microcode_ctl vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the microcode_ctl package. This does not include vulnerabilities belonging to this package’s dependencies.

Fix vulnerabilities automatically

Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

Fix for free
VulnerabilityVulnerable Version
  • M
CVE-2024-28956

<2:2.1-73.24.0.20250512.el7_9
  • H
Sequence of Processor Instructions Leads to Unexpected Behavior

<2:2.1-73.19.0.3.el7_9
  • M
Information Exposure

<2:2.1-73.15.0.6.el7_9
  • H
Incomplete Cleanup

<2:2.1-73.13.0.3.el7_9
  • H
Incomplete Cleanup

<2:2.1-73.13.0.3.el7_9
  • H
Incomplete Cleanup

<2:2.1-73.13.0.5.el7_9
  • H
Incomplete Cleanup

<2:2.1-73.13.0.5.el7_9
  • H
ELSA-2018-4018

<2:2.1-22.5.0.3.el7_4
  • H
ELSA-2018-0093

<2:2.1-22.5.0.2.el7_4
  • H
Incomplete Cleanup

<2:2.1-73.11.0.1.el7_9
  • H
CVE-2020-24513

<2:2.1-73.9.0.1.el7_9
  • H
Information Exposure

<2:2.1-73.11.0.1.el7_9
  • H
Exposure of Resource to Wrong Sphere

<2:2.1-73.11.0.1.el7_9
  • H
Information Exposure

<2:2.1-73.11.0.1.el7_9
  • H
Exposure of Resource to Wrong Sphere

<2:2.1-73.11.0.1.el7_9
  • H
Improper Cross-boundary Removal of Sensitive Data

<2:2.1-73.11.0.1.el7_9
  • H
Improper Resource Shutdown or Release

<2:2.1-73.11.0.1.el7_9
  • H
Improper Resource Shutdown or Release

<2:2.1-73.11.0.1.el7_9
  • H
Incomplete Cleanup

<2:2.1-73.11.0.1.el7_9
  • H
Improper Check for Unusual or Exceptional Conditions

<2:2.1-53.3.0.4.el7_7
  • H
Improper Input Validation

<2:2.1-53.3.0.4.el7_7
  • H
CVE-2019-11135

<2:2.1-53.3.0.4.el7_7
  • H
Information Exposure

<2:2.1-22.2.el7