Description
A flaw was found in Keycloak. An unauthenticated remote attacker can trigger an application level Denial of Service (DoS) by sending a highly compressed SAMLRequest through the SAML Redirect Binding. The server fails to enforce size limits during DEFLATE decompression, leading to an OutOfMemoryError (OOM) and subsequent process termination. This vulnerability allows an attacker to disrupt the availability of the service.
Problem types
Improper Handling of Highly Compressed Data (Data Amplification)
Product status
26.4.10-1 (rpm) before *
26.4-12 (rpm) before *
26.4-12 (rpm) before *
Timeline
| 2026-02-16: | Reported to Red Hat. |
| 2026-02-16: | Made public. |
Credits
Red Hat would like to thank Sho Odagiri (GMO Cybersecurity by Ierae, Inc.) for reporting this issue.
References
access.redhat.com/errata/RHSA-2026:3947 (RHSA-2026:3947)
access.redhat.com/errata/RHSA-2026:3948 (RHSA-2026:3948)
access.redhat.com/security/cve/CVE-2026-2575
bugzilla.redhat.com/show_bug.cgi?id=2440149 (RHBZ#2440149)