Fix for this issue has been included in 1.24.0 release.
No analysis available yet.
No remediation available yet.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-16328 | Hackney fails to properly release HTTP connections to the pool |
Github GHSA |
GHSA-9fm9-hp7p-53mf | Hackney fails to properly release HTTP connections to the pool |
Mon, 26 Jan 2026 12:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Wed, 28 May 2025 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 28 May 2025 11:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Hackney fails to properly release HTTP connections to the pool after handling 307 Temporary Redirect responses. Remote attackers can exploit this to exhaust connection pools, causing denial of service in applications using the library. Fix for this issue has been included in 1.24.0 release. | |
| Title | Connection pool exhaustion in hackney | |
| Weaknesses | CWE-772 | |
| References |
| |
| Metrics |
cvssV4_0
|
Subscriptions
No data.
Status: PUBLISHED
Assigner: CERT-PL
Published:
Updated: 2026-01-26T12:13:02.411Z
Reserved: 2025-04-22T08:43:49.641Z
Link: CVE-2025-3864
Updated: 2025-05-28T13:17:51.796Z
Status : Deferred
Published: 2025-05-28T12:15:19.760
Modified: 2026-04-15T00:35:42.020
Link: CVE-2025-3864
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA