CVE-2026-40943
Received Received - Intake
Race Condition in Oxia Causes Server Panic and Deadlock

Publication date: 2026-04-21

Last updated on: 2026-04-21

Assigner: GitHub, Inc.

Description
Oxia is a metadata store and coordination system. Prior to 0.16.2, a race condition between session heartbeat processing and session closure can cause the server to panic with send on closed channel. The heartbeat() method uses a blocking channel send while holding a mutex, and under specific timing with concurrent close() calls, this can lead to either a deadlock (channel buffer full) or a panic (send on closed channel after TOCTOU gap in KeepAlive). This vulnerability is fixed in 0.16.2.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-21
Last Modified
2026-04-21
Generated
2026-05-06
AI Q&A
2026-04-22
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
oxia metadata_store to 0.16.2 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-362 The product contains a concurrent code sequence that requires temporary, exclusive access to a shared resource, but a timing window exists in which the shared resource can be modified by another code sequence operating concurrently.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability exists in Oxia, a metadata store and coordination system, in versions prior to 0.16.2. It is caused by a race condition between session heartbeat processing and session closure. Specifically, the heartbeat() method performs a blocking channel send while holding a mutex. When this operation coincides with concurrent close() calls, it can lead to either a deadlock if the channel buffer is full or a panic due to sending on a closed channel after a time-of-check-to-time-of-use (TOCTOU) gap in the KeepAlive mechanism.

This issue is fixed in version 0.16.2.


How can this vulnerability impact me? :

The vulnerability can cause the Oxia server to panic or deadlock during session management operations. This can lead to service interruptions or crashes, potentially affecting the availability and reliability of systems relying on Oxia for metadata storage and coordination.


What immediate steps should I take to mitigate this vulnerability?

The vulnerability is fixed in Oxia version 0.16.2. Immediate mitigation involves upgrading the Oxia metadata store and coordination system to version 0.16.2 or later.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart