CVE-2023-54096

Source
https://cve.org/CVERecord?id=CVE-2023-54096
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-54096.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2023-54096
Downstream
Related
Published
2025-12-24T13:06:23.828Z
Modified
2026-03-11T07:45:13.455395Z
Summary
soundwire: fix enumeration completion
Details

In the Linux kernel, the following vulnerability has been resolved:

soundwire: fix enumeration completion

The soundwire subsystem uses two completion structures that allow drivers to wait for soundwire device to become enumerated on the bus and initialised by their drivers, respectively.

The code implementing the signalling is currently broken as it does not signal all current and future waiters and also uses the wrong reinitialisation function, which can potentially lead to memory corruption if there are still waiters on the queue.

Not signalling future waiters specifically breaks sound card probe deferrals as codec drivers can not tell that the soundwire device is already attached when being reprobed. Some codec runtime PM implementations suffer from similar problems as waiting for enumeration during resume can also timeout despite the device already having been enumerated.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/54xxx/CVE-2023-54096.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
fb9469e54fa7a7b6a8137c40ae66c41b8d0ab175
Fixed
48d1d0ce0782f995fda678508fdae35c5e9593f0
Fixed
a36b522767f3a72688893a472e80c9aa03e67eda
Fixed
e1d54962a63b6ec04ed0204a3ecca942fde3a6fe
Fixed
c5265691cd065464d795de5666dcfb89c26b9bc1
Fixed
c40d6b3249b11d60e09d81530588f56233d9aa44

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-54096.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
5.7.0
Fixed
5.10.190
Type
ECOSYSTEM
Events
Introduced
5.11.0
Fixed
5.15.126
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
6.1.43
Type
ECOSYSTEM
Events
Introduced
6.2.0
Fixed
6.4.8

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-54096.json"