GHSA-9fm9-hp7p-53mf

Suggest an improvement
Source
https://github.com/advisories/GHSA-9fm9-hp7p-53mf
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2025/05/GHSA-9fm9-hp7p-53mf/GHSA-9fm9-hp7p-53mf.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-9fm9-hp7p-53mf
Aliases
  • CVE-2025-3864
Published
2025-05-28T12:30:34Z
Modified
2025-05-28T16:57:21.071037Z
Severity
  • 2.3 (Low) CVSS_V4 - CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N CVSS Calculator
Summary
Hackney fails to properly release HTTP connections to the pool
Details

Hackney fails to properly release HTTP connections to the pool after handling 307 Temporary Redirect responses. Remote attackers can exploit this to exhaust connection pools, causing denial of service in applications using the library. Fix for this issue has been included in 1.24.0 release.

Database specific
{
    "nvd_published_at": "2025-05-28T12:15:19Z",
    "cwe_ids": [
        "CWE-772"
    ],
    "severity": "LOW",
    "github_reviewed": true,
    "github_reviewed_at": "2025-05-28T16:08:47Z"
}
References

Affected packages

Hex / hackney

Package

Name
hackney
Purl
pkg:hex/hackney

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.24.0