[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"article-ollama-memory-leak-cve-2026-7482-en":3,"tags-ollama-memory-leak-cve-2026-7482-en":36,"related-lang-ollama-memory-leak-cve-2026-7482-en":47,"related-posts-ollama-memory-leak-cve-2026-7482-en":51,"series-research-4eaf4af7-1f8a-4856-bcfe-e83241d9abda":88},{"id":4,"title":5,"content":6,"summary":7,"source":8,"source_url":9,"author":10,"image_url":11,"keywords":12,"language":18,"translated_content":10,"views":19,"is_premium":20,"created_at":21,"updated_at":21,"cover_image":11,"published_at":22,"rewrite_status":23,"rewrite_error":10,"rewritten_from_id":24,"slug":25,"category":26,"related_article_id":27,"status":28,"google_indexed_at":29,"x_posted_at":10,"tweet_text":10,"title_rewritten_at":10,"title_original":10,"key_takeaways":30,"topic_cluster_id":34,"embedding":35,"is_canonical_seed":20},"4eaf4af7-1f8a-4856-bcfe-e83241d9abda","Ollama flaw can leak process memory remotely","\u003Cp data-speakable=\"summary\">A critical Ollama bug can leak process memory from exposed servers.\u003C\u002Fp>\u003Cp>Ollama has a serious security problem: a remote attacker can send a crafted GGUF file, trigger an out-of-bounds read, and pull data out of process memory. The flaw is tracked as \u003Ca href=\"https:\u002F\u002Fwww.cve.org\u002FCVERecord?id=CVE-2026-7482\" target=\"_blank\" rel=\"noopener\">CVE-2026-7482\u003C\u002Fa>, carries a CVSS score of 9.1, and Cyera has dubbed it \u003Ca href=\"https:\u002F\u002Fwww.cyera.com\u002F\" target=\"_blank\" rel=\"noopener\">Bleeding Llama\u003C\u002Fa>.\u003C\u002Fp>\u003Ctable>\u003Cthead>\u003Ctr>\u003Cth>Fact\u003C\u002Fth>\u003Cth>Value\u003C\u002Fth>\u003C\u002Ftr>\u003C\u002Fthead>\u003Ctbody>\u003Ctr>\u003Ctd>CVE\u003C\u002Ftd>\u003Ctd>CVE-2026-7482\u003C\u002Ftd>\u003C\u002Ftr>\u003Ctr>\u003Ctd>CVSS score\u003C\u002Ftd>\u003Ctd>9.1\u003C\u002Ftd>\u003C\u002Ftr>\u003Ctr>\u003Ctd>Likely exposed servers\u003C\u002Ftd>\u003Ctd>300,000+\u003C\u002Ftd>\u003C\u002Ftr>\u003Ctr>\u003Ctd>Ollama GitHub stars\u003C\u002Ftd>\u003Ctd>171,000+\u003C\u002Ftd>\u003C\u002Ftr>\u003Ctr>\u003Ctd>Ollama forks\u003C\u002Ftd>\u003Ctd>16,100+\u003C\u002Ftd>\u003C\u002Ftr>\u003Ctr>\u003Ctd>Fixed in\u003C\u002Ftd>\u003Ctd>0.17.1\u003C\u002Ftd>\u003C\u002Ftr>\u003C\u002Ftbody>\u003C\u002Ftable>\u003Ch2>What the bug actually does\u003C\u002Fh2>\u003Cp>\u003Ca href=\"https:\u002F\u002Follama.com\" target=\"_blank\" rel=\"noopener\">Ollama\u003C\u002Fa> is popular because it lets people run large language models locally instead of sending prompts to a cloud service. That convenience comes with a bigger \u003Ca href=\"\u002Fnews\u002Fai-agent-clis-new-supply-chain-attack-surface-en\">attack surface\u003C\u002Fa>, especially when the REST \u003Ca href=\"\u002Ftag\u002Fapi\">API\u003C\u002Fa> is exposed to a network.\u003C\u002Fp>\n\u003Cfigure class=\"my-6\">\u003Cimg src=\"https:\u002F\u002Fxxdpdyhzhpamafnrdkyq.supabase.co\u002Fstorage\u002Fv1\u002Fobject\u002Fpublic\u002Fcovers\u002Finline-1778713867208-bz3c.png\" alt=\"Ollama flaw can leak process memory remotely\" class=\"rounded-xl w-full\" loading=\"lazy\" \u002F>\u003C\u002Ffigure>\n\u003Cp>According to the CVE description, versions before 0.17.1 accept attacker-supplied GGUF files through the \u003Ccode>\u002Fapi\u002Fcreate\u003C\u002Fcode> endpoint. If the declared tensor offset and size are larger than the real file, the server can read past the heap buffer during quantization in \u003Ccode>fs\u002Fggml\u002Fgguf.go\u003C\u002Fcode> and \u003Ccode>server\u002Fquantization.go\u003C\u002Fcode>.