CVE-2026-43475
Scheduling While Atomic in Linux Kernel Hyper-V Storage
Publication date: 2026-05-08
Last updated on: 2026-05-08
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| microsoft | hyper-v | * |
| linux | linux_kernel | 6.19.0-rc7 |
| microsoft | hv_storvsc | * |
| linux | ext4 | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in the Linux kernel's storvsc driver, which is used for SCSI storage on Hyper-V virtual machines. The issue involves improper scheduling while in an atomic context when running with the PREEMPT_RT (real-time) patch enabled. This can cause a kernel crash (splat) and lock-up, as the kernel attempts to schedule tasks when it should not, leading to instability.
How can this vulnerability impact me? :
If you are running a Linux kernel with the storvsc driver on a Hyper-V virtual machine with PREEMPT_RT enabled, this vulnerability can cause your system to crash or lock up unexpectedly. This can lead to downtime, data loss, or disruption of services running on the affected virtual machine.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability manifests as a kernel BUG related to scheduling while atomic when running with PREEMPT_RT enabled on Hyper-V. It can be detected by monitoring the system logs for specific kernel error messages.
Look for log entries similar to the following in your kernel logs (e.g., using dmesg or journalctl):
- BUG: scheduling while atomic: stress-ng-iomix/1048/0x00000002
- Preemption disabled at: storvsc_queuecommand
- Call trace involving storvsc_queuecommand and related functions
Suggested commands to detect this issue include:
- dmesg | grep -i 'BUG: scheduling while atomic'
- journalctl -k | grep -i 'BUG: scheduling while atomic'
- journalctl -k | grep storvsc_queuecommand
What immediate steps should I take to mitigate this vulnerability?
The vulnerability is resolved by a fix in the Linux kernel related to the storvsc driver scheduling while atomic on PREEMPT_RT enabled systems running on Hyper-V.
Immediate mitigation steps include:
- Update your Linux kernel to a version that includes the fix for this vulnerability.
- If updating the kernel is not immediately possible, consider disabling PREEMPT_RT or avoiding running workloads that trigger this issue on Hyper-V until the fix is applied.
- Monitor system logs for the described BUG messages to detect if the issue occurs.