mcp/docs
Snider 95f8ad387c docs(security): document accepted ollama CVEs + operator runbook
Closes Mantis #323.

All 9 CVEs filed in #323 (govulncheck against the github.com/ollama/ollama
indirect dep) are unfixed upstream as of 2026-04-25. We are on v0.18.1
indirect via go-rag; ollama upstream is at v0.21.2 (3 days old). Pin-bump
resolves none of them.

Documents:
- CVE-by-CVE reachability assessment in our call graph
- 7 server-side CVEs (GZIP DoS, OOB, divzero, nullderef, server DoS) →
  unreachable; we are a client, not a server
- 1 conditional (GO-2025-3824 token exposure) → watch flag, reachable IF we
  ever add auth tokens
- 1 operator-side (GO-2025-4251 missing auth) → operator runbook required

Operator runbook covers:
- Network-level isolation (localhost-only or private-network binding)
- Reverse-proxy + auth for shared deployments
- CI-side govulncheck filter scoped to just these 9 CVE IDs

Surface in use: 3 symbols only (api.NewClient, api.Client, api.EmbedRequest)
imported from one file (go-rag/ollama.go). Vendor-fork would be
over-engineering for this scope; pin-bump is unavailable.

Argus filed; athena reviewed + documented.

Co-Authored-By: Argus <argus@lthn.ai>
Co-Authored-By: Athena <athena@lthn.ai>
Co-Authored-By: Virgil <virgil@lethean.io>
2026-04-25 01:40:43 +01:00
..
plans docs(mcp): add SDK migration plan for AX conventions + notifications 2026-03-21 12:34:14 +00:00
architecture.md feat(mcp): add server resource listing 2026-04-02 16:47:03 +00:00
development.md docs(mcp): refresh AX migration notes and options references 2026-03-30 07:52:58 +00:00
index.md docs: add human-friendly documentation 2026-03-11 13:02:40 +00:00
migration-guide-options.md feat(mcp): align channel notifications with AX notifier flow 2026-03-30 05:48:11 +00:00
security-vulnerabilities.md docs(security): document accepted ollama CVEs + operator runbook 2026-04-25 01:40:43 +01:00