Skip to content

Commit 1cba351

Browse files
committed
Updating Security Advisory and CVEs page, and linking to page from release notes after updating.
Signed-off-by: Sunil Singh <[email protected]>
1 parent 51c7007 commit 1cba351

File tree

4 files changed

+86
-42
lines changed
  • docs
    • 14.releasenotes/01.5x
    • 16.security_advisories/01.security_advisories
  • versioned_docs/version-5.4
    • 14.releasenotes/01.5x
    • 16.security_advisories/01.security_advisories

4 files changed

+86
-42
lines changed

docs/14.releasenotes/01.5x/01.5x.md

Lines changed: 21 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -13,21 +13,30 @@ To receive email notifications of new releases, please subscribe to this SUSE ma
1313

1414
#### 5.4.6 August 2025
1515

16-
##### Bug Fixes:
16+
##### New Features:
1717

18-
* **NVSHAS-10019**: Fixed typo in TCP.SYN.Flood log.
19-
* **NVSHAS-10001**: Protect/Monitor enforcements present after group deletion.
20-
* **NVSHAS-9974**: Fixed condition checks in D2M and M2P to correctly interpret group name suffixes.
21-
* **NVSHAS-10018**: NeuVector is not scanning all images in GitLab Registry.
22-
* **NVSHAS-10001**: Federation operation failed 'invalid data' when configuring federation through ConfigMap.
23-
* **NVSHAS-10043**: Improve link and address subscription with options.
24-
* **NVSHAS-9981**: Update zero-drift behavior.
2518
* **NVSHAS-6733**: Export response rules as CRD.
26-
* **NVSHAS-10057**: Response rule import always fails.
27-
* **NVSHAS-10060**: Response rules for the target CRD group are not deleted.
28-
* **NVSHAS-9968-9990**: Support setting default admin account's default password.
29-
* **NVSHAS-10063**: Namespace user with runtime_policy(w) permission cannot create response rule.
3019
* **NVSHAS-9899**: NeuVector Process Profile Alerts for Java Services contain sensitive data.
20+
* **NVSHAS-9990**: Adopt new hash algorithm for user passwords.
21+
* **NVSHAS-9968**: Support setting default admin account's default password.
22+
23+
##### Bugs Fixed
24+
25+
* **NVSHAS-10062**: Manager not showing ERROR when failing to create admin password during 1st login.
26+
* **NVSHAS-10041**: Federation operation failed "invalid data" when configuring federation through ConfigMap.
27+
* **NVSHAS-10018**: Neuvector is not scanning all images in GitLab Registry.
28+
* **NVSHAS-10017**: False Positive Security Alert related to allowed process.
29+
* **NVSHAS-10001**: Protect/Monitor enforcements "linger" after group deletion.
30+
* **NVSHAS-9985**: NeuVector (Fed Master) creates a problem for all requests coming from outside.
31+
* **NVSHAS-9981**: Security Event is triggered whenever a new "Process Profile Rule" is added or changed in a group.
32+
33+
##### Security Advisories:
34+
35+
* [Admin account has insecure default password](https://github.com/neuvector/neuvector/security/advisories/GHSA-8pxw-9c75-6w56)
36+
* [Insecure password management vulnerable to rainbow attacks](https://github.com/neuvector/neuvector/security/advisories/GHSA-8ff6-pc43-jwv3)
37+
* [Process with sensitive arguments lead to leakage](https://github.com/neuvector/neuvector/security/advisories/GHSA-w54x-xfxg-4gxq)
38+
39+
See the [Security Advisory and CVEs](/security_advisories/security_advisories/cve) documentation for more information.
3140

3241
#### 5.4.5 July 2025
3342

Lines changed: 22 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,16 @@
1-
# Sensitive information exposure in NeuVector manager container logs
1+
# Security Advisories and CVEs
2+
3+
NeuVector is committed to informing the community of security issues. Below is a CVE reference list of published security advisories and CVEs (Common Vulnerabilities and Exposures) for issues we have resolved.
4+
5+
## CVE List
6+
7+
| ID | Description | Date | Resolution |
8+
| :---- | :---- | :---- | :---- |
9+
| [CVE-2025-8077](https://github.com/neuvector/neuvector/security/advisories/GHSA-8pxw-9c75-6w56) | For NeuVector deployment on the Kubernetes-based environment, the bootstrap password of the default admin user will be generated randomly and stored in a Kubernetes secret. The default admin will need to get the bootstrap password from the Kubernetes secret first and will be asked to change password after the first UI login is successful. | 25 Aug 2025 | [NeuVector v5.4.6](https://github.com/neuvector/neuvector/releases/tag/v5.4.6) |
10+
| [CVE-2025-53884](https://github.com/neuvector/neuvector/security/advisories/GHSA-8ff6-pc43-jwv3) | NeuVector uses a cryptographically secure salt with the PBKDF2 algorithm instead of a simple hash to protect user passwords.For rolling upgrades from earlier versions, NeuVector recalculates and stores the new password hash only after each user’s next successful login. | 25 Aug 2025 | [NeuVector v5.4.6](https://github.com/neuvector/neuvector/releases/tag/v5.4.6) |
11+
| [CVE-2025-54467](https://github.com/neuvector/neuvector/security/advisories/GHSA-w54x-xfxg-4gxq) | By default, NeuVector redacts process commands that contain the strings password,passwd, pwd, token, or key in security logs, syslog, enforcer debug logs, controller debug logs, webhooks, and support logs. Users can configure a Kubernetes ConfigMap to define custom regex patterns for additional process commands to redact. | 25 Aug 2025 | [NeuVector v5.4.6](https://github.com/neuvector/neuvector/releases/tag/v5.4.6) |
12+
13+
## Sensitive information exposure in NeuVector manager container logs
214

315
**CVE ID:** CVE-2025-46808
416
**CVSS Score:** 6.8- [AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N](https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N&version=3.1)
@@ -11,7 +23,7 @@
1123

1224
**Fixed version: `5.4.5`**
1325

14-
### **Impact**
26+
### Impact
1527

1628
A vulnerability has been identified in the NeuVector version up to and including `5.4.4`, where sensitive information is leaked into the manager container’s log. The listed fields can be caught in the log:
1729

@@ -37,17 +49,18 @@ In the patched version, X-R-Sess is partially masked so that users can confirm w
3749

3850
Please consult the associated [Unsecured credentials](https://attack.mitre.org/techniques/T1552/) for further information about this category of attack.
3951

40-
### **Patches**
52+
### Patches
4153

4254
Patched versions include release `5.4.5` and above. Users are advised to rotate the GitHub token used in Remote Repository Configuration once they have upgraded to a fixed version.
4355

44-
### **Workarounds**
56+
### Workarounds
4557

4658
No workarounds are currently available. Customers are advised to upgrade to a fixed version at their earliest convenience.
4759

48-
If you have any questions or comments about this advisory:
49-
50-
* Reach out to the [SUSE Rancher Security team](https://github.com/rancher/rancher/security/policy) for security related inquiries.
51-
* Open an issue in the [NeuVector](https://github.com/neuvector/neuvector/issues/new/choose) repository.
52-
* Verify with our [support matrix](https://www.suse.com/suse-neuvector/support-matrix/all-supported-versions/neuvector-v-all-versions/) and [product support lifecycle](https://www.suse.com/lifecycle/#suse-security).
60+
## Questions and Support
5361

62+
* Contact the [SUSE Rancher Security team](https://github.com/rancher/rancher/security/policy).
63+
* Open an issue in the [NeuVector GitHub repository](https://github.com/neuvector/neuvector/issues/new/choose).
64+
* References:
65+
** [NeuVector Support Matrix](https://www.suse.com/suse-neuvector/support-matrix/all-supported-versions/neuvector-v-all-versions/)
66+
** [Product Support Lifecycle](https://www.suse.com/lifecycle/#suse-security)

versioned_docs/version-5.4/14.releasenotes/01.5x/01.5x.md

Lines changed: 21 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -13,21 +13,30 @@ To receive email notifications of new releases, please subscribe to this SUSE ma
1313

1414
#### 5.4.6 August 2025
1515

16-
##### Bug Fixes:
16+
##### New Features:
1717

18-
* **NVSHAS-10019**: Fixed typo in TCP.SYN.Flood log.
19-
* **NVSHAS-10001**: Protect/Monitor enforcements present after group deletion.
20-
* **NVSHAS-9974**: Fixed condition checks in D2M and M2P to correctly interpret group name suffixes.
21-
* **NVSHAS-10018**: NeuVector is not scanning all images in GitLab Registry.
22-
* **NVSHAS-10001**: Federation operation failed 'invalid data' when configuring federation through ConfigMap.
23-
* **NVSHAS-10043**: Improve link and address subscription with options.
24-
* **NVSHAS-9981**: Update zero-drift behavior.
2518
* **NVSHAS-6733**: Export response rules as CRD.
26-
* **NVSHAS-10057**: Response rule import always fails.
27-
* **NVSHAS-10060**: Response rules for the target CRD group are not deleted.
28-
* **NVSHAS-9968-9990**: Support setting default admin account's default password.
29-
* **NVSHAS-10063**: Namespace user with runtime_policy(w) permission cannot create response rule.
3019
* **NVSHAS-9899**: NeuVector Process Profile Alerts for Java Services contain sensitive data.
20+
* **NVSHAS-9990**: Adopt new hash algorithm for user passwords.
21+
* **NVSHAS-9968**: Support setting default admin account's default password.
22+
23+
##### Bugs Fixed
24+
25+
* **NVSHAS-10062**: Manager not showing ERROR when failing to create admin password during 1st login.
26+
* **NVSHAS-10041**: Federation operation failed "invalid data" when configuring federation through ConfigMap.
27+
* **NVSHAS-10018**: Neuvector is not scanning all images in GitLab Registry.
28+
* **NVSHAS-10017**: False Positive Security Alert related to allowed process.
29+
* **NVSHAS-10001**: Protect/Monitor enforcements "linger" after group deletion.
30+
* **NVSHAS-9985**: NeuVector (Fed Master) creates a problem for all requests coming from outside.
31+
* **NVSHAS-9981**: Security Event is triggered whenever a new "Process Profile Rule" is added or changed in a group.
32+
33+
##### Security Advisories:
34+
35+
* [Admin account has insecure default password](https://github.com/neuvector/neuvector/security/advisories/GHSA-8pxw-9c75-6w56)
36+
* [Insecure password management vulnerable to rainbow attacks](https://github.com/neuvector/neuvector/security/advisories/GHSA-8ff6-pc43-jwv3)
37+
* [Process with sensitive arguments lead to leakage](https://github.com/neuvector/neuvector/security/advisories/GHSA-w54x-xfxg-4gxq)
38+
39+
See the [Security Advisory and CVEs](/security_advisories/security_advisories/cve) documentation for more information.
3140

