Scrapy versions up to 2.13.2 are vulnerable to a denial of service (DoS) attack due to a flaw in its brotli decompression implementation. The protection mechanism against decompression bombs fails to mitigate the brotli variant, allowing remote servers to crash clients with less than 80GB of available memory. This occurs because brotli can achieve extremely high compression ratios for zero-filled data, leading to excessive memory consumption during decompression.
This issue has been addressed in the following products: Red Hat Enterprise Linux 10.0 Extended Update Support Via RHSA-2026:0008 https://access.redhat.com/errata/RHSA-2026:0008
This issue has been addressed in the following products: Red Hat Enterprise Linux 10 Via RHSA-2026:0845 https://access.redhat.com/errata/RHSA-2026:0845
This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2026:2042 https://access.redhat.com/errata/RHSA-2026:2042
This issue has been addressed in the following products: Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions Via RHSA-2026:2226 https://access.redhat.com/errata/RHSA-2026:2226
This issue has been addressed in the following products: Red Hat Enterprise Linux 9.2 Update Services for SAP Solutions Via RHSA-2026:2228 https://access.redhat.com/errata/RHSA-2026:2228
This issue has been addressed in the following products: Red Hat Enterprise Linux 9.6 Extended Update Support Via RHSA-2026:2229 https://access.redhat.com/errata/RHSA-2026:2229
This issue has been addressed in the following products: Red Hat Enterprise Linux 9.4 Extended Update Support Via RHSA-2026:2227 https://access.redhat.com/errata/RHSA-2026:2227