Vulnerability Description
PCI devices can make use of a functionality called phantom functions, that when enabled allows the device to generate requests using the IDs of functions that are otherwise unpopulated. This allows a device to extend the number of outstanding requests. Such phantom functions need an IOMMU context setup, but failure to setup the context is not fatal when the device is assigned. Not failing device assignment when such failure happens can lead to the primary device being assigned to a guest, while some of the phantom functions are assigned to a different domain.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Xen | Xen | All versions |
| Fedoraproject | Fedora | 39 |
References
- https://xenbits.xenproject.org/xsa/advisory-449.htmlPatchVendor Advisory
- http://xenbits.xen.org/xsa/advisory-449.htmlPatchVendor Advisory
- https://lists.fedoraproject.org/archives/list/[email protected]Mailing ListThird Party Advisory
- https://xenbits.xenproject.org/xsa/advisory-449.htmlPatchVendor Advisory
FAQ
What is CVE-2023-46839?
CVE-2023-46839 is a vulnerability with a CVSS score of 5.3 (MEDIUM). PCI devices can make use of a functionality called phantom functions, that when enabled allows the device to generate requests using the IDs of functions that are otherwise unpopulated. This allows a...
How severe is CVE-2023-46839?
CVE-2023-46839 has been rated MEDIUM with a CVSS base score of 5.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-46839?
Check the references section above for vendor advisories and patch information. Affected products include: Xen Xen, Fedoraproject Fedora.