Check: CNTR-R2-001580
Rancher Government Solutions RKE2 STIG:
CNTR-R2-001580
(in versions v2 r2 through v1 r1)
Title
Rancher RKE2 must remove old components after updated versions have been installed. (Cat II impact)
Discussion
Previous versions of Rancher RKE2 components that are not removed after updates have been installed may be exploited by adversaries by causing older components to execute which contain vulnerabilities. When these components are deleted, the likelihood of this happening is removed.
Check Content
To view all pods and the images used to create the pods, from the RKE2 Control Plane, run the following command: kubectl get pods --all-namespaces -o jsonpath="{..image}" | \ tr -s '[[:space:]]' '\n' | \ sort | \ uniq -c Review the images used for pods running within Kubernetes. If there are multiple versions of the same image, this is a finding.
Fix Text
Remove any old pods that are using older images. On the RKE2 Control Plane, run the command: kubectl delete pod podname (Note: "podname" is the name of the pod to delete.) Run the command: systemctl restart rke2-server
Additional Identifiers
Rule ID: SV-254574r961677_rule
Vulnerability ID: V-254574
Group Title: SRG-APP-000454-CTR-001110
Expert Comments
CCIs
Number | Definition |
---|---|
CCI-002617 |
Remove previous versions of organization-defined software components after updated versions have been installed. |
Controls
Number | Title |
---|---|
SI-2(6) |
Removal of Previous Versions of Software / Firmware |