The vulnerability is an unbounded HTTP download in melange update-cache. The advisory mentions the vulnerable code is in pkg/renovate/cache/cache.go and the function io.Copy is used without size limits. The path in the advisory was slightly incorrect, the actual path is pkg/cache/cache.go. I was able to find the fixing commit by searching for commits that modify this file and introduce a size limit for downloads. The commit b6145148324a3557a95642a9973c7992813a9443 replaces io.Copy with io.CopyN in the fetch function in pkg/cache/cache.go. This function is responsible for downloading files. The lack of a size limit in the original implementation is the root cause of the vulnerability. Therefore, the fetch function is the vulnerable function.