OESA-2026-1270

Source
https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2026-1270
Import Source
https://repo.openeuler.org/security/data/osv/OESA-2026-1270.json
JSON Data
https://api.test.osv.dev/v1/vulns/OESA-2026-1270
Upstream
Published
2026-01-30T12:28:29Z
Modified
2026-01-30T14:15:02.441629Z
Summary
runc security update
Details

runc is a CLI tool for spawning and running containers according to the OCI specification.

Security Fix(es):

A denial-of-service vulnerability exists in github.com/sirupsen/logrus when using Entry.Writer() to log a single-line payload larger than 64KB without newline characters. Due to limitations in the internal bufio.Scanner, the read fails with "token too long" and the writer pipe is closed, leaving Writer() unusable and causing application unavailability (DoS). This affects versions < 1.8.3, 1.9.0, and 1.9.2. The issue is fixed in 1.8.3, 1.9.1, and 1.9.3+, where the input is chunked and the writer continues to function even if an error is logged.(CVE-2025-65637)

Database specific
{
    "severity": "High"
}
References

Affected packages

openEuler:20.03-LTS-SP4 / runc

Package

Name
runc
Purl
pkg:rpm/openEuler/runc&distro=openEuler-20.03-LTS-SP4

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
docker-1.0.0.rc3-230.oe2003sp4

Ecosystem specific

{
    "x86_64": [
        "docker-runc-1.0.0.rc3-230.oe2003sp4.x86_64.rpm"
    ],
    "src": [
        "docker-runc-1.0.0.rc3-230.oe2003sp4.src.rpm"
    ],
    "aarch64": [
        "docker-runc-1.0.0.rc3-230.oe2003sp4.aarch64.rpm"
    ]
}

Database specific

source
"https://repo.openeuler.org/security/data/osv/OESA-2026-1270.json"