Sending an HTTP request/response body with greater than 2^31 bytes triggers an infinite loop in proxygen::coro::HTTPQuicCoroSession which blocks the backing event loop and unconditionally appends data to a std::vector per-loop iteration. This issue leads to unbounded memory growth and eventually causes the process to run out of memory.
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Wed, 03 Dec 2025 01:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-834
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 02 Dec 2025 22:15:00 +0000

Type Values Removed Values Added
Description Sending an HTTP request/response body with greater than 2^31 bytes triggers an infinite loop in proxygen::coro::HTTPQuicCoroSession which blocks the backing event loop and unconditionally appends data to a std::vector per-loop iteration. This issue leads to unbounded memory growth and eventually causes the process to run out of memory.
References
Metrics cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Meta

Published:

Updated: 2025-12-03T00:33:57.022Z

Reserved: 2025-08-08T18:21:47.119Z

Link: CVE-2025-55181

cve-icon Vulnrichment

Updated: 2025-12-03T00:33:53.658Z

cve-icon NVD

Status : Received

Published: 2025-12-02T22:16:08.380

Modified: 2025-12-03T01:15:47.877

Link: CVE-2025-55181

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.