Hackney fails to properly release HTTP connections to the pool after handling 307 Temporary Redirect responses. Remote attackers can exploit this to exhaust connection pools, causing denial of service in applications using the library. Fix for this issue has been included in 1.24.0 release.
The product does not release a resource after its effective lifetime has ended, i.e., after the resource is no longer needed.
Link | Tags |
---|---|
https://github.com/benoitc/hackney/issues/717 | issue tracking |
https://cert.pl/en/posts/2025/05/CVE-2025-3864/ | third party advisory |