- Issued:
- 2024-11-21
- Updated:
- 2024-11-21
RHSA-2024:10175 - Security Advisory
Synopsis
Important: Red Hat build of Keycloak 24.0.9 Images Update
Type/Severity
Security Advisory: Important
Topic
New images with security impact Important are available for Red Hat build of Keycloak 24.0.9 and Red Hat build of Keycloak 24.0.9 Operator, running on OpenShift Container Platform.
Description
Red Hat build of Keycloak is an integrated sign-on solution, available as a Red Hat JBoss Middleware for OpenShift containerized image. The Red Hat build of Keycloak for OpenShift image provides an authentication server that you can use to log in centrally, log out, and register. You can also manage user accounts for web applications, mobile applications, and RESTful web services.
Red Hat build of Keycloak Operator for OpenShift simplifies deployment and management of Keycloak 24.0.9 clusters.
This erratum releases new images for Red Hat build of Keycloak 24.0.9 for use within the OpenShift Container Platform cloud computing Platform-as-a-Service (PaaS) for on-premise or private cloud deployments, aligning with the standalone product release.
Security fixes:
- Sensitive Data Exposure in Keycloak Build Process (CVE-2024-10451)
- Keycloak Denial of Service (CVE-2024-10270)
- Keycloak path trasversal (CVE-2024-10492)
- Keycloak proxy header handling Denial-of-Service (DoS) vulnerability (CVE-2024-9666)
- Keycloak TLS passthrough (CVE-2024-10039)
Solution
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
For details on how to apply this update, refer to:
Affected Products
- Red Hat build of Keycloak Text-only Advisories x86_64
Fixes
- BZ - 2317440 - CVE-2024-9666 org.keycloak/keycloak-quarkus-server: Keycloak proxy header handling Denial-of-Service (DoS) vulnerability
- BZ - 2319217 - CVE-2024-10039 keycloak-core: mTLS passthrough
- BZ - 2321214 - CVE-2024-10270 org.keycloak:keycloak-services: Keycloak Denial of Service
- BZ - 2322096 - CVE-2024-10451 org.keycloak:keycloak-quarkus-server: Sensitive Data Exposure in Keycloak Build Process
- BZ - 2322447 - CVE-2024-10492 keycloak-quarkus-server: Keycloak path trasversal
ppc64le
rhbk/keycloak-rhel9@sha256:0d281d30fa7f931cabd50b24c908c2b61c1fc527326626ad4fff548e47bfd577 |
rhbk/keycloak-rhel9-operator@sha256:446294f7b35b9e1a3ad908ceab53fabbd1b8dfa0535e6b9a7acebcd038a2507a |
s390x
rhbk/keycloak-rhel9@sha256:801d2ade5b61cadf0508f347881ae496e679725a6052653619044a63938b8184 |
rhbk/keycloak-rhel9-operator@sha256:b0259432bac5499e7ea08136ef8357851d1f5be64a3b5086cdf46bfaac9d50b0 |
x86_64
rhbk/keycloak-operator-bundle@sha256:b88294b9033853bf4874fe5f14757c217c7ab3901dfd6ded46b880fd9bd9543b |
rhbk/keycloak-rhel9@sha256:69f6df6ec90aca5d801c6724e5350700548d8903a4be3aef7a1bb95bbbbdb0c6 |
rhbk/keycloak-rhel9-operator@sha256:3c74dc71609ff709e4221145dbca43ea1fd973789d3b380a00402e7700d10b68 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.