Reference #18.490dde17.1778442846.30338b4e
https://errors.edgesuite.net/18.490dde17.1778442846.30338b4e
Reference #18.490dde17.1778442846.30338b4e
https://errors.edgesuite.net/18.490dde17.1778442846.30338b4e
Reference #18.2d4adc17.1778444391.8a9bf0c
https://errors.edgesuite.net/18.2d4adc17.1778444391.8a9bf0c
Cybersecurity researchers have disclosed a critical security vulnerability in Ollama that, if successfully exploited, could allow a remote, unauthenticated attacker to leak its entire process memory.
The out-of-bounds read flaw, which likely impacts over 300,000 servers globally, is tracked as CVE-2026-7482 (CVSS score: 9.1). It has been codenamed Bleeding Llama by Cyera.
Ollama is a popular open-source framework that allows large language models (LLMs) to be run locally instead of on the cloud. On GitHub, the project has more than 171,000 stars and has been forked over 16,100 times.
“Ollama before 0.17.1 contains a heap out-of-bounds read vulnerability in the GGUF model loader,” according to a description of the flaw in CVE.org. “The /api/create endpoint accepts an attacker-supplied GGUF file in which the declared tensor offset and size exceed the file’s actual length; during quantization in fs/ggml/gguf.go and server/quantization.go (WriteTo()), the server reads past the allocated heap buffer.”
GGUF, short for GPT-Generated Unified Format, is a file format that’s used to store large language models so that they can be easily loaded and executed locally.
The problem, at its core, stems from Ollama’s use of the unsafe package when creating a model from a GGUF file, specifically in a function named “WriteTo(),” thereby making it possible to execute operations that bypass the memory safety guarantees of the programming language.
In a hypothetical attack scenario, a bad actor can send a specially crafted GGUF file to an exposed Ollama server with the tensor’s shape set to a very large number to trigger the out-of-bounds heap read during model creation using the /api/create endpoint. Successful exploitation of the vulnerability could leak sensitive data from the Ollama process memory.
This may include environment variables, API keys, system prompts, and concurrent users’ conversation data. This data can be exfiltrated by uploading the resulting model artifact through the /api/push endpoint to an attacker-controlled registry.
The exploitation chain unfolds over three steps –
“An attacker can learn basically anything about the organization from your AI inference — API keys, proprietary code, customer contracts, and much more,” Cyera security researcher Dor Attias said.
“On top of that, engineers often connect Ollama to tools like Claude Code. In those cases, the impact is even higher — all tool outputs flow to the Ollama server, get saved in the heap, and potentially end up in an attacker’s hands.”
Users are advised to apply the latest fixes, limit network access, audit running instances for internet exposure, and isolate and secure them behind a firewall. It’s also recommended to deploy an authentication proxy or API gateway in front of all Ollama instances, as the REST API does not provide authentication out of the box.
The development comes as researchers at Striga detailed two vulnerabilities in Ollama’s Windows update mechanism that can be chained into persistent code execution. The shortcomings remain unpatched following disclosure on January 27, 2026, and have been published following the elapse of a 90-day disclosure period.
According to Bartłomiej “Bartek” Dmitruk, co-founder of Striga, the Windows desktop client auto-starts on login from the Windows Startup folder, listens on 127.0.0[.]1:11434, and periodically polls for updates in the background via the /api/update endpoint to run any pending updates on the next app start.
The identified vulnerabilities relate to a path traversal and a missing signature check that, when combined with the on-login routine, can permit an attacker with the ability to influence update responses to execute arbitrary code at every login. The flaws are listed below –
To exploit the flaws, the attacker needs to be in control of an update server that’s reachable by the victim’s Ollama client.In such a situation, it could lead to a scenario where an arbitrary executable is supplied as part of the update process and gets written to the Windows Startup folder without raising any signature check issues.
To be able to control the update response, one approach involves overriding the OLLAMA_UPDATE_URL to point the client at a local server on plain HTTP. The attack chain also assumes AutoUpdateEnabled is on, which is the default setting.
What’s more, the missing integrity check can lead to code execution on its own without the need for exploiting the path traversal vulnerability. In this case, the installer is dropped into the expected staging directory. During the next launch from the Startup folder, the update process is invoked without re-verifying the signature, causing the attacker’s code to be executed instead.
That being said, the remote code execution is not persistent, as the next legitimate update overwrites the staged file. By adding the path traversal to the mix, a bad actor can redirect the executable to be written outside the usual path and achieve persistent code execution.
