|
|
|
|
@ -13,7 +13,8 @@ be sure it can be reproduced in the supported version.
|
|
|
|
|
## Reporting a Vulnerability
|
|
|
|
|
|
|
|
|
|
If you have information about a security issue or vulnerability in the product, please
|
|
|
|
|
send an e-mail to secure@intel.com. Encrypt sensitive information using our PGP public key.
|
|
|
|
|
send an e-mail to [secure@intel.com](mailto:secure@intel.com). Encrypt sensitive information
|
|
|
|
|
using our PGP public key.
|
|
|
|
|
|
|
|
|
|
Please provide as much information as possible, including:
|
|
|
|
|
|
|
|
|
|
@ -25,3 +26,23 @@ Please provide as much information as possible, including:
|
|
|
|
|
|
|
|
|
|
For more information on how Intel works to resolve security issues, see:
|
|
|
|
|
[Vulnerability handling guidelines](<https://www.intel.com/content/www/us/en/security-center/vulnerability-handling-guidelines.html>)
|
|
|
|
|
|
|
|
|
|
## Intel® Bug Bounty Program
|
|
|
|
|
|
|
|
|
|
Intel Corporation believes that working with skilled security researchers across the globe
|
|
|
|
|
is a crucial part of identifying and mitigating security vulnerabilities in Intel products.
|
|
|
|
|
|
|
|
|
|
Like other major technology companies, Intel incentivizes security researchers to report
|
|
|
|
|
security vulnerabilities in Intel products to us to enable a coordinated response. To
|
|
|
|
|
encourage closer collaboration with the security research community on these kinds of issues,
|
|
|
|
|
Intel created its Bug Bounty Program.
|
|
|
|
|
|
|
|
|
|
If you believe you've found a security vulnerability in an Intel product or technology, we
|
|
|
|
|
encourage you to notify us through our program and work with us to mitigate and to coordinate
|
|
|
|
|
disclosure of the vulnerability.
|
|
|
|
|
|
|
|
|
|
[Intel® Bug Bounty Program Terms](<https://www.intel.com/content/www/us/en/security-center/bug-bounty-program.html>)
|
|
|
|
|
|
|
|
|
|
Watch this video, [So You Found a Vulnerability](<https://www.intel.com/content/www/us/en/security-center/so-you-found-a-vulnerability.html>),
|
|
|
|
|
to find out what you can expect when participating in the Intel® Bug Bounty Program.
|
|
|
|
|
|
|
|
|
|
|