Step 4: Scan the Container Image for Vulnerabilities
Scan the Container Image for Vulnerabilities
Vulnerable components like the version of ImageMagick present in our container image can be identified by Snyk. Developers using the Snyk CLI can run snyk container test to scan containers to get vulnerability information and base image upgrade guidance.
Scan the image (assuming you are in the thumbnailer directory of your goof repo) by running the following command:
snyk container test $REPO/thumbnailer:latest --file=Dockerfile --exclude-app-vulnsWhen the scan completes, review the list of vulnerabilities. There are quite a few!
...
Package manager: deb
Target file: Dockerfile
Project name: docker-image|012345678901.dkr.ecr.us-west-2.amazonaws.com/thumbnailer
Docker image: 012345678901.dkr.ecr.us-west-2.amazonaws.com/thumbnailer:latest
Platform: linux/amd64
Base image: python:3.11.1
Licenses: enabled
Tested 426 dependencies for known issues, found 393 issues.
Base Image Vulnerabilities Severity
python:3.11.1 405 9 critical, 29 high, 85 medium, 282 low
Recommendations for base image upgrade:
Minor upgrades
Base Image Vulnerabilities Severity
python:3.11.5 179 3 critical, 4 high, 13 medium, 159 low
Alternative image types
Base Image Vulnerabilities Severity
python:3.13-rc-slim 33 1 critical, 0 high, 0 medium, 32 low
python:3.11.6-slim 34 1 critical, 0 high, 0 medium, 33 low
python:3.12.0-slim-bookworm 35 1 critical, 0 high, 0 medium, 34 low
python:3.13-rc-slim-bullseye 60 1 critical, 0 high, 0 medium, 59 low
...As you can see, the Snyk engine is recommending we consider upgrading to newer base images that have fixes for many of the issues found in ours. If you search the output of the scan, you also can see that our CVE is, indeed in this base image.
✗ Medium severity vulnerability found in imagemagick/imagemagick-6-common
Description: CVE-2022-44268
Info: https://security.snyk.io/vuln/SNYK-DEBIAN11-IMAGEMAGICK-3314444
Introduced through: imagemagick/libmagickcore-dev@8:6.9.11.60+dfsg-1.3, imagemagick/libmagickwand-dev@8:6.9.11.60+dfsg-1.3, imagemagick@8:6.9.11.60+dfsg-1.3
From: imagemagick/libmagickcore-dev@8:6.9.11.60+dfsg-1.3 > imagemagick/imagemagick-6-common@8:6.9.11.60+dfsg-1.3
From: imagemagick/libmagickwand-dev@8:6.9.11.60+dfsg-1.3 > imagemagick/imagemagick-6-common@8:6.9.11.60+dfsg-1.3
From: imagemagick@8:6.9.11.60+dfsg-1.3 > imagemagick/imagemagick-6.q16@8:6.9.11.60+dfsg-1.3 > imagemagick/libmagickcore-6.q16-6@8:6.9.11.60+dfsg-1.3 > imagemagick/imagemagick-6-common@8:6.9.11.60+dfsg-1.3
and 24 more...
Image layer: Introduced by your base image (python:3.11.1)
Fixed in: 8:6.9.11.60+dfsg-1.3+deb11u1Fixing our image
Let’s take Snyk’s recommendation and upgrade our base image:
Double click on the Dockerfile under the thumbnailer directory in your VS Code Server IDE sidebar and change the first line from:
FROM python:3.11.1To:
FROM python:3.11.5Note:
Dont to forget to save your Dockerfile with your changes moving forward.
Now, rebuild the image:
docker build -t $REPO/thumbnailer .… and let’s re-scan it:
snyk container test $REPO/thumbnailer --file=Dockerfile --exclude-app-vulnsThe results now should show the lower vulnerability count.
...
Package manager: deb
Target file: Dockerfile
Project name: docker-image|012345678901.dkr.ecr.us-west-2.amazonaws.com/thumbnailer
Docker image: 012345678901.dkr.ecr.us-west-2.amazonaws.com/thumbnailer
Platform: linux/amd64
Base image: python:3.11.5
Licenses: enabled
Tested 429 dependencies for known issues, found 179 issues.
Base Image Vulnerabilities Severity
python:3.11.5 179 3 critical, 4 high, 13 medium, 159 low
Recommendations for base image upgrade:
Alternative image types
Base Image Vulnerabilities Severity
python:3.13-rc-slim 33 1 critical, 0 high, 0 medium, 32 low
python:3.11.6-slim 34 1 critical, 0 high, 0 medium, 33 low
python:3.12.0-slim-bookworm 35 1 critical, 0 high, 0 medium, 34 low
python:3.13-rc-slim-bullseye 60 1 critical, 0 high, 0 medium, 59 lowIf you search through the output, you should find our ImageMagick CVE is gone.
About the recommendations
Snyk recommends less vulnerable base images grouped by how likely they are to be compatible:
- Minor upgrades are the most likely to be compatible with little work,
- Major upgrades can introduce breaking changes depending on image usage,
- Alternative architecture images are shown for more technical users to investigate.