- Issued:
- 2025-03-10
- Updated:
- 2025-03-10
RHSA-2025:2544 - Security Advisory
Synopsis
Moderate: Red Hat build of Keycloak 26.0.10 Images Update
Type/Severity
Security Advisory: Moderate
Topic
New images are available for Red Hat build of Keycloak 26.0.10 and Red Hat build of Keycloak 26.0.10 Operator, running on OpenShift Container Platform
Description
Red Hat build of Keycloak is an integrated sign-on solution, available as a Red Hat JBoss Middleware for OpenShift containerized image. The Red Hat build of Keycloak for OpenShift image provides an authentication server that you can use to log in centrally, log out, and register. You can also manage user accounts for web applications, mobile applications, and RESTful web services.
Red Hat build of Keycloak Operator for OpenShift simplifies deployment and management of Keycloak 26.0.10 clusters.
This erratum releases new images for Red Hat build of Keycloak 26.0.10 for use within the OpenShift Container Platform cloud computing Platform-as-a-Service (PaaS) for on-premise or private cloud deployments, aligning with the standalone product release.
Security fixes:
- Authentication Bypass Due to Missing LDAP Bind After Password Reset in Keycloak (CVE-2025-0604)
- Improper Authorization in Keycloak Organization Mapper Allows Unauthorized Organization Claims (CVE-2025-1391)
Solution
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
For details on how to apply this update, refer to:
Affected Products
- Red Hat build of Keycloak Text-only Advisories x86_64
Fixes
- BZ - 2338993 - CVE-2025-0604 keycloak-ldap-federation: Authentication Bypass Due to Missing LDAP Bind After Password Reset in Keycloak
- BZ - 2346082 - CVE-2025-1391 keycloak-services: Improper Authorization in Keycloak Organization Mapper Allows Unauthorized Organization Claims
ppc64le
rhbk/keycloak-rhel9@sha256:2cb3de99006ef0d9cf53955880c6eff3dbe5de5e7f9e6ddbb5e5b0bb828789ca |
rhbk/keycloak-rhel9-operator@sha256:2cf74d2886063637b9c0bf1fe5d97866b8dcac8aa5c00b064790b8133fef676b |
s390x
rhbk/keycloak-rhel9@sha256:835ced3d703edf1fa55d563e12049b30ef60f4450f0cc4af8e2ff53e34896657 |
rhbk/keycloak-rhel9-operator@sha256:ed9cad42ed11212bf7a8dc7d6afbcc52cd76082f87fae5c0f923dcc70fc1a444 |
x86_64
rhbk/keycloak-operator-bundle@sha256:d719dbf646d4c66e9fce35418a90bffc6ae4f40bdf7d7c306fb903f6f1bce14f |
rhbk/keycloak-rhel9@sha256:42cf4d4f9576ad1a3b54b10a9f022f9f7ded8f98804da66dad51625c8aa868aa |
rhbk/keycloak-rhel9-operator@sha256:73097189922c29afdbb6890ebc2b3e276ab6fbfe81bc0d74d0c5268783c1e806 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.