An allocation of resources without limits or throttling vulnerability exists in curl <v7.88.0 based on the "chained" HTTP compression algorithms, meaning that a server response can be compressed multiple times and potentially with differentalgorithms. The number of acceptable "links" in this "decompression chain" wascapped, but the cap was implemented on a per-header basis allowing a maliciousserver to insert a virtually unlimited number of compression steps simply byusing many headers. The use of such a decompression chain could result in a "malloc bomb", making curl end up spending enormous amounts of allocated heap memory, or trying to and returning out of memory errors.
{
"license": "CC-BY-4.0",
"sources": [
{
"imported": "2026-05-02T08:39:46.650Z",
"url": "https://services.nvd.nist.gov/rest/json/cves/2.0?cveId=CVE-2023-23916",
"id": "CVE-2023-23916",
"database_specific": {
"status": "Modified"
},
"modified": "2025-03-12T19:15:36.367Z",
"published": "2023-02-23T20:15:13.777Z",
"html_url": "https://nvd.nist.gov/vuln/detail/CVE-2023-23916"
}
]
}