration. - The
Egress and Ingress chart
has a new vulnerability column which contains theHigh
andMedium
vulnerability count for each service.
Bug Fixesβ
- Fixed bug related to
regex
when using a comma (,
) in a multi-entryAdmission Control user criteria
. - Fixed bug where the CVE scan of
jar
packages would not show all packages affected by a same CVE. Now all occurences are reported. - Remediates following CVEs:
CVE | Applies to | Impact |
---|---|---|
CVE-2024-35195 | python:requests | π‘ Medium |
CVE-2024-21011 | openjdk11 | π’ Low |
CVE-2024-21012 | openjdk11 | π’ Low |
CVE-2024-21068 | openjdk11 | π’ Low |
CVE-2024-21085 | openjdk11 | π’ Low |
CVE-2024-21094 | openjdk11 | π’ Low |
Otherβ
- Allow users to set resources for
updater-cron-job
when installing NeuVector with the Helm chart. - Prometheus exporter container versioning reviewed and dissociated to the
controller
versioning. - (Scanner) Detect the
R
package/module in Ubuntu and Red Hat Enterprise Linux. - (Scanner) Added support for PHP Composer scan.
5.2.4-s3 April 2024β
- Remediates following CVEs:
CVE | Applies to | Impact |
---|---|---|
CVE-2021-40633 | giflib | π High |
CVE-2023-48161 | giflib | π High |
CVE-2024-28757 | expat | π High |
CVE-2023-39742 | giflib | π‘ Medium |
CVE-2023-45288 | go:golang.org/x/net | π‘ Medium |
CVE-2024-25629 | c-ares | π‘ Medium |
CVE-2024-3651 | python:idna | π‘ Medium |
CVE-2024-2511 | openssl | π’ Low |
5.3.2 April 2024β
Bug Fixesβ
- After upgrading to v5.3.1 from a previous NeuVector release, pre-existing NvClusterSecurityRule custom resources may be deleted inadvertently. NOTE: The 5.3.1 version has been removed from docker hub in order to prevent the upgrade issue.
5.3.1 April 2024β
The 5.3.1 version has been removed from docker hub in order to prevent the upgrade issue fixed in 5.3.2. Please use the 5.3.2 release.
Enhancementsβ
- Allow users to define βacceptedβ vulnerabilities when using Github actions so they donβt affect workflows.
- Add Severity, Score level and Feed Rating filters to Assets > Registry > Image Vulnerabilities view.
- Allow when configuring a registry if it should use the defined proxy for the registry image scans.
Bug Fixesβ
- Security Risks > Vulnerabilities > Advanced Filter doesn't filter 'CVE without Fix'
- Unexpected violation from container to hostmode container
- Accept OCI image format when switching to docker api 1.24
- Registry Scan should not scan non-image artifacts / not log an error
- Allow for rootless key pair image signature verification without internet or sigstore dependence.
- Security Events not getting permitted by network rules in a specific node (related to "Container Task chan full" error messages)
- Container is unable to add to workload successfully (frequent occurences). Resulting from deadlock from channel messages.
Otherβ
- Update the scanner plugins for Jenkins, GitHub action, and Bamboo.
- (Scanner) Accept OCI image format when switching to docker api 1.24.
- (Scanner) Registry Scan should not scan non-image artifacts / not log an error.
- (Scanner) Add support for php composer scan.
NeuVector UI Extension v. 1.0 for Rancher March 2024β
- After installation of NeuVector, enabling/installing the NeuVector UI Extension from Rancher will display a Dashboard for the cluster, including links to SSO to the full NeuVector cluster. NOTE: The extension may display as Third Party, which will be fixed in a future release. Also, after installation, Rancher 2.7.x users may see two NeuVector UI Ext icons in the list (bug). One icon will say Uninstall (meaning it is installed), and the other should say Install. This can be left as is, ie, don't Install again if the extension is already installed.
5.2.4-s2 February 2024β
- Remediates following CVEs:
- High cve: CVE-2023-52425 in expat, CVE-2024-20952 and CVE-2024-20918 in openjdk11
- Med cve: CVE-2023-52426 in expat, CVE-2024-20926, CVE-2024-20921, CVE-2024-20945 and CVE-2024-20919 in openjdk11, CVE-2024-0727 and CVE-2023-6237 in openssl
5.3.0 February 2024β
#####Enhancements
- Show external destination URLs (FQDN) in Dashboard (egress), PDF and CSV reports, as we well as in Network Activity screen and Security Events (violations) lists
- In Discover mode, learn egresses to external FQDN address groups automatically. A new external FQDN custom group will be created unless the external connection matches an existing rule.
