Skip to content

Commit 20b794e

Browse files
committed
Updating after review
Signed-off-by: Sunil Singh <[email protected]>
1 parent 1cba351 commit 20b794e

File tree

4 files changed

+26
-26
lines changed
  • docs
    • 14.releasenotes/01.5x
    • 16.security_advisories/01.security_advisories
  • versioned_docs/version-5.4
    • 14.releasenotes/01.5x
    • 16.security_advisories/01.security_advisories

4 files changed

+26
-26
lines changed

docs/14.releasenotes/01.5x/01.5x.md

Lines changed: 12 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ To receive email notifications of new releases, please subscribe to this SUSE ma
1313

1414
#### 5.4.6 August 2025
1515

16-
##### New Features:
16+
##### New Features
1717

1818
* **NVSHAS-6733**: Export response rules as CRD.
1919
* **NVSHAS-9899**: NeuVector Process Profile Alerts for Java Services contain sensitive data.
@@ -30,7 +30,7 @@ To receive email notifications of new releases, please subscribe to this SUSE ma
3030
* **NVSHAS-9985**: NeuVector (Fed Master) creates a problem for all requests coming from outside.
3131
* **NVSHAS-9981**: Security Event is triggered whenever a new "Process Profile Rule" is added or changed in a group.
3232

33-
##### Security Advisories:
33+
##### Security Advisories
3434

3535
* [Admin account has insecure default password](https://github.com/neuvector/neuvector/security/advisories/GHSA-8pxw-9c75-6w56)
3636
* [Insecure password management vulnerable to rainbow attacks](https://github.com/neuvector/neuvector/security/advisories/GHSA-8ff6-pc43-jwv3)
@@ -40,11 +40,11 @@ See the [Security Advisory and CVEs](/security_advisories/security_advisories/cv
4040

4141
#### 5.4.5 July 2025
4242

43-
##### New Features:
43+
##### New Features
4444

4545
* **NVSHAS-9776**: Add etcd toleration in helm chart.
4646

47-
##### Bug Fixes:
47+
##### Bug Fixes
4848

4949
* **NVSHAS-9507**: OCI container not getting scanned.
5050
* **NVSHAS-9787**: Remove unnecessary manager log.
@@ -85,7 +85,7 @@ See the [Security Advisory and CVEs](/security_advisories/security_advisories/cv
8585

8686
#### 5.4.4 May 2025
8787

88-
##### New Features:
88+
##### New Features
8989

9090
* **NVSHAS-9915**: Show scan results from the Harbor scanner module in the NeuVector UI.
9191
* **NVSHAS-9904**: Expose `imagePullPolicy` to `values.yaml` for each component.
@@ -95,7 +95,7 @@ See the [Security Advisory and CVEs](/security_advisories/security_advisories/cv
9595
* **NVSHAS-8160**: [Controller] Adjust some items for Security Risk Score calculation.
9696
* **NVSHAS-4673**: Suggestion to add message before exporting groups.
9797

98-
##### Bug Fixes:
98+
##### Bug Fixes
9999

100100
* **NVSHAS-9931**: Add a warning if there are inconsistent versions of NeuVector products in multi-cluster.
101101
* **NVSHAS-9925**: `/v1/scan/asset/images` API on the Registry Page fails.
@@ -114,7 +114,7 @@ See the [Security Advisory and CVEs](/security_advisories/security_advisories/cv
114114

115115
#### 5.4.3 March 2025
116116

117-
##### New Features:
117+
##### New Features
118118

119119
* **NVSHAS-9793**: Allow Fed Global roles in LDAP/userinitcfg when deploying NeuVector through the ConfigMap and Secret.
120120
* **NVSHAS-9764**: [RFE] Add support for Azure for "Remote Repository Configuration".
@@ -127,7 +127,7 @@ See the [Security Advisory and CVEs](/security_advisories/security_advisories/cv
127127
* **NVSHAS-7997**: Scanner connector for ghcr.io.
128128
* **NVSHAS-7982**: Assign WAF sensors from Federation Master.
129129

130-
##### Bug Fixes:
130+
##### Bug Fixes
131131

132132
* **NVSHAS-9849**: Enforcers not registering with controllers.
133133
* **NVSHAS-9847**: Wildcard filters not working for Docker registry.
@@ -154,7 +154,7 @@ See the [Security Advisory and CVEs](/security_advisories/security_advisories/cv
154154

155155
#### 5.4.2 January 2025
156156

157-
##### New Features:
157+
##### New Features
158158

159159
* **NVSHAS-9726**: The monitor now passes proxy URL.
160160
* **NVSHAS-9719**: Announces the retirement of built-in certificates.
@@ -164,7 +164,7 @@ See the [Security Advisory and CVEs](/security_advisories/security_advisories/cv
164164
* **NVSHAS-9590**: Ability to choose which vulnerability score for all assets.
165165
* **NVSHAS-7555**: Include "Auto Refresh" option under Security Events.
166166

