Source: brotli
Version: 1.1.0-2
Severity: important
Tags: security upstream
X-Debbugs-Cc: [email protected], Debian Security Team <[email protected]>
Control: affects -1 + python-scrapy 
Control: forwarded -1 https://github.com/google/brotli/pull/1234

Hi

The v1.2.0 release contains:

| python: added Decompressor::can_accept_more_data method and optional
| output_buffer_limit argument Decompressor::process;
| that allows mitigation of unexpectedly large output;

In fact to effectively mitigate the CVE-2025-6176 issue in
python-scrapy, bumping the version used by python-scrapy to at least
1.2.0 is required.

Details on the issue CVE-2025-6176 assigned for python-scrapy:
https://huntr.com/bounties/2c26a886-5984-47ee-a421-0d5fe1344eb0

Regards,
Salvatore

Reply via email to