CVE-2024-49869
Linux Kernel vulnerability analysis and mitigation

Overview

CVE-2024-49869 affects the Linux kernel's btrfs send functionality. The vulnerability was discovered in the buffer overflow detection mechanism when copying paths to cache entries. The issue stems from a mismatch between the array length and the namelen field in the namecacheentry structure, where the array length includes a NUL terminator while namelen does not, causing false positive buffer overflow detections in fortified kernels (NVD).

Technical details

The vulnerability was introduced by commit c0247d289e73 which annotated the variable length array 'name' with _countedby() to improve overflow detection. However, the implementation was incorrect as the length of the array includes the NUL string terminator while the name_len field does not account for it. This mismatch causes the fortified kernel to incorrectly detect and report buffer overflows. The issue affects Linux kernel versions from 6.11 up to (excluding) 6.11.3. The vulnerability has been assigned a CVSS v3.1 base score of 7.8 (HIGH) with vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H (NVD).

Impact

When triggered, the vulnerability causes the kernel to incorrectly detect buffer overflows and generate warning messages, potentially leading to system instability. The issue manifests as false positive detections that report buffer overflow conditions when copying path strings to cache entries in the btrfs send operation (Kernel Patch).

Mitigation and workarounds

The vulnerability has been fixed by removing the NUL string terminator storage since it's not required for name cache entries. The fix involves marking the 'name' array field with __nonstring and using memcpy() instead of strcpy(). Users should upgrade to Linux kernel version 6.11.3 or later which contains the fix (Kernel Patch).

Additional resources


SourceThis report was generated using AI

Related Linux Kernel vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-40343MEDIUM6.4
  • Linux KernelLinux Kernel
  • kernel-rt-modules-internal
NoYesDec 09, 2025
CVE-2025-40342MEDIUM6.4
  • Linux KernelLinux Kernel
  • kernel-debug-modules-extra
NoYesDec 09, 2025
CVE-2025-40341MEDIUM5.1
  • Linux KernelLinux Kernel
  • linux-nvidia-tegra
NoYesDec 09, 2025
CVE-2025-40345N/AN/A
  • Linux KernelLinux Kernel
  • kernel-headers
NoYesDec 12, 2025
CVE-2025-40344N/AN/A
  • Linux KernelLinux Kernel
  • linux-azure-6.14
NoYesDec 09, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management