[GH-ISSUE #9566] NVDB-CNVDB-2025882765 vulnerability? #68295

Closed
opened 2026-05-04 13:09:46 -05:00 by GiteaMirror · 6 comments
Owner

Originally created by @ZhouMM92 on GitHub (Mar 7, 2025).
Original GitHub issue: https://github.com/ollama/ollama/issues/9566

What is the issue?

Recently, the Industrial and Information Technology Ministry's Cybersecurity Threat and Vulnerability Information Sharing Platform monitored and discovered that the Ollama has an unauthorized access critical vulnerability (NVDB-CNVDB-2025882765), which can lead to data leaks, computing power theft, interruptions, and other serious hazards.
So how can I fix it?

Relevant log output


OS

No response

GPU

No response

CPU

No response

Ollama version

No response

Originally created by @ZhouMM92 on GitHub (Mar 7, 2025). Original GitHub issue: https://github.com/ollama/ollama/issues/9566 ### What is the issue? Recently, the Industrial and Information Technology Ministry's Cybersecurity Threat and Vulnerability Information Sharing Platform monitored and discovered that the Ollama has an unauthorized access critical vulnerability (NVDB-CNVDB-2025882765), which can lead to data leaks, computing power theft, interruptions, and other serious hazards. So how can I fix it? ### Relevant log output ```shell ``` ### OS _No response_ ### GPU _No response_ ### CPU _No response_ ### Ollama version _No response_
GiteaMirror added the bugneeds more info labels 2026-05-04 13:09:46 -05:00
Author
Owner

@rick-github commented on GitHub (Mar 7, 2025):

Description of vulnerability?

<!-- gh-comment-id:2705805463 --> @rick-github commented on GitHub (Mar 7, 2025): Description of vulnerability?
Author
Owner

@jaypeche commented on GitHub (Mar 7, 2025):

Hello, I maintain the Ollama package in its binary version, for Gentoo Linux. I run the service with a dedicated ollama user. To protect myself from some data leaks, I restrict access to the shell for Ollama. I don't know if this is suitable for all situations, but for coding, it doesn't seem to be a problem. Here are the links that go well:

https://ftp.pingwho.org/pub/gentoo/ftp/overlay/dbox2-overlay/acct-user/ollama/ollama-0-r1.ebuild
https://ftp.pingwho.org/pub/gentoo/ftp/overlay/dbox2-overlay/acct-group/ollama/ollama-0-r1.ebuild
https://ftp.pingwho.org/pub/gentoo/ftp/overlay/dbox2-overlay/app-misc/ollama-bin/ollama-bin-0.5.13.ebuild

<!-- gh-comment-id:2706513825 --> @jaypeche commented on GitHub (Mar 7, 2025): Hello, I maintain the Ollama package in its binary version, for Gentoo Linux. I run the service with a dedicated ollama user. To protect myself from some data leaks, I restrict access to the shell for Ollama. I don't know if this is suitable for all situations, but for coding, it doesn't seem to be a problem. Here are the links that go well: https://ftp.pingwho.org/pub/gentoo/ftp/overlay/dbox2-overlay/acct-user/ollama/ollama-0-r1.ebuild https://ftp.pingwho.org/pub/gentoo/ftp/overlay/dbox2-overlay/acct-group/ollama/ollama-0-r1.ebuild https://ftp.pingwho.org/pub/gentoo/ftp/overlay/dbox2-overlay/app-misc/ollama-bin/ollama-bin-0.5.13.ebuild
Author
Owner

@Gitaddy commented on GitHub (Mar 10, 2025):

You can refer to this article: https://mp.weixin.qq.com/s/uV3isS780ZU1X1ilH4sxKw , It may be the vulnerability situation you need, pay attention to it

<!-- gh-comment-id:2710503503 --> @Gitaddy commented on GitHub (Mar 10, 2025): You can refer to this article: https://mp.weixin.qq.com/s/uV3isS780ZU1X1ilH4sxKw , It may be the vulnerability situation you need, pay attention to it
Author
Owner

@rick-github commented on GitHub (Mar 10, 2025):

This article is based on a false premise. By default, ollama binds to 127.0.0.1 and is therefore not accessible to a remote attacker. If the user configures the server to listen to a different IP address, it's true that the user must enable access controls, but that's not an ollama issue.

<!-- gh-comment-id:2710565028 --> @rick-github commented on GitHub (Mar 10, 2025): This article is based on a false premise. By default, ollama binds to 127.0.0.1 and is therefore not accessible to a remote attacker. If the user configures the server to listen to a different IP address, it's true that the user must enable access controls, but that's not an ollama issue.
Author
Owner

@chenyiping124 commented on GitHub (Mar 10, 2025):

这是来自QQ邮箱的假期自动回复邮件。您好,我最近正在休假中,无法亲自回复您的邮件。我将在假期结束后,尽快给您回复。

<!-- gh-comment-id:2710569697 --> @chenyiping124 commented on GitHub (Mar 10, 2025): 这是来自QQ邮箱的假期自动回复邮件。您好,我最近正在休假中,无法亲自回复您的邮件。我将在假期结束后,尽快给您回复。
Author
Owner

@chenyiping124 commented on GitHub (Mar 26, 2025):

这是来自QQ邮箱的假期自动回复邮件。您好,我最近正在休假中,无法亲自回复您的邮件。我将在假期结束后,尽快给您回复。

<!-- gh-comment-id:2754309131 --> @chenyiping124 commented on GitHub (Mar 26, 2025): 这是来自QQ邮箱的假期自动回复邮件。您好,我最近正在休假中,无法亲自回复您的邮件。我将在假期结束后,尽快给您回复。
Sign in to join this conversation.
1 Participants
Notifications
Due Date
No due date set.
Dependencies

No dependencies set.

Reference: github-starred/ollama#68295