VYPR
Unrated severityNVD Advisory· Published Dec 24, 2025· Updated Apr 15, 2026

CVE-2023-54096

CVE-2023-54096

Description

In the Linux kernel, the following vulnerability has been resolved:

soundwire: fix enumeration completion

The soundwire subsystem uses two completion structures that allow drivers to wait for soundwire device to become enumerated on the bus and initialised by their drivers, respectively.

The code implementing the signalling is currently broken as it does not signal all current and future waiters and also uses the wrong reinitialisation function, which can potentially lead to memory corruption if there are still waiters on the queue.

Not signalling future waiters specifically breaks sound card probe deferrals as codec drivers can not tell that the soundwire device is already attached when being reprobed. Some codec runtime PM implementations suffer from similar problems as waiting for enumeration during resume can also timeout despite the device already having been enumerated.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

The Linux kernel soundwire subsystem uses broken completion signaling, causing potential memory corruption and incorrect synchronization for drivers waiting on enumeration and initialization.

Vulnerability

Description

The soundwire subsystem in the Linux kernel uses two completion structures to allow drivers to wait for soundwire devices to become enumerated on the bus and initialized by their drivers. The signaling implementation is flawed: it does not wake all current and future waiters, and it reinitializes the completion with the wrong function, which can cause memory corruption if waiters are still on the queue [1][2][3][4].

Exploitation

This bug affects driver synchronization. Not properly signaling future waiters breaks sound card probe deferral because codec drivers cannot determine that the soundwire device is already attached when being reprobed. Similarly, codec runtime PM implementations can time out waiting for enumeration during resume, even if the device was already enumerated [1][2][3][4].

Impact

An attacker with local access could potentially trigger the memory corruption by manipulating driver loading sequences, leading to system instability or denial of service. The incorrect completion signaling may also cause permanent driver probe failures, making sound hardware unavailable. However, there is no evidence of remote exploitation.

Mitigation

The issue is fixed in Linux kernel stable commits [1][2][3][4]. Users should apply the relevant kernel patches to ensure soundwire completions are correctly signaled. No workaround is available beyond updating the kernel.

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

5

Vulnerability mechanics

Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

5

News mentions

0

No linked articles in our index yet.