Potential security vulnerabilities in some Intel® oneAPI Toolkits and Component software may allow escalation of privilege. Intel is releasing software updates to mitigate these potential vulnerabilities.
CVEID: CVE-2023-24592
Description: Path traversal in the some Intel® oneAPI Toolkits and Component software before version 2023.1 may allow authenticated user to potentially enable escalation of privilege via local access.
CVSS Base Score: 7.3 High
CVSS Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
CVEID: CVE-2023-27383
Description: Protection mechanism failure in some Intel® oneAPI HPC Toolkit 2023.1 and Intel® MPI Library software before version 2021.9 may allow a privileged user to potentially enable escalation of privilege via adjacent access.
CVSS Base Score: 6.8 Medium
CVSS Vector: CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Intel® Advisor before version 2023.1.
Intel® Inspector before version 2023.1.
Intel® oneAPI Base Toolkit before version 2023.1.
Intel® oneAPI HPC Toolkit before version 2023.1.
Intel® MPI Library before version 2021.9.
Intel recommends updating Intel® Advisor before version 2023.1. or later.
Updates are available for download at this location:
<https://www.intel.com/content/www/us/en/developer/articles/tool/oneapi-standalone-components.html>
Intel recommends updating Intel® Inspector before version 2023.1. or later.
Updates are available for download at this location:
<https://www.intel.com/content/www/us/en/developer/articles/tool/oneapi-standalone-components.html>
Intel recommends updating Intel® oneAPI Base Toolkit before version 2023.1. or later.
Updates are available for download at this location:
<https://www.intel.com/content/www/us/en/developer/tools/oneapi/base-toolkit-download.html>
Intel recommends updating Intel® oneAPI HPC Toolkit to version 2023.1 or later.
Updates are available for download at this location:
<https://www.intel.com/content/www/us/en/developer/tools/oneapi/hpc-toolkit-download.html>
Intel recommends updating Intel® MPI Library to version 2021.9 or later.
Updates are available for download at this location:
<https://www.intel.com/content/www/us/en/developer/articles/tool/oneapi-standalone-components.html#mpi>
Intel would like to thank @j00sean (CVE-2023-24592) for reporting this issue. The following CVE-2023-27383 was found internally by Intel employees.
Intel, and nearly the entire technology industry, follows a disclosure practice called Coordinated Disclosure, under which a cybersecurity vulnerability is generally publicly disclosed only after mitigations are available.