PCI devices can make use of a functionality called phantom functions,
that when enabled allows the device to generate requests using the IDs
of functions that are otherwise unpopulated. This allows a device to
extend the number of outstanding requests.

Such phantom functions need an IOMMU context setup, but failure to
setup the context is not fatal when the device is assigned. Not
failing device assignment when such failure happens can lead to the
primary device being assigned to a guest, while some of the phantom
functions are assigned to a different domain.
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

There is no mitigation (other than not passing through PCI devices with phantom functions to guests).

History

Wed, 14 Jan 2026 00:15:00 +0900

Type Values Removed Values Added
First Time appeared Fedoraproject
Fedoraproject fedora
Xen
Xen xen
Weaknesses NVD-CWE-noinfo
CPEs cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*
cpe:2.3:o:xen:xen:*:*:*:*:*:*:x86:*
Vendors & Products Fedoraproject
Fedoraproject fedora
Xen
Xen xen

Wed, 05 Nov 2025 04:30:00 +0900


Thu, 29 May 2025 02:00:00 +0900

Type Values Removed Values Added
References

Thu, 22 May 2025 11:45:00 +0900


Fri, 22 Nov 2024 05:15:00 +0900

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 5.5, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}

cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: XEN

Published:

Updated: 2025-11-04T18:18:53.943Z

Reserved: 2023-10-27T07:55:35.332Z

Link: CVE-2023-46839

cve-icon Vulnrichment

Updated: 2025-11-04T18:18:53.943Z

cve-icon NVD

Status : Analyzed

Published: 2024-03-20T11:15:08.120

Modified: 2026-01-13T15:03:22.213

Link: CVE-2023-46839

cve-icon Redhat

Severity : Moderate

Publid Date: 2024-03-20T00:00:00Z

Links: CVE-2023-46839 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses