silent crashes with ofbs4

Trying to run obfs4 bridge on Debian Trixie on 1GB Raspberry Pi, it regularly seems to crash silently after a few minutes to dozen hours. E.g.

 14:07:09 [NYX_NOTICE] Tor control port closed
 14:07:07 [NOTICE] Removed 528 bytes by killing 45 circuits; 0 circuits remain alive. Also killed 0 non-linked directory connections. Killed 0 edge connections
 14:07:07 [NOTICE] We're low on memory (cell queues total alloc: 528 buffer total alloc: 0, tor compress total alloc: 293257561 (zlib: 395520, zstd: 0, lzma: 292861977), rendezvous cache
   total alloc: 0). Killing circuits withover-long queues. (This behavior is controlled by MaxMemInQueues.)
 14:06:47 [WARN] Possible compression bomb; abandoning stream. [494 duplicates hidden]
 14:06:47 [WARN] Detected possible compression bomb with input size = 33341 and output size = 890274 [55 duplicates hidden]
 14:06:47 [WARN] Detected possible compression bomb with input size = 28865 and output size = 817344 [38 duplicates hidden]
 14:06:47 [WARN] Detected possible compression bomb with input size = 31845 and output size = 905279 [40 duplicates hidden]
 14:05:47 [WARN] Detected possible compression bomb with input size = 33313 and output size = 890274 [34 duplicates hidden]
 14:04:47 [WARN] Detected possible compression bomb with input size = 31859 and output size = 905279 [48 duplicates hidden]
 14:04:47 [WARN] Detected possible compression bomb with input size = 28885 and output size = 817344 [51 duplicates hidden]
 13:27:47 [WARN] Unable to decompress HTTP body (tried Zstandard compressed, on Directory connection (client reading) with 57.128.169.164:443). [178 similar message(s) suppressed in last 3660
   seconds]
 12:34:53 [WARN] Detected possible compression bomb with input size = 29256 and output size = 871523 [30 duplicates hidden]
 12:34:46 [WARN] Detected possible compression bomb with input size = 31480 and output size = 902775 [36 duplicates hidden]
 12:34:46 [WARN] Detected possible compression bomb with input size = 27762 and output size = 827924 [38 duplicates hidden]
 12:33:46 [WARN] Detected possible compression bomb with input size = 27526 and output size = 827924 [29 duplicates hidden]
 12:33:46 [WARN] Detected possible compression bomb with input size = 22323 and output size = 596032 [37 duplicates hidden]
 12:33:46 [WARN] Detected possible compression bomb with input size = 31518 and output size = 902775 [31 duplicates hidden]
 12:27:46 [WARN] Unable to decompress HTTP body (tried Zstandard compressed, on Directory connection (client reading) with 212.227.85.103:443). [179 similar message(s) suppressed in last 3600
   seconds]
 12:26:44 [NOTICE] Heartbeat: Since last heartbeat message, I have seen 5 unique clients.
 12:26:44 [NOTICE] While not bootstrapping, fetched this many bytes: 7581018 (server descriptor fetch); 367 (server descriptor upload); 306322 (consensus network-status fetch); 45770599
   (microdescriptor fetch)
 12:26:44 [NOTICE] While bootstrapping, fetched this many bytes: 23281 (consensus network-status fetch)
 12:26:44 [NOTICE] Heartbeat: Tor's uptime is 6:00 hours, with 2 circuits open. I've sent 10.11 MB and received 57.99 MB. I've received 5 connections on IPv4 and 0 on IPv6. I've made 14
   connections with IPv4 and 0 with IPv6.
 11:27:46 [WARN] Unable to decompress HTTP body (tried Zstandard compressed, on Directory connection (client reading) with 212.227.85.103:443). [178 similar message(s) suppressed in last 3600
   seconds]
 11:25:47 [WARN] Detected possible compression bomb with input size = 26425 and output size = 764288
 11:25:47 [WARN] Detected possible compression bomb with input size = 22776 and output size = 617392
 11:24:54 [WARN] Detected possible compression bomb with input size = 28925 and output size = 801152
 11:24:53 [WARN] Detected possible compression bomb with input size = 23684 and output size = 715680 [2 duplicates hidden]
 11:24:46 [WARN] Detected possible compression bomb with input size = 47580 and output size = 1375110 [2 duplicates hidden]
 11:23:46 [WARN] Detected possible compression bomb with input size = 47567 and output size = 1375110 [1 duplicate hidden]
 11:23:46 [WARN] Detected possible compression bomb with input size = 28934 and output size = 799664 [3 duplicates hidden]
 11:21:46 [WARN] Detected possible compression bomb with input size = 23680 and output size = 714240
ii  obfs4proxy                      0.0.14-2+b5                          arm64        pluggable transport proxy for Tor, implementing obfs4
ii  tor                             0.4.8.16-1                           arm64        anonymizing overlay network for TCP

there are no messages in dmesg(8) either (so no kernel OOM).