A flaw was found in Keycloak in OAuth 2.0 Pushed Authorization Requests (PAR). Client-provided parameters were found to be included in plain text in the KC_RESTART cookie returned by the authorization server's HTTP response to a `request_uri` authorization request, possibly leading to an information disclosure vulnerability.
https://bugzilla.redhat.com/show_bug.cgi?id=2279303
https://access.redhat.com/security/cve/CVE-2024-4540
https://access.redhat.com/errata/RHSA-2024:3576
https://access.redhat.com/errata/RHSA-2024:3575
https://access.redhat.com/errata/RHSA-2024:3574
https://access.redhat.com/errata/RHSA-2024:3573
https://access.redhat.com/errata/RHSA-2024:3572
https://access.redhat.com/errata/RHSA-2024:3570
https://access.redhat.com/errata/RHSA-2024:3568