CVE-2022-50764 — Improper Synchronization in Linux
Severity
6.2MEDIUM
No vectorEPSS
0.0%
top 92.73%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedDec 24
Description
In the Linux kernel, the following vulnerability has been resolved:
ipv6/sit: use DEV_STATS_INC() to avoid data-races
syzbot/KCSAN reported that multiple cpus are updating dev->stats.tx_error
concurrently.
This is because sit tunnels are NETIF_F_LLTX, meaning their ndo_start_xmit()
is not protected by a spinlock.
While original KCSAN report was about tx path, rx path has the same issue.
Affected Packages4 packages
▶CVEListV5linux/linux8df40d1033d64597dcf1efd4f7547e817f7a953b — 222cc04356984f3f98acfa756a69d4bed7c501ac+4
🔴Vulnerability Details
3GHSA▶
GHSA-grmr-47cc-4gc2: In the Linux kernel, the following vulnerability has been resolved:
ipv6/sit: use DEV_STATS_INC() to avoid data-races
syzbot/KCSAN reported that mul↗2025-12-24
OSV▶
CVE-2022-50764: In the Linux kernel, the following vulnerability has been resolved: ipv6/sit: use DEV_STATS_INC() to avoid data-races syzbot/KCSAN reported that multi↗2025-12-24