How to use Chainguard Security Advisories and the Diff API
Tools used in this video
Related Article
See How to Use Chainguard Security Advisories for a written article covering similar content to this video.
Transcript
0:05 So a question we sometimes get asked is how to investigate vulnerabilities found in Chainguard images and how you can figure out if there’s a fix
0:15 so thanks to a new website and some new tooling this is pretty
0:19 straightforward so in this example we’re
0:21 going to look at a slightly old golang
0:23 image and if we run Docker Scout or a
0:26 similar scanner we do get some results
0:31 so you can see in this image we found 11
0:35 vulnerabilities and we’re going to
0:37 investigate this one 2023
0:42 44487 and we can see we’re interested in
0:45 the nghttp2 package so I’m going to
0:50 copy that and I’m going to move to a
0:56 browser and here I have opened images.chainguard.dev/security and I can search by
1:02 that cve so that comes up. If I click
1:06 into this I can filter by packages so if
1:09 I put in nghttp2
1:12 we can see that comes up
1:15 here and interestingly we can see see
1:19 the status is fixed it’s fixed in
1:21 version 1.57 point0 r0 um and this
1:25 happened a while ago on October the 11th
1:29 so now now I’m fairly
1:34 sure that that vulnerability will be
1:36 gone because the image will have been
1:37 updated and indeed there we see there’s
1:40 no vulnerabilities detected but we can
1:42 do bit more than that with a new diff
1:44 API we can actually look into the
1:46 differences between the 121.2 image and
1:49 the 121.5 image um this will take a
1:53 little moment to run note that I’ve
1:55 piped this through jq to format the
1:57 output and I’ve also saved it out to
1:59 file um so we can scroll through it and
2:02 see the output and look at it a little
2:04 bit easier so if I open this
2:08 file and we look at the bottom what we
2:11 have here is a list of the
2:13 vulnerabilities that have been removed
2:15 between the two versions of the image so
2:18 in this list I should see that 4487
2:20 indeed it’s here we’re saying this cve was
2:24 addressed and also if we search for NG
2:28 http2 we find it here and we see the
2:32 version has been updated so in the in
2:36 this version of the image we’re running
2:39 on a newer version of nghttp2
2:42 which is why that vulnerability has gone
2:44 away so there you have it that’s how you
2:47 can investigate CVEs and find out how
2:50 they were addressed and Chainguard
2:51 images please do give this a go and let
2:54 me know how you get on
Last updated: 2024-01-18 15:21