A denial-of-service vulnerability exists in github.com/sirupsen/logrus when using Entry.Writer() to log a single-line payload larger than 64KB without newline characters. Due to limitations in the internal bufio.Scanner, the read fails with "token too long" and the writer pipe is closed, leaving Writer() unusable and causing application unavailability (DoS). This affects versions < 1.8.3, 1.9.0, and 1.9.2. The issue is fixed in 1.8.3, 1.9.1, and 1.9.3+, where the input is chunked and the writer continues to function even if an error is logged.
History

Fri, 05 Dec 2025 11:00:00 +0000

Type Values Removed Values Added
First Time appeared Logrus Project
Logrus Project logrus
Vendors & Products Logrus Project
Logrus Project logrus

Thu, 04 Dec 2025 18:30:00 +0000

Type Values Removed Values Added
Description A denial-of-service vulnerability exists in github.com/sirupsen/logrus when using Entry.Writer() to log a single-line payload larger than 64KB without newline characters. Due to limitations in the internal bufio.Scanner, the read fails with "token too long" and the writer pipe is closed, leaving Writer() unusable and causing application unavailability (DoS). This affects versions < 1.8.3, 1.9.0, and 1.9.2. The issue is fixed in 1.8.3, 1.9.1, and 1.9.3+, where the input is chunked and the writer continues to function even if an error is logged.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2025-12-04T18:17:04.939Z

Reserved: 2025-11-18T00:00:00.000Z

Link: CVE-2025-65637

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2025-12-04T19:16:05.223

Modified: 2025-12-04T19:16:05.223

Link: CVE-2025-65637

cve-icon Redhat

No data.