OESA-2026-1271

Source
https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2026-1271
Import Source
https://repo.openeuler.org/security/data/osv/OESA-2026-1271.json
JSON Data
https://api.test.osv.dev/v1/vulns/OESA-2026-1271
Upstream
Published
2026-01-30T12:28:30Z
Modified
2026-01-30T14:09:17.356198Z
Summary
runc security update
Details

runc is a CLI tool for spawning and running containers according to the OCI specification.

Security Fix(es):

A denial-of-service vulnerability exists in github.com/sirupsen/logrus when using Entry.Writer() to log a single-line payload larger than 64KB without newline characters. Due to limitations in the internal bufio.Scanner, the read fails with "token too long" and the writer pipe is closed, leaving Writer() unusable and causing application unavailability (DoS). This affects versions < 1.8.3, 1.9.0, and 1.9.2. The issue is fixed in 1.8.3, 1.9.1, and 1.9.3+, where the input is chunked and the writer continues to function even if an error is logged.(CVE-2025-65637)

Database specific
{
    "severity": "High"
}
References

Affected packages

openEuler:24.03-LTS-SP1 / runc

Package

Name
runc
Purl
pkg:rpm/openEuler/runc&distro=openEuler-24.03-LTS-SP1

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.1.8-29.oe2403sp1

Ecosystem specific

{
    "src": [
        "runc-1.1.8-29.oe2403sp1.src.rpm"
    ],
    "x86_64": [
        "runc-1.1.8-29.oe2403sp1.x86_64.rpm"
    ],
    "aarch64": [
        "runc-1.1.8-29.oe2403sp1.aarch64.rpm"
    ]
}

Database specific

source

"https://repo.openeuler.org/security/data/osv/OESA-2026-1271.json"