Release notes
Highlights what is new and what has changed with Red Hat Advanced Cluster Security for Kubernetes releases
Abstract
Chapter 1. Red Hat Advanced Cluster Security for Kubernetes 4.6
Red Hat Advanced Cluster Security for Kubernetes (RHACS) is an enterprise-ready, Kubernetes-native container security solution that protects your vital applications across the build, deploy, and runtime stages of the application lifecycle. Red Hat Advanced Cluster Security for Kubernetes deploys into your infrastructure and integrates with your DevOps tools and workflows. This integration provides better security and compliance, enabling DevOps and InfoSec teams to operationalize security.
RHACS version | Released on |
---|---|
| 3 December 2024 |
| 18 December 2024 |
| 4 February 2025 |
| 10 March 2025 |
| 31 March 2025 |
| 15 April 2025 |
| 27 May 2025 |
| 11 June 2025 |
1.1. About release 4.6.0
RHACS 4.6 includes the following new features, improvements, and updates:
- Architecture
- Compliance
- Documentation
- Network
- Visualizing external entities in the network graph (Technology Preview)
- Platform
- Platform components
- Policy
- Vulnerability Management
1.2. New features
This release adds improvements related to the following components and concepts:
1.2.1. Support for ARM architecture in secured clusters (Technology Preview)
Support for ARM architecture in secured clusters is a Technology Preview feature only. Technology Preview features are not supported with Red Hat production service level agreements (SLAs) and might not be functionally complete. Red Hat does not recommend using them in production. These features provide early access to upcoming product features, enabling customers to test functionality and provide feedback during the development process.
For more information about the support scope of Red Hat Technology Preview features, see Technology Preview Features Support Scope.
RHACS now provides support for ARM architecture in RHACS secured clusters only. This architecture provides enhanced flexibility and performance for secured clusters, including the following benefits:
- Efficient power consumption
- Better handling of resource-intensive tasks
- Cost-effective scaling
For more information, see Installation methods for different architectures. The RHACS Central component is not supported on ARM.
1.2.2. Scanner V4 use of CSAF-VEX for vulnerability data
Red Hat is switching to Common Security Advisory Framework (CSAF) Vulnerability Exploitability eXchange (VEX) vulnerability data as standardized security advisory formats to communicate vulnerabilities affecting Red Hat products. In particular, the VEX profile describes which Red Hat products and components are impacted or known not to be impacted by a specific vulnerability identified by the Common Vulnerability and Exposures (CVE) ID. This format also describes vulnerability data with greater detail than before. RHACS now uses the Red Hat CSAF-VEX vulnerability data source if you have Scanner V4 configured for vulnerability scanning.
For more information about Red Hat security data and VEX, see the following sources:
For more information on Scanner V4 and CSAF-VEX, see the following documentation:
1.2.3. Scanner V4 support for RHCOS (Technology Preview)
Scanner V4 support for RHCOS is a Technology Preview feature only. Technology Preview features are not supported with Red Hat production service level agreements (SLAs) and might not be functionally complete. Red Hat does not recommend using them in production. These features provide early access to upcoming product features, enabling customers to test functionality and provide feedback during the development process.
For more information about the support scope of Red Hat Technology Preview features, see Technology Preview Features Support Scope.
RHACS now supports scanning of Red Hat Enterprise Linux CoreOS (RHCOS) nodes with Scanner V4. For more information, see Enabling RHCOS node scanning with Scanner V4.
1.2.4. Platform components
When addressing security issues, your approach might vary depending on whether the issues originate from the underlying platform, such as OpenShift Container Platform, or other user workloads. RHACS 4.6 includes an internal definition of the underlying platform. This internal definition enhances RHACS views, enabling you to focus on either aspect.
- The policy violations view and API support this differentiation.
The platform definition is built-in and is not yet customizable. You can see the impact of the definition in your environment by using the global search. To do this:
- Click Search.
- Select Show Orchestrator Components.
-
Apply the filter
Platform Component: true
.
1.2.5. Support for policy as code (Technology Preview)
Policy as code is a Technology Preview feature only. Technology Preview features are not supported with Red Hat production service level agreements (SLAs) and might not be functionally complete. Red Hat does not recommend using them in production. These features provide early access to upcoming product features, enabling customers to test functionality and provide feedback during the development process.
For more information about the support scope of Red Hat Technology Preview features, see Technology Preview Features Support Scope.
With this release, RHACS adds the ability to manage RHACS policies as Kubernetes custom resources, enabling GitOps workflows such as Argo CD. For more information, see Managing policies as code.
1.2.6. Policy violation views
RHACS 4.6 introduces the following new features:
- A new drop-down selector in the policy violations view. You can use it to focus on violations related to user application workloads, platform workloads, or both.
- The policy violations view now lists violations across three panels to easily distinguish between active, resolved, and attempted violations.
1.2.7. Upgraded view filters
The violations view now includes comprehensive filtering capabilities similar to Vulnerability Management:
- Filter by cluster, namespace, and deployment.
- Filter by Violation date, time, and entity type.
- Filter by Policy name, category, severity, and other options.
1.2.8. Policy editor updates
RHACS includes the following enhancements to the policy editor:
- The policy editor now includes reordered sections to reflect the logical policy structure better, splitting the policy definition part (rules and metadata) from the behavior part (scope and actions).
- The editor recognizes Policy as Code capabilities and shows a warning when editing an Externally Managed policy.
1.2.9. Exposure analysis in network policy generator
When you create a connectivity map by using the build-time network policy generator, an option is now available to show open connections. This configuration with open connections increases the exposure risk. Therefore, such connections are a good candidate for limiting exposure. For example, a network policy might allow ingress to a pod from any namespace instead of specifying individual consumers.
For more information, see the netpol connectivity map
command reference.
1.2.10. Compliance reporting (Technology Preview)
Compliance reporting is a Technology Preview feature only. Technology Preview features are not supported with Red Hat production service level agreements (SLAs) and might not be functionally complete. Red Hat does not recommend using them in production. These features provide early access to upcoming product features, enabling customers to test functionality and provide feedback during the development process.
For more information about the support scope of Red Hat Technology Preview features, see Technology Preview Features Support Scope.
Compliance reporting is available as a Technology Preview for all OpenShift clusters running Compliance Operator version 1.6 or later. With this feature, you can more easily access the compliance results of a given scan schedule in a CSV file.
Compliance reporting provides the following options:
- Generating the report on-demand directly by using the RHACS portal or the API
- Sending the report periodically by email every time a scan is scheduled
- Creating email notifiers when creating a scan configuration as a destination to send on-demand reports
- Generating an on-demand report for a given scan configuration, which RHACS sends to any notifiers configured on that scan configuration
For more information, see Scheduling compliance scans and assessing profile compliance.
1.2.11. Visualizing external entities in the network graph (Technology Preview)
Visualizing external entities is a Technology Preview feature only. Technology Preview features are not supported with Red Hat production service level agreements (SLAs) and might not be functionally complete. Red Hat does not recommend using them in production. These features provide early access to upcoming product features, enabling customers to test functionality and provide feedback during the development process.
For more information about the support scope of Red Hat Technology Preview features, see Technology Preview Features Support Scope.
The network graph now provides additional insights into connections to external entities. With this update, you can view specific IP addresses associated with these external connections, offering a more comprehensive overview of network activity.
To configure RHACS to collect this information for a cluster, you modify the secured cluster’s runtime configuration by using a ConfigMap. For more information, see Visualizing external entities.
1.2.12. Microsoft Sentinel notifier added
RHACS has added a Microsoft Sentinel notifier to send alerts and audit logs to Azure Log Analytics Workspace. For more information, see Integrating with Microsoft Sentinel notifier.
1.2.13. Support for backups using non-AWS S3 compatible providers
RHACS has added a new external backup integration for non-AWS S3 compatible providers. For more information, see Integrating with S3 API compatible services.
1.2.14. Vulnerability Management page updates
The Vulnerability Management page has updates and improvements, including the following changes:
- CVE published date
- RHACS now reports the CVE published date in vulnerability management data shown in the portal and obtained from the API. This field uses the first published date for the CVE that is obtained from vendor-specific security data feeds, when those are available. If data from the vendor is missing, data from the National Vulnerability Database (NVD) is used to populate the CVE published date field.
