Vulnerability Description
A flaw was found in the cert-manager package. This flaw allows an attacker who can modify PEM data that the cert-manager reads, for example, in a Secret resource, to use large amounts of CPU in the cert-manager controller pod to effectively create a denial-of-service (DoS) vector for the cert-manager in the cluster.
CVSS Score
MEDIUM
Related Weaknesses (CWE)
References
- https://access.redhat.com/security/cve/CVE-2024-12401
- https://bugzilla.redhat.com/show_bug.cgi?id=2327929
- https://github.com/cert-manager/cert-manager/pull/7400
- https://github.com/cert-manager/cert-manager/pull/7401
- https://github.com/cert-manager/cert-manager/pull/7402
- https://github.com/cert-manager/cert-manager/pull/7403
- https://github.com/cert-manager/cert-manager/security/advisories/GHSA-r4pg-vg54-
- https://go.dev/issue/50116
FAQ
What is CVE-2024-12401?
CVE-2024-12401 is a vulnerability with a CVSS score of 4.4 (MEDIUM). A flaw was found in the cert-manager package. This flaw allows an attacker who can modify PEM data that the cert-manager reads, for example, in a Secret resource, to use large amounts of CPU in the ce...
How severe is CVE-2024-12401?
CVE-2024-12401 has been rated MEDIUM with a CVSS base score of 4.4/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-12401?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.