Software Security Guidance
For developers and systems experts, find resources to help you assess risk and build more secure solutions.
|6.5||Floating Point Value Injection||CVE-2021-0086||INTEL-SA-00516||2021-06-08|
|6.5||Speculative Code Store Bypass||CVE-2021-0089||INTEL-SA-00516||2021-06-08|
|5.6||Running Average Power Limit Energy Reporting||CVE-2020-8694, CVE-2020-8695||INTEL-SA-00389||2020-11-10|
|6.5||Special Register Buffer Data Sampling||CVE-2020-0543||INTEL-SA-00320||2020-06-09|
Product and Performance Information
Performance varies by use, configuration and other factors. Learn more at www.Intel.com/PerformanceIndex.
Features and benefits in Intel® technologies depend on system configuration and may require enabled hardware, software or service activation. Performance varies depending on system configuration. No product or component can be absolutely secure. Check with your system manufacturer or retailer or learn more at Intel.com.
Software and workloads used in performance tests may have been optimized for performance only on Intel microprocessors.
Performance tests, such as SYSmark and MobileMark, are measured using specific computer systems, components, software, operations and functions. Any change to any of those factors may cause the results to vary. You should consult other information and performance tests to assist you in fully evaluating your contemplated purchases, including the performance of that product when combined with other products. For more complete information visit www.intel.com/benchmarks.
Performance results are based on testing as of dates shown in configurations and may not reflect all publicly available updates.
The products and services described may contain defects or errors known as errata which may cause deviations from published specifications. Current characterized errata are available on request.
Intel provides these materials as-is, with no express or implied warranties.