Check: CNTR-R2-001580
Rancher Government Solutions RKE2 STIG:
CNTR-R2-001580
(in versions v1 r5 through v1 r1)
Title
Rancher RKE2 must remove old components after updated versions have been installed. (Cat II impact)
Discussion
Previous versions of Rancher RKE2 components that are not removed after updates have been installed may be exploited by adversaries by causing older components to execute which contain vulnerabilities. When these components are deleted, the likelihood of this happening is removed.
Check Content
To view all pods and the images used to create the pods, from the RKE2 Control Plane, run the following command: kubectl get pods --all-namespaces -o jsonpath="{..image}" | \ tr -s '[[:space:]]' '\n' | \ sort | \ uniq -c Review the images used for pods running within Kubernetes. If there are multiple versions of the same image, this is a finding.
Fix Text
Remove any old pods that are using older images. On the RKE2 Control Plane, run the command: kubectl delete pod podname (Note: "podname" is the name of the pod to delete.) Run the command: systemctl restart rke2-server
Additional Identifiers
Rule ID: SV-254574r955723_rule
Vulnerability ID: V-254574
Group Title: SRG-APP-000454-CTR-001110
Expert Comments
CCIs
Number | Definition |
---|---|
CCI-002617 |
The organization removes organization-defined software components (e.g., previous versions) after updated versions have been installed. |
Controls
Number | Title |
---|---|
SI-2 (6) |
Removal Of Previous Versions Of Software / Firmware |