CVE-2023-54096
Unknown Unknown - Not Provided
Improper Signaling in Linux Soundwire Causes Memory Corruption

Publication date: 2025-12-24

Last updated on: 2025-12-24

Assigner: kernel.org

Description
In the Linux kernel, the following vulnerability has been resolved: soundwire: fix enumeration completion The soundwire subsystem uses two completion structures that allow drivers to wait for soundwire device to become enumerated on the bus and initialised by their drivers, respectively. The code implementing the signalling is currently broken as it does not signal all current and future waiters and also uses the wrong reinitialisation function, which can potentially lead to memory corruption if there are still waiters on the queue. Not signalling future waiters specifically breaks sound card probe deferrals as codec drivers can not tell that the soundwire device is already attached when being reprobed. Some codec runtime PM implementations suffer from similar problems as waiting for enumeration during resume can also timeout despite the device already having been enumerated.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-12-24
Last Modified
2025-12-24
Generated
2026-05-06
AI Q&A
2025-12-24
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
linux linux_kernel *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-UNKNOWN
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is in the Linux kernel's soundwire subsystem. It involves the improper handling of completion structures used to signal when a soundwire device has been enumerated and initialized. The signaling code is broken because it does not notify all current and future waiters and uses the wrong reinitialization function. This can lead to memory corruption if waiters remain on the queue. Additionally, it causes issues with sound card probe deferrals and codec runtime power management, leading to timeouts even when the device is already enumerated.


How can this vulnerability impact me? :

This vulnerability can cause memory corruption in the Linux kernel if there are still waiters on the queue due to improper signaling. It can also disrupt sound card probe deferrals because codec drivers cannot detect that the soundwire device is already attached during reprobe. Furthermore, some codec runtime power management implementations may experience timeouts during resume, even though the device has already been enumerated, potentially affecting system stability and audio functionality.


What immediate steps should I take to mitigate this vulnerability?

Apply the updated Linux kernel patch that fixes the soundwire enumeration completion issue to ensure proper signalling and prevent potential memory corruption and probe deferral problems.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart