> Am 02.03.2026 um 12:38 schrieb Andreas Mohr via curl-users 
> <[email protected]>:
> 
> On Mon, Mar 02, 2026 at 09:53:34AM +0100, Daniel Stenberg via curl-users 
> wrote:
>> Would it make sense to have some kind of limit to the "explosion factor" ?
> 
> Ah, indeed, possibly.
> An "explosion factor" config state seems to be
> much more precision-related *) than
> a raw result file size config state.
> (since the actually hurting most relevant characteristic
> of a compression bomb is
> the *very abnormally* high explosion factor vs.
> its tiny origin data, and especially vs.
> plain "normal" decompression examples).
> 
> *)
> - quite reliably catches compression bombs
> - is more future-proof than
>  enacting some raw fixed file size limit (vs.
>  eternally growing capabilities of systems!)
> 
> 
> OTOH with an input file of
> say 1GB and explosion factor limit of
> only 100 **), one would still end up with
> a dangerously large 100GB file size...
> 
> **) which might be already too low for
> many legitimate decompression activities
> 
> So, do instead resort to
> a plain file-size-based limit after all?

Do not forget the various use cases where the output is piped somewhere or 
immediately consumed by a libcurl application. If one pipes a WebSocket 
connection to some event processing, a limit might do more harm than good.

Regards,
Stefan

> 
> Greetings
> 
> Andreas Mohr
> -- 
> Unsubscribe: https://lists.haxx.se/mailman/listinfo/curl-users
> Etiquette:   https://curl.se/mail/etiquette.html

-- 
Unsubscribe: https://lists.haxx.se/mailman/listinfo/curl-users
Etiquette:   https://curl.se/mail/etiquette.html

Reply via email to