Scrapy versions up to 2.13.2 are vulnerable to a denial of service (DoS) attack due to a flaw in its brotli decompression implementation. The protection mechanism against decompression bombs fails to mitigate the brotli variant, allowing remote servers to crash clients with less than 80GB of available memory. This occurs because brotli can achieve extremely high compression ratios for zero-filled data, leading to excessive memory consumption during decompression.
This issue has been addressed in the following products: Red Hat Enterprise Linux 10.0 Extended Update Support Via RHSA-2026:0008 https://access.redhat.com/errata/RHSA-2026:0008
This issue has been addressed in the following products: Red Hat Enterprise Linux 10 Via RHSA-2026:0845 https://access.redhat.com/errata/RHSA-2026:0845
This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2026:2042 https://access.redhat.com/errata/RHSA-2026:2042
This issue has been addressed in the following products: Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions Via RHSA-2026:2226 https://access.redhat.com/errata/RHSA-2026:2226
This issue has been addressed in the following products: Red Hat Enterprise Linux 9.2 Update Services for SAP Solutions Via RHSA-2026:2228 https://access.redhat.com/errata/RHSA-2026:2228
This issue has been addressed in the following products: Red Hat Enterprise Linux 9.6 Extended Update Support Via RHSA-2026:2229 https://access.redhat.com/errata/RHSA-2026:2229
This issue has been addressed in the following products: Red Hat Enterprise Linux 9.4 Extended Update Support Via RHSA-2026:2227 https://access.redhat.com/errata/RHSA-2026:2227
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2026:2389 https://access.redhat.com/errata/RHSA-2026:2389
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.2 Advanced Update Support Via RHSA-2026:2401 https://access.redhat.com/errata/RHSA-2026:2401
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support Red Hat Enterprise Linux 8.4 Extended Update Support Long-Life Add-On Via RHSA-2026:2399 https://access.redhat.com/errata/RHSA-2026:2399
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.8 Update Services for SAP Solutions Red Hat Enterprise Linux 8.8 Telecommunications Update Service Via RHSA-2026:2400 https://access.redhat.com/errata/RHSA-2026:2400
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions Red Hat Enterprise Linux 8.6 Telecommunications Update Service Via RHSA-2026:2455 https://access.redhat.com/errata/RHSA-2026:2455
This issue has been addressed in the following products: Red Hat OpenShift Container Platform 4.18 Via RHSA-2026:2976 https://access.redhat.com/errata/RHSA-2026:2976
This issue has been addressed in the following products: Red Hat OpenShift Container Platform 4.14 Via RHSA-2026:2974 https://access.redhat.com/errata/RHSA-2026:2974
This issue has been addressed in the following products: Red Hat OpenShift Container Platform 4.17 Via RHSA-2026:3417 https://access.redhat.com/errata/RHSA-2026:3417
This issue has been addressed in the following products: Red Hat OpenShift Container Platform 4.19 Via RHSA-2026:3392 https://access.redhat.com/errata/RHSA-2026:3392
This issue has been addressed in the following products: Red Hat OpenShift Container Platform 4.13 Via RHSA-2026:3415 https://access.redhat.com/errata/RHSA-2026:3415
This issue has been addressed in the following products: Red Hat OpenShift Container Platform 4.12 Via RHSA-2026:3861 https://access.redhat.com/errata/RHSA-2026:3861
This issue has been addressed in the following products: Red Hat OpenShift Container Platform 4.15 Via RHSA-2026:4419 https://access.redhat.com/errata/RHSA-2026:4419
This issue has been addressed in the following products: Red Hat OpenShift Container Platform 4.16 Via RHSA-2026:4465 https://access.redhat.com/errata/RHSA-2026:4465
This issue has been addressed in the following products: Red Hat Satellite 6.17 for RHEL 9 Via RHSA-2026:5970 https://access.redhat.com/errata/RHSA-2026:5970
This issue has been addressed in the following products: Red Hat Satellite 6.16 for RHEL 8 Red Hat Satellite 6.16 for RHEL 9 Via RHSA-2026:5971 https://access.redhat.com/errata/RHSA-2026:5971