First published: Fri Sep 16 2022(Updated: )
Last updated 11 April 2025
Credit: cve-coordination@google.com
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | >=5.1<5.4.212 | |
Linux Kernel | >=5.5<5.10.141 | |
Linux Kernel | >=5.11<5.15.65 | |
Linux Kernel | >=5.16<5.17 | |
Debian Linux | =10.0 | |
Debian Linux | =11.0 | |
debian/linux | 5.10.223-1 5.10.234-1 6.1.129-1 6.1.133-1 6.12.21-1 6.12.22-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-3176 is classified as a high-severity vulnerability due to its potential to compromise the stability and security of the Linux kernel.
To fix CVE-2022-3176, you should upgrade to the patched versions of the Linux kernel which are 5.10.223-1, 5.10.226-1, 6.1.123-1, 6.1.119-1, 6.12.10-1, or 6.12.11-1.
CVE-2022-3176 affects various Linux kernel versions from 5.1 up to 5.4.212 and within specific ranges up to 5.17.
The risks associated with CVE-2022-3176 include application crashes, data corruption, and possible exploitation by attackers to execute arbitrary code.
CVE-2022-3176 was disclosed on November 29, 2022.