\u003C\u002Fp>\u003Cp>GGUF, short for GPT-Generated Unified Format, is the file format Ollama uses to store and load models locally. The bug lives in code that uses Go’s \u003Ccode>unsafe\u003C\u002Fcode> package, which means the language’s normal memory safety guarantees do not apply in that path.\u003C\u002Fp>\u003Cul>\u003Cli>Attack surface: exposed Ollama servers with the REST API reachable over the network\u003C\u002Fli>\u003Cli>Trigger: a malformed GGUF file with inflated tensor metadata\u003C\u002Fli>\u003Cli>Impact: remote memory disclosure from the Ollama process\u003C\u002Fli>\u003Cli>Likely loot: environment variables, API keys, system prompts, and active chat data\u003C\u002Fli>\u003C\u002Ful>\u003Ch2>Why this leak matters in real deployments\u003C\u002Fh2>\u003Cp>This is not the kind of flaw that just dumps a few bytes and goes away. If the attacker can cause Ollama to serialize the resulting model artifact and push it outward, the memory contents can be exfiltrated through the \u003Ccode>\u002Fapi\u002Fpush\u003C\u002Fcode> endpoint to an attacker-controlled registry.\u003C\u002Fp>\u003Cp>Cyera security researcher Dor Attias described the risk in blunt terms: “An attacker can learn basically anything about the organization from your AI inference — API keys, proprietary code, customer contracts, and much more.” He added that the impact gets worse when engineering teams wire Ollama into tools like \u003Ca href=\"https:\u002F\u002Fgithub.com\u002Fanthropics\u002Fclaude-code\" target=\"_blank\" rel=\"noopener\">Claude Code\u003C\u002Fa>, because tool outputs can also end up in the process heap.\u003C\u002Fp>\u003Cblockquote>“An attacker can learn basically anything about the organization from your AI inference — API keys, proprietary code, customer contracts, and much more.” — Dor Attias, Cyera\u003C\u002Fblockquote>\u003Cp>That quote matters because it changes how you think about local AI servers. The danger is not limited to model weights or prompt text. It reaches the surrounding workflow, including secrets that were never meant to leave the box.\u003C\u002Fp>\u003Cp>For teams running Ollama in production or in shared internal environments, the practical lesson is simple: if the API is reachable from anywhere outside a tightly controlled network, treat it like a high-value target.\u003C\u002Fp>\u003Ch2>How the attack chain works\u003C\u002Fh2>\u003Cp>The reported exploitation path is straightforward and ugly. An attacker uploads a crafted GGUF file, calls \u003Ccode>\u002Fapi\u002Fcreate\u003C\u002Fcode> to trigger model creation, then uses \u003Ccode>\u002Fapi\u002Fpush\u003C\u002Fcode> to move leaked memory data out to an external registry.\u003C\u002Fp>\n\u003Cfigure class=\"my-6\">\u003Cimg src=\"https:\u002F\u002Fxxdpdyhzhpamafnrdkyq.supabase.co\u002Fstorage\u002Fv1\u002Fobject\u002Fpublic\u002Fcovers\u002Finline-1778713869628-dcps.png\" alt=\"Ollama flaw can leak process memory remotely\" class=\"rounded-xl w-full\" loading=\"lazy\" \u002F>\u003C\u002Ffigure>\n\u003Cp>That chain matters because each step is ordinary on its own. File upload, model creation, and model publishing are normal Ollama operations. The bug turns those legitimate actions into a memory disclosure path.\u003C\u002Fp>\u003Cul>\u003Cli>Step 1: send a malicious GGUF file with oversized tensor metadata\u003C\u002Fli>\u003Cli>Step 2: invoke \u003Ccode>\u002Fapi\u002Fcreate\u003C\u002Fcode> to force the out-of-bounds read\u003C\u002Fli>\u003Cli>Step 3: use \u003Ccode>\u002Fapi\u002Fpush\u003C\u002Fcode> to exfiltrate the leaked heap contents\u003C\u002Fli>\u003C\u002Ful>\u003Cp>Cyera says the flaw likely affects more than 300,000 servers worldwide. That number is a reminder that local AI tooling is no longer a hobbyist corner case. It is infrastructure, and infrastructure gets scanned.\u003C\u002Fp>\u003Cp>There is also a broader point here about trust. Teams often assume that because a model runs locally, the risk stays local too. This bug shows how a single exposed endpoint can turn a private inference server into a data source for an attacker.\u003C\u002Fp>\u003Ch2>What to compare, patch, and watch next\u003C\u002Fh2>\u003Cp>Ollama is not the only project dealing with memory safety and update-chain issues, but this disclosure is especially sharp because it hits both confidentiality and operational trust. The fix for CVE-2026-7482 is available in \u003Ca href=\"https:\u002F\u002Fgithub.com\u002Follama\u002Follama\" target=\"_blank\" rel=\"noopener\">Ollama\u003C\u002Fa> 0.17.1, so version checks matter right away.\u003C\u002Fp>\u003Cp>There is also a separate Windows problem in Ollama’s updater, tracked by \u003Ca href=\"https:\u002F\u002Fwww.cve.org\u002FCVERecord?id=CVE-2026-42248\" target=\"_blank\" rel=\"noopener\">CVE-2026-42248\u003C\u002Fa> and \u003Ca href=\"https:\u002F\u002Fwww.cve.org\u002FCVERecord?id=CVE-2026-42249\" target=\"_blank\" rel=\"noopener\">CVE-2026-42249\u003C\u002Fa>. Those flaws can be chained into persistent code execution on Windows systems that auto-start the desktop client and poll for updates.\u003C\u002Fp>\u003Cul>\u003Cli>CVE-2026-7482: heap out-of-bounds read in the GGUF loader, fixed in 0.17.1\u003C\u002Fli>\u003Cli>CVE-2026-42248: missing signature verification in the Windows updater\u003C\u002Fli>\u003Cli>CVE-2026-42249: path traversal in the Windows updater staging path\u003C\u002Fli>\u003Cli>Windows exposure window: versions 0.12.10 through 0.17.5 are called out in the disclosure\u003C\u002Fli>\u003Cli>Default behavior: AutoUpdateEnabled is on unless admins turn it off\u003C\u002Fli>\u003C\u002Ful>\u003Cp>The defensive checklist is short but important: update Ollama, restrict network access, put an authentication proxy or API gateway in front of every instance, and audit whether any server is reachable from the internet. If you use the Windows client, disable automatic updates and remove the Startup folder shortcut until the update path is verified.