First published: Thu Feb 27 2025(Updated: )
This release of Red Hat Build of Quarkus 3.15.3.SP1 includes security updates.<br>For more information, see the release notes page listed in the References section.<br>Security Fix(es):<br><li> io.netty/netty-handler: SslHandler doesn't correctly validate packets, which can lead to a native crash when using native SSLEngine (CVE-2025-24970)</li> <li> io.quarkus/quarkus-rest: Quarkus REST Endpoint Request Parameter Leakage Due to Shared Instance (CVE-2025-1247)</li> <li> io.quarkus:quarkus-resteasy: Memory Leak in Quarkus RESTEasy Classic When Client Requests Timeout (CVE-2025-1634)</li>
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Quarkus RESTEasy |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2025:1885 is classified as high due to the potential for compromised packet validation leading to security vulnerabilities.
To fix RHSA-2025:1885, update your Red Hat Build of Quarkus to version 3.15.3.SP1 or later.
RHSA-2025:1885 addresses a vulnerability in io.netty/netty-handler where SslHandler does not correctly validate packets.
RHSA-2025:1885 affects users of Red Hat Quarkus versions prior to the patched release.
RHSA-2025:1885 was released in response to security issues identified in Red Hat Quarkus on a specified date.