Skip to content

Commit 1ea2dd8

Browse files
committed
Syncing version-5.4
1 parent 3168bca commit 1ea2dd8

3 files changed

Lines changed: 92 additions & 2 deletions

File tree

  • docs/14.releasenotes/01.5x
  • versioned_docs/version-5.4
    • 14.releasenotes/01.5x
    • 16.security_advisories/01.security_advisories

docs/14.releasenotes/01.5x/01.5x.md

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -16,8 +16,6 @@ To receive email notifications of new releases, please subscribe to this SUSE ma
1616

1717
##### New Features
1818

19-
[features]: #features
20-
2119
* **NVSHAS-10186**: Return file_path after export to remote repository successfully
2220
* **NVSHAS-10168**: Add remote export option to system configurations page - Federation only
2321
* **NVSHAS-10142**: Make 'enforce TLS verification' enabled by default for new NV deployment (6)

versioned_docs/version-5.4/14.releasenotes/01.5x/01.5x.md

Lines changed: 42 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -11,6 +11,48 @@ slug: /releasenotes/5x
1111
To receive email notifications of new releases, please subscribe to this SUSE mailing list: https://lists.suse.com/mailman/listinfo/neuvector-updates
1212
:::
1313

14+
#### 5.4.8 December 2025
15+
16+
##### New Features
17+
18+
* **NVSHAS-10186**: Return file_path after export to remote repository successfully
19+
* **NVSHAS-10168**: Add remote export option to system configurations page - Federation only
20+
* **NVSHAS-10142**: Make 'enforce TLS verification' enabled by default for new NV deployment (6)
21+
* **NVSHAS-10068**: [UI] Support "Export"/"Import" buttons on all fed-related policy pages
22+
* **NVSHAS-10026**: Possibility of creating Federation rules through automation RESTAPI only
23+
* **NVSHAS-9300**: Helm chart: manager-service and controller-service customizable TCP ports
24+
25+
##### Bugs Fixed
26+
27+
* **NVSHAS-10196**: Replace country flag images to avoid CVE-2025-66412 / GHSA-v4hv-rgfq-gp49
28+
* **NVSHAS-10185**: Suggest add "Fed" in exported file name when exporting fed policy to local or remote in NV UI
29+
* **NVSHAS-10180**: [C03084][C03092][C03085] [Container Scan] It fails to detect package.json related modules
30+
* **NVSHAS-10174**: Controller wrongly allows 'Committer Name' & 'Email' in Remote Repository Configuration to be empty in POST request
31+
* **NVSHAS-10173**: [UI] Newly-created rule in fed DLP/WAF sensor page cannot be edited
32+
* **NVSHAS-10172**: [UI] Incorrect floating message when try to delete a fed webhook that is in-use
33+
* **NVSHAS-10171**: [UI] strange behavior for Federated Policy -> Configuration page
34+
* **NVSHAS-10169**: [Federated policy][Configuration] After webhook is updated, the reflected record shows the type is user created
35+
* **NVSHAS-10167**: [UI] Incorrect response rules displayed after selecting a fed group
36+
* **NVSHAS-10166**: [UI] Incorrect floating message after importing fed configuration
37+
* **NVSHAS-10165**: [UI] Network policy mode and Process profile mode should not be in the export federated groups modal
38+
* **NVSHAS-10164**: [Groups] Hide selection checkbox on federated groups on local group page
39+
* **NVSHAS-10163**: [UI] 'Export to Remote Repository' is missing for all fed policy pages' export
40+
* **NVSHAS-10162**: HIGH CVEs FOUND in NV Images
41+
* **NVSHAS-10157**: [Scan] Fixed Version is empty in some image
42+
* **NVSHAS-10156**: NeuVector Scanner is not reporting CVEs for the npm repository tinymce
43+
* **NVSHAS-10154**: Only response rules without group can be exported in response rules page
44+
* **NVSHAS-10151**: Incorrect payload for creating fed WAF sensor
45+
* **NVSHAS-10140**: Unexpected checkbox for DLP/WAF export
46+
* **NVSHAS-10139**: [Controller] Controller does not initialize when enforcer is not deployed
47+
* **NVSHAS-10133**: Enforcer pods crashing
48+
* **NVSHAS-10128**: [Controller] Controller doesnt initialize when disabling scanner using cve.scanner.enabled=false parameter
49+
* **NVSHAS-10116**: Controller throwing errors "...Watch failure - error..."
50+
* **NVSHAS-10113**: [UI] 'View Federated Repositories' on Assets -> Registries page
51+
52+
## References:
53+
54+
* [OpenID Connect is vulnerable to man-in-the-middle (MITM)](https://github.com/neuvector/neuvector/security/advisories/GHSA-4jj9-cgqc-x9h5)
55+
1456
#### 5.4.7 October 2025
1557

1658
:::note

versioned_docs/version-5.4/16.security_advisories/01.security_advisories/cve.md

Lines changed: 50 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -6,6 +6,7 @@ NeuVector is committed to informing the community of security issues. Below is a
66

77
| ID | Description | Date | Resolution |
88
| :---- | :---- | :---- | :---- |
9+
| [CVE-2025-66001](https://github.com/neuvector/neuvector/security/advisories/GHSA-4jj9-cgqc-x9h5) | In the patched version, the new NeuVector deployment enables TLS verification by default. For rolling upgrades, NeuVector does not automatically change this setting to prevent disruptions. For more information refer to [OpenID Connect is vulnerable to MITM](#openid-connect-is-vulnerable-to-mitm)| 12 Dec 2025 | [NeuVector v5.4.8](https://github.com/neuvector/neuvector/releases/tag/v5.4.8) |
910
| [CVE-2025-54471](https://github.com/neuvector/neuvector/security/advisories/GHSA-h773-7gf7-9m2x) | NeuVector uses dynamically generated encryption keys and securely stores them in Kubernetes secrets. This improvement replaces previously hardcoded cryptographic material, enhancing data confidentiality and operational security in all deployments. For more information refer to [NeuVector is shipping cryptographic material into its binary](#neuvector-is-shipping-cryptographic-material-into-its-binary)| 17 Oct 2025 | [NeuVector v5.4.7](https://github.com/neuvector/neuvector/releases/tag/v5.4.7) |
1011
| [CVE-2025-54470](https://github.com/neuvector/neuvector/security/advisories/GHSA-qqj3-g7mx-5p4w) | NeuVector enforces TLS certificate and hostname verification for all telemetry communications. In addition, it limits telemetry response size to prevent denial-of-service risks. These enhancements ensure telemetry data is exchanged securely and efficiently. | 17 Oct 2025 | [NeuVector v5.4.7](https://github.com/neuvector/neuvector/releases/tag/v5.4.7) |
1112
| [CVE-2025-54469](https://github.com/neuvector/neuvector/security/advisories/GHSA-c8g6-qrwh-m3vp) | NeuVector strengthened the enforcer’s monitor process by validating environment variables before execution. This change prevents unsafe command execution and improves overall runtime security and process integrity.| 17 Oct 2025 | [NeuVector v5.4.7](https://github.com/neuvector/neuvector/releases/tag/v5.4.7) |
@@ -19,6 +20,55 @@ NeuVector is committed to informing the community of security issues. Below is a
1920
| [CVE-2024-41110](https://github.com/advisories/GHSA-v23v-6jw2-98fq) | A security vulnerability has been detected in certain versions of Docker Engine, which could allow an attacker to bypass [authorization plugins (AuthZ)](https://docs.docker.com/engine/extend/plugins_authorization/) under specific circumstances. The base likelihood of this being exploited is low. | 16 Nov 2024 | [NeuVector v5.4.1](https://github.com/neuvector/neuvector/releases/tag/v5.4.1) |
2021
| [CVE-2020-26160](https://github.com/advisories/GHSA-w73w-5m7g-f7qc) | `jwt-go` allows attackers to bypass intended access restrictions in situations with `[]string{}` for `m["aud"]` (which is allowed by the specification). Because the type assertion fails, "" is the value of `aud`. This is a security problem if the JWT token is presented to a service that lacks its own audience check. There is no patch available and users of `jwt-go` are advised to migrate to [`golang-jwt`](https://github.com/golang-jwt/jwt) at version 3.2.1. | 16 Nov 2024 | [NeuVector v5.4.1](https://github.com/neuvector/neuvector/releases/tag/v5.4.1) |
2122

23+
## OpenID Connect is vulnerable to MITM
24+
25+
* **CVE ID:** CVE-2025-66001[AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H](https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H&version=3.1)
26+
* **CVSS Score**: 8.8
27+
28+
**Affected Versions**
29+
30+
* All versions earlier than `5.3.0`
31+
* Versions from `5.3.0` up to and including `5.4.7`
32+
33+
**Fixed version: `5.4.8`**
34+
35+
### Impact
36+
37+
NeuVector supports login authentication through OpenID Connect. However, the TLS verification (which verifies the remote server's authenticity and integrity) for OpenID Connect is not enforced by default. As a result this may expose the system to man-in-the-middle (MITM) attacks.
38+
39+
Starting from version 5.4.0, NeuVector supports TLS verification for following connection types:
40+
41+
* Registry Connections
42+
* Auth Server Connections (SAML, LDAP and OIDC)
43+
* Webhook Connections
44+
45+
By default, TLS verification remains disabled, and its configuration is located under Settings > Configuration in the NeuVector UI.
46+
47+
In the patched version, the new NeuVector deployment enables TLS verification by default.
48+
For rolling upgrades, NeuVector does not automatically change this setting to prevent disruptions.
49+
50+
:::note
51+
When TLS verification is enabled, it affects all connections to
52+
* Registry servers
53+
* Auth servers (SAML, LDAP and OIDC)
54+
* Webhook servers
55+
:::
56+
57+
### Patches
58+
Patched versions include release v5.4.8 and above.
59+
60+
### Workarounds
61+
To manually enable TLS verification:
62+
1. Open the NeuVector UI.
63+
1. Navigate to Settings > Configuration.
64+
1. In the TLS Self-Signed Certificate Configuration section, select Enable TLS verification.
65+
1. (Optional) Upload or paste the TLS self-signed certificate.
66+
67+
## Questions and Support
68+
If you have any questions or comments about this advisory:
69+
* Reach out to the SUSE Rancher Security team for security related inquiries.
70+
* Open an issue in the NeuVector repository.
71+
* Verify with our support matrix and product support lifecycle.
2272

2373
## NeuVector is shipping cryptographic material into its binary
2474

0 commit comments

Comments
 (0)