DEBIAN-CVE-2025-6176

Source
https://security-tracker.debian.org/tracker/CVE-2025-6176
Import Source
https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2025-6176.json
JSON Data
https://api.osv.dev/v1/vulns/DEBIAN-CVE-2025-6176
Upstream
  • CVE-2025-6176
Published
2025-10-31T00:15:37.333Z
Modified
2025-11-20T14:28:52.953038Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
[none]
Details

Scrapy versions up to 2.13.2 are vulnerable to a denial of service (DoS) attack due to a flaw in its brotli decompression implementation. The protection mechanism against decompression bombs fails to mitigate the brotli variant, allowing remote servers to crash clients with less than 80GB of available memory. This occurs because brotli can achieve extremely high compression ratios for zero-filled data, leading to excessive memory consumption during decompression.

References

Affected packages

Debian:11 / python-scrapy

Package

Name
python-scrapy
Purl
pkg:deb/debian/python-scrapy?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

2.*
2.4.1-2
2.4.1-2+deb11u1
2.5.0-1~exp1
2.5.0-1
2.5.0-2
2.5.1-1
2.5.1-2
2.6.1-1
2.6.2-1
2.7.0-1
2.7.1-1
2.8.0-1
2.8.0-2
2.9.0-1~exp1
2.9.0-1
2.9.0-2
2.10.0-1
2.11.0-1
2.11.0-2
2.11.1-1
2.11.1-2
2.11.2-1
2.11.2-2
2.11.2-3
2.12.0-1
2.12.0-2
2.13.1-1~exp1
2.13.3-1~exp1
2.13.3-1
2.13.4-1

Ecosystem specific

{
    "urgency": "unimportant"
}

Database specific

source
"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2025-6176.json"

Debian:12 / python-scrapy

Package

Name
python-scrapy
Purl
pkg:deb/debian/python-scrapy?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

2.*
2.8.0-2
2.9.0-1~exp1
2.9.0-1
2.9.0-2
2.10.0-1
2.11.0-1
2.11.0-2
2.11.1-1
2.11.1-2
2.11.2-1
2.11.2-2
2.11.2-3
2.12.0-1
2.12.0-2
2.13.1-1~exp1
2.13.3-1~exp1
2.13.3-1
2.13.4-1

Ecosystem specific

{
    "urgency": "unimportant"
}

Database specific

source
"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2025-6176.json"

Debian:13 / python-scrapy

Package

Name
python-scrapy
Purl
pkg:deb/debian/python-scrapy?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

2.*
2.12.0-2
2.13.1-1~exp1
2.13.3-1~exp1
2.13.3-1
2.13.4-1

Ecosystem specific

{
    "urgency": "unimportant"
}

Database specific

source
"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2025-6176.json"

Debian:14 / python-scrapy

Package

Name
python-scrapy
Purl
pkg:deb/debian/python-scrapy?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.13.4-1

Affected versions

2.*
2.12.0-2
2.13.1-1~exp1
2.13.3-1~exp1
2.13.3-1

Ecosystem specific

{
    "urgency": "unimportant"
}

Database specific

source
"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2025-6176.json"