Vulnerability Description
A flaw was found in the quarkus-resteasy extension, which causes memory leaks when client requests with low timeouts are made. If a client request times out, a buffer is not released correctly, leading to increased memory usage and eventual application crash due to OutOfMemoryError.
CVSS Score
HIGH
Related Weaknesses (CWE)
References
- https://access.redhat.com/errata/RHSA-2025:12511
- https://access.redhat.com/errata/RHSA-2025:1884
- https://access.redhat.com/errata/RHSA-2025:1885
- https://access.redhat.com/errata/RHSA-2025:2067
- https://access.redhat.com/errata/RHSA-2025:23417
- https://access.redhat.com/errata/RHSA-2025:9922
- https://access.redhat.com/security/cve/CVE-2025-1634
- https://bugzilla.redhat.com/show_bug.cgi?id=2347319
- https://github.com/quarkusio/quarkus/issues/46412
- https://github.com/quarkusio/quarkus/pull/46419
FAQ
What is CVE-2025-1634?
CVE-2025-1634 is a vulnerability with a CVSS score of 7.5 (HIGH). A flaw was found in the quarkus-resteasy extension, which causes memory leaks when client requests with low timeouts are made. If a client request times out, a buffer is not released correctly, leadin...
How severe is CVE-2025-1634?
CVE-2025-1634 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-1634?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.