- Hiding unwanted display columns
- RHACS now provides the ability to hide unwanted columns in tables by using column management. Starting with the Workload CVEs section of RHACS, a button is displayed above the table containing the text "Columns" and provides a count of the number of columns that are enabled. You can click this button to open a menu to hide unwanted columns. These settings are saved per table in your browser and remain in place across separate sessions.
1.3. Certifications
Red Hat Advanced Cluster Security Cloud Service is certified according to the following global standards for security, compliance, and data protection:
- ISO/IEC 27001:2022
- ISO/IEC 27017:2015
- ISO/IEC 27018:2019
- PCI DSS 4.0
- SOC 2 Type 2
- SOC 2 Type 3
1.4. Notable technical changes
This release contains the following changes:
- Secured cluster upgrade behavior enhancements
The following changes were made to the upgrade functionality on secured clusters:
-
RHACS Cloud Service: Secured clusters that were deployed by using the
roxctl
CLI, also called the manifest method, can now be automatically upgraded by using the cluster upgrader. RHACS Central:
- Messages and errors for the secured cluster upgrader are now simpler and clearer.
- Typical failure scenarios for cluster upgrader are now documented. For more information, see Troubleshooting the cluster upgrader.
-
RHACS Cloud Service: Secured clusters that were deployed by using the
- Flag for diagnostic bundles to include only database information
-
The
roxctl central debug download-diagnostics
command that is used to create diagnostic bundles for troubleshooting has a new flag,--with-database-only
. The flag generates only database metrics in the diagnostic bundle. This flag is helpful when you only need database information to diagnose performance issues in large clusters. - Additional changes
-
Automatic sensing within the Helm charts for detecting OpenShift clusters has been changed. Automatic sensing now depends on the
project.openshift.io/v1
objectAPIVersion
. -
Sensor now stores pull secrets by secret name and registry host instead of only by registry host. This change reduces delegated scanning authentication failures when multiple secrets exist for the same registry within a namespace and more closely aligns with Kubernetes secrets handling. To disable this feature and cause secrets to be stored by only registry host, set
ROX_SENSOR_PULL_SECRETS_BY_NAME
tofalse
. -
The endpoint
/v2/compliance/scan/configurations/reports/run
method has changed fromPUT
toPOST
.
-
Automatic sensing within the Helm charts for detecting OpenShift clusters has been changed. Automatic sensing now depends on the
1.5. Documentation updates
Documentation updates include the following:
1.5.1. Feature flag documentation
Documentation has been added to show you how to manage features that are enabled as Technology Preview features. For more information, see Managing feature flags.
1.5.2. API documentation available publicly
Previously, API documentation was only available by clicking ? and selecting API Reference to view the API documentation in the product. The API documentation is now publicly available; see the API Reference.
1.6. Deprecated and removed features
Some features available in earlier releases have been deprecated or removed.
Deprecated functionality is still included in RHACS and continues to be supported; however, it will be removed in a future release of this product and is not recommended for new deployments. For the most recent list of major functionality deprecated and removed, see the following table. Additional removed or deprecated functionality is available after the table.
In the table, features are marked with the following statuses:
- GA: General Availability
- TP: Technology Preview
- DEP: Deprecated
- REM: Removed
- NA: Not applicable
Feature | RHACS 4.4 | RHACS 4.5 | RHACS 4.6 |
---|---|---|---|
API token authentication for Red Hat OpenShift Cluster Manager[1] | GA | GA | DEP |
| DEP | DEP | DEP |
Google Container Registry integration[2] | GA | GA | DEP |
Kernel support packages and driver download functionality [3] | NA | DEP | DEP |
Reporting of Istio vulnerabilities | DEP | DEP | DEP |
| NA | DEP | DEP |
| GA | GA | REM |
StackRox Scanner | GA | GA | DEP |
| GA | DEP | DEP |
| DEP | DEP | DEP |
| DEP | DEP | DEP |
| DEP | DEP | REM |
| DEP | DEP | DEP |
| DEP | DEP | DEP |
| NA | DEP | DEP |
| DEP | DEP | DEP |
Vulnerability Management (1.0) menu item[9] | DEP | DEP | DEP |
Vulnerability Report Creator permission | DEP | DEP | DEP |
- API token authentication has been deprecated by Red Hat OpenShift Cluster Manager. The corresponding cloud source integration now uses service accounts for authentication.
