VYPR
Unrated severityNVD Advisory· Published Dec 24, 2025· Updated Apr 15, 2026

CVE-2022-50764

CVE-2022-50764

Description

In the Linux kernel, the following vulnerability has been resolved:

ipv6/sit: use DEV_STATS_INC() to avoid data-races

syzbot/KCSAN reported that multiple cpus are updating dev->stats.tx_error concurrently.

This is because sit tunnels are NETIF_F_LLTX, meaning their ndo_start_xmit() is not protected by a spinlock.

While original KCSAN report was about tx path, rx path has the same issue.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Data race in Linux kernel SIT tunnels allows concurrent updates to device stats, causing incorrect error counts.

In the Linux kernel, the SIT (Simple Internet Transition) tunnel driver has a data race vulnerability. Because SIT tunnels are marked NETIF_F_LLTX, their ndo_start_xmit() function is not protected by a spinlock. This allows multiple CPUs to concurrently update dev->stats.tx_error and other device statistics, leading to incorrect error counts.

The vulnerability can be triggered by transmitting packets through an SIT tunnel from multiple CPU cores simultaneously. No special privileges are required beyond the ability to send packets over an SIT interface. The same issue exists on the receive path, where dev->stats.rx_errors can also be corrupted.

An attacker exploiting this data race could cause the kernel to report inaccurate network statistics. While this does not directly lead to code execution or privilege escalation, it can degrade monitoring and accounting, potentially masking other issues. The fix uses DEV_STATS_INC() which provides atomic increments to avoid the race.

The patches addressing this vulnerability have been applied to the stable kernel branches. Users are advised to update to the latest kernel version to mitigate the issue.

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

4

Vulnerability mechanics

Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

4

News mentions

0

No linked articles in our index yet.