Hi,
We are trying to deploy Consul API Gateway but we are being blocked due to vulnerabilities being discovered by X-Ray.
Is there any fix for this?
Description
BusyBox through 1.35.0 allows remote attackers to execute arbitrary code if netstat is used to print a DNS PTR record’s value to a VT compatible terminal. Alternatively, the attacker could choose to change the terminal’s colors.
References
- https://nvd.nist.gov/vuln/detail/CVE-2022-28391
- https://git.alpinelinux.org/aports/plain/main/busybox/0001-libbb-sockaddr2str-ensure-only-printable-characters-.patch
- https://git.alpinelinux.org/aports/plain/main/busybox/0002-nslookup-sanitize-all-printed-strings-with-printable.patch
- https://gitlab.alpinelinux.org/alpine/aports/-/issues/13661