YAML Metadata Warning: empty or missing yaml metadata in repo card (https://huggingface.co/docs/hub/model-cards#model-card-metadata)

TensorRT Deserialization Memory Corruption PoC

This repository contains a proof-of-concept (PoC) .engine file designed to trigger a memory corruption vulnerability in NVIDIA TensorRT's C++ backend via Python bindings.

Vulnerability Details:

  • Target Function: tensorrt.Runtime.deserialize_cuda_engine
  • Issue: Improper validation of length-prefixes in the engine header leading to a Segmentation Fault/Kernel crash.
  • Potential Impact: Remote Code Execution (RCE) / Denial of Service (DoS).

How to Reproduce:

  1. Install tensorrt library.
  2. Load the plugin_rce.engine file using trt.Runtime.
  3. Observe the system-level crash/session restart.
Downloads last month

-

Downloads are not tracked for this model. How to track
Inference Providers NEW
This model isn't deployed by any Inference Provider. 🙋 Ask for provider support