First published: Thu Mar 20 2025(Updated: )
A trusted client with long-lived JWT tokens can cause memory exhaustion in Keycloak due to unbounded token caching.
Affected Software | Affected Version | How to fix |
---|---|---|
Keycloak |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-2353868 is critical due to its potential to cause memory exhaustion.
To fix REDHAT-BUG-2353868, configure Keycloak to limit the lifetime of JWT tokens or manage token caching strategies.
REDHAT-BUG-2353868 affects Red Hat Keycloak, particularly in regards to its handling of long-lived JWT tokens.
The cause of the issue in REDHAT-BUG-2353868 is unbounded token caching leading to memory exhaustion.
Yes, you can prevent REDHAT-BUG-2353868 by implementing proper token expiry settings and limiting the number of cached tokens.