{"id":"CVE-2023-41915","details":"OpenPMIx PMIx before 4.2.6 and 5.0.x before 5.0.1 allows attackers to obtain ownership of arbitrary files via a race condition during execution of library code with UID 0.","modified":"2026-04-16T04:36:49.889155731Z","published":"2023-09-09T22:15:09.530Z","related":["ALSA-2024:2199","ALSA-2024:3008","SUSE-SU-2023:3859-1","openSUSE-SU-2024:13223-1"],"references":[{"type":"WEB","url":"http://www.openwall.com/lists/oss-security/2024/07/10/4"},{"type":"WEB","url":"http://www.openwall.com/lists/oss-security/2024/07/10/6"},{"type":"WEB","url":"https://docs.openpmix.org/en/latest/security.html"},{"type":"WEB","url":"http://www.openwall.com/lists/oss-security/2024/07/10/3"},{"type":"WEB","url":"http://www.openwall.com/lists/oss-security/2024/07/11/3"},{"type":"ADVISORY","url":"https://github.com/openpmix/openpmix/releases/tag/v4.2.6"},{"type":"ADVISORY","url":"https://github.com/openpmix/openpmix/releases/tag/v5.0.1"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2023/10/msg00048.html"},{"type":"ADVISORY","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IFKIY6SNC3KQNZMVROWMIW6DI5XPNKQX/"},{"type":"ADVISORY","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SYJ7IRNR6NHJMTNOV3E3W3D5MLDRDCJX/"},{"type":"ADVISORY","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YDLWSMQYXF2ZGOQKCG26H6ZZA5FEH7HX/"},{"type":"ADVISORY","url":"https://www.debian.org/security/2023/dsa-5547"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/openpmix/openpmix","events":[{"introduced":"0"},{"fixed":"f20e0d5dc6b4028bd1edd469980c5f6ff71014ad"},{"introduced":"0"},{"last_affected":"6c87b11c6f1dae46def4f3357d32441af78425b3"},{"fixed":"77e8095a5bb8bb231f589fa9a95650440da2b02f"}],"database_specific":{"versions":[{"introduced":"0"},{"fixed":"4.2.6"},{"introduced":"0"},{"last_affected":"5.0.0"}]}}],"versions":["dev","v1.0.0","v1.1.0","v1.1.1","v1.1.2","v1.1.3","v4.0.0","v4.0.0rc1","v4.0.0rc2","v4.0.0rc3","v4.1.0","v4.1.0rc1","v4.1.0rc2","v4.1.1","v4.1.1rc1","v4.1.1rc2","v4.1.1rc3","v4.1.1rc4","v4.1.1rc5","v4.1.1rc6","v4.1.2","v4.2.0","v4.2.0rc1","v4.2.0rc2","v4.2.1","v4.2.1rc1","v4.2.2","v4.2.2rc1","v4.2.2rc2","v4.2.3","v4.2.3rc1","v4.2.3rc2","v4.2.4","v4.2.4rc1","v4.2.5","v5.0.0","v5.0.0rc1"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-41915.json","unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"37"}]},{"events":[{"introduced":"0"},{"last_affected":"38"}]},{"events":[{"introduced":"0"},{"last_affected":"39"}]},{"events":[{"introduced":"0"},{"last_affected":"10.0"}]},{"events":[{"introduced":"0"},{"last_affected":"12.0"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}