Consul API Gateway fails X-Ray Scans

We are trying to deploy Consul API Gateway but we are being blocked due to vulnerabilities being discovered by X-Ray.
Is there any fix for this?


BusyBox through 1.35.0 allows remote attackers to execute arbitrary code if netstat is used to print a DNS PTR record’s value to a VT compatible terminal. Alternatively, the attacker could choose to change the terminal’s colors.


Hi, thanks for raising this issue!

Our release machinery uses alpine:latest, which at the time of our v0.2.1 release was Alpine 3.15.4 - a version which does include a patch to mitigate this CVE according to Alpine 3.12.12, 3.13.10, 3.14.6 and 3.15.4 released | Alpine Linux

This can be verified by running the following command:

> docker run -it --entrypoint cat hashicorp/consul-api-gateway:0.2.1 /etc/os-release
NAME="Alpine Linux"
PRETTY_NAME="Alpine Linux v3.15"

Thanks very much for your response