Bug 2333208
Summary: | CVE-2024-45338 cri-o:1.21/cri-o: Non-linear parsing of case-insensitive content in golang.org/x/net/html [epel-8] | ||
---|---|---|---|
Product: | [Fedora] Fedora EPEL | Reporter: | Avinash Hanwate <ahanwate> |
Component: | cri-o | Assignee: | Peter Hunt <pehunt> |
Status: | MODIFIED --- | QA Contact: | |
Severity: | high | Docs Contact: | |
Priority: | high | ||
Version: | epel8 | CC: | blaise, bradley.g.smith, cglombek, go-sig, jakubr, maxwell, pehunt, ryncsn, santiago |
Target Milestone: | --- | Keywords: | Security, SecurityTracking |
Target Release: | --- | ||
Hardware: | Unspecified | ||
OS: | Unspecified | ||
Whiteboard: | {"flaws": ["a4463782-1469-4be2-a943-3bbbf3a20606"]} | ||
Fixed In Version: | Doc Type: | No Doc Update | |
Doc Text: | Story Points: | --- | |
Clone Of: | Environment: | ||
Last Closed: | Type: | --- | |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | |||
Bug Blocks: | 2333122 |
Description
Avinash Hanwate
2024-12-19 07:44:01 UTC
I defer to Peter Hunt on this potential vulnerability as I do not know what use EPEL 8 has internally in RedHat. My analysis: A scan by govulcheck (see https://github.com/golang/vuln) on cri-o v1.21 indicates that cri-o does not appear to be vulnerable. GO-2024-3333 is the Go vulnerability database analog to CVE-2024-45338. Full results: cri-o [ release-1.21][✘?] ❯ govulncheck --show verbose ./... Scanning your code and 1370 packages across 218 dependent modules for known vulnerabilities... Fetching vulnerabilities from the database... Checking the code against the vulnerabilities... === Symbol Results === No vulnerabilities found. === Package Results === Vulnerability #1: GO-2024-3333 Non-linear parsing of case-insensitive content in golang.org/x/net/html More info: https://pkg.go.dev/vuln/GO-2024-3333 Module: golang.org/x/net Found in: golang.org/x/net.0 Fixed in: golang.org/x/net.0 Vulnerability #2: GO-2024-3321 Misuse of ServerConfig.PublicKeyCallback may cause authorization bypass in golang.org/x/crypto More info: https://pkg.go.dev/vuln/GO-2024-3321 Module: golang.org/x/crypto Found in: golang.org/x/crypto.0 Fixed in: golang.org/x/crypto.0 === Module Results === No other vulnerabilities found. Your code is affected by 0 vulnerabilities. This scan also found 2 vulnerabilities in packages you import and 0 vulnerabilities in modules you require, but your code doesn't appear to call these vulnerabilities. cri-o [ release-1.21][✘?] ❯ |