We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-3864

Connection pool exhaustion in hackney



Description

Hackney fails to properly release HTTP connections to the pool after handling 307 Temporary Redirect responses. Remote attackers can exploit this to exhaust connection pools, causing denial of service in applications using the library. Fix for this issue has been included in 1.24.0 release.

Reserved 2025-04-22 | Published 2025-05-28 | Updated 2025-05-28 | Assigner CERT-PL


LOW: 2.3CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N

Problem types

CWE-772 Missing Release of Resource after Effective Lifetime

Product status

Default status
unknown

Any version before 1.24.0
affected

Credits

Michał Majchrowicz, Marcin Wyczechowski, and Paweł Zdunek — members of the AFINE Team finder

References

github.com/benoitc/hackney/issues/717 issue-tracking

cert.pl/en/posts/2025/05/CVE-2025-3864/ third-party-advisory

cve.org (CVE-2025-3864)

nvd.nist.gov (CVE-2025-3864)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-3864

Support options

Helpdesk Chat, Email, Knowledgebase