CVE-2025-12970
BaseFortify
Publication date: 2025-11-24
Last updated on: 2025-11-28
Assigner: CERT/CC
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| treasuredata | fluent_bit | 4.1.0 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-120 | The product copies an input buffer to an output buffer without verifying that the size of the input buffer is less than the size of the output buffer. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
The vulnerability exists in the extract_name function of the Fluent Bit in_docker input plugin. This function copies container names into a fixed size stack buffer without checking the length of the container name. An attacker who can create containers or control container names can supply a name that is too long, causing a buffer overflow. This overflow can lead to the process crashing or even allow the attacker to execute arbitrary code.
How can this vulnerability impact me? :
This vulnerability can impact you by causing the Fluent Bit process to crash, which may disrupt logging and telemetry data collection. More severely, it could allow an attacker to execute arbitrary code on the system running Fluent Bit, potentially leading to unauthorized access, data compromise, or further system exploitation.