Consul API Gateway fails X-Ray Scans

Hi,
We are trying to deploy Consul API Gateway but we are being blocked due to vulnerabilities being discovered by X-Ray.
Is there any fix for this?

Description

BusyBox through 1.35.0 allows remote attackers to execute arbitrary code if netstat is used to print a DNS PTR record’s value to a VT compatible terminal. Alternatively, the attacker could choose to change the terminal’s colors.

References

Hi, thanks for raising this issue!

Our release machinery uses alpine:latest, which at the time of our v0.2.1 release was Alpine 3.15.4 - a version which does include a patch to mitigate this CVE according to Alpine 3.12.12, 3.13.10, 3.14.6 and 3.15.4 released | Alpine Linux

This can be verified by running the following command:

> docker run -it --entrypoint cat hashicorp/consul-api-gateway:0.2.1 /etc/os-release
NAME="Alpine Linux"
ID=alpine
VERSION_ID=3.15.4
PRETTY_NAME="Alpine Linux v3.15"
HOME_URL="https://alpinelinux.org/"
BUG_REPORT_URL="https://bugs.alpinelinux.org/"

Thanks very much for your response