|
| 1 | +<!-- |
| 2 | +SPDX-FileCopyrightText: Copyright (c) 2024-2025 NVIDIA CORPORATION & AFFILIATES. All rights reserved. |
| 3 | +SPDX-License-Identifier: Apache-2.0 |
| 4 | +
|
| 5 | +Licensed under the Apache License, Version 2.0 (the "License"); |
| 6 | +you may not use this file except in compliance with the License. |
| 7 | +You may obtain a copy of the License at |
| 8 | +
|
| 9 | +http://www.apache.org/licenses/LICENSE-2.0 |
| 10 | +
|
| 11 | +Unless required by applicable law or agreed to in writing, software |
| 12 | +distributed under the License is distributed on an "AS IS" BASIS, |
| 13 | +WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
| 14 | +See the License for the specific language governing permissions and |
| 15 | +limitations under the License. |
| 16 | +--> |
| 17 | + |
| 18 | +# Report a Security Vulnerability |
| 19 | + |
| 20 | +To report a potential security vulnerability in any NVIDIA product, please use either: |
| 21 | +* This web form: [Security Vulnerability Submission Form](https://www.nvidia.com/en-us/support/submit-security-vulnerability/), or |
| 22 | +* Send email to: [NVIDIA PSIRT ](mailto:[email protected]) |
| 23 | + |
| 24 | +If reporting a potential vulnerability via email, please encrypt it using NVIDIA’s public PGP key ([see PGP Key page](https://www.nvidia.com/en-us/security/pgp-key/)) and include the following information: |
| 25 | +1. Product/Driver name and version/branch that contains the vulnerability |
| 26 | +2. Type of vulnerability (code execution, denial of service, buffer overflow, etc.) |
| 27 | +3. Instructions to reproduce the vulnerability |
| 28 | +4. Proof-of-concept or exploit code |
| 29 | +5. Potential impact of the vulnerability, including how an attacker could exploit the vulnerability |
| 30 | + |
| 31 | +See https://www.nvidia.com/en-us/security/ for past NVIDIA Security Bulletins and Notices. |
0 commit comments