8.1
CVSSv3

CVE-2023-41915

Published: 09/09/2023 Updated: 09/01/2024
CVSS v3 Base Score: 8.1 | Impact Score: 5.9 | Exploitability Score: 2.2
VMScore: 0

Vulnerability Summary

OpenPMIx PMIx prior to 4.2.6 and 5.0.x prior to 5.0.1 allows malicious users to obtain ownership of arbitrary files via a race condition during execution of library code with UID 0.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

openpmix openpmix

openpmix openpmix 5.0.0

fedoraproject fedora 37

fedoraproject fedora 38

fedoraproject fedora 39

debian debian linux 10.0

debian debian linux 12.0

Vendor Advisories

Debian Bug report logs - #1051729 pmix: CVE-2023-41915 Package: src:pmix; Maintainer for src:pmix is Alastair McKinstry <mckinstry@debianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Mon, 11 Sep 2023 19:39:01 UTC Severity: grave Tags: security, upstream Found in version pmix/500~rc1-2 Fixed in ...
Francois Diakhate reported that a race condition in pmix, a library implementing Process Management Interface (PMI) Exascale API, could allow a malicious user to obtain ownership of an arbitrary file on the filesystem when parts of the PMIx library are called by a process with elevated privileges, resulting in privilege escalation This may happen ...
Description<!---->OpenPMIx PMIx is vulnerable to a race condition during execution of library code with UID 0, which allows attackers to obtain ownership of arbitrary filesOpenPMIx PMIx is vulnerable to a race condition during execution of library code with UID 0, which allows attackers to obtain ownership of arbitrary files ...