Total vulnerabilities in the database
An unconstrained memory consumption vulnerability was discovered in Keycloak. It can be triggered in environments which have millions of offline tokens (> 500,000 users with each having at least 2 saved sessions). If an attacker creates two or more user sessions and then open the "consents" tab of the admin User Interface, the UI attempts to load a huge number of offline client sessions leading to excessive memory and CPU consumption which could potentially crash the entire system.
Software | From | Fixed in |
---|---|---|
![]() |
- | 21.0.0 |
redhat / keycloak | - | 21.0.0 |
redhat / single_sign-on | 7.6 | 7.6.x |
redhat / openshift_container_platform | 4.11 | 4.11.x |
redhat / openshift_container_platform | 4.12 | 4.12.x |
redhat / openshift_container_platform_for_power | 4.9 | 4.9.x |
redhat / openshift_container_platform_for_power | 4.10 | 4.10.x |
redhat / openshift_container_platform_for_ibm_linuxone | 4.9 | 4.9.x |
redhat / openshift_container_platform_for_ibm_linuxone | 4.10 | 4.10.x |