Hackney fails to properly release HTTP connections to the pool after handling 307 Temporary Redirect responses. Remote attackers can exploit this to exhaust connection pools, causing denial of service in applications using the library.
Fix for this issue has been included in 1.24.0 release.
Metrics
Affected Vendors & Products
References
History
Wed, 28 May 2025 14:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Wed, 28 May 2025 11:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Hackney fails to properly release HTTP connections to the pool after handling 307 Temporary Redirect responses. Remote attackers can exploit this to exhaust connection pools, causing denial of service in applications using the library. Fix for this issue has been included in 1.24.0 release. | |
Title | Connection pool exhaustion in hackney | |
Weaknesses | CWE-772 | |
References |
| |
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: CERT-PL
Published: 2025-05-28T11:19:15.208Z
Updated: 2025-05-28T13:17:57.950Z
Reserved: 2025-04-22T08:43:49.641Z
Link: CVE-2025-3864

Updated: 2025-05-28T13:17:51.796Z

Status : Awaiting Analysis
Published: 2025-05-28T12:15:19.760
Modified: 2025-05-28T15:01:30.720
Link: CVE-2025-3864

No data.