Количество 4
Количество 4
CVE-2025-12970
The extract_name function in Fluent Bit in_docker input plugin copies container names into a fixed size stack buffer without validating length. An attacker who can create containers or control container names, can supply a long name that overflows the buffer, leading to process crash or arbitrary code execution.
CVE-2025-12970
CVE-2025-12970
GHSA-8rpx-2j25-w4rp
The extract_name function in Fluent Bit in_docker input plugin copies container names into a fixed size stack buffer without validating length. An attacker who can create containers or control container names, can supply a long name that overflows the buffer, leading to process crash or arbitrary code execution.
BDU:2025-15407
Уязвимость плагина in_docker функции extract_name инструмента для сбора и обработки логов Fluent Bit, позволяющая нарушителю вызвать отказ в обслуживании
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2025-12970 The extract_name function in Fluent Bit in_docker input plugin copies container names into a fixed size stack buffer without validating length. An attacker who can create containers or control container names, can supply a long name that overflows the buffer, leading to process crash or arbitrary code execution. | CVSS3: 8.8 | 0% Низкий | 3 месяца назад | |
CVE-2025-12970 CVE-2025-12970 | CVSS3: 8.8 | 0% Низкий | 2 месяца назад | |
GHSA-8rpx-2j25-w4rp The extract_name function in Fluent Bit in_docker input plugin copies container names into a fixed size stack buffer without validating length. An attacker who can create containers or control container names, can supply a long name that overflows the buffer, leading to process crash or arbitrary code execution. | CVSS3: 8.8 | 0% Низкий | 3 месяца назад | |
BDU:2025-15407 Уязвимость плагина in_docker функции extract_name инструмента для сбора и обработки логов Fluent Bit, позволяющая нарушителю вызвать отказ в обслуживании | CVSS3: 8.8 | 0% Низкий | 3 месяца назад |
Уязвимостей на страницу