Description
A flaw was found in the quarkus-resteasy extension, which causes memory leaks when client requests with low timeouts are made. If a client request times out, a buffer is not released correctly, leading to increased memory usage and eventual application crash due to OutOfMemoryError.
Published: 2025-02-26
Score: 7.5 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

Vendor Workaround

Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-5294 A flaw was found in the quarkus-resteasy extension, which causes memory leaks when client requests with low timeouts are made. If a client request times out, a buffer is not released correctly, leading to increased memory usage and eventual application crash due to OutOfMemoryError.
Github GHSA Github GHSA GHSA-4fwr-mh5q-hchh io.quarkus:quarkus-resteasy: Memory Leak in Quarkus RESTEasy Classic When Client Requests Timeout
History

Mon, 20 Apr 2026 19:15:00 +0000


Wed, 17 Dec 2025 14:45:00 +0000

Type Values Removed Values Added
CPEs cpe:/a:redhat:amq_streams:3 cpe:/a:redhat:amq_streams:3.1::el9
References

Thu, 11 Dec 2025 07:15:00 +0000

Type Values Removed Values Added
CPEs cpe:/a:redhat:amq_streams:3

Fri, 01 Aug 2025 19:15:00 +0000

Type Values Removed Values Added
CPEs cpe:/a:redhat:amq_streams:3.0::el9
References

Mon, 30 Jun 2025 14:15:00 +0000

Type Values Removed Values Added
First Time appeared Redhat amq Streams
CPEs cpe:/a:redhat:amq_streams:2.9::el9
Vendors & Products Redhat amq Streams
References

Tue, 04 Mar 2025 03:45:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 03 Mar 2025 13:30:00 +0000

Type Values Removed Values Added
CPEs cpe:/a:redhat:camel_quarkus:3 cpe:/a:redhat:camel_quarkus:3.15
References

Thu, 27 Feb 2025 15:30:00 +0000

Type Values Removed Values Added
CPEs cpe:/a:redhat:quarkus:3.8::el8
References

Thu, 27 Feb 2025 14:15:00 +0000

Type Values Removed Values Added
CPEs cpe:/a:redhat:quarkus:3 cpe:/a:redhat:quarkus:3.15::el8
References

Wed, 26 Feb 2025 17:15:00 +0000

Type Values Removed Values Added
Description No description is available for this CVE. A flaw was found in the quarkus-resteasy extension, which causes memory leaks when client requests with low timeouts are made. If a client request times out, a buffer is not released correctly, leading to increased memory usage and eventual application crash due to OutOfMemoryError.
Title io.quarkus:quarkus-resteasy: Memory Leak in Quarkus RESTEasy Classic When Client Requests Timeout Io.quarkus:quarkus-resteasy: memory leak in quarkus resteasy classic when client requests timeout
First Time appeared Redhat
Redhat camel Quarkus
Redhat quarkus
CPEs cpe:/a:redhat:camel_quarkus:3
cpe:/a:redhat:quarkus:3
Vendors & Products Redhat
Redhat camel Quarkus
Redhat quarkus
References

Tue, 25 Feb 2025 01:45:00 +0000

Type Values Removed Values Added
Description No description is available for this CVE.
Title io.quarkus:quarkus-resteasy: Memory Leak in Quarkus RESTEasy Classic When Client Requests Timeout
Weaknesses CWE-401
References
Metrics threat_severity

None

cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}

threat_severity

Important


Subscriptions

Redhat Amq Streams Camel Quarkus Quarkus
cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2026-04-20T18:50:51.922Z

Reserved: 2025-02-24T14:23:22.369Z

Link: CVE-2025-1634

cve-icon Vulnrichment

Updated: 2025-02-26T17:25:42.771Z

cve-icon NVD

Status : Deferred

Published: 2025-02-26T17:15:22.083

Modified: 2026-04-20T19:16:08.277

Link: CVE-2025-1634

cve-icon Redhat

Severity : Important

Publid Date: 2025-02-24T00:00:00Z

Links: CVE-2025-1634 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses