mirror of
https://github.com/NVIDIA/TensorRT-LLM.git
synced 2026-02-16 15:55:08 +08:00
32 lines
1.6 KiB
Markdown
32 lines
1.6 KiB
Markdown
<!--
|
||
SPDX-FileCopyrightText: Copyright (c) 2024-2026 NVIDIA CORPORATION & AFFILIATES. All rights reserved.
|
||
SPDX-License-Identifier: Apache-2.0
|
||
|
||
Licensed under the Apache License, Version 2.0 (the "License");
|
||
you may not use this file except in compliance with the License.
|
||
You may obtain a copy of the License at
|
||
|
||
http://www.apache.org/licenses/LICENSE-2.0
|
||
|
||
Unless required by applicable law or agreed to in writing, software
|
||
distributed under the License is distributed on an "AS IS" BASIS,
|
||
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||
See the License for the specific language governing permissions and
|
||
limitations under the License.
|
||
-->
|
||
|
||
# Report a Security Vulnerability
|
||
|
||
To report a potential security vulnerability in any NVIDIA product, please use either:
|
||
* This web form: [Security Vulnerability Submission Form](https://www.nvidia.com/en-us/support/submit-security-vulnerability/), or
|
||
* Send email to: [NVIDIA PSIRT](mailto:psirt@nvidia.com)
|
||
|
||
If reporting a potential vulnerability via email, please encrypt it using NVIDIA’s public PGP key ([see PGP Key page](https://www.nvidia.com/en-us/security/pgp-key/)) and include the following information:
|
||
1. Product/Driver name and version/branch that contains the vulnerability
|
||
2. Type of vulnerability (code execution, denial of service, buffer overflow, etc.)
|
||
3. Instructions to reproduce the vulnerability
|
||
4. Proof-of-concept or exploit code
|
||
5. Potential impact of the vulnerability, including how an attacker could exploit the vulnerability
|
||
|
||
See https://www.nvidia.com/en-us/security/ for past NVIDIA Security Bulletins and Notices.
|