### [CVE-2025-38382](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38382) ![](https://img.shields.io/static/v1?label=Product&message=Linux&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=1cf474cd474bc5d3ef63086ffd009a87a5b7bb2e%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=6.2%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=e43eec81c5167b655b72c781b0e75e62a05e415e%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=blue) ### Description In the Linux kernel, the following vulnerability has been resolved:btrfs: fix iteration of extrefs during log replayAt __inode_add_ref() when processing extrefs, if we jump into the nextlabel we have an undefined value of victim_name.len, since we haven'tinitialized it before we did the goto. This results in an invalid memoryaccess in the next iteration of the loop since victim_name.len was notinitialized to the length of the name of the current extref.Fix this by initializing victim_name.len with the current extref's namelength. ### POC #### Reference No PoCs from references. #### Github - https://github.com/w4zu/Debian_security