- Enable ICMP learning (Discover mode) and blocking (Protect mode) through new Controller environment variable CTRL_EN_ICMP_POLICY = 1
- Export CRDs into Github to support gitops to a default repo using console or REST API.
- Support SAML SSO single logout with ADFS iDP
- Add support for ARM64 platform. Pulling from ARM based platforms will automatically pull the appropriate ARM64 NeuVector images.
- Support webhooks through a proxy
- Improve admission control auditing function to include results of all rules. List the result of every rule, and adds another entry for the final action the would occur when evaluated in a live admission control deployment.
- Apply disabled Admission Control rules via CRD or yaml (kubectl)
- Vulnerability Profile export / import through console, CRD, or REST API. Importing will replace the existing profile. Deleting the CRD will result in an empty profile.
- Compliance Profile template export / import through console, CRD, or REST API. Importing will replace the existing template.
- Add a 'Manual' status in the compliance reports for CIS benchmarks that must be run manually by users (not run by NeuVector).
- Improve UI loading/performance of Vulnerabilities page
- Unify browser session login. With this, all tabs in the browser share the same login session, opening a new tab from an existing session does not ask for credentials, and when one tab logs out, all tabs are logged out.
- Enhancements to security of console (UI): 1) add mandatory security headers (X-Content-Type-Options nosniff; X-XSS-Protection 1; mode=block; X-Frame-Options SAMEORIGIN; Cache-Control private, no-cache, no-store, must-revalidate HTTP Strict Transport Security max-age=15724800, 2) add CSP header (e.g. set a βdefault-srcβ directive), 3) remove server name disclosure
- Support newer versions of CIS benchmarks. Kubernetes (1.8.0), Kubernetes V1.24 (1.0.0), Kubernetes V1.23 (1.0.1), RedHat OpenShift Container Platform (1.4.0)
- Show in Assets -> Containers -> Container details containers which were scanned in registries versus runtime
- Add link to Group in Security Risks -> Vulnerabilities -> Impact popup to easily edit group mode
- Support deep linking in URL's to image and/or container vulnerability page
- Add password reset option for admin to reset user password in console Settings -> Users
- Allow sending event logs to controller pod logs in Settings -> Configuration -> Notification. The events sent will begin with 'notification=' and be saved only to the leader controller pod. Note that there is a bug in this version where, in order to change the event level SYSLOG must be enabled (and can be disabled if desired after changing the level).
- Remove requirement for controller/enforcer to mount "/host/cgroup".
- Add Get Support menu with links to slack, documentation, and other resources
- Fill message field to /v1/log/activity logs
#####Bug Fixes
- Internal Server Error in Security Risks -> Vulnerabilities with a high number of CVEs
- SIGSEGV: segmentation violation on controller
- Deleting vulnerable files (e.g. jar) doesn't remove from vulnerability list
- Invalid Syslog certificate using the signature algorithm SHA256withECDSA
- NeuVector shows security events that should be allowed by a Network Rule
- Un-managed node with "zombie" enforcer running
- Advanced Filter shows Remediation and Impact fields blank
- Fix string handling to prevent unexpected Enforcer restart
- Unexpected violations relating to built-in groups
- Support-bundle enforcer debug RPC call for data returns error
- Group is not matching in Security Events
- Send events to slack is not working - with proxy
- Showing security events for allowed network rules
#####Other
- Add run-time container engine (socket) automatic detection to Helm chart
- Remove setting for running controller in privileged mode in Helm chart, and requirement for controller/enforcer to mount "/host/cgroup".
- The sample kubernetes deployment files have been removed from the NeuVector docs. Please refer to the link for examples.
#####Highlighted Changes Which May Require Changes for Manual Deployments (all changes are already reflected in latest Helm chart for 5.3.x)
- Auto detection of container run-time (socket) removes the need to specify the container run-time and socket path.
- Removal of requirement to run the controller in privileged mode removes the need for mounting runtime socket and mounted /host/cgroup/
- Added role/role binding for neuvector-binding-secret as well as neuvector-secret in yaml.
- New service accounts and role bindings required for 5.3
- All referenced deployment yaml files now have /5.3.0/ in their paths
5.2.4-s1 January 2024β
Security Patch Releaseβ
- Remediates CVE-2023-6129 in openssl, and CVE-2023-46219, CVE-2023-46218 in curl.
5.2.4 November 2023β
Bug Fixesβ
- Azure AKS ValidatingWebhookConfiguration changes and error logging.
5.2.3 November 2023β
Enhancementsβ
- Add support for NVD API 2.0 in Scanner.
- Scan the container host in scanner standalone mode.
docker run --rm --privileged --pid=host neuvector/scanner -n
Bug Fixesβ
- Scan on a node fails due to deadlocked docker cp / grpc issue.
5.2.2-s1 October 2023β
Security Updateβ
- Update packages to remediate CVEs including High CVE-2023-38545 and CVE-2023-43804.
5.2.2 October 2023β
Security Advisory for CVE-2023-32188β
- Remediate CVE-2023-32188 βJWT token compromise can allow malicious actions including Remote Code Execution (RCE)β by auto-generating certificate used for signing JWT token upon deployment and upgrade, and auto-generating Manager/RESTful API certificate during Helm based deployments.
- Certificate for JWT-signing is created automatically by controller with validity of 90days and rotated automatically.
- Auto-generation of Manager, REST API, and registry adapter certificate requires using Helm-based install using NeuVector helm version 2.6.3 or later.
- Built-in certificate is still used for yaml based deployments if not replaced during deployment; however, it is recommended to replace these (see next line).
- Manual replacement of certificate is still supported and recommended for previous releases or yaml based deployments. See the NeuVector GitHub security advisory here for a description.
- Use of user-supplied certificates is still supported as before for both Helm and yaml based deployments.
- Add additional controls on custom compliance scripts. By default, custom script are now not allowed to be added, unless the environment variable CUSTOM_CHECK_CONTROL is added to Controller and Enforcer. Values are "disable" (default, not allowed), "strict" (admin role only), or "loose" (admin, compliance, and runtime-policy roles).
- Prevent LDAP injection - username field is escaped.
Enhancementsβ
- Add additional scan data to CVE results sent by SYSLOG for layered scans
- Support NVD API 2.0 for scan CVE database
- Provide container image build date in Assets -> Container details
- Adjust sorting for Network rules: disable sorting in Network rules view but enable sorting of network rules in Group view.
- Enable/disable TLS 1.0 and TLS 1.1 detection/alerting with environment variables to Enforcer THRT_SSL_TLS_1DOT0, THRT_SSL_TLS_1DOT1. Disabled by default.
- Add environment variable AUTO_PROFILE_COLLECT for Controller and Enforcer to assist in capturing memory usage when investigating memory pressure events. Set value = 1 to enable.
- Configuration assessments against Admission Control should show all violations with one scan.
- Add more options for CVE report criteria in Response Rules. Example 1 - "cve-high-with-fix:X" means: When # of (high vulnerability that have been fixed) >= X, trigger the response rule. Example 2 - "cve-high-with-fix:X/Y" means: When # of (high vulnerability that were reported Y days ago & have been fixed) >= X, trigger the response rule.
Bug Fixesβ
- Export of group policy does not return any actual YAML contents
- Improve pruning of namespaces with dedicated function
- NeuVector namespace user cannot see assets-->namespaces
- Skip handling the CRD CREATE/UPDATE requests if the CR's namespace is already deleted
- Provide workaround for part of CRD groups which cannot be pruned successfully after namespaces are deleted.
5.2.1 August 2023β
Enhancementsβ
- Report layered scan results and additional CVE data in SYSLOG messages. This is enabled through a checkbox in Settings -> Configuration -> SYSLOG
- Export NIST 800-53 mappings (to docker CIS benchmarks) in the exported csv compliance report
- Support Proxy setting in image signature verification
- Include image signature scan result in the downloaded CVE report
- Support pod annotations for Admission Control Policies, available through the Custom criteria
- Add Last Modified field to filter for vulnerabilities report printing, as well as Advanced Filter in Vulnerabilities view
Bug fixesβ
- Do not create default admin with default password in initial NeuVector deployment for AWS billing (CSP adapter) offering, requiring user to use a secret to create admin username and password
- Fix .json file which increased size and crashed a kubernetes node
- Improve SQL injection detection logic
- When installing the helm crd chart first before installing the NeuVector core chart, service accounts are missing
- Image scan I.4.1 compliance result is incorrect
- Vulnerability advanced filter report showing images from all other namespace