OESA-2026-2309

Source
https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2026-2309
Import Source
https://repo.openeuler.org/security/data/osv/OESA-2026-2309.json
JSON Data
https://api.osv.dev/v1/vulns/OESA-2026-2309
Upstream
Published
2026-05-15T14:00:27Z
Modified
2026-05-15T14:15:10.904083Z
Summary
kata-containers-go security update
Details

This is core component of Kata Container, to make it work, you need a isulad/docker engine.

Security Fix(es):

A denial-of-service vulnerability exists in github.com/sirupsen/logrus when using Entry.Writer() to log a single-line payload larger than 64KB without newline characters. Due to limitations in the internal bufio.Scanner, the read fails with "token too long" and the writer pipe is closed, leaving Writer() unusable and causing application unavailability (DoS). This affects versions < 1.8.3, 1.9.0, and 1.9.2. The issue is fixed in 1.8.3, 1.9.1, and 1.9.3+, where the input is chunked and the writer continues to function even if an error is logged.(CVE-2025-65637)

Database specific
{
    "severity": "High"
}
References

Affected packages

openEuler:24.03-LTS-SP3 / kata-containers-go

Package

Name
kata-containers-go
Purl
pkg:rpm/openEuler/kata-containers-go&distro=openEuler-24.03-LTS-SP3

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.11.1-33.oe2403sp3

Ecosystem specific

{
    "aarch64": [
        "kata-containers-go-1.11.1-33.oe2403sp3.aarch64.rpm"
    ],
    "src": [
        "kata-containers-go-1.11.1-33.oe2403sp3.src.rpm"
    ],
    "x86_64": [
        "kata-containers-go-1.11.1-33.oe2403sp3.x86_64.rpm"
    ]
}

Database specific

source
"https://repo.openeuler.org/security/data/osv/OESA-2026-2309.json"