- The Google Container Registry integration is now deprecated in response to the deprecation of Container Registry by Google. Users should use Artifact Registry as a registry replacement and Scanner V4 as a scanner replacement.
- Kernel support packages and driver download functionality are deprecated.
-
The
rhacs-collector-slim*
images have been deprecated.rhacs-collector
images used to contain kernel modules and eBPF probes, but those items are no longer needed by RHACS. Therhacs-collector* `image and the `rhacs-collector-slim*
images are now functionally the same. Therhacs-collector-slim*
image is planned for removal in a future release. The Central PVC stackrox-db is removed and existing volumes are released. The following flags for configuring Central attached persistent storage have been removed from
roxctl
:-
roxctl central generate k8s pvc
androxctl central generate openshift pvc
no longer have the flags--name
,--size
, and--storage-class
. -
roxctl central generate k8s hostpath
androxctl central generate openshift hostpath
no longer have the flags--hostpath
,--node-selector-key
, and--node-selector-value
.
-
-
This object is controlled by a feature flag and can be enabled or disabled by using the
ROX_VULN_MGMT_LEGACY_SNOOZE
environment variable. -
The format for specifying duration in JSON requests to
v1/nodecves/suppress
,v1/clustercves/suppress
, andv1/imagecves/suppress
has changed to the ProtoJSON format. Only a numeric value representing seconds with optional fractional seconds for nanosecond precision and followed by thes
suffix is supported. For example,0.300s
,-5400s
, or9900s
. The previously valid time units ofns
,us
,µs
,ms
,m
, andh
are no longer supported. -
The
/v1/cve/requests
API for managing vulnerability exceptions is removed. Use the new/v2/vulnerability-exceptions/
API. - The Dashboard view under Vulnerability Management is deprecated. Use the Workload CVEs, Exception Management, Platform CVEs, and Node CVEs views as alternatives.
1.6.1. Deprecated features
The following section provides information about additional deprecated features:
To unify the response data for stream and unary API requests, the following changes were made:
-
The
error
field returned for failed unary API requests is deprecated. Use themessage
field to retrieve error information instead of theerror
field. Themessage
field has the same information as theerror
field. In this release, Red Hat removed the following fields in the returned error response for gRPC stream APIs:
-
grpcCode
-
httpCode
httpStatus
With this release, the response includes the new
code
field that includes thegrpcCode
data.
-
-
The
1.7. Bug fixes in version 4.6.0
Release date: 3 December 2024
- Before this release, the timestamp data displayed incorrectly when viewing affected images in the First discovered column of the Workload CVE single page view. This update resolves the issue.
- Before this release, the Vulnerability Management window that contains CVEs with an unknown severity displayed incorrect CVE counts when viewing an image. This update resolves the issue.
-
In runtime monitoring, process names and arguments could cause serialization problems when containing invalid UTF-8 characters. This resulted in error messages in the collector logs. Those characters are now filtered and replaced with a
?
when necessary. - Previously, when using delegated scanning, newer image metadata and layers were pulled incorrectly for an older image referenced by tag when the image registry contents had changed since deployment. Now, the metadata and layers pulled are based on the digest of the image provided by the container runtime when available, instead of just the tag.
1.8. About release 4.6.1
Release date: 18 December 2024
This release of RHACS fixes the following bugs:
- Fixed an issue where Sensor went online prematurely due to HTTP reachability, assuming the gRPC connection was active.
- Fixed an issue where the HTML code in column values was rendered in PDFs due to insufficient sanitization.
1.9. About release 4.6.2
Release date: 4 February 2025
This release of RHACS fixes the following bugs:
- Fixed an issue in StackRox Scanner V2 where scan results for Red Hat Enterprise Linux (RHEL)-based images displayed inaccurate package and vulnerability data due to incorrect layer hierarchy assumptions.
-
Fixed an issue where the output format of the
roxctl
CLI command for timestamps changed in RHACS 4.6, interrupting customer automation workflows.
1.10. About release 4.6.3
Release date: 10 March 2025
This release of RHACS fixes the following bugs:
- Fixed an issue where the Operator was not displayed as Federal Information Processing Standards (FIPS) compliant in the Operator catalog search.
- Fixed an issue where vulnerability report jobs in RHACS could become deadlocked if a report took too long to complete, preventing new jobs from starting.
This release of RHACS fixes the following security vulnerabilities:
- CVE-2025-1094: PostgreSQL quoting APIs miss neutralizing quoting syntax in text that fails encoding validation.
-
GHSA-6wxm-mpqj-6jpf: Insecure temporary file usage in
github.com/golang/glog
. - CVE-2025-22868: Flaw in Golang in the token parsing component.
1.11. About release 4.6.4
Release date: 31 March 2025
This release of RHACS fixes the following bugs:
- Fixed an issue where Scanner V4 performed TLS validation even for integrations where TLS validation was disabled.
- Fixed an issue that prevented the "Container CPU Limit" field from being added to security policy rules.
- Fixed an issue where the Network Policies tab in the network graph detail view would hang in the PatternFly Code editor due to a potential issue with the Monaco-based text editor.
This release of RHACS fixes the following security vulnerabilities:
- CVE-2025-27144: Flaw in Go JOSE versions prior to 4.0.5.
- CVE-2025-22868: Flaw in Golang in the token parsing component.
-
CVE-2025-22869: Flaw in
golang.org/x/crypto
Secure Shell (SSH) file transfer implementation.
1.12. About release 4.6.5
Release date: 15 April 2025
This release of RHACS fixes the following bugs:
- Fixed an issue where Central could perform image scans even when delegated scanning was enabled, due to a race condition during Sensor reconnection.
- Fixed an issue where mismatched aggregation fields in Compliance tables and widgets caused inconsistent percentage displays.
- Fixed an issue where you ran into Google Kubernetes Engine (GKE) compatibility test failures because the tests still used a deprecated service in RHACS 4.6.
- Fixed an issue where you could see the Configuration Management page despite only having Alert permissions, resulting in role-based access control (RBAC) errors.
- Fixed an issue where verifying multi-signed images failed due to incorrect error handling.
This release of RHACS fixes the following security vulnerabilities:
-
CVE-2024-21536: Flaw in
http-proxy-middleware
allowed denial of service through unhandled promise rejections in micromatch. -
CVE-2025-30204: Flaw in
jwt-go
allowed excessive memory allocation during header parsing, which could lead to a possible denial of service. -
CVE-2024-57083: Flaw in
redoc
allowed prototypes inmergeObjects
to be tainted, which allowed a denial of service through crafted payloads.
1.13. About release 4.6.6
Release date: 27 May 2025
This release of RHACS fixes the following bugs:
- Fixed an issue where the number of failed policies reported in Configuration Management for a deployment were calculated incorrectly.
- Before this update, long-running GraphQL-based requests would time out. With this update, the default client timeout for GraphQL-based queries has been increased from 60 seconds to 180 seconds to avoid timeouts for long-running requests.
1.14. About release 4.6.7
Release date: 11 June 2025
This release of RHACS 4.6 provides the following bug fixes:
-
Fixed an issue where images were mistakenly pruned when the inactive images retention value was set to
0
. This action caused resetting of thefirstDiscovered
andfirstImageOccurrence
values for CVEs. - Fixed an issue with the web portal where you could not scroll when assigning roles to an auth provider.
This release provides fixes for these security issues:
-
zlib: Out-of-bounds pointer arithmetic in
inftrees.c
(CVE-2016-9840) - krb5: Kerberos RC4-HMAC-MD5 checksum vulnerability (CVE-2025-3576)
1.15. Image versions
You can manually pull, retag, and push Red Hat Advanced Cluster Security for Kubernetes images to your registry. The current version includes the following images:
Image | Description | Current version |
---|---|---|
Main |
Includes Central, Sensor, Admission controller, and Compliance components. Also includes |
|
Central DB | PostgreSQL instance that provides the database storage for Central. |
|
Scanner | Scans images and nodes. |
|
Scanner DB | Stores image scan results and vulnerability definitions. |
|
Scanner V4 | Scans images. |
|
Scanner V4 DB | Stores image scan results and vulnerability definitions for Scanner V4. |
|
Collector | Collects runtime activity in Kubernetes or OpenShift Container Platform clusters. |
|