pactflow / pact-protobuf-plugin

Pact plugin for Protobufs and gRPC
MIT License
16 stars 8 forks source link

CVE-2022-37434 (High) detected in libz-sys-1.1.8.crate, libgit2-sys-0.12.26+1.3.0.crate #10

Closed mend-for-github-com[bot] closed 2 years ago

mend-for-github-com[bot] commented 2 years ago

CVE-2022-37434 - High Severity Vulnerability

Vulnerable Libraries - libz-sys-1.1.8.crate, libgit2-sys-0.12.26+1.3.0.crate

libz-sys-1.1.8.crate

Low-level bindings to the system libz library (also known as zlib).

Library home page: https://crates.io/api/v1/crates/libz-sys/1.1.8/download

Dependency Hierarchy: - built-0.5.1.crate (Root Library) - git2-0.13.25.crate - libgit2-sys-0.12.26+1.3.0.crate - :x: **libz-sys-1.1.8.crate** (Vulnerable Library)

libgit2-sys-0.12.26+1.3.0.crate

Native bindings to the libgit2 library

Library home page: https://crates.io/api/v1/crates/libgit2-sys/0.12.26+1.3.0/download

Dependency Hierarchy: - built-0.5.1.crate (Root Library) - git2-0.13.25.crate - :x: **libgit2-sys-0.12.26+1.3.0.crate** (Vulnerable Library)

Found in HEAD commit: 0f5b2911035c371dfb8b2b98875a5b05ad53b7a4

Found in base branch: main

Vulnerability Details

zlib through 1.2.12 has a heap-based buffer over-read or buffer overflow in inflate in inflate.c via a large gzip header extra field. NOTE: only applications that call inflateGetHeader are affected. Some common applications bundle the affected zlib source code but may be unable to call inflateGetHeader (e.g., see the nodejs/node reference).

Publish Date: 2022-08-05

URL: CVE-2022-37434

CVSS 3 Score Details (9.8)

Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High

For more information on CVSS3 Scores, click here.

rholshausen commented 2 years ago

Updated deps in e77ec3f35678