First published: Tue Jan 30 2024(Updated: )
PCI devices can make use of a functionality called phantom functions, that when enabled allows the device to generate requests using the IDs of functions that are otherwise unpopulated. This allows a device to extend the number of outstanding requests. Such phantom functions need an IOMMU context setup, but failure to setup the context is not fatal when the device is assigned. Not failing device assignment when such failure happens can lead to the primary device being assigned to a guest, while some of the phantom functions are assigned to a different domain.
Credit: security@xen.org
Affected Software | Affected Version | How to fix |
---|---|---|
Xen Hypervisor |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-46839 has a medium severity rating, indicating potential risks in environments using affected PCI devices.
To mitigate CVE-2023-46839, it's recommended to disable the use of phantom functions on the affected devices.
CVE-2023-46839 specifically affects the Xen Hypervisor when used with certain PCI devices.
Phantom functions allow PCI devices to generate requests using IDs of non-populated functions, potentially extending the number of outstanding requests.
Currently, the main workaround for CVE-2023-46839 is to disable the phantom functions feature in affected devices.