First published: Thu Feb 27 2025(Updated: )
This release of Red Hat build of Quarkus 3.8.6.SP3 contains security updates. For more information, see the release notes<br>page listed in the References section.<br>Security Fix(es):<br><li> io.netty/netty-handler: SslHandler doesn't correctly validate packets, which can lead to a native crash when using native SSLEngine (CVE-2025-24970)</li> <li> io.quarkus/quarkus-rest: Quarkus REST Endpoint Request Parameter Leakage Due to Shared Instance (CVE-2025-1247)</li> <li> io.quarkus:quarkus-resteasy: Memory Leak in Quarkus RESTEasy Classic When Client Requests Timeout (CVE-2025-1634)</li>
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Quarkus RESTEasy |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2025:1884 is classified as important due to security vulnerabilities in the affected software.
To fix RHSA-2025:1884, you should update your Red Hat Quarkus installation to the latest version provided in the advisory.
RHSA-2025:1884 addresses a vulnerability in io.netty/netty-handler where SslHandler does not correctly validate packets.
RHSA-2025:1884 affects all versions of Red Hat Quarkus that include the vulnerable io.netty/netty-handler package.
RHSA-2025:1884 is part of ongoing security improvements and updates within Red Hat's ecosystem, specifically targeting vulnerabilities in Quarkus.