According to CERT Polska, which took over the coordinated disclosure process, Ollama for Windows versions 0.12.10 through 0.17.5 are vulnerable to the two flaws. In the interim, users are recommended to turn off automatic updates and remove any existing Ollama shortcut from the Startup folder (“%APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup”) to disable the silent on-login execution pathway.
“Any Ollama for Windows installation running version 0.12.10 through 0.22.0 is vulnerable,” Dmitruk said. “The path traversal writes attacker-chosen executables into the Windows Startup folder. The missing signature verification keeps them there: the post-write cleanup that would remove unsigned files on a working updater is a no-op on Windows. On the next login, Windows runs whatever was left behind.”
“The chain produces persistent, silent code execution at the privilege level of the user running Ollama. Realistic payloads include reverse shells, info-stealers exfiltrating browser secrets and SSH keys, or droppers that pivot to additional persistence mechanisms. Anything that runs as the current user. Removing the dropped binary from the Startup folder ends the persistence, but the underlying flaws remain.”
The Scottish Labour leader, Anas Sarwar, has warned other Scottish political leaders not to spend the next Holyrood parliament “shouting about Nigel Farage”, saying his job is to ensure there is a credible opposition at Holyrood “that holds the SNP’s feet to the fire”.
While the Scottish National party won a fifth successive Holyrood victory and ended up with 58 MSPs, Labour had its worst result since devolution in 1999, tying for second place with Reform UK as both parties secured 17 MSPs.
Speaking for the first time since he conceded defeat on Friday, Sarwar said he did not believe it was Reform’s intention to do anything more than create division, and he said he would work with other political parties in the Scottish parliament that shared his views.
Interviewed on BBC Scotland’s Sunday Show, Sarwar refused to be drawn on speculation about Keir Starmer’s future as Labour leader and batted away questions about his own position, saying: “I’ve got a job to do and I intend to do it.”
He said: “If we think the next parliament is all about shouting about Nigel Farage, that only serves the purpose of those who want to use politics to divide us. We need the parliament to make sure it’s actually getting things done for people in Scotland, and that’s holding the SNP government to account and making sure they deliver the promises that they make.
“I don’t believe Reform can do that, I don’t think it’s their intention to do that. And it’s my intention, working with other political parties who share those same views, to make sure there is a credible opposition that holds the SNP’s feet to the fire.”
The results mean Reform’s Scottish leader, Malcolm Offord, now has the right to ask the opening questions at first minister’s questions, while Reform could get committee convenership posts.
The SNP is seven seats short of a majority, meaning it will have to rely on other parties to pass legislation. On Saturday the SNP leader, John Swinney, pointed to previous successful budget negotiations with the Greens and the Liberal Democrats, and said the party had worked constructively with the Tories and Labour in the past.
But all parties have ruled out working with Reform, and Swinney said he would not invite its representatives to Bute House for talks as he would the leaders of all other Holyrood parties in the coming week.
On the same programme, Reform’s deputy leader in Scotland, Thomas Kerr, said Swinney and Sarwar were ignoring the electorate and accused them of “political posturing before we’ve even set foot in the chamber”. He said: “It’s ridiculous, it’s anti-democratic.”
There has been some speculation that Reform may try to augment its Holyrood group with a further defection from the Tories to push Labour into third place, but on Saturday Offord reiterated Farage’s vow not to have any further Conservative defections. “We’re happy with the 17 that we’ve got,” he said.
Kerr told the Sunday Show his party was “not interested in making sure everybody is media-trained”. He defended Senga Beresford, newly elected in South Scotland, who previously stated her support for Tommy Robinson and for the deportation of Muslims, saying her posts had been taken out of context.
The Scottish Greens co-leader Gillian Mackay was asked on the programme about Q Manivannan, one of her Edinburgh MSPs, who is studying in Scotland on a student visa. The Scottish parliament recently passed legislation to allow people without permanent leave to remain to stand in elections. Mackay said she was confident Manivannan’s visa process would be completed during the term of the next parliament.
Earlier on the programme, the SNP’s Màiri McAllan pointed to “the single largest pro-independence majority” in the parliament’s history, combining SNP MSPs with the Scottish Greens’ 16 MSPs, their best ever result.
McAllan said the UK was “hurtling towards Nigel Farage as prime minister” and that Scots “must have the power to protect themselves from that”.
On Saturday, Swinney confirmed he would table a draft bill next week calling for Holyrood to be given the powers to stage a second independence referendum, a document that will have no legal force while the UK government continues to refuse Holyrood the powers to do so.

