microcode_ctl is vulnerable to privilege escalation. The vulnerability exists through the Special Register Buffer Data Sampling (SRBDS) module.
lists.opensuse.org/opensuse-security-announce/2020-06/msg00025.html
lists.opensuse.org/opensuse-security-announce/2020-07/msg00024.html
lists.opensuse.org/opensuse-security-announce/2020-07/msg00031.html
www.openwall.com/lists/oss-security/2020/07/14/5
access.redhat.com/errata/RHSA-2020:2433
access.redhat.com/security/updates/classification/#moderate
access.redhat.com/solutions/5142691
access.redhat.com/solutions/5142751
cert-portal.siemens.com/productcert/pdf/ssa-534763.pdf
kc.mcafee.com/corporate/index?page=content&id=SB10318
lists.fedoraproject.org/archives/list/[email protected]/message/DT2VKDMQ3I37NBNJ256A2EXR7OJHXXKZ/
lists.fedoraproject.org/archives/list/[email protected]/message/GRFC7UAPKAFFH5WX3AMDUBVHLKYQA2NZ/
lists.fedoraproject.org/archives/list/[email protected]/message/NQZMOSHLTBBIECENNXA6M7DN5FEED4KI/
lists.fedoraproject.org/archives/list/[email protected]/message/T5OUM24ZC43G4IDT3JUCIHJTSDXJSK6Y/
usn.ubuntu.com/4385-1/
usn.ubuntu.com/4387-1/
usn.ubuntu.com/4388-1/
usn.ubuntu.com/4389-1/
usn.ubuntu.com/4390-1/
usn.ubuntu.com/4391-1/
usn.ubuntu.com/4392-1/
usn.ubuntu.com/4393-1/
www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00320.html