Closed
Description
Advisory CVE-2024-39720 references a vulnerability in the following Go modules:
Module |
---|
github.com/ollama/ollama |
Description:
An issue was discovered in Ollama before 0.1.46. An attacker can use two HTTP requests to upload a malformed GGUF file containing just 4 bytes starting with the GGUF custom magic header. By leveraging a custom Modelfile that includes a FROM statement pointing to the attacker-controlled blob file, the attacker can crash the application through the CreateModel route, leading to a segmentation fault (signal SIGSEGV: segmentation violation).
References:
- ADVISORY: https://nvd.nist.gov/vuln/detail/CVE-2024-39720
- WEB: ollama/ollama@v0.1.45...v0.1.46#diff-782c2737eecfa83b7cb46a77c8bdaf40023e7067baccd4f806ac5517b4563131L417
- WEB: https://oligosecurity.webflow.io/blog/more-models-more-probllms
Cross references:
- github.com/ollama/ollama appears in 2 other report(s):
- data/reports/GO-2024-2901.yaml (x/vulndb: potential Go vuln in github.com/ollama/ollama: CVE-2024-37032 #2901)
- data/reports/GO-2024-3104.yaml (x/vulndb: potential Go vuln in github.com/ollama/ollama: CVE-2024-45436 #3104)
See doc/quickstart.md for instructions on how to triage this report.
id: GO-ID-PENDING
modules:
- module: github.com/ollama/ollama
vulnerable_at: 0.3.14
summary: CVE-2024-39720 in github.com/ollama/ollama
cves:
- CVE-2024-39720
references:
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-39720
- web: https://github.com/ollama/ollama/compare/v0.1.45...v0.1.46#diff-782c2737eecfa83b7cb46a77c8bdaf40023e7067baccd4f806ac5517b4563131L417
- web: https://oligosecurity.webflow.io/blog/more-models-more-probllms
source:
id: CVE-2024-39720
created: 2024-10-31T21:01:24.9265414Z
review_status: UNREVIEWED