The extract_name function in Fluent Bit in_docker input plugin copies container names into a fixed size stack buffer without validating length. An attacker who can create containers or control container names, can supply a long name that overflows the buffer, leading to process crash or arbitrary code execution.
References
Configurations
History
28 Nov 2025, 18:15
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
|
28 Nov 2025, 15:23
| Type | Values Removed | Values Added |
|---|---|---|
| CWE | CWE-120 | |
| First Time |
Treasuredata fluent Bit
Treasuredata |
|
| References | () https://fluentbit.io/announcements/v4.1.0/ - Release Notes | |
| CPE | cpe:2.3:a:treasuredata:fluent_bit:4.1.0:*:*:*:*:*:*:* |
24 Nov 2025, 17:16
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.8 |
24 Nov 2025, 15:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-11-24 15:15
Updated : 2025-11-28 18:15
NVD link : CVE-2025-12970
Mitre link : CVE-2025-12970
CVE.ORG link : CVE-2025-12970
JSON object : View
Products Affected
treasuredata
- fluent_bit
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
