Software Security Guidance
This information is designed for developers and systems experts looking to understand potential vulnerabilities and assess risk, with resources and recommendations for building more secure solutions.
Featured Security Guidance
|CVSS||Issue Overview||CVE||INTEL-SA||Disclosure Date||Technical Documentation (If Applicable)|
|6.0||Stale Data Read from Legacy xAPIC||CVE-2022-21233
|4.7||Return Stack Buffer Underflow||CVE-2022-28693
|6.1||Processor MMIO Stale Data Vulnerabilities||CVE-2022-21123
|INTEL-SA-00615||2022-06-14||Processor MMIO Stale Data Vulnerabilities|
|Branch History Injection|
Check Affected Processors
Evaluate the impact of transient execution attacks from 2018 through today on Intel® CPUs to determine the recommended way to stay protected from potential attacks.
Proactively Secure Software for Intel® Processors
To develop for system security and performance, developers must understand how software works with hardware. To balance both priorities:
- Adhere to security best practices and secure coding principles as a first line of defense.
- Download the latest microcode and follow recommended mitigation guidance for known issues.
- Learn Intel hardware behavior and how software can best use that behavior and associated features.
The following documents show how to develop and secure software running on Intel processors, as well as details and options for fine-tuned control of software and hardware features according to the most up-to-date guidance.
Report a Security Vulnerability
If you believe you've found a security vulnerability in an Intel product or solution, notify us through the Intel Bug Bounty Program, and work with Intel to mitigate and coordinate disclosure of the vulnerability.
Watch this video to find out what you can expect when participating in the Intel Bug Bounty Program.
性能因用途、配置和其他因素而异。请访问 www.Intel.cn/PerformanceIndex 了解更多信息。
英特尔® 技术的功能和优势取决于系统配置，并且可能需要启用硬件、软件或服务才能激活。实际性能可能因系统配置的不同而有所差异。没有任何产品或组件能够做到绝对安全。请咨询您的系统制造商或零售商，或者访问 Intel.cn 了解更多信息。