curl < 7.84.0 supports "chained" HTTP compression algorithms, meaning that a serverresponse can be compressed multiple times and potentially with different algorithms. The number of acceptable "links" in this "decompression chain" was unbounded, allowing a malicious server to insert a virtually unlimited number of compression steps.The use of such a decompression chain could result in a "malloc bomb", makingcurl end up spending enormous amounts of allocated heap memory, or trying toand returning out of memory errors.
{
"license": "CC-BY-4.0",
"sources": [
{
"database_specific": {
"status": "Modified"
},
"modified": "2025-05-05T17:18:13.120Z",
"id": "CVE-2022-32206",
"published": "2022-07-07T13:15:08.340Z",
"imported": "2026-05-02T08:39:45.575Z",
"html_url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32206",
"url": "https://services.nvd.nist.gov/rest/json/cves/2.0?cveId=CVE-2022-32206"
}
]
}