CVE-2023-54096
Description
In the Linux kernel, the following vulnerability has been resolved:
soundwire: fix enumeration completion
The soundwire subsystem uses two completion structures that allow drivers to wait for soundwire device to become enumerated on the bus and initialised by their drivers, respectively.
The code implementing the signalling is currently broken as it does not signal all current and future waiters and also uses the wrong reinitialisation function, which can potentially lead to memory corruption if there are still waiters on the queue.
Not signalling future waiters specifically breaks sound card probe deferrals as codec drivers can not tell that the soundwire device is already attached when being reprobed. Some codec runtime PM implementations suffer from similar problems as waiting for enumeration during resume can also timeout despite the device already having been enumerated.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
The Linux kernel soundwire subsystem uses broken completion signaling, causing potential memory corruption and incorrect synchronization for drivers waiting on enumeration and initialization.
Vulnerability
Description
The soundwire subsystem in the Linux kernel uses two completion structures to allow drivers to wait for soundwire devices to become enumerated on the bus and initialized by their drivers. The signaling implementation is flawed: it does not wake all current and future waiters, and it reinitializes the completion with the wrong function, which can cause memory corruption if waiters are still on the queue [1][2][3][4].
Exploitation
This bug affects driver synchronization. Not properly signaling future waiters breaks sound card probe deferral because codec drivers cannot determine that the soundwire device is already attached when being reprobed. Similarly, codec runtime PM implementations can time out waiting for enumeration during resume, even if the device was already enumerated [1][2][3][4].
Impact
An attacker with local access could potentially trigger the memory corruption by manipulating driver loading sequences, leading to system instability or denial of service. The incorrect completion signaling may also cause permanent driver probe failures, making sound hardware unavailable. However, there is no evidence of remote exploitation.
Mitigation
The issue is fixed in Linux kernel stable commits [1][2][3][4]. Users should apply the relevant kernel patches to ensure soundwire completions are correctly signaled. No workaround is available beyond updating the kernel.
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1Patches
548d1d0ce0782a36b522767f3e1d54962a63bc5265691cd06c40d6b3249b1Vulnerability mechanics
Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
5- git.kernel.org/stable/c/48d1d0ce0782f995fda678508fdae35c5e9593f0nvd
- git.kernel.org/stable/c/a36b522767f3a72688893a472e80c9aa03e67edanvd
- git.kernel.org/stable/c/c40d6b3249b11d60e09d81530588f56233d9aa44nvd
- git.kernel.org/stable/c/c5265691cd065464d795de5666dcfb89c26b9bc1nvd
- git.kernel.org/stable/c/e1d54962a63b6ec04ed0204a3ecca942fde3a6fenvd
News mentions
0No linked articles in our index yet.