Sending an HTTP request/response body with greater than 2^31 bytes triggers an infinite loop in proxygen::coro::HTTPQuicCoroSession which blocks the backing event loop and unconditionally appends data to a std::vector per-loop iteration. This issue leads to unbounded memory growth and eventually causes the process to run out of memory.
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Fri, 19 Dec 2025 18:15:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:facebook:proxygen:*:*:*:*:*:*:*:*

Wed, 03 Dec 2025 12:15:00 +0000

Type Values Removed Values Added
First Time appeared Facebook
Facebook proxygen
Vendors & Products Facebook
Facebook proxygen

Wed, 03 Dec 2025 01:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-834
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 02 Dec 2025 22:15:00 +0000

Type Values Removed Values Added
Description Sending an HTTP request/response body with greater than 2^31 bytes triggers an infinite loop in proxygen::coro::HTTPQuicCoroSession which blocks the backing event loop and unconditionally appends data to a std::vector per-loop iteration. This issue leads to unbounded memory growth and eventually causes the process to run out of memory.
References
Metrics cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: Meta

Published:

Updated: 2025-12-03T00:33:57.022Z

Reserved: 2025-08-08T18:21:47.119Z

Link: CVE-2025-55181

cve-icon Vulnrichment

Updated: 2025-12-03T00:33:53.658Z

cve-icon NVD

Status : Analyzed

Published: 2025-12-02T22:16:08.380

Modified: 2025-12-19T18:02:26.070

Link: CVE-2025-55181

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2025-12-03T12:09:57Z

Weaknesses