Use of NullPointerException Catch to Detect NULL Pointer Dereference Affecting ollama package, versions <0.14.0-r0


Severity

Recommended
0.0
high
0
10

Snyk's Security Team recommends NVD's CVSS assessment. Learn more

Threat Intelligence

EPSS
0.09% (26th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-MINIMOSLATEST-OLLAMA-15166918
  • published2 Feb 2026
  • disclosed12 Jan 2026

Introduced: 12 Jan 2026

CVE-2025-15514  (opens in a new tab)
CWE-395  (opens in a new tab)

How to fix?

Upgrade Minimos:latest ollama to version 0.14.0-r0 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream ollama package and not the ollama package as distributed by Minimos. See How to fix? for Minimos:latest relevant fixed versions and status.

Ollama 0.11.5-rc0 through current version 0.13.5 contain a null pointer dereference vulnerability in the multi-modal model image processing functionality. When processing base64-encoded image data via the /api/chat endpoint, the application fails to validate that the decoded data represents valid media before passing it to the mtmd_helper_bitmap_init_from_buf function. This function can return NULL for malformed input, but the code does not check this return value before dereferencing the pointer in subsequent operations. A remote attacker can exploit this by sending specially crafted base64 image data that decodes to invalid media, causing a segmentation fault and crashing the runner process. This results in a denial of service condition where the model becomes unavailable to all users until the service is restarted.

CVSS Base Scores

version 3.1