SB2026021249 - Multiple vulnerabilities in IBM Enterprise Build of Quarkus 



SB2026021249 - Multiple vulnerabilities in IBM Enterprise Build of Quarkus

Published: February 12, 2026

Security Bulletin ID SB2026021249
Severity
Medium
Patch available
YES
Number of vulnerabilities 4
Exploitation vector Remote access
Highest impact Denial of service

Breakdown by Severity

Medium 75% Low 25%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 4 secuirty vulnerabilities.


1) Missing Release of Resource after Effective Lifetime (CVE-ID: CVE-2025-14969)

The vulnerability allows a remote user to perform a denial of service (DoS) attack.

The vulnerability exists due to a remote client can prematurely close the HTTP connection, when an HTTP endpoint is exposed to perform database operations. A remote user can leak connections from the database connection pool, potentially causing a Denial of Service (DoS) by exhausting available database connections.


2) Information Exposure Through Timing Discrepancy (CVE-ID: CVE-2025-59432)

The vulnerability allows a remote attacker to gain access to sensitive information.

The vulnerability exist due to timing discrepancy when using Arrays.equals to compare secret values such as client proofs and server signatures. A remote attacker can perform a timing side-channel attack and gain access to sensitive information. 


3) Resource management error (CVE-ID: CVE-2025-66560)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to improper management of internal resources within the application. When a response is being written, the framework waits for previously written response chunks to be fully transmitted before proceeding. If the client connection is dropped during this waiting period, the associated worker thread is never released and becomes permanently blocked.  A remote attacker can initiate multiple requests to the server and keep dropping the connections exhausting the available worker threads.


4) CRLF injection (CVE-ID: CVE-2025-67735)

The vulnerability allows a remote attacker to inject arbitrary data in server response.

The vulnerability exists due to insufficient validation of attacker-supplied data in io.netty.handler.codec.http.HttpRequestEncoder. A remote attacker can pass specially crafted data to the application containing CR-LF characters and modify application behavior.


Remediation

Install update from vendor's website.