Описание
An issue was discovered in Ollama before 0.1.34. The CreateModelHandler function uses os.Open to read a file until completion. The req.Path parameter is user-controlled and can be set to /dev/random, which is blocking, causing the goroutine to run infinitely (even after the HTTP request is aborted by the client).
An issue was discovered in Ollama before 0.1.34. The CreateModelHandler function uses os.Open to read a file until completion. The req.Path parameter is user-controlled and can be set to /dev/random, which is blocking, causing the goroutine to run infinitely (even after the HTTP request is aborted by the client).
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2024-39721
- https://github.com/ollama/ollama/blob/9164b0161bcb24e543cba835a8863b80af2c0c21/server/routes.go#L557
- https://github.com/ollama/ollama/blob/adeb40eaf29039b8964425f69a9315f9f1694ba8/server/routes.go#L536
- https://oligosecurity.webflow.io/blog/more-models-more-probllms
- https://www.oligo.security/blog/more-models-more-probllms
Связанные уязвимости
An issue was discovered in Ollama before 0.1.34. The CreateModelHandler function uses os.Open to read a file until completion. The req.Path parameter is user-controlled and can be set to /dev/random, which is blocking, causing the goroutine to run infinitely (even after the HTTP request is aborted by the client).
An issue was discovered in Ollama before 0.1.34. The CreateModelHandle ...
Уязвимость системы запуска и управления большими языковыми моделями (LLM) Ollama, связанная с неконтролируемым расходом ресурсов, позволяющая нарушителю вызвать отказ в обслуживании