vulnerability

Ubuntu: (Multiple Advisories) (CVE-2022-49046): Linux kernel vulnerabilities

Severity
5
CVSS
(AV:L/AC:L/Au:S/C:N/I:N/A:C)
Published
Feb 26, 2025
Added
Mar 19, 2025
Modified
Apr 28, 2026

Description

In the Linux kernel, the following vulnerability has been resolved:

i2c: dev: check return value when calling dev_set_name()

If dev_set_name() fails, the dev_name() is null, check the return
value of dev_set_name() to avoid the null-ptr-deref.

Solutions

ubuntu-upgrade-linux-image-5-4-0-1061-iotubuntu-upgrade-linux-image-5-4-0-1075-xilinx-zynqmpubuntu-upgrade-linux-image-5-4-0-1103-ibmubuntu-upgrade-linux-image-5-4-0-1131-fipsubuntu-upgrade-linux-image-5-4-0-1144-kvmubuntu-upgrade-linux-image-5-4-0-1155-oracleubuntu-upgrade-linux-image-5-4-0-1157-awsubuntu-upgrade-linux-image-5-4-0-1157-aws-fipsubuntu-upgrade-linux-image-5-4-0-1160-gcpubuntu-upgrade-linux-image-5-4-0-1160-gcp-fipsubuntu-upgrade-linux-image-5-4-0-1161-azureubuntu-upgrade-linux-image-5-4-0-1161-azure-fipsubuntu-upgrade-linux-image-5-4-0-228-genericubuntu-upgrade-linux-image-5-4-0-228-generic-lpaeubuntu-upgrade-linux-image-5-4-0-228-lowlatencyubuntu-upgrade-linux-image-awsubuntu-upgrade-linux-image-aws-5-4ubuntu-upgrade-linux-image-aws-fipsubuntu-upgrade-linux-image-aws-fips-5-4ubuntu-upgrade-linux-image-aws-lts-20-04ubuntu-upgrade-linux-image-azureubuntu-upgrade-linux-image-azure-5-4ubuntu-upgrade-linux-image-azure-fipsubuntu-upgrade-linux-image-azure-fips-5-4ubuntu-upgrade-linux-image-azure-lts-20-04ubuntu-upgrade-linux-image-fipsubuntu-upgrade-linux-image-fips-5-4ubuntu-upgrade-linux-image-gcpubuntu-upgrade-linux-image-gcp-5-4ubuntu-upgrade-linux-image-gcp-fipsubuntu-upgrade-linux-image-gcp-fips-5-4ubuntu-upgrade-linux-image-gcp-lts-20-04ubuntu-upgrade-linux-image-genericubuntu-upgrade-linux-image-generic-5-4ubuntu-upgrade-linux-image-generic-hwe-18-04ubuntu-upgrade-linux-image-generic-lpaeubuntu-upgrade-linux-image-generic-lpae-5-4ubuntu-upgrade-linux-image-generic-lpae-hwe-18-04ubuntu-upgrade-linux-image-ibmubuntu-upgrade-linux-image-ibm-5-4ubuntu-upgrade-linux-image-ibm-lts-20-04ubuntu-upgrade-linux-image-kvmubuntu-upgrade-linux-image-kvm-5-4ubuntu-upgrade-linux-image-lowlatencyubuntu-upgrade-linux-image-lowlatency-5-4ubuntu-upgrade-linux-image-lowlatency-hwe-18-04ubuntu-upgrade-linux-image-oemubuntu-upgrade-linux-image-oem-osp1ubuntu-upgrade-linux-image-oracleubuntu-upgrade-linux-image-oracle-5-4ubuntu-upgrade-linux-image-oracle-lts-20-04ubuntu-upgrade-linux-image-snapdragon-5-4ubuntu-upgrade-linux-image-snapdragon-hwe-18-04ubuntu-upgrade-linux-image-virtualubuntu-upgrade-linux-image-virtual-5-4ubuntu-upgrade-linux-image-virtual-hwe-18-04ubuntu-upgrade-linux-image-xilinx-zynqmpubuntu-upgrade-linux-image-xilinx-zynqmp-5-4

References

    Title
    Rapid7 Labs

    2026 Global Threat Landscape Report

    The predictive window has collapsed. Exploitation follows disclosure in days. See how attackers are accelerating and how to stay ahead.