Home

Description

Sending an HTTP request/response body with greater than 2^31 bytes triggers an infinite loop in proxygen::coro::HTTPQuicCoroSession which blocks the backing event loop and unconditionally appends data to a std::vector per-loop iteration. This issue leads to unbounded memory growth and eventually causes the process to run out of memory.

PUBLISHED Reserved 2025-08-08 | Published 2025-12-02 | Updated 2025-12-03 | Assigner Meta




MEDIUM: 5.3CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L

Problem types

Excessive Iteration (CWE-834)

Product status

Default status
unaffected

v2025.08.25.00 (semver)
affected

References

www.facebook.com/security/advisories/cve-2025-55181

github.com/...ommit/17689399ef99b7c3d3a8b2b768b1dba1a4b72f8f

cve.org (CVE-2025-55181)

nvd.nist.gov (CVE-2025-55181)