intel-ucode vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the intel-ucode package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • L
Out-of-bounds Write

<20250812-r0
  • L
Out-of-Bounds

<20250812-r0
  • L
Insufficient Granularity of Access Control

<20250812-r0
  • L
Missing Reference to Active Allocated Resource

<20250812-r0
  • L
Improperly Implemented Security Check for Standard

<20250812-r0
  • L
Sequence of Processor Instructions Leads to Unexpected Behavior

<20250812-r0
  • L
Improper Handling of Overlap Between Protected Memory Ranges

<20250812-r0
  • L
Insufficient Control Flow Management

<20250812-r0
  • L
Insufficient Compartmentalization

<20250812-r0
  • L
CVE-2024-28956

<20250512-r0
  • L
Uncaught Exception

<20250512-r0
  • L
Incorrect Behavior Order

<20250512-r0
  • L
CVE-2024-43420

<20250512-r0
  • L
Improper Access Control

<20250211-r0
  • L
Sequence of Processor Instructions Leads to Unexpected Behavior

<20250211-r0
  • L
CVE-2024-23918

<20241112-r0
  • L
CVE-2024-24853

<20240813-r0
  • L
CVE-2023-46103

<20240514-r0
  • L
CVE-2024-24980

<20240813-r0
  • L
CVE-2023-43490

<20240312-r0
  • H
Sequence of Processor Instructions Leads to Unexpected Behavior

<20231114-r0
  • M
Exposure of Resource to Wrong Sphere

<20210608-r0
  • M
CVE-2020-24513

<20210608-r0
  • L
CVE-2024-39355

<20250211-r0
  • L
Improper Input Validation

<20250211-r0
  • M
CVE-2022-21233

<20220809-r0
  • L
Improper Finite State Machines (FSMs) in Hardware Logic

<20241112-r0
  • L
Improper Finite State Machines (FSMs) in Hardware Logic

<20250211-r0
  • L
CVE-2024-45332

<20250512-r0
  • M
Information Exposure

<20190514a-r0
  • L
CVE-2023-49141

<20240813-r0
  • L
CVE-2025-20623

<20250512-r0
  • L
CVE-2024-25939

<20240813-r0
  • L
Insufficient Resource Pool

<20250512-r0
  • L
CVE-2025-24495

<20250512-r0
  • L
CVE-2023-42667

<20240813-r0
  • L
Information Exposure

<20241112-r0
  • L
CVE-2023-45733

<20240514-r0
  • M
Information Exposure

<20230808-r0
  • M
CVE-2022-41804

<20230808-r0
  • M
CVE-2021-0146

<20220207-r0
  • H
Incomplete Cleanup

<20210608-r0
  • L
Improper Finite State Machines (FSMs) in Hardware Logic

<20241112-r0
  • L
CVE-2023-22655

<20240312-r0
  • L
CVE-2023-38575

<20240312-r0
  • M
CVE-2023-23908

<20230808-r0
  • M
CVE-2022-21216

<20230214-r0
  • M
CVE-2022-38090

<20230214-r0
  • M
Incorrect Default Permissions

<20230214-r0
  • M
CVE-2022-21151

<20220510-r0
  • H
CVE-2023-45745

<20240514-r0
  • L
CVE-2023-28746

<20240312-r0
  • L
CVE-2023-39368

<20240312-r0
  • M
CVE-2021-0127

<20220207-r0
  • M
Improper Resource Shutdown or Release

<20200609-r0
  • M
CVE-2019-11135

<20191112-r0
  • M
CVE-2020-8694

<20201110-r0
  • M
Information Exposure

<20190514a-r0
  • M
Exposure of Resource to Wrong Sphere

<20201112-r0
  • M
Information Exposure

<20191112-r0