First published: Thu Nov 21 2024(Updated: )
# Duplicate Advisory This advisory has been withdrawn because it is a duplicate of GHSA-r4pg-vg54-wxx4. This link is maintained to preserve external references. # Original Description A flaw was found in the cert-manager package. This flaw allows an attacker who can modify PEM data that the cert-manager reads, for example, in a Secret resource, to use large amounts of CPU in the cert-manager controller pod to effectively create a denial-of-service (DoS) vector for the cert-manager in the cluster.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
go/github.com/cert-manager/cert-manager | >=1.16.0-alpha.0<1.16.2 | 1.16.2 |
go/github.com/cert-manager/cert-manager | >=1.13.0-alpha.0<1.15.4 | 1.15.4 |
go/github.com/cert-manager/cert-manager | <1.12.14 | 1.12.14 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-12401 has been assessed as a moderate severity vulnerability.
To fix CVE-2024-12401, upgrade the cert-manager package to version 1.16.2, 1.15.4, or 1.12.14 depending on your existing version.
CVE-2024-12401 affects cert-manager versions between 1.16.0-alpha.0 and 1.16.2, 1.13.0-alpha.0 and 1.15.4, and versions up to but not including 1.12.14.
CVE-2024-12401 allows an attacker to modify PEM data, potentially leading to unauthorized access.
Yes, CVE-2024-12401 has been withdrawn as it is a duplicate of GHSA-r4pg-vg54-wxx4.