More information about this security flaw is available in the following bug: https://bugzilla.redhat.com/show_bug.cgi?id=2358890 Disclaimer: Community trackers are created by Red Hat Product Security team on a best effort basis. Package maintainers are required to ascertain if the flaw indeed affects their package, before starting the update process.
We don't use crossbeam-channel: # rpm -q 389-ds-base 389-ds-base-3.1.3-3.fc42.x86_64 # rpm -q --provides 389-ds-base | grep crossbeam bundled(crate(crossbeam-epoch)) = 0.9.18 bundled(crate(crossbeam-queue)) = 0.3.12 bundled(crate(crossbeam-utils)) = 0.8.21 Closing as NOTABUG.