CVE-2025-38382
btrfs: fix iteration of extrefs during log replay
CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th
In the Linux kernel, the following vulnerability has been resolved: btrfs: fix iteration of extrefs during log replay At __inode_add_ref() when processing extrefs, if we jump into the next label we have an undefined value of victim_name.len, since we haven't initialized it before we did the goto. This results in an invalid memory access in the next iteration of the loop since victim_name.len was not initialized to the length of the name of the current extref. Fix this by initializing victim_name.len with the current extref's name length.
| Vendor | linux |
| Product | linux |
| Ecosystems | |
| Industries | Technology |
| Published | Jul 25, 2025 |
| Last Updated | May 11, 2026 |
Stay Ahead of the Next One
Get instant alerts for linux linux
Be the first to know when new unknown vulnerabilities affecting linux linux are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
Affected Versions
Linux / Linux
1cf474cd474bc5d3ef63086ffd009a87a5b7bb2e < 539969fc472886a1d63565459514d47e27fef461 e43eec81c5167b655b72c781b0e75e62a05e415e < 2d11d274e2e1d7c79e2ca8461ce3ff3a95c11171 e43eec81c5167b655b72c781b0e75e62a05e415e < 7ac790dc2ba00499a8d671d4a24de4d4ad27e234 e43eec81c5167b655b72c781b0e75e62a05e415e < aee57a0293dca675637e5504709f9f8fd8e871be e43eec81c5167b655b72c781b0e75e62a05e415e < 54a7081ed168b72a8a2d6ef4ba3a1259705a2926
Linux / Linux
6.2
References
git.kernel.org: https://git.kernel.org/stable/c/539969fc472886a1d63565459514d47e27fef461 git.kernel.org: https://git.kernel.org/stable/c/2d11d274e2e1d7c79e2ca8461ce3ff3a95c11171 git.kernel.org: https://git.kernel.org/stable/c/7ac790dc2ba00499a8d671d4a24de4d4ad27e234 git.kernel.org: https://git.kernel.org/stable/c/aee57a0293dca675637e5504709f9f8fd8e871be git.kernel.org: https://git.kernel.org/stable/c/54a7081ed168b72a8a2d6ef4ba3a1259705a2926 lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html