Reference #18.c5d07868.1778416997.3a9ff13c
https://errors.edgesuite.net/18.c5d07868.1778416997.3a9ff13c
NEWYou can now listen to Fox News articles!
The Indianapolis Grand Prix was a crash-filled affair on Saturday which saw IndyCar star Christian Lundgaard pick up his first win since 2023.
Felix Rosenqvist was involved in one of the scarier crashes of the day. He was entering Turn 13 of the road course on Lap 29 when he got into the side of Pato O’Ward and went airborne. Rosenqvist tried to drive through the wreck, but his vehicle was too damaged.
ZERO BS. JUST DAKICH. TAKE THE DON’T @ ME PODCAST ON THE ROAD. DOWNLOAD NOW!

Felix Rosenqvist drives car number 60 during practice for the Sonsio Grand Prix at Indianapolis Motor Speedway on May 8, 2026. (Bob Goshert/For IndyStar / USA TODAY NETWORK via Imagn Images)
He finished in 23rd after starting the race in third place.
Rosenqvist’s wreck was one of a few that occurred on the course. Drivers trading paint started early as there was bumping coming down the front stretch to take the green flag before Lap 1. As the drivers raced into Turn 1, a handful of drivers were caught up in a spin. Rosenqvist was involved in that incident as well.
CLICK HERE FOR MORE SPORTS COVERAGE ON FOXNEWS.COM

Felix Rosenqvist drives out of pit lane during practice for the Sonsio Grand Prix at Indianapolis Motor Speedway on May 8, 2026. (Mykal McEldowney/IndyStar / USA TODAY NETWORK via Imagn Images)
Marcus Ericsson, Christian Rasmussen and Alexander Rossi each failed to finish the race. Romain Grosjean finished the race but was one lap down.
There were 12 caution laps given during the race and six lead changes among four drivers.
The biggest lead change came at the end. Lundgaard passed David Malukas with 18 laps to go. He held off every other driver for the remainder of the race to capture the victory.

Arrow McLaren driver Christian Lundgaard poses for a photo after winning the Sonsio Grand Prix at Indianapolis Motor Speedway on May 9, 2026. (Grace Hollars/IndyStar / USA TODAY NETWORK via Imagn Images)
CLICK HERE TO DOWNLOAD THE FOX NEWS APP
The Indianapolis Grand Prix was the pre-cursor for the Indianapolis 500. IndyCar drivers will now have to get ready for one of the most-anticipated events of the year.
Reference #18.134adc17.1778417924.6e3d410
https://errors.edgesuite.net/18.134adc17.1778417924.6e3d410
Reference #18.6e560e17.1778417192.a52630c
https://errors.edgesuite.net/18.6e560e17.1778417192.a52630c
Reference #18.84adc17.1778419392.155711fd
https://errors.edgesuite.net/18.84adc17.1778419392.155711fd

Reference #18.c5d07868.1778416588.3a9843c0
https://errors.edgesuite.net/18.c5d07868.1778416588.3a9843c0