Skip to content

Commit 7e51355

Browse files
Merge pull request #91346 from openshift-cherrypick-robot/cherry-pick-91324-to-rhacs-docs-4.7
[rhacs-docs-4.7] ROX-28773: Patch release notes for 4.7.1
2 parents 2ceaff7 + e0f2ac8 commit 7e51355

File tree

1 file changed

+29
-14
lines changed

1 file changed

+29
-14
lines changed

release_notes/47-release-notes.adoc

Lines changed: 29 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -16,6 +16,7 @@ toc::[]
1616
|{product-title-short} version |Released on
1717

1818
|`4.7.0` | 17 March 2025
19+
|`4.7.1` | 31 March 2025
1920

2021
|====
2122

@@ -85,17 +86,17 @@ For more information about how to use the Azure Entra ID service principals for
8586
[id="view-the-violation-status-directly-on-the-violations-page_{context}"]
8687
=== View the violation status directly on the Violations page
8788

88-
With {product-title-short} 4.7, you can now see the status of a violation directly on the *Violations* page so that you can quickly determine whether the violation is still active. This streamlines automation workflows, such as creating a Jira ticket and sending it to an owner who does not use {product-title-short} regularly.
89+
With {product-title-short} 4.7, you can now see the status of a violation directly on the *Violations* page so that you can quickly determine whether the violation is still active. This streamlines automation workflows, such as creating a Jira ticket and sending it to an owner who does not use {product-title-short} regularly.
8990

9091
By following the link in the ticket, the owner can immediately see if the violation is still relevant, reducing the risk of unnecessary delays or deprioritization. In addition, the page provides the full context of the violation and ensures that all relevant details are immediately available.
9192

9293
//ROX-26335
9394
[id="prioritize-cves-with-the-epss-integration_{context}"]
9495
=== Prioritize CVEs with the EPSS integration
9596

96-
{product-title-short} 4.7 introduces integration with the Exploit Prediction Scoring System (EPSS), a data-driven model that estimates the likelihood of a software vulnerability being exploited.
97+
{product-title-short} 4.7 introduces integration with the Exploit Prediction Scoring System (EPSS), a data-driven model that estimates the likelihood of a software vulnerability being exploited.
9798

98-
In addition to the severity and Common Vulnerability Scoring System (CVSS) score, an EPSS probability score from 0%-100% is now displayed for detected Common Vulnerabilities and Exposures (CVEs).
99+
In addition to the severity and Common Vulnerability Scoring System (CVSS) score, an EPSS probability score from 0%-100% is now displayed for detected Common Vulnerabilities and Exposures (CVEs).
99100
You can use the EPSS score to better prioritize the remediation of CVE vulnerabilities and strengthen your security strategy.
100101

101102
For more information, see xref:../operating/manage-vulnerabilities/vulnerability-management.adoc#vulnerability-management-prioritizing_acs-operating-manage-vulnerabilities[Prioritizing the vulnerabilities].
@@ -105,7 +106,7 @@ For more information, see xref:../operating/manage-vulnerabilities/vulnerability
105106
[id="gain-visibility-into-the-external-ips-in-the-network-graph_{context}"]
106107
=== Enhanced visibility into the external IPs in the network graph
107108

108-
With {product-title-short} 4.7, you can now get a better insight into the external IPs behind external entities in the network graph.
109+
With {product-title-short} 4.7, you can now get a better insight into the external IPs behind external entities in the network graph.
109110

110111
:FeatureName: Visualizing external entities
111112
include::snippets/technology-preview.adoc[]
@@ -118,7 +119,7 @@ For more information, see xref:../operating/visualizing-external-entities.adoc#v
118119
[id="enhanced-options-for-the-roxctl-netpol-generate-command_{context}"]
119120
=== Enhanced options for the roxctl netpol generate command
120121

