Fix for this issue has been included in 1.24.0 release.
Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-16328 | Hackney fails to properly release HTTP connections to the pool |
Github GHSA |
GHSA-9fm9-hp7p-53mf | Hackney fails to properly release HTTP connections to the pool |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Wed, 28 May 2025 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 28 May 2025 11:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Hackney fails to properly release HTTP connections to the pool after handling 307 Temporary Redirect responses. Remote attackers can exploit this to exhaust connection pools, causing denial of service in applications using the library. Fix for this issue has been included in 1.24.0 release. | |
| Title | Connection pool exhaustion in hackney | |
| Weaknesses | CWE-772 | |
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: CERT-PL
Published:
Updated: 2025-05-28T13:17:57.950Z
Reserved: 2025-04-22T08:43:49.641Z
Link: CVE-2025-3864
Updated: 2025-05-28T13:17:51.796Z
Status : Awaiting Analysis
Published: 2025-05-28T12:15:19.760
Modified: 2025-05-28T15:01:30.720
Link: CVE-2025-3864
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA