Closed github-actions[bot] closed 9 months ago
libgit is only pulled in as a transitive dependency of the built crate, which is a build time dependency of the operator. So the affected code is not included in the released artifacts and only run once at compile time, so the artifacts are not affected by this vulnerability.
libgit2-sys
0.15.2+1.6.4
>=0.16.2
The libgit2 project fixed three security issues in the 1.7.2 release. These issues are:
git_revparse_single
function can potentially enter an infinite loop on a well-crafted input, potentially causing a Denial of Service. This function is exposed in thegit2
crate via theRepository::revparse_single
method.git_index_add
function may cause heap corruption and possibly lead to arbitrary code execution. This function is exposed in thegit2
crate via theIndex::add
method.The
libgit2-sys
crate bundles libgit2, or optionally links to a system libgit2 library. In either case, versions of the libgit2 library less than 1.7.2 are vulnerable. The 0.16.2 release oflibgit2-sys
bundles the fixed version of 1.7.2, and requires a system libgit2 version of at least 1.7.2.It is recommended that all users upgrade.
See advisory page for additional details.