In the Linux kernel, the following vulnerability has been resolved:
ipv6/sit: use DEVSTATSINC() to avoid data-races
syzbot/KCSAN reported that multiple cpus are updating dev->stats.tx_error concurrently.
This is because sit tunnels are NETIFFLLTX, meaning their ndostartxmit() is not protected by a spinlock.
While original KCSAN report was about tx path, rx path has the same issue.
{
"cna_assigner": "Linux",
"osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/50xxx/CVE-2022-50764.json"
}