\u003C\u002Fp>\u003Cp>If your organization treats local \u003Ca href=\"\u002Ftag\u002Fllm\">LLM\u003C\u002Fa> hosting as a safe internal tool, this is the kind of incident that should change the policy. The next question is not whether a public Ollama instance can be found, but how many already are and whether they are exposing prompts, keys, or customer data right now.\u003C\u002Fp>\u003Cp>For related coverage, see our guide on \u003Ca href=\"\u002Fnews\u002Fai-service-exposure-risks\" target=\"_blank\" rel=\"noopener\">exposed AI services and common misconfigurations\u003C\u002Fa>.\u003C\u002Fp>","A critical Ollama bug can leak process memory remotely, exposing keys, prompts, and user data across exposed servers.","thehackernews.com","https:\u002F\u002Fthehackernews.com\u002F2026\u002F05\u002Follama-out-of-bounds-read-vulnerability.html",null,"https:\u002F\u002Fxxdpdyhzhpamafnrdkyq.supabase.co\u002Fstorage\u002Fv1\u002Fobject\u002Fpublic\u002Fcovers\u002Finline-1778713867208-bz3c.png",[13,14,15,16,17],"Ollama","CVE-2026-7482","memory leak","GGUF","LLM security","en",2,false,"2026-05-13T23:10:36.728739+00:00","2026-05-13T23:10:36.724+00:00","done","cedb86b7-8ecb-4de7-b06c-91172c573cbc","ollama-memory-leak-cve-2026-7482-en","research","1de70fef-f10d-4ff6-b162-d58b527a168c","published","2026-05-14T09:00:17.338+00:00",[31,32,33],"CVE-2026-7482 can leak Ollama process memory through a crafted GGUF file.","The likely exposure includes API keys, prompts, environment variables, and chat data.","Admins should patch to 0.17.1, restrict access, and add authentication in front of the API.","3103988e-c4fe-45e3-98ab-846500c9d507","[-0.0013348969,0.015937952,-0.012938406,-0.06629824,-0.018754514,0.009482576,-0.00147511,0.025597682,0.0035404384,0.035196766,-0.003128644,-0.025490645,0.0071315886,-0.033507857,0.14277878,0.014826779,0.0058763856,0.02292763,0.032207765,0.008034169,-0.021260982,-0.002998455,-0.03417237,-0.0022388117,0.011917868,-0.010677658,0.0013030656,0.0124117285,0.046837725,0.00021906104,-0.0007237079,-0.008604782,-0.008239738,0.02449575,0.007866045,0.034933604,0.023599727,-0.0017326762,-0.010243097,0.02030543,-0.0107897315,-0.028069405,-0.005583397,0.0022591413,-0.008090253,0.023967082,-0.011628725,-0.0027133115,-0.03410742,0.029820323,-0.0021544625,0.010837927,-0.021086108,-0.16449685,-0.009215131,0.036337312,0.0043691485,0.007036094,0.032632943,-0.002813868,-0.00287033,0.0027508342,-3.2754782e-05,-0.013776577,-0.010113008,-0.009222441,0.010159631,0.0022038687,-0.016966356,0.0058106016,-0.026151452,-0.040207785,0.010933096,-0.037413597,0.0032323722,-0.0023148074,0.011770271,0.0035801781,0.02974463,0.021341579,0.006755554,-0.021392753,0.004523603,-0.004556615,0.0024208447,0.01526655,0.011036364,-0.027270362,-0.0057453294,-0.02472674,0.013690683,0.011152671,0.011770685,0.02564634,0.007422316,0.019608023,0.008191537,-0.0007448919,0.0059458558,0.005098484,0.011825103,-0.014652234,0.0005116276,0.023877695,0.0007717183,-0.025952308,0.017219288,-0.008941411,0.013876908,0.023259165,0.016603284,0.002089751,-0.030291911,0.0011265691,0.019148447,-0.12465705,-0.0022318715,-0.0057503646,0.0018605199,-0.0076658125,0.0040928945,-0.02176726,0.0075092115,0.01773299,0.024529723,-0.01245273,0.021162817,0.010368746,0.0077379476,-0.0027481695,-0.019952614,-0.02702777,0.020033635,0.013031431,-0.017941969,0.048266053,-0.011146694,-0