3241
#### 5.4.5 July 2025
3342

Lines changed: 22 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,16 @@
1-
# Sensitive information exposure in NeuVector manager container logs
1+
# Security Advisories and CVEs
2+
3+
NeuVector is committed to informing the community of security issues. Below is a CVE reference list of published security advisories and CVEs (Common Vulnerabilities and Exposures) for issues we have resolved.
4+
5+
## CVE List
6+
7+
| ID | Description | Date | Resolution |
8+
| :---- | :---- | :---- | :---- |
9+
| [CVE-2025-8077](https://github.com/neuvector/neuvector/security/advisories/GHSA-8pxw-9c75-6w56) | For NeuVector deployment on the Kubernetes-based environment, the bootstrap password of the default admin user will be generated randomly and stored in a Kubernetes secret. The default admin will need to get the bootstrap password from the Kubernetes secret first and will be asked to change password after the first UI login is successful. | 25 Aug 2025 | [NeuVector v5.4.6](https://github.com/neuvector/neuvector/releases/tag/v5.4.6) |
10+
| [CVE-2025-53884](https://github.com/neuvector/neuvector/security/advisories/GHSA-8ff6-pc43-jwv3) | NeuVector uses a cryptographically secure salt with the PBKDF2 algorithm instead of a simple hash to protect user passwords.For rolling upgrades from earlier versions, NeuVector recalculates and stores the new password hash only after each user’s next successful login. | 25 Aug 2025 | [NeuVector v5.4.6](https://github.com/neuvector/neuvector/releases/tag/v5.4.6) |
11+
| [CVE-2025-54467](https://github.com/neuvector/neuvector/security/advisories/GHSA-w54x-xfxg-4gxq) | By default, NeuVector redacts process commands that contain the strings password,passwd, pwd, token, or key in security logs, syslog, enforcer debug logs, controller debug logs, webhooks, and support logs. Users can configure a Kubernetes ConfigMap to define custom regex patterns for additional process commands to redact. | 25 Aug 2025 | [NeuVector v5.4.6](https://github.com/neuvector/neuvector/releases/tag/v5.4.6) |
12+
13+
## Sensitive information exposure in NeuVector manager container logs
214

315
**CVE ID:** CVE-2025-46808
416
**CVSS Score:** 6.8- [AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N](https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N&version=3.1)
@@ -11,7 +23,7 @@
1123

1224
**Fixed version: `5.4.5`**
1325

14-
### **Impact**
26+
### Impact
1527

1628
A vulnerability has been identified in the NeuVector version up to and including `5.4.4`, where sensitive information is leaked into the manager container’s log. The listed fields can be caught in the log:
1729

@@ -37,17 +49,18 @@ In the patched version, X-R-Sess is partially masked so that users can confirm w
3749

3850
Please consult the associated [Unsecured credentials](https://attack.mitre.org/techniques/T1552/) for further information about this category of attack.
3951

40-
### **Patches**
52+
### Patches
4153

4254
Patched versions include release `5.4.5` and above. Users are advised to rotate the GitHub token used in Remote Repository Configuration once they have upgraded to a fixed version.
4355

44-
### **Workarounds**
56+
### Workarounds
4557

4658
No workarounds are currently available. Customers are advised to upgrade to a fixed version at their earliest convenience.
4759

48-
If you have any questions or comments about this advisory:
49-
50-
* Reach out to the [SUSE Rancher Security team](https://github.com/rancher/rancher/security/policy) for security related inquiries.
51-
* Open an issue in the [NeuVector](https://github.com/neuvector/neuvector/issues/new/choose) repository.
52-
* Verify with our [support matrix](https://www.suse.com/suse-neuvector/support-matrix/all-supported-versions/neuvector-v-all-versions/) and [product support lifecycle](https://www.suse.com/lifecycle/#suse-security).
60+
## Questions and Support
5361

62+
* Contact the [SUSE Rancher Security team](https://github.com/rancher/rancher/security/policy).
63+
* Open an issue in the [NeuVector GitHub repository](https://github.com/neuvector/neuvector/issues/new/choose).
64+
* References:
65+
** [NeuVector Support Matrix](https://www.suse.com/suse-neuvector/support-matrix/all-supported-versions/neuvector-v-all-versions/)
66+
** [Product Support Lifecycle](https://www.suse.com/lifecycle/#suse-security)

0 commit comments

Comments
 (0)