CVE-2025-55181
02.12.2025, 22:16
Sending an HTTP request/response body with greater than 2^31 bytes triggers an infinite loop in proxygen::coro::HTTPQuicCoroSession which blocks the backing event loop and unconditionally appends data to a std::vector per-loop iteration. This issue leads to unbounded memory growth and eventually causes the process to run out of memory.Enginsight
| Vendor | Product | Version |
|---|---|---|
| proxygen | 2025.08.25.00 ≤ 𝑥 ≤ 2025.12.01.00 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration