A flaw was found in Keycloak in OAuth 2.0 Pushed Authorization Requests (PAR). Client-provided parameters were found to be included in plain text in the KC_RESTART cookie returned by the authorization server's HTTP response to a `request_uri` authorization request, possibly leading to an information disclosure vulnerability.
https://access.redhat.com/errata/RHSA-2024:3576
https://access.redhat.com/errata/RHSA-2024:3575
https://access.redhat.com/errata/RHSA-2024:3574
https://access.redhat.com/errata/RHSA-2024:3573
https://access.redhat.com/errata/RHSA-2024:3572
https://access.redhat.com/errata/RHSA-2024:3570
https://access.redhat.com/errata/RHSA-2024:3568
https://access.redhat.com/errata/RHSA-2024:3567
https://access.redhat.com/errata/RHSA-2024:3566