167-
##### Bug Fixes:
167+
##### Bug Fixes
168168

169169
* **NVSHAS-9662**: Inconsistent Role/RoleBinding logic in Helm chart 2.8.2.
170170
* **NVSHAS-9652**: Observed difference in syslog format in splunk.
@@ -317,7 +317,7 @@ Please note the stand-alone scanner will not be affected by these changes.
317317
+ Cloud billing data archiving.
318318
+ Namespace boundary enforcement.
319319

320-
##### New Features:
320+
##### New Features
321321

322322
+ **NVSHAS-9012**: Displaying Rancher SSO users on NV UI that have the same user name.
323323
+ **NVSHAS-8939**: Provide an option on NV UI so that Rancher SSO session users can drop the current JWT token (i.e. logout).
@@ -354,7 +354,7 @@ Please note the stand-alone scanner will not be affected by these changes.
354354
+ **NVSHAS-7945**: (*Available when deployed from a Rancher Chart.*) Support DISA STIG benchmark for Kubernetes.
355355
+ **NVSHAS-8234**: Admission Control Logic allowing images that should be denied.
356356

357-
##### Bug Fixes:
357+
##### Bug Fixes
358358

359359
+ **NVSHAS-9005**: TypeError in registries: Cannot read properties of undefined (reading 'total_records').
360360
+ **NVSHAS-9085**: Assets View PDF report shows 0% vulnerability even with present vulnerabilities.

docs/16.security_advisories/01.security_advisories/cve.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ NeuVector is committed to informing the community of security issues. Below is a
44

55
## CVE List
66

7-
| ID | Description | Date | Resolution |
7+
| ID | Description | Date | Release |
88
| :---- | :---- | :---- | :---- |
99
| [CVE-2025-8077](https://github.com/neuvector/neuvector/security/advisories/GHSA-8pxw-9c75-6w56) | For NeuVector deployment on the Kubernetes-based environment, the bootstrap password of the default admin user will be generated randomly and stored in a Kubernetes secret. The default admin will need to get the bootstrap password from the Kubernetes secret first and will be asked to change password after the first UI login is successful. | 25 Aug 2025 | [NeuVector v5.4.6](https://github.com/neuvector/neuvector/releases/tag/v5.4.6) |
1010
| [CVE-2025-53884](https://github.com/neuvector/neuvector/security/advisories/GHSA-8ff6-pc43-jwv3) | NeuVector uses a cryptographically secure salt with the PBKDF2 algorithm instead of a simple hash to protect user passwords.For rolling upgrades from earlier versions, NeuVector recalculates and stores the new password hash only after each user’s next successful login. | 25 Aug 2025 | [NeuVector v5.4.6](https://github.com/neuvector/neuvector/releases/tag/v5.4.6) |

versioned_docs/version-5.4/14.releasenotes/01.5x/01.5x.md

Lines changed: 12 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ To receive email notifications of new releases, please subscribe to this SUSE ma
1313

1414
#### 5.4.6 August 2025
1515

16-
##### New Features:
16+
##### New Features
1717

1818
* **NVSHAS-6733**: Export response rules as CRD.
1919
* **NVSHAS-9899**: NeuVector Process Profile Alerts for Java Services contain sensitive data.
@@ -30,7 +30,7 @@ To receive email notifications of new releases, please subscribe to this SUSE ma
3030
* **NVSHAS-9985**: NeuVector (Fed Master) creates a problem for all requests coming from outside.
3131
* **NVSHAS-9981**: Security Event is triggered whenever a new "Process Profile Rule" is added or changed in a group.
3232

33-
##### Security Advisories:
33+
##### Security Advisories
3434

3535
* [Admin account has insecure default password](https://github.com/neuvector/neuvector/security/advisories/GHSA-8pxw-9c75-6w56)
3636
* [Insecure password management vulnerable to rainbow attacks](https://github.com/neuvector/neuvector/security/advisories/GHSA-8ff6-pc43-jwv3)
@@ -40,11 +40,11 @@ See the [Security Advisory and CVEs](/security_advisories/security_advisories/cv
4040

4141
#### 5.4.5 July 2025
4242

43-
##### New Features:
43+
##### New Features
4444

4545
* **NVSHAS-9776**: Add etcd toleration in helm chart.
4646

47-
##### Bug Fixes:
47+
##### Bug Fixes
4848

4949
* **NVSHAS-9507**: OCI container not getting scanned.
5050
* **NVSHAS-9787**: Remove unnecessary manager log.
@@ -85,7 +85,7 @@ See the [Security Advisory and CVEs](/security_advisories/security_advisories/cv
8585

8686
#### 5.4.4 May 2025
8787

88-
##### New Features:
88+
##### New Features
8989

9090
* **NVSHAS-9915**: Show scan results from the Harbor scanner module in the NeuVector UI.
9191
* **NVSHAS-9904**: Expose `imagePullPolicy` to `values.yaml` for each component.
@@ -95,7 +95,7 @@ See the [Security Advisory and CVEs](/security_advisories/security_advisories/cv
9595
* **NVSHAS-8160**: [Controller] Adjust some items for Security Risk Score calculation.
9696
* **NVSHAS-4673**: Suggestion to add message before exporting groups.
9797

