Impact
An integer overflow is present in the calculation of the tensor copy size during output tensor copying in Samsung Open Source:ONE. This flaw leads to an incorrect length being used when a tensor exceeds a certain size, allowing memory corruption through an oversized tensor. The vulnerability is classified as CWE-190, indicating a numeric safety flaw that can compromise data integrity.
Affected Systems
The issue affects deployments of Samsung Open Source:ONE that are built from any commit prior to 1.30.0. No specific product versions beyond this commit boundary are impacted, and the vulnerability is tied solely to the Samsung Open Source:ONE library.
Risk and Exploitability
The CVSS score of 6.6 places the bug in the Medium severity range, and the lack of an EPSS score or KEV listing suggests it is not widely exploited at this time. The vulnerability can only be triggered when a tensor of sufficient size is processed, implying that an attacker would require the ability to influence tensor inputs to the library. The resulting memory corruption could potentially lead to code execution or system instability, but an active exploitation path has not been documented.
OpenCVE Enrichment