The dataset viewer is not available because its heuristics could not detect any supported data files. You can try uploading some data files, or configuring the data files location manually.
PoC: GGUF Integer Overflow Vulnerability
This repository contains a Proof-of-Concept (PoC) model file (gguf_overflow.gguf) demonstrating a critical Integer Overflow vulnerability in standard GGUF parsers (like llama.cpp/ggml).
Vulnerability Details
The GGUF format allows defining tensor dimensions. If a tensor is defined with dimensions that fit within a 64-bit element count but result in a byte size exceeding $2^{64}$ when multiplied by the data type size (e.g., Float32 = 4 bytes), the size calculation overflows module $2^{64}$.
This leads to a tiny memory allocation (e.g., 4 bytes) for a massive tensor, causing Heap Corruption when the parser attempts to read/write the tensor data.
Files
gguf_overflow.gguf: The malicious model file.poc_gguf_overflow.py: Script used to generate the model.
Usage
WARNING: This file may crash your system or corrupt memory. Run in a sandboxed environment.
# Verify with llama.cpp
./llama-cli -m gguf_overflow.gguf
- Downloads last month
- 15