Impact
This vulnerability originates from a scheduling error in the StorVSC SCSI driver when operating under a PREEMPT_RT enabled kernel. The bug triggers a "scheduling while atomic" condition, causing a system lockup or crash. Because the bug occurs in kernel space, any process that exercises the SCSI queue path can potentially trigger it, resulting in a denial of service that brings the entire system to a halt. The weakness corresponds to kernel lock contention (CWE-821).
Affected Systems
The affected platforms are Linux kernels that compile with PREEMPT_RT and have not applied the StorVSC patch from commit 57297736c08233987e5d29ce6584c6ca2a831b12. Any kernel built with PREEMPT_RT prior to the patch that uses the StorVSC driver is considered vulnerable.
Risk and Exploitability
The risk is moderate because a single local action that issues a SCSI command can precipitate a kernel panic and loss of availability. The CVSS score of 5.5 indicates medium severity, and the EPSS score of less than 1% signals a relatively low likelihood of exploitation. The CVE is not listed in KEV, suggesting no known public exploits at this time. Based on the description, it is inferred that exploitation may occur from either local or remote means, depending on the environment, but the impact remains a full system lockup.
OpenCVE Enrichment