The extract_name function in Fluent Bit in_docker input plugin copies container names into a fixed size stack buffer without validating length. An attacker who can create containers or control container names, can supply a long name that overflows the buffer, leading to process crash or arbitrary code execution.
Metrics
Affected Vendors & Products
References
| Link | Providers |
|---|---|
| https://fluentbit.io/announcements/v4.1.0/ |
|
History
Wed, 26 Nov 2025 11:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Fluentbit
Fluentbit fluent Bit |
|
| Vendors & Products |
Fluentbit
Fluentbit fluent Bit |
Mon, 24 Nov 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
Mon, 24 Nov 2025 14:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The extract_name function in Fluent Bit in_docker input plugin copies container names into a fixed size stack buffer without validating length. An attacker who can create containers or control container names, can supply a long name that overflows the buffer, leading to process crash or arbitrary code execution. | |
| Title | CVE-2025-12970 | |
| References |
|
Status: PUBLISHED
Assigner: certcc
Published: 2025-11-24T14:39:52.569Z
Updated: 2025-11-24T17:00:03.177Z
Reserved: 2025-11-10T17:54:00.525Z
Link: CVE-2025-12970
Updated: 2025-11-24T16:59:52.768Z
Status : Awaiting Analysis
Published: 2025-11-24T15:15:46.507
Modified: 2025-11-25T22:16:16.690
Link: CVE-2025-12970
No data.