in reply to daniel:// stenberg://

For even as small as 500 bytes, I would argue that it qualifies as a potential Denial of Service issue, since this could still cause problems in a program which makes many connections, and is running on a container/microcontroller with only a small amount of memory allocated.

It probably wouldn't get a very high severity rating or anything but I'd argue that it at least qualifies for a score.

in reply to daniel:// stenberg://

strongly depends on your usecase. Many would say RCE is a security issue but not if your product is called lambda and you're AWS. On the other hand if you have curl embedded in a physical access system that fetches authorization via network and you only have a few kilobytes of RAM, then suddenly 1kB of RAM usage turns into a DoS. Similarly I'd consider my phone fairly secure but for a state actor it's easy to extract my pin (out of me). It all depends on your scenario.
in reply to daniel:// stenberg://

I see the audience is very split on “at even the smallest size” and “never”. This is a question I can’t really answer by poll, because (unlike a remote code execution flaw) whether a slow bleed of resources until the system falls over constitutes a security flaw is very use-case dependent. If a device is low-resource but important (embedded controllers), even a tiny leak left dripping can escalate to a security incident. But in a big web server that’s probably already restarting everything on a cron timer, it’s just a nuisance.
in reply to daniel:// stenberg://

@0xabad1dea agreed; the line must be drawn on security problems.

However, I'd argue that it's still needs to be fixed at some priority. Is it a security concern? Unless it's leaking sensitive data, nah. But long uptime ESP32's and similar could conceivably experience A Problem.

What Problem? <shrug!> Maybe they just stop showing the weather. Maybe somebody ignored the "NOT FOR LIFE CRITICAL" labels on everything. But not a security problem.

in reply to daniel:// stenberg://

Security use the CIA model, Confidentiality, Integrity and Availability. This is not a threat to either C or I, but Availability may be impacted over time, leading to a Denial of Service situation. Thus the size of the memory leak is not relevant, the precense is enough to call it a security problem.

Also, will the systems overall react correctly in a situation with limited resources?