Impact
The issue occurs during system suspend and resume in Tegra platforms, where an unsafe call to generic_handle_irq() is made from a non‑interrupt context, violating its API contract and producing a warning. The patch defers that call to a hard IRQ context, eliminating the warning. The CVE description does not report any crash or service disruption; it focuses on the warning message.
Affected Systems
Linux kernel builds that include the Tegra PMC driver; all kernels prior to the commit introducing IRQ_WORK_INIT_HARD are affected. Both PREEMPT_RT and non‑PREEMPT_RT kernels are impacted, with the PREEMPT_RT variant requiring IRQ_WORK_INIT_HARD to execute in hardirq context.
Risk and Exploitability
The CVSS score of 5.5 indicates medium severity, the vulnerability is not listed in the CISA KEV catalog, and EPSS data is not available. Attackers would need access that allows triggering system suspend/resume to experience the warning. No information suggests that this flaw can be exploited remotely or to gain elevated privileges; the risk appears limited to a warning that may signal kernel instability.
OpenCVE Enrichment