Impact
The vulnerability arises from a double‑free bug in the Xen 9p front‑end teardown path, which allows the xenwatch thread to release the 9p front‑end state twice. This flaw triggers an immediate general protection fault and crashes the kernel, interrupting critical services. The impact is a denial of service for all processes running on the affected host. Based on the description, no arbitrary code execution is demonstrated, so the primary risk is a system outage rather than remote code execution.
Affected Systems
The issue affects the Linux kernel’s xen 9p subsystem in all releases that include the unpatched xenwatch thread code. Vendors that ship the standard Linux kernel with default 9p support are impacted until the patch from commit 59e7707492576bdbfa8c1dbe7d90791df31e4773 (and subsequent commits) is deployed. Specific version ranges are not listed in the advisory, so administrators should check for the presence of this commit in their kernel source or distribution kernel.
Risk and Exploitability
The CVSS score is not provided, and the EPSS score is unavailable, so the overall risk assessment is based on the severity of a kernel crash and the requirement for privileged access to Xen. The vulnerability can be exploited only if an attacker can trigger a race condition in the xenwatch thread, which usually implies control over a guest or malicious configuration. While the KEV catalog does not list this flaw, the high potential for service disruption warrants proactive remediation.
OpenCVE Enrichment