This vulnerability affects all currently maintained versions of the quarkus-resteasy extension. Applications exposing REST endpoints using this extension are susceptible to attacks where an adversary can intentionally cause client timeouts, leading to memory exhaustion and application failure. The issue has been addressed in a recent fix, and users are advised to update their dependencies accordingly.
This issue has been addressed in the following products: Red Hat build of Quarkus 3.15.3.SP1 Via RHSA-2025:1885 https://access.redhat.com/errata/RHSA-2025:1885
This issue has been addressed in the following products: Red Hat build of Quarkus 3.8.6.SP3 Via RHSA-2025:1884 https://access.redhat.com/errata/RHSA-2025:1884
This issue has been addressed in the following products: Red Hat Build of Apache Camel 4.8 for Quarkus 3.15 Via RHSA-2025:2067 https://access.redhat.com/errata/RHSA-2025:2067