CVE-2026-43249
Race Condition in Linux Kernel 9p/xen Filesystem
Publication date: 2026-05-06
Last updated on: 2026-05-06
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| xen_project | xen | * |
| xen | xen | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in the Linux kernel's 9p/xen subsystem, specifically involving the xen_9pfs_front_free function. The issue arises because the xenwatch thread can race with other back-end change notifications, causing xen_9pfs_front_free() to be called twice concurrently. This leads to a double-free error, which triggers a general protection fault and causes the system to crash.
The fix involves protecting the teardown path so that only one caller can release the front-end state at a time, preventing the double-free and the resulting crash.
How can this vulnerability impact me? :
This vulnerability can cause a system crash due to a double-free error in the Linux kernel's 9p/xen subsystem. Such crashes can lead to denial of service, potentially disrupting operations on affected systems running the vulnerable kernel.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability manifests as a general protection fault caused by a double-free in the Linux kernel related to the xen_9pfs_front_free function. Detection involves monitoring system logs for specific kernel crash messages.
You can check your system logs (e.g., using dmesg or journalctl) for messages similar to the following kernel oops trace indicating the double-free issue:
- dmesg | grep -i 'xen_9pfs_front_free'
- journalctl -k | grep -i 'xen_9pfs_front_free'
Look specifically for general protection faults or oops messages referencing xenwatch and xen_9pfs_front_free, which indicate the race condition and double-free problem.
What immediate steps should I take to mitigate this vulnerability?
The vulnerability is fixed by guarding the teardown path in the Linux kernel so that only one caller can release the front-end state at a time, preventing the double-free crash.
Immediate mitigation steps include:
- Update your Linux kernel to a version that includes the fix for this vulnerability.
- If updating immediately is not possible, consider limiting or disabling the use of the affected 9p/xen filesystem features or xenwatch thread functionality until the patch can be applied.
Monitoring for crash logs as described can also help identify if the vulnerability is being triggered.