{"id":"JLSEC-2025-181","summary":"Uncontrolled search path element in the Intel(R) oneAPI Toolkit OpenMP before version 2022.1 may all...","details":"Uncontrolled search path element in the Intel(R) oneAPI Toolkit OpenMP before version 2022.1 may allow an authenticated user to potentially enable escalation of privilege via local access.","modified":"2026-03-14T01:49:09.161375Z","published":"2025-10-21T17:50:47.064Z","withdrawn":"2026-03-13T16:20:47.266Z","upstream":["CVE-2022-26345"],"database_specific":{"sources":[{"id":"CVE-2022-26345","html_url":"https://nvd.nist.gov/vuln/detail/CVE-2022-26345","imported":"2025-10-21T15:06:08.448Z","published":"2023-02-16T20:15:13.057Z","modified":"2024-11-21T06:53:47.710Z","url":"https://services.nvd.nist.gov/rest/json/cves/2.0?cveId=CVE-2022-26345"}],"license":"CC-BY-4.0"},"references":[{"type":"WEB","url":"http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00674.html"},{"type":"WEB","url":"http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00674.html"}],"affected":[{"package":{"name":"IntelOpenMP_jll","ecosystem":"Julia","purl":"pkg:julia/IntelOpenMP_jll?uuid=1d5cc7b8-4909-519e-a0f8-d0f5ad9712d0"},"ranges":[{"type":"SEMVER","events":[{"introduced":"0"},{"fixed":"2023.1.0+0"}]}],"database_specific":{"source":"https://github.com/JuliaLang/SecurityAdvisories.jl/tree/generated/osv/2025/JLSEC-2025-181.json"}}],"schema_version":"1.7.5"}