A vulnerability was found in the Keycloak-services package. If untrusted data is passed to the SearchQueryUtils method, it could lead to a denial of service (DoS) scenario by exhausting system resources due to a Regex complexity.
The product uses a regular expression with an inefficient, possibly exponential worst-case computational complexity that consumes excessive CPU cycles.
Link | Tags |
---|---|
https://access.redhat.com/errata/RHSA-2024:10175 | vendor advisory |
https://access.redhat.com/errata/RHSA-2024:10176 | vendor advisory |
https://access.redhat.com/errata/RHSA-2024:10177 | vendor advisory |
https://access.redhat.com/errata/RHSA-2024:10178 | vendor advisory |
https://access.redhat.com/security/cve/CVE-2024-10270 | vdb entry |
https://bugzilla.redhat.com/show_bug.cgi?id=2321214 | issue tracking |