CVE-2024-12401: Duplicate Advisory: cert-manager ha a potential slowdown / DoS when parsing specially crafted PEM inputs
Duplicate Advisory
This advisory has been withdrawn because it is a duplicate of GHSA-r4pg-vg54-wxx4. This link is maintained to preserve external references.
Original Description
A flaw was found in the cert-manager package. This flaw allows an attacker who can modify PEM data that the cert-manager reads, for example, in a Secret resource, to use large amounts of CPU in the cert-manager controller pod to effectively create a denial-of-service (DoS) vector for the cert-manager in the cluster.
References
- access.redhat.com/security/cve/CVE-2024-12401
- bugzilla.redhat.com/show_bug.cgi?id=2327929
- github.com/advisories/GHSA-ghw8-3xqw-hhcj
- github.com/cert-manager/cert-manager
- github.com/cert-manager/cert-manager/pull/7400
- github.com/cert-manager/cert-manager/pull/7401
- github.com/cert-manager/cert-manager/pull/7402
- github.com/cert-manager/cert-manager/pull/7403
- github.com/cert-manager/cert-manager/security/advisories/GHSA-r4pg-vg54-wxx4
- go.dev/issue/50116
- nvd.nist.gov/vuln/detail/CVE-2024-12401
Detect and mitigate CVE-2024-12401 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →