Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Fri, 28 Nov 2025 18:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Fri, 28 Nov 2025 18:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Fri, 28 Nov 2025 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Treasuredata
Treasuredata fluent Bit |
|
| Weaknesses | CWE-120 | |
| CPEs | cpe:2.3:a:treasuredata:fluent_bit:4.1.0:*:*:*:*:*:*:* | |
| Vendors & Products |
Treasuredata
Treasuredata fluent Bit |
Wed, 26 Nov 2025 11:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Fluentbit
Fluentbit fluent Bit |
|
| Vendors & Products |
Fluentbit
Fluentbit fluent Bit |
Mon, 24 Nov 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
Mon, 24 Nov 2025 14:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The extract_name function in Fluent Bit in_docker input plugin copies container names into a fixed size stack buffer without validating length. An attacker who can create containers or control container names, can supply a long name that overflows the buffer, leading to process crash or arbitrary code execution. | |
| Title | CVE-2025-12970 | |
| References |
|
Status: PUBLISHED
Assigner: certcc
Published:
Updated: 2026-01-07T15:36:41.505Z
Reserved: 2025-11-10T17:54:00.525Z
Link: CVE-2025-12970
Updated: 2025-11-24T16:59:52.768Z
Status : Modified
Published: 2025-11-24T15:15:46.507
Modified: 2025-11-28T18:15:46.240
Link: CVE-2025-12970
No data.
OpenCVE Enrichment
Updated: 2025-11-26T11:11:10Z