Description
Vulnerability in root-project root (builtins/zlib modules). This vulnerability is associated with program files inffast.C.

This issue affects root.
Published: 2026-01-27
Score: 9.3 Critical
EPSS: < 1% Very Low
KEV: No
Impact: Arbitrary code execution via memory corruption
Action: Immediate Patch
AI Analysis

Impact

The flaw lies in an improper pointer arithmetic in the 'inffast.c' module of the ROOT application, a component that processes ZIP/deflate streams. This incorrect arithmetic can corrupt memory, potentially allowing an attacker to execute arbitrary code on the target system. The vulnerability is classified as a memory corruption weakness and may let malicious data trigger arbitrary code execution when the ROOT application decompresses input files. The damage could include full system compromise, data loss, and persistence if the attacker gains sufficient privileges. Based on the description, it is inferred that the attack vector may involve crafted compressed inputs delivered to ROOT, but no specific evidence of remote exploitation is provided. The risk to confidentiality, integrity, and availability is therefore severe.

Affected Systems

Vulnerable systems include installations of the root-project ROOT software. The affected vendor is root-project and product ROOT. Exact product versions are not specified in the advisory, so users should consult the vendor or the referenced pull request to verify which releases incorporate the fix. In the absence of version data, any deployment that has not applied the patch from PR 18526 should be considered vulnerable.

Risk and Exploitability

The CVSS v3.1 score of 9.3 indicates critical severity, with high impact and multiple attack vectors. The EPSS score is reported as less than 1%, implying that successful exploitation is currently considered unlikely but not impossible. The vulnerability is not listed in CISA’s Known Exploited Vulnerabilities catalog. An attacker would need to supply specially crafted compressed data that triggers the faulty pointer arithmetic; once triggered, memory corruption could lead to code execution. Because ROOT often processes user-supplied data, the practical risk to exposed services is significant even though the current observed exploit probability remains low.

Generated by OpenCVE AI on April 18, 2026 at 02:22 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the ROOT software to a version that includes the fix from pull request 18526.
  • Rebuild any configured ROOT-based applications with the updated source to ensure the inffast.c changes are active.
  • Until a patch is applied, limit ROOT’s processing of external compressed data or disable untrusted zlib streams to mitigate potential exploitation.

Generated by OpenCVE AI on April 18, 2026 at 02:22 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 19 Feb 2026 17:30:00 +0000


Tue, 17 Feb 2026 20:00:00 +0000

Type Values Removed Values Added
First Time appeared Root
Root root
CPEs cpe:2.3:a:root:root:*:*:*:*:*:*:*:*
Vendors & Products Root
Root root
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Tue, 27 Jan 2026 20:30:00 +0000

Type Values Removed Values Added
First Time appeared Riot Project
Riot Project riot
Vendors & Products Riot Project
Riot Project riot

Tue, 27 Jan 2026 15:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-119
CWE-125
CWE-20
CWE-787
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 27 Jan 2026 09:00:00 +0000

Type Values Removed Values Added
Description Vulnerability in root-project root (builtins/zlib modules). This vulnerability is associated with program files inffast.C. This issue affects root.
Title An improper pointer arithmetic in root-project/root at builtins/zlib/inffast.c
References
Metrics cvssV4_0

{'score': 9.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:H/VA:H/SC:L/SI:H/SA:H/S:N/AU:Y/R:U/V:D/RE:M/U:Amber'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GovTech CSG

Published:

Updated: 2026-02-19T16:10:51.424Z

Reserved: 2026-01-27T08:39:10.281Z

Link: CVE-2026-24811

cve-icon Vulnrichment

Updated: 2026-02-19T16:10:51.424Z

cve-icon NVD

Status : Modified

Published: 2026-01-27T09:15:51.440

Modified: 2026-02-19T17:24:49.470

Link: CVE-2026-24811

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T02:30:15Z