-

CVE-2025-38382

In the Linux kernel, the following vulnerability has been resolved:

btrfs: fix iteration of extrefs during log replay

At __inode_add_ref() when processing extrefs, if we jump into the next
label we have an undefined value of victim_name.len, since we haven't
initialized it before we did the goto. This results in an invalid memory
access in the next iteration of the loop since victim_name.len was not
initialized to the length of the name of the current extref.

Fix this by initializing victim_name.len with the current extref's name
length.

Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
VendorLinux
Product Linux
Default Statusunaffected
Version < 539969fc472886a1d63565459514d47e27fef461
Version 1cf474cd474bc5d3ef63086ffd009a87a5b7bb2e
Status affected
Version < 2d11d274e2e1d7c79e2ca8461ce3ff3a95c11171
Version e43eec81c5167b655b72c781b0e75e62a05e415e
Status affected
Version < 7ac790dc2ba00499a8d671d4a24de4d4ad27e234
Version e43eec81c5167b655b72c781b0e75e62a05e415e
Status affected
Version < aee57a0293dca675637e5504709f9f8fd8e871be
Version e43eec81c5167b655b72c781b0e75e62a05e415e
Status affected
Version < 54a7081ed168b72a8a2d6ef4ba3a1259705a2926
Version e43eec81c5167b655b72c781b0e75e62a05e415e
Status affected
VendorLinux
Product Linux
Default Statusaffected
Version 6.2
Status affected
Version < 6.2
Version 0
Status unaffected
Version <= 6.1.*
Version 6.1.144
Status unaffected
Version <= 6.6.*
Version 6.6.97
Status unaffected
Version <= 6.12.*
Version 6.12.37
Status unaffected
Version <= 6.15.*
Version 6.15.6
Status unaffected
Version <= *
Version 6.16
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.03% 0.061
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string