121-
In {product-title-short} 4.7, the `roxctl netpol generate` command automatically detects when DNS connections are required and generates them accordingly. If you do not specify a port, port `53` is selected automatically, but you can change this by using the `--dnsport` flag. The `--dnsport` flag also accepts port names in addition to numbers. For example,`--dnsport dns`.
122+
In {product-title-short} 4.7, the `roxctl netpol generate` command automatically detects when DNS connections are required and generates them accordingly. If you do not specify a port, port `53` is selected automatically, but you can change this by using the `--dnsport` flag. The `--dnsport` flag also accepts port names in addition to numbers. For example,`--dnsport dns`.
122123

123124
You can use port names as a more robust method of specifying the port if the service has a defined name.
124125
If you are a {osp} customer and use the default DNS setting, you should use the `--dnsport` flag to change the default port, as the OpenShift DNS pod listens on port `5353`.
@@ -144,7 +145,7 @@ For more information, see xref:../configuration/configuring-and-integrating-the-
144145
[id="generate-sboms-from-the-scanned-container-images_{context}"]
145146
=== Generate SBOMs from the scanned container images
146147

147-
With {product-title-short} 4.7, you can now generate a Software Bill of Materials (SBOM) from the scanned container images.
148+
With {product-title-short} 4.7, you can now generate a Software Bill of Materials (SBOM) from the scanned container images.
148149

149150
:FeatureName: Generation of SBOMs from the scanned container images
150151
include::snippets/technology-preview.adoc[]
@@ -174,7 +175,7 @@ For more information about the automatic certificate renewal, see xref:../config
174175
[id="cluster-registration-secret-for-secured-cluster-bootstrapping_{context}"]
175176
=== Cluster Registration Secret for secured cluster bootstrapping
176177

177-
In {product-title-short} 4.7, you can now use the Cluster Registration Secret (CRS) to bootstrap a secured cluster and register it with Central.
178+
In {product-title-short} 4.7, you can now use the Cluster Registration Secret (CRS) to bootstrap a secured cluster and register it with Central.
178179

179180
:FeatureName: Cluster Registration Secret
180181
include::snippets/technology-preview.adoc[]
@@ -212,13 +213,13 @@ This release contains the following changes:
212213
* Scanner V4 now uses Red{nbsp}Hat VEX files instead of the Common Vulnerabilities and Exposures (CVE) map to provide vulnerability data for non-RPM content in official Red{nbsp}Hat images.
213214
* You can no longer set the `ROX_NODE_INDEX_CONTAINER_API` environment variable in the Compliance pod. The node scanner never used this variable because the node scanner never connected to the Red{nbsp}Hat Container Catalog.
214215
+
215-
To enable node scanning with Scanner V4 while the nodes continue to be scanned in parallel with Scanner V2, update the variable ROX_NODE_INDEX_ENABLED variable from a Boolean setting to a feature flag. This change ensures that the {product-title-short} portal can access the setting through the Central API.
216+
To enable node scanning with Scanner V4 while the nodes continue to be scanned in parallel with Scanner V2, update the variable ROX_NODE_INDEX_ENABLED variable from a Boolean setting to a feature flag. This change ensures that the {product-title-short} portal can access the setting through the Central API.
216217
+
217218
By default, Central with Scanner V4 prioritizes Scanner V4 scans, while StackRox Scanner V2 remains operational without any changes. You can manually enable or disable Scanner V4 and StackRox Scanner V2 for node scanning without affecting image scanning.
218219
+
219220
For more information, see xref:../operating/manage-vulnerabilities/vulnerability-management.adoc#vulnerability-management[Vulnerability management overview].
220221

221-
* `stackrox.io` Content Delivery Network (CDN) has been moved from CloudFlare to Akamai. When configuring firewall rules, use the hostname instead of the IP addresses. If you previously allowed the IP ranges to `stackrox.io`, you must update these rules.
222+
* `stackrox.io` Content Delivery Network (CDN) has been moved from CloudFlare to Akamai. When configuring firewall rules, use the hostname instead of the IP addresses. If you previously allowed the IP ranges to `stackrox.io`, you must update these rules.
222223
+
223224
The following values are associated with a stable subset of Akamai Classless Inter-Domain Routings (CIDRs):
224225

@@ -354,13 +355,13 @@ For more information, see link:https://cloud.google.com/artifact-registry/docs/t
354355

355356
3. Kernel support packages and driver download functionality are deprecated.
356357

357-
4. The `rhacs-collector-slim*` image is deprecated and has been removed in {product-title-short} 4.7.0. `rhacs-collector*` image used to contain kernel modules and eBPF probes, but {product-title-short} no longer needs those items.
358-
The `rhacs-collector*` and the `rhacs-collector-slim*` images are now functionally the same.
358+
4. The `rhacs-collector-slim*` image is deprecated and has been removed in {product-title-short} 4.7.0. `rhacs-collector*` image used to contain kernel modules and eBPF probes, but {product-title-short} no longer needs those items.
359+
The `rhacs-collector*` and the `rhacs-collector-slim*` images are now functionally the same.
359360

360361
5. A feature flag controls this API object, and you can enable or disable this API object by using the `ROX_VULN_MGMT_LEGACY_SNOOZE` environment variable.
361362

362-
6. The format for specifying duration in JSON requests to `v1/nodecves/suppress`, `v1/clustercves/suppress`, and `v1/imagecves/suppress` has been changed to the ProtoJSON format.
363-
Only a numeric value representing seconds with optional fractional seconds for nanosecond precision and followed by the `s` suffix is supported.
363+
6. The format for specifying duration in JSON requests to `v1/nodecves/suppress`, `v1/clustercves/suppress`, and `v1/imagecves/suppress` has been changed to the ProtoJSON format.
364+
Only a numeric value representing seconds with optional fractional seconds for nanosecond precision and followed by the `s` suffix is supported.
364365
+
365366
For example, `0.300s`, `-5400s`, or `9900s`. The previously valid time units of `ns`, `us`, `µs`, `ms`, `m`, and `h` are no longer supported.
366367

@@ -389,7 +390,7 @@ This issue occurred when the system reported errors when encountering zombie pro
389390
With this update, the system now specifically recognizes zombie processes and adjusts the message level to a less strict classification. However, the system can still trigger an error if the detection of zombie processes exceeds a certain threshold, helping to identify faulty workloads.
390391

391392
//ROX-25638
392-
* Before this update, the Central logs were not rotated, which caused the log file for {product-title-short} to grow indefinitely and eventually take up the entire node memory. This issue occurred because `/var/log/stackrox` was mounted by using an `emptyDir` volume, which does not persist across pod restarts and has no built-in log rotation.
393+
* Before this update, the Central logs were not rotated, which caused the log file for {product-title-short} to grow indefinitely and eventually take up the entire node memory. This issue occurred because `/var/log/stackrox` was mounted by using an `emptyDir` volume, which does not persist across pod restarts and has no built-in log rotation.
393394
+
394395
With this update, logs are deleted and the `emptyDir` volume is recreated when you restart the Central pod. A log size limit has been introduced to prevent excessive memory usage and to ensure that the Central logs do not overload the node.
395396

@@ -402,4 +403,18 @@ With this update, the filter logic in Central has been adjusted to ensure that `
402403
//ROX-27829
403404
* Before to this update, the {product-title-short} portal incorrectly validated Slack webhook URLs and blocked the Mattermost integration due to strict regex rules. With this update, the regex check has been removed to allow for more flexible URL formats.
404405

406+
[id="about-release-4.7.1_{context}"]
407+
== About release version 4.7.1
408+
409+
*Release date*: 31 March 2025
410+
411+
This release of {product-title-short} includes the following bug fix:
412+
413+
* Fixed a bug in which Scanner V4 performed TLS validation even for integrations that had TLS validation disabled.
414+
415+
This release also addresses the following security vulnerabilities:
416+
417+
* link:https://access.redhat.com/security/cve/cve-2025-22869[CVE-2025-22869] Flaw in the `golang.org/x/crypto/ssh` package.
418+
* link:https://access.redhat.com/security/cve/cve-2025-27144[CVE-2025-27144] Go JOSE's parsing vulnerable to denial of service.
419+
405420
include::modules/image-versions.adoc[leveloffset=+1]

0 commit comments

Comments
 (0)