Dataset Viewer

The dataset viewer is not available because its heuristics could not detect any supported data files. You can try uploading some data files, or configuring the data files location manually.

PoC: GGUF Integer Overflow Vulnerability

This repository contains a Proof-of-Concept (PoC) model file (gguf_overflow.gguf) demonstrating a critical Integer Overflow vulnerability in standard GGUF parsers (like llama.cpp/ggml).

Vulnerability Details

The GGUF format allows defining tensor dimensions. If a tensor is defined with dimensions that fit within a 64-bit element count but result in a byte size exceeding $2^{64}$ when multiplied by the data type size (e.g., Float32 = 4 bytes), the size calculation overflows module $2^{64}$.

This leads to a tiny memory allocation (e.g., 4 bytes) for a massive tensor, causing Heap Corruption when the parser attempts to read/write the tensor data.

Files

  • gguf_overflow.gguf: The malicious model file.
  • poc_gguf_overflow.py: Script used to generate the model.

Usage

WARNING: This file may crash your system or corrupt memory. Run in a sandboxed environment.

# Verify with llama.cpp
./llama-cli -m gguf_overflow.gguf
Downloads last month
15