This advisory has been withdrawn because it is a duplicate of GHSA-r4pg-vg54-wxx4. This link is maintained to preserve external references.
A flaw was found in the cert-manager package. This flaw allows an attacker who can modify PEM data that the cert-manager reads, for example, in a Secret resource, to use large amounts of CPU in the cert-manager controller pod to effectively create a denial-of-service (DoS) vector for the cert-manager in the cluster.
{
"nvd_published_at": "2024-12-12T09:15:05Z",
"cwe_ids": [
"CWE-20"
],
"github_reviewed_at": "2024-12-12T19:19:49Z",
"severity": "MODERATE",
"github_reviewed": true
}