CVE-2022-50764

Source
https://cve.org/CVERecord?id=CVE-2022-50764
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-50764.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2022-50764
Downstream
Published
2025-12-24T13:05:55.423Z
Modified
2026-04-02T08:28:45.065639Z
Summary
ipv6/sit: use DEV_STATS_INC() to avoid data-races
Details

In the Linux kernel, the following vulnerability has been resolved:

ipv6/sit: use DEVSTATSINC() to avoid data-races

syzbot/KCSAN reported that multiple cpus are updating dev->stats.tx_error concurrently.

This is because sit tunnels are NETIFFLLTX, meaning their ndostartxmit() is not protected by a spinlock.

While original KCSAN report was about tx path, rx path has the same issue.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/50xxx/CVE-2022-50764.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
8df40d1033d64597dcf1efd4f7547e817f7a953b
Fixed
222cc04356984f3f98acfa756a69d4bed7c501ac
Fixed
4eed93bb3e57b8cc78d17166a14e40a73276015a
Fixed
207501a986831174df09a36a8cb62a28f92f0dc8
Fixed
cb34b7cf17ecf33499c9298943f85af247abc1e9

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-50764.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
2.6.37
Fixed
5.15.86
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
6.0.16
Type
ECOSYSTEM
Events
Introduced
6.1.0
Fixed
6.1.2

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-50764.json"