98-
##### Bug Fixes:
98+
##### Bug Fixes
9999

100100
* **NVSHAS-9931**: Add a warning if there are inconsistent versions of NeuVector products in multi-cluster.
101101
* **NVSHAS-9925**: `/v1/scan/asset/images` API on the Registry Page fails.
@@ -114,7 +114,7 @@ See the [Security Advisory and CVEs](/security_advisories/security_advisories/cv
114114

115115
#### 5.4.3 March 2025
116116

117-
##### New Features:
117+
##### New Features
118118

119119
* **NVSHAS-9793**: Allow Fed Global roles in LDAP/userinitcfg when deploying NeuVector through the ConfigMap and Secret.
120120
* **NVSHAS-9764**: [RFE] Add support for Azure for "Remote Repository Configuration".
@@ -127,7 +127,7 @@ See the [Security Advisory and CVEs](/security_advisories/security_advisories/cv
127127
* **NVSHAS-7997**: Scanner connector for ghcr.io.
128128
* **NVSHAS-7982**: Assign WAF sensors from Federation Master.
129129

130-
##### Bug Fixes:
130+
##### Bug Fixes
131131

132132
* **NVSHAS-9849**: Enforcers not registering with controllers.
133133
* **NVSHAS-9847**: Wildcard filters not working for Docker registry.
@@ -154,7 +154,7 @@ See the [Security Advisory and CVEs](/security_advisories/security_advisories/cv
154154

155155
#### 5.4.2 January 2025
156156

157-
##### New Features:
157+
##### New Features
158158

159159
* **NVSHAS-9726**: The monitor now passes proxy URL.
160160
* **NVSHAS-9719**: Announces the retirement of built-in certificates.
@@ -164,7 +164,7 @@ See the [Security Advisory and CVEs](/security_advisories/security_advisories/cv
164164
* **NVSHAS-9590**: Ability to choose which vulnerability score for all assets.
165165
* **NVSHAS-7555**: Include "Auto Refresh" option under Security Events.
166166

167-
##### Bug Fixes:
167+
##### Bug Fixes
168168

169169
* **NVSHAS-9662**: Inconsistent Role/RoleBinding logic in Helm chart 2.8.2.
170170
* **NVSHAS-9652**: Observed difference in syslog format in splunk.
@@ -317,7 +317,7 @@ Please note the stand-alone scanner will not be affected by these changes.
317317
+ Cloud billing data archiving.
318318
+ Namespace boundary enforcement.
319319

320-
##### New Features:
320+
##### New Features
321321

322322
+ **NVSHAS-9012**: Displaying Rancher SSO users on NV UI that have the same user name.
323323
+ **NVSHAS-8939**: Provide an option on NV UI so that Rancher SSO session users can drop the current JWT token (i.e. logout).
@@ -354,7 +354,7 @@ Please note the stand-alone scanner will not be affected by these changes.
354354
+ **NVSHAS-7945**: (*Available when deployed from a Rancher Chart.*) Support DISA STIG benchmark for Kubernetes.
355355
+ **NVSHAS-8234**: Admission Control Logic allowing images that should be denied.
356356

357-
##### Bug Fixes:
357+
##### Bug Fixes
358358

359359
+ **NVSHAS-9005**: TypeError in registries: Cannot read properties of undefined (reading 'total_records').
360360
+ **NVSHAS-9085**: Assets View PDF report shows 0% vulnerability even with present vulnerabilities.

versioned_docs/version-5.4/16.security_advisories/01.security_advisories/cve.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ NeuVector is committed to informing the community of security issues. Below is a
44

55
## CVE List
66

7-
| ID | Description | Date | Resolution |
7+
| ID | Description | Date | Release |
88
| :---- | :---- | :---- | :---- |
99
| [CVE-2025-8077](https://github.com/neuvector/neuvector/security/advisories/GHSA-8pxw-9c75-6w56) | For NeuVector deployment on the Kubernetes-based environment, the bootstrap password of the default admin user will be generated randomly and stored in a Kubernetes secret. The default admin will need to get the bootstrap password from the Kubernetes secret first and will be asked to change password after the first UI login is successful. | 25 Aug 2025 | [NeuVector v5.4.6](https://github.com/neuvector/neuvector/releases/tag/v5.4.6) |
1010
| [CVE-2025-53884](https://github.com/neuvector/neuvector/security/advisories/GHSA-8ff6-pc43-jwv3) | NeuVector uses a cryptographically secure salt with the PBKDF2 algorithm instead of a simple hash to protect user passwords.For rolling upgrades from earlier versions, NeuVector recalculates and stores the new password hash only after each user’s next successful login. | 25 Aug 2025 | [NeuVector v5.4.6](https://github.com/neuvector/neuvector/releases/tag/v5.4.6) |

0 commit comments

Comments
 (0)