intel-ucode vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the intel-ucode package. This does not include vulnerabilities belonging to this package’s dependencies.

Fix vulnerabilities automatically

Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

Fix for free
VulnerabilityVulnerable Version
  • L
Improper Handling of Values

<20260210-r0
  • L
Out-of-bounds Write

<20250812-r0
  • L
Out-of-Bounds

<20250812-r0
  • L
Insufficient Granularity of Access Control

<20250812-r0
  • L
Missing Reference to Active Allocated Resource

<20250812-r0
  • L
Improperly Implemented Security Check for Standard

<20250812-r0
  • L
Sequence of Processor Instructions Leads to Unexpected Behavior

<20250812-r0
  • L
Improper Handling of Overlap Between Protected Memory Ranges

<20250812-r0
  • L
Insufficient Control Flow Management

<20250812-r0
  • L
Insufficient Compartmentalization

<20250812-r0
  • L
CVE-2024-28956

<20250512-r0
  • L
Uncaught Exception

<20250512-r0
  • L
Incorrect Behavior Order

<20250512-r0
  • L
CVE-2024-43420

<20250512-r0
  • L
Improper Access Control

<20250211-r0
  • L
Sequence of Processor Instructions Leads to Unexpected Behavior

<20250211-r0
  • L
CVE-2024-23918

<20241112-r0
  • L
CVE-2024-24853

<20260210-r0
  • L
CVE-2023-46103

<20240514-r0
  • L
CVE-2024-24980

<20240813-r0
  • L
CVE-2023-43490

<20240312-r0
  • H
Sequence of Processor Instructions Leads to Unexpected Behavior

<20231114-r0
  • M
Exposure of Resource to Wrong Sphere

<20210608-r0
  • M
CVE-2020-24513

<20210608-r0
  • L
CVE-2024-39355

<20250211-r0
  • L
Improper Input Validation

<20250211-r0
  • M
CVE-2022-21233

<20220809-r0
  • L
Improper Finite State Machines (FSMs) in Hardware Logic

<20241112-r0
  • L
Improper Finite State Machines (FSMs) in Hardware Logic

<20250211-r0
  • L
CVE-2024-45332

<20250512-r0
  • M
Information Exposure

<20190514a-r0
  • L
CVE-2023-49141

<20240813-r0
  • L
CVE-2025-20623

<20250512-r0
  • L
CVE-2024-25939

<20240813-r0
  • L
Insufficient Resource Pool

<20250512-r0
  • L
CVE-2025-24495

<20250512-r0
  • L
CVE-2023-42667

<20240813-r0
  • L
Information Exposure

<20241112-r0
  • L
CVE-2023-45733

<20240514-r0
  • M
Information Exposure

<20230808-r0
  • M
CVE-2022-41804

<20230808-r0
  • M
CVE-2021-0146

<20220207-r0
  • H
Incomplete Cleanup

<20210608-r0
  • L
Improper Finite State Machines (FSMs) in Hardware Logic

<20241112-r0
  • L
CVE-2023-22655

<20240312-r0
  • L
CVE-2023-38575

<20240312-r0
  • M
CVE-2023-23908

<20230808-r0
  • M
CVE-2022-21216

<20230214-r0
  • M
CVE-2022-38090

<20230214-r0
  • M
Incorrect Default Permissions

<20230214-r0
  • M
CVE-2022-21151

<20220510-r0
  • H
CVE-2023-45745

<20240514-r0
  • L
CVE-2023-28746

<20240312-r0
  • L
CVE-2023-39368

<20240312-r0
  • M
CVE-2021-0127

<20220207-r0
  • M
Improper Resource Shutdown or Release

<20200609-r0
  • M
CVE-2019-11135

<20191112-r0
  • M
CVE-2020-8694

<20201110-r0
  • M
Information Exposure

<20190514a-r0
  • M
Exposure of Resource to Wrong Sphere

<20201112-r0
  • M
Information Exposure

<20191112-r0