The extract_name function in Fluent Bit in_docker input plugin copies container names into a fixed size stack buffer without validating length. An attacker who can create containers or control container names, can supply a long name that overflows the buffer, leading to process crash or arbitrary code execution.
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

References
History

Wed, 26 Nov 2025 11:15:00 +0000

Type Values Removed Values Added
First Time appeared Fluentbit
Fluentbit fluent Bit
Vendors & Products Fluentbit
Fluentbit fluent Bit

Mon, 24 Nov 2025 17:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 24 Nov 2025 14:45:00 +0000

Type Values Removed Values Added
Description The extract_name function in Fluent Bit in_docker input plugin copies container names into a fixed size stack buffer without validating length. An attacker who can create containers or control container names, can supply a long name that overflows the buffer, leading to process crash or arbitrary code execution.
Title CVE-2025-12970
References

cve-icon MITRE

Status: PUBLISHED

Assigner: certcc

Published:

Updated: 2025-11-24T17:00:03.177Z

Reserved: 2025-11-10T17:54:00.525Z

Link: CVE-2025-12970

cve-icon Vulnrichment

Updated: 2025-11-24T16:59:52.768Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-11-24T15:15:46.507

Modified: 2025-11-25T22:16:16.690

Link: CVE-2025-12970

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2025-11-26T11:11:10Z