CVE-2024-31073

NameCVE-2024-31073
DescriptionUncontrolled search path for some Intel(R) oneAPI Level Zero software may allow an authenticated user to potentially enable escalation of privilege via local access.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
level-zero (PTS)bookworm1.8.12-1fixed
sid, trixie1.20.6-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
level-zerosource(unstable)(not affected)

Notes

- level-zero <not-affected> (Fixed before initial upload to Debian)
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01274.html

Search for package or bug name: Reporting problems