.007888346,-0.004780705,-0.017975831,0.012551803,0.03580384,0.015589182,-0.029482082,-0.0062644887,0.0011513596,-0.032152653,0.014877964,0.019370405,-0.020830505,0.027901752,-0.016692908,0.00019202192,-0.015895182,0.023136217,-0.04390062,-0.007358334,0.02782796,-0.008778243,0.015487919,-0.014030292,-0.012953091,-0.0018897876,0.009743062,0.009669627,0.007253248,-0.010721608,-0.011172366,0.018236674,0.004400236,-0.026147546,-0.018228078,-0.0076048886,-0.004021192,-0.0072375983,-0.0057288166,0.00013479985,0.0004816902,-0.0025817314,-0.01500456,-0.004676937,9.617907e-05,0.00910813,0.008868711,0.021577617,0.00063607516,0.03139819,0.00041853095,0.0035336304,0.0014033302,-0.00844363,0.0016723593,0.024660751,-0.00030240166,0.0024609917,0.0035319044,-0.028986264,0.005507368,0.008482024,0.022886612,-0.012573202,-0.027736194,0.0047561647,-0.03838239,0.00024056721,-0.0017003926,0.0006642759,0.006393343,0.017853206,-0.005897434,0.006627743,-0.0017084177,0.033359986,0.016479954,0.018342292,-0.011142776,-0.00824443,0.0030802884,0.01718618,-0.013126806,0.01565757,-0.009537532,0.014386355,0.013298538,6.539429e-05,-0.004720241,-0.01587238,0.0016575968,0.00061283534,0.03276757,0.01837099,0.017573085,0.0034562093,-0.00015185983,0.022571323,0.009053279,0.015695969,0.002969403,-0.01771528,0.030543808,-0.02392562,0.0031052558,0.0012021703,-0.004567041,0.039534055,-0.04461144,0.022419166,0.010802983,-0.023439461,0.010204254,0.0024694765,-0.0034356373,0.0067995726,0.014133761,-0.0032620504,-0.017890016,-0.0047221333,0.019477885,-0.005624917,-0.0109549565,0.014731702,-0.0042335456,-0.008729734,-0.0041535534,-0.020665472,0.011711572,0.0047053066,0.0028972568,-0.017899968,0.023339758,-0.0109096365,0.0026308734,-0.008093224,0.026523191,0.043533664,-0.01915205,-0.019179828,0.014431946,-0.0024404598,-0.00033719168,0.010524769,0.025551777,-0.029771926,-0.006244357,0.0051799337,-0.005009386,-0.015252222,0.017058361,-0.017162343,-0.02233867,0.017065177,0.014125574,0.007269429,0.01544787,0.012189597,-0.0045218044,0.00744043,-0.008935889,-0.005978276,0.0008942324,-0.0015141688,-0.025744125,0.028134054,0.037138965,0.00080419215,0.019709883,0.009251993,0.001574011,-0.0020942134,0.018882517,0.0013567915,0.0047669136,-0.0018117533,-0.045898795,-0.008973095,-0.0029974794,-0.011386897,-0.024120897,0.0037422953,-0.01975098,0.0015509631,-0.016118538,0.029861286,-0.0085200695,-0.035486065,0.0022479647,-0.0025198422,0.0017418894,0.023176685,-0.0035670013,-0.0028338924,0.02384069,0.0005019091,-0.011223079,-0.004998603,-0.0056527224,-0.0067681028,0.008659814,-0.013986412,-0.01647312,-0.021202933,0.013204369,-8.426388e-05,-0.012630254,-0.005899856,0.014593999,0.031050013,-0.013275802,0.011435101,-0.03434158,0.05293773,0.0059720413,0.024299785,0.0054962444,-0.037484102,0.031371687,0.015245848,-0.008902755,0.015399964,0.013198996,0.02848499,0.0068861954,-0.0061108265,-0.003914858,0.03182367,0.003518233,-0.008330302,-0.0010051685,-0.021749994,-0.009371966,0.01990868,-0.018789096,0.0008346755,-0.027158756,-0.013176245,0.009075408,-0.028008435,0.008215641,0.035649367,-0.012661703,0.00032016117,0.029949067,0.004975605,-0.017631207,0.0143426,0.018786728,-0.017966792,-0.003105384,-0.0070576076,0.027132832,-0.031228686,-0.004775167,-