More information about this security flaw is available in the following bug: https://bugzilla.redhat.com/show_bug.cgi?id=2333122 Disclaimer: Community trackers are created by Red Hat Product Security team on a best effort basis. Package maintainers are required to ascertain if the flaw indeed affects their package, before starting the update process.
Fedora 41 has cri-tools 1.29 (cri-tools-1.29.0-6.fc41). In addition F41 also has cri-tools1.29, cri-tools1.30, cri-tools1.31, and cri-tools1.32 rpms. Copied from https://bugzilla.redhat.com/show_bug.cgi?id=2333244 A scan by govulcheck (see https://github.com/golang/vuln) on cri-o v1.29 indicates that cri-o does not appear to be vulnerable. GO-2024-3333 is the Go vulnerability database analog to CVE-2024-45338. Full results: cri-o [ release-1.29][✘?] ❯ govulncheck --show verbose ./... Scanning your code and 1370 packages across 218 dependent modules for known vulnerabilities... Fetching vulnerabilities from the database... Checking the code against the vulnerabilities... === Symbol Results === No vulnerabilities found. === Package Results === Vulnerability #1: GO-2024-3333 Non-linear parsing of case-insensitive content in golang.org/x/net/html More info: https://pkg.go.dev/vuln/GO-2024-3333 Module: golang.org/x/net Found in: golang.org/x/net.0 Fixed in: golang.org/x/net.0 Vulnerability #2: GO-2024-3321 Misuse of ServerConfig.PublicKeyCallback may cause authorization bypass in golang.org/x/crypto More info: https://pkg.go.dev/vuln/GO-2024-3321 Module: golang.org/x/crypto Found in: golang.org/x/crypto.0 Fixed in: golang.org/x/crypto.0 === Module Results === No other vulnerabilities found. Your code is affected by 0 vulnerabilities. This scan also found 2 vulnerabilities in packages you import and 0 vulnerabilities in modules you require, but your code doesn't appear to call these vulnerabilities. cri-o [ release-1.29][✘?]