that when enabled allows the device to generate requests using the IDs
of functions that are otherwise unpopulated. This allows a device to
extend the number of outstanding requests.
Such phantom functions need an IOMMU context setup, but failure to
setup the context is not fatal when the device is assigned. Not
failing device assignment when such failure happens can lead to the
primary device being assigned to a guest, while some of the phantom
functions are assigned to a different domain.
Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
There is no mitigation (other than not passing through PCI devices with phantom functions to guests).
Tue, 13 Jan 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Fedoraproject
Fedoraproject fedora Xen Xen xen |
|
| Weaknesses | NVD-CWE-noinfo | |
| CPEs | cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:* cpe:2.3:o:xen:xen:*:*:*:*:*:*:x86:* |
|
| Vendors & Products |
Fedoraproject
Fedoraproject fedora Xen Xen xen |
Tue, 04 Nov 2025 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Wed, 28 May 2025 17:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
Thu, 22 May 2025 02:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
Thu, 21 Nov 2024 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
ssvc
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: XEN
Published:
Updated: 2025-11-04T18:18:53.943Z
Reserved: 2023-10-27T07:55:35.332Z
Link: CVE-2023-46839
Updated: 2025-11-04T18:18:53.943Z
Status : Analyzed
Published: 2024-03-20T11:15:08.120
Modified: 2026-01-13T15:03:22.213
Link: CVE-2023-46839
OpenCVE Enrichment
No data.