CVE-2023-46839 Affecting xen package, versions <4.17.3+10-g091466ba55-1~deb12u1


Severity

Recommended
low

Based on default assessment until relevant scores are available.

Threat Intelligence

EPSS
0.04% (11th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-DEBIAN12-XEN-6210148
  • published31 Jan 2024
  • disclosed20 Mar 2024

Introduced: 31 Jan 2024

CVE-2023-46839  (opens in a new tab)

How to fix?

Upgrade Debian:12 xen to version 4.17.3+10-g091466ba55-1~deb12u1 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream xen package and not the xen package as distributed by Debian. See How to fix? for Debian:12 relevant fixed versions and status.

PCI devices can make use of a functionality called phantom functions, that when enabled allows the device to generate requests using the IDs of functions that are otherwise unpopulated. This allows a device to extend the number of outstanding requests.

Such phantom functions need an IOMMU context setup, but failure to setup the context is not fatal when the device is assigned. Not failing device assignment when such failure happens can lead to the primary device being assigned to a guest, while some of the phantom functions are assigned to a different domain.

CVSS Scores

version 3.1