0.01923205,0.01858527,-0.020427572,0.008750995,-0.02676197,0.019374354,0.028110228,-0.031854644,0.01854542,0.0030338408,-0.021732483,0.024564592,0.019256268,-0.012693999,-0.002340585,0.0063144835,0.023144249,0.004516552,-0.01585977,-0.011322347,0.027461069,-0.015191198,0.021482596,0.014876099,-0.026726102,-0.01140744,-0.019126141,0.012899752,-0.01571025,0.013312027,0.006682841,-0.00655076,-0.008392373,0.0112662865,0.017884493,-0.02584691,-0.006968241,0.006252409,0.0071036206,0.021910712,-0.018284852,0.0037113852,0.022383077,-0.011313993,0.00030562124,-0.051036358,-0.035253707,-0.010841931,-0.0119402,-0.021906128,-0.0042534787,0.0055984603,-0.009111554,0.00012077484,0.020005431,-0.05603504,-0.028238473,0.005560131,0.048199818,-0.012765541,0.045057658,-0.02695691,-0.004753321,-0.010392009,0.016288845,0.0025677523,0.0020300858,0.0017997624,-0.0012133091,-0.00817864,0.028846659,0.032779526,-0.0013232684,-0.025373384,-0.005979886,-0.015446109,-0.008631468,0.012609353,-0.0046169977,0.012673078,0.022973292,-0.005052015,-0.017844617,0.016243141,0.0023913067,0.0066314135,0.01089222,0.01944688,-0.0012561559,0.011624529,-0.0011805778,0.006965557,-0.0037571867,0.03202006,-0.017246163,-0.0010569469,-0.0137281725,0.008706258,0.029755259,0.006876789,-0.0007573003,-0.005593727,-0.011008315,-0.034117024,-0.011583082,-0.015952606,-0.020548455,0.015256995,0.018293284,-0.0020876108,-0.002437316,-0.016810814,-0.009851985,-0.012832935,-0.0065029287,-0.0029779456,0.0035109655,-0.0011640196,-0.035598803,-0.00060735695,0.03681068,-0.017628549,0.0054540182,-0.0034477317,-0.017646426,-0.008669899,-0.0173803,-0.0035473506,0.02522124,-0.018350575,0.011332416,0.022656377,0.0014743238,-0.013283722,0.0075626606,0.00043270164,-0.009204704,0.010627208,-0.0070862137,-0.004732239,-0.0008399417,-0.017382685,0.01851596,-0.01818439,0.014912391,0.0027914552,0.019254267,5.0486728e-05,-0.023811614,-0.023615079,-0.019590927,-0.0011458315,0.018939355,-0.09299032,-0.010773083,-0.007851698,0.00590111,-0.01784343,-0.011477935,0.030033128,-0.0028919373,-0.0029782818,0.014020416,0.02129871,-0.02689495,0.040612902,0.03652601,-0.018530186,-0.029212974,-0.015185053,0.009951809,0.01585601,-0.0069618397,0.042356152,-0.0076160743,-0.0054154973,0.045783762,-0.03333008,-0.0030047745,0.00808972,0.023024365,0.0013094572,0.008504005,-0.009655687,0.006588327,0.008079478,0.020727849,-0.002227477,-0.013653476,0.01113072,-0.009136802,0.00574206,0.0037652475,0.0055865133,-0.0041927495,-0.01585354,-0.0003001552,-0.005213033,-0.00013822527,-0.007949359,0.006330714,0.016562527,0.024221433,-0.015375779,-0.01464935,-0.02268399,-0.008782773,-0.008147518,-0.020154327,-0.005984286,-0.018267792,-0.033459514,0.014602131,-0.01667583,0.021108778,-0.005996523,0.01963406,0.0060211956,0.00160114,0.0045585204,0.010000798,0.021408956,0.006784475,-0.0072053224,-0.01439122,0.027222704,0.009673608,-0.03273726,0.027237182,-0.0329546,0.035842426,-0.0095057655,-0.015323333,0.0034377167,-0.0070876856,-0.07142883,-0.010533385,0.010894517,-0.013490275,-0.002210285,-0.00081722136,0.007535763,-0.03402615,0.0023313968,-0.03514843,0.020058895,-0.00017281198,-0.03509559,0.012177722,0.019841433,-0.0066664093,-0.01888718,0.014001834,-0.010188965,-0.036545392,-0.0051679793,0.008186512,0.022054171,-0.005316861,-0.009794651,-0.0067519657,-0.014632799,0.014825045,0.036611922,-0.012643871,-0.026307033,-0.12542102,0.03755483,0.014328715,0.007740045,0.014251868,0.00653123,0.0023149098,-4.016138e-05,0.018638697,0.0012133966,-0.007274331,-0.043691598,0.005136122,-0.0013376275,-0.012140729,0.11653268,-0.010684238,0.022161378,0.011708271,-0.004115038,0.012567034,-0.033298206,0.018087879,0.002424374,0.021270674,0.019126054,0.053230643,0.0048072175,-0.027617041,0.03636322,0.04286308,-0.01644231,-0.0057625435,0.005703284,0.026498485,-0.0036897447,-0.007447986,-0.01706574,-0.016162084,0.01662141,0.007162592,0.037973654,-0.004197172,0.0029146438,-0.0031179923,-0.010212545,0.023874953,0.0066157635,0.00017488016,-0.020336837,0.007509509,-0.06276916,0.030625042,-0.02090612,0.024815578,-0.0018252556,-0.00703762,0.017752253,0.008918729,0.025918614,-0.01592705,-0.014580238,-0.002766085,-0.010249535,-0.0032305364,-0.019134328,0.040706683,0.011434969,-0.019403193,-0.01331038,-0.026124379,0.01702656,0.017370395,-0.03431738,0.02786882,0.0015038524,-0.0022253706,0.002941792,0.01307321,-0.0011494596,0.005683973,-0.0053371596,-0.0015265371,-0.008407655,-0.025905358,-0.018441617,0.011110178,-0.007023797,0.011071777,0.009951808,-0.012055988,0.019366048,-0.020069815,0.020933576,0.029172296,-0.002454282,-0.02664036,-0.015289974,-0.025855094,0.00084960076,-0.013202497,-0.037244003,-0.011893255,0.0043668062,-0.012977609,0.0029568654,0.019332862,0.010317712,0.032404024,0.005041816]",[37,39,41,43,45],{"name":15,"slug":38},"memory-leak",{"name":16,"slug":40},"gguf",{"name":14,"slug":42},"cve-2026-7482",{"name":13,"slug":44},"ollama",{"name":17,"slug":46},"llm-security",{"id":27,"slug":48,"title":49,"language":50},"ollama-memory-leak-cve-2026-7482-zh","Ollama 漏洞可遠端洩漏記憶體","zh",[52,58,64,70,76,82],{"id":53,"slug":54,"title":55,"cover_image":56,"image_url":56,"created_at":57,"category":26},"94994abd-e24d-4fd1-b941-942d03d19acf","turboquant-seo-shift-small-sites-en","TurboQuant and the SEO Shift for Small Sites","https:\u002F\u002Fxxdpdyhzhpamafnrdkyq.supabase.co\u002Fstorage\u002Fv1\u002Fobject\u002Fpublic\u002Fcovers\u002Finline-1778840455122-jfce.png","2026-05-15T10:20:28.134545+00:00",{"id":59,"slug":60,"title":61,"cover_image":62,"image_url":62,"created_at":63,"category":26},"670a7f69-911f-41e8-a18b-7d3491253a19","turboquant-vllm-comparison-fp8-kv-cache-en","TurboQuant vs FP8: vLLM’s first broad test","https:\u002F\u002Fxxdpdyhzhpamafnrdkyq.supabase.co\u002Fstorage\u002Fv1\u002Fobject\u002Fpublic\u002Fcovers\u002Finline-1778839858405-b5ao.png","2026-05-15T10:10:37.219158+00:00",{"id":65,"slug":66,"title":67,"cover_image":68,"image_url":68,"created_at":69,"category":26},"5aef1c57-961f-49f7-8277-f83f7336799a","llmbda-calculus-agent-safety-rules-en","LLMbda calculus gives agents safety rules","https:\u002F\u002Fxxdpdyhzhpamafnrdkyq.supabase.co\u002Fstorage\u002Fv1\u002Fobject\u002Fpublic\u002Fcovers\u002Finline-1778825459914-obkf.png","2026-05-15T06:10:36.242145+00:00",{"id":71,"slug":72,"title":73,"cover_image":74,"image_url":74,"created_at":75,"category":26},"712a0357-f7cd-48f2-adde-c2691da0815f","low-complexity-beamspace-denoiser-mmwave-mimo-en","A simpler beamspace denoiser for mmWave MIMO","https:\u002F\u002Fxxdpdyhzhpamafnrdkyq.supabase.co\u002Fstorage\u002Fv1\u002Fobject\u002Fpublic\u002Fcovers\u002Finline-1778814646705-e7mx.png","2026-05-15T03:10:31.764301+00:00",{"id":77,"slug":78,"title":79,"cover_image":80,"image_url":80,"created_at":81,"category":26},"f595f949-6ea1-4b0e-a632-f1832ef26e36","ai-benchmark-wins-cyber-scare-defenders-en","Why AI benchmark wins in cyber should scare defenders","https:\u002F\u002Fxxdpdyhzhpamafnrdkyq.supabase.co\u002Fstorage\u002Fv1\u002Fobject\u002Fpublic\u002Fcovers\u002Finline-1778807444539-gz7f.png","2026-05-15T01:10:30.04579+00:00",{"id":83,"slug":84,"title":85,"cover_image":86,"image_url":86,"created_at":87,"category":26},"3ad202d1-9e5f-49c5-8383-02fcf1a23cf2","why-linux-security-needs-patch-wave-mindset-en","Why Linux security needs a patch-wave mindset","https:\u002F\u002Fxxdpdyhzhpamafnrdkyq.supabase.co\u002Fstorage\u002Fv1\u002Fobject\u002Fpublic\u002Fcovers\u002Finline-1778741441493-ikl6.png","2026-05-14T06:50:25.906256+00:00",[89,94,99,104,109,114,119,124,129,134],{"id":90,"slug":91,"title":92,"created_at":93},"a2715e72-1fe8-41b3-abb1-d0cf1f710189","ai-predictions-2026-big-changes-en","AI Predictions for 2026: Brace for Big Changes","2026-03-26T01:25:07.788356+00:00",{"id":95,"slug":96,"title":97,"created_at":98},"8404bd7b-4c2f-4109-9ec4-baf29d88af2b","ml-papers-of-the-week-github-research-desk-en","ML Papers of the Week Turns GitHub Into a Research Desk","2026-03-27T01:11:39.480259+00:00",{"id":100,"slug":101,"title":102,"created_at":103},"87897a94-8065-4464-a016-1f23e89e17cc","ai-ml-conferences-to-watch-in-2026-en","AI\u002FML Conferences to Watch in 2026","2026-03-27T01:51:54.184108+00:00",{"id":105,"slug":106,"title":107,"created_at":108},"6f1987cf-25f3-47a4-b3e6-db0997695be8","openclaw-agents-manipulated-self-sabotage-en","OpenClaw Agents Can Be Manipulated Into Failure","2026-03-28T03:03:18.899465+00:00",{"id":110,"slug":111,"title":112,"created_at":113},"a53571ad-735a-4178-9f93-cb09b699d99c","vega-driving-language-instructions-en","Vega: Driving with Natural Language Instructions","2026-03-28T14:54:04.698882+00:00",{"id":115,"slug":116,"title":117,"created_at":118},"a34581d6-f36e-46da-88bb-582fb3e7425c","personalizing-autonomous-driving-styles-en","Drive My Way: Personalizing Autonomous Driving Styles","2026-03-28T14:54:26.148181+00:00",{"id":120,"slug":121,"title":122,"created_at":123},"2bc1ad7f-26ce-4f02-9885-803b35fd229d","training-knowledge-bases-writeback-rag-en","Training Knowledge Bases with WriteBack-RAG","2026-03-28T14:54:45.643433+00:00",{"id":125,"slug":126,"title":127,"created_at":128},"71adc507-3c54-4605-bbe2-c966acd6187e","packforcing-long-video-generation-en","PackForcing: Efficient Long-Video Generation Method","2026-03-28T14:55:02.646943+00:00",{"id":130,"slug":131,"title":132,"created_at":133},"675942ef-b9ec-4c5f-a997-381250b6eacb","pixelsmile-facial-expression-editing-en","PixelSmile Framework Enhances Facial Expression Editing","2026-03-28T14:55:20.633463+00:00",{"id":135,"slug":136,"title":137,"created_at":138},"6954fa2b-8b66-4839-884b-e46f89fa1bc3","adaptive-block-scaled-data-types-en","IF4: Smarter 4-Bit Quantization That Adapts to Your Data","2026-03-31T06:00:36.65963+00:00"]