Duplicate Advisory: cert-manager ha a potential slowdown / DoS when parsing specially crafted PEM inputs
Moderate severity
GitHub Reviewed
Published
Dec 12, 2024
to the GitHub Advisory Database
•
Updated Dec 12, 2024
Withdrawn
This advisory was withdrawn on Dec 12, 2024
Package
Affected versions
< 1.12.14
>= 1.13.0-alpha.0, < 1.15.4
>= 1.16.0-alpha.0, < 1.16.2
Patched versions
1.12.14
1.15.4
1.16.2
Description
Published by the National Vulnerability Database
Dec 12, 2024
Published to the GitHub Advisory Database
Dec 12, 2024
Reviewed
Dec 12, 2024
Withdrawn
Dec 12, 2024
Last updated
Dec 12, 2024
Duplicate Advisory
This advisory has been withdrawn because it is a duplicate of GHSA-r4pg-vg54-wxx4. This link is maintained to preserve external references.
Original Description
A flaw was found in the cert-manager package. This flaw allows an attacker who can modify PEM data that the cert-manager reads, for example, in a Secret resource, to use large amounts of CPU in the cert-manager controller pod to effectively create a denial-of-service (DoS) vector for the cert-manager in the cluster.
References