-

CVE-2023-54096

In the Linux kernel, the following vulnerability has been resolved:

soundwire: fix enumeration completion

The soundwire subsystem uses two completion structures that allow
drivers to wait for soundwire device to become enumerated on the bus and
initialised by their drivers, respectively.

The code implementing the signalling is currently broken as it does not
signal all current and future waiters and also uses the wrong
reinitialisation function, which can potentially lead to memory
corruption if there are still waiters on the queue.

Not signalling future waiters specifically breaks sound card probe
deferrals as codec drivers can not tell that the soundwire device is
already attached when being reprobed. Some codec runtime PM
implementations suffer from similar problems as waiting for enumeration
during resume can also timeout despite the device already having been
enumerated.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung. Login Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
Produkt Linux
Default Statusunaffected
Version < 48d1d0ce0782f995fda678508fdae35c5e9593f0
Version fb9469e54fa7a7b6a8137c40ae66c41b8d0ab175
Status affected
Version < a36b522767f3a72688893a472e80c9aa03e67eda
Version fb9469e54fa7a7b6a8137c40ae66c41b8d0ab175
Status affected
Version < e1d54962a63b6ec04ed0204a3ecca942fde3a6fe
Version fb9469e54fa7a7b6a8137c40ae66c41b8d0ab175
Status affected
Version < c5265691cd065464d795de5666dcfb89c26b9bc1
Version fb9469e54fa7a7b6a8137c40ae66c41b8d0ab175
Status affected
Version < c40d6b3249b11d60e09d81530588f56233d9aa44
Version fb9469e54fa7a7b6a8137c40ae66c41b8d0ab175
Status affected
HerstellerLinux
Produkt Linux
Default Statusaffected
Version 5.7
Status affected
Version < 5.7
Version 0
Status unaffected
Version <= 5.10.*
Version 5.10.190
Status unaffected
Version <= 5.15.*
Version 5.15.126
Status unaffected
Version <= 6.1.*
Version 6.1.43
Status unaffected
Version <= 6.4.*
Version 6.4.8
Status unaffected
Version <= *
Version 6.5
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.03% 0.065
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
Es wurden noch keine Informationen zu CWE veröffentlicht.