-
Notifications
You must be signed in to change notification settings - Fork 8.1k
Description
Before reporting an issue
- I have read and understood the above terms for submitting issues, and I understand that my issue may be closed without action if I do not follow them.
Area
dist/quarkus
Describe the bug
Package: io.quarkus:quarkus-rest
Installed Version: 3.30.5
Vulnerability CVE-2025-66560
Severity: MEDIUM
Fixed Version: 3.20.5, 3.27.2, 3.31.0
Link: CVE-2025-66560
Quarkus is a Cloud Native, (Linux) Container First framework for writing Java applications. Prior to versions 3.31.0, 3.27.2, and 3.20.5, a vulnerability exists in the HTTP layer of Quarkus REST related to response handling. When a response is being written, the framework waits for previously written response chunks to be fully transmitted before proceeding. If the client connection is dropped during this waiting period, the associated worker thread is never released and becomes permanently blocked. Under sustained or repeated occurrences, this can exhaust the available worker threads, leading to degraded performance, or complete unavailability of the application. This issue has been patched in versions 3.31.0, 3.27.2, and 3.20.5. A workaround involves implementing a health check that monitors the status and saturation of the worker thread pool to detect abnormal thread retention early.
Version
26.5.1
Regression
- The issue is a regression
Expected behavior
No CVE reported.
Actual behavior
CVE reported.
How to Reproduce?
Please check the scanner alerts.
Anything else?
This seems to be fixed in quarkus but not in the next 3.30.6 (or it was a mistake in the advisory, we need to investigate this).