Impact
This vulnerability is an integer overflow that occurs while calculating the scratch buffer size during initialization in Samsung Open Source ONE. The overflow causes incorrect memory initialization when the program handles large intermediate tensors, which can lead to memory corruption and potentially a crash of the running application.
Affected Systems
Samsung Open Source ONE, any installation that uses versions prior to commit 1.30.0. The exact vendors and product names are Samsung Open Source ONE; affected releases are all builds before the introduction of commit 1.30.0 in the repository.
Risk and Exploitability
With a CVSS score of 6.1 the problem is considered medium severity. No EPSS score is available, and the vulnerability is not listed in CISA KEV. The likely attack vector is that an attacker can supply or influence large intermediate tensors—either locally or remotely if the library is exposed in a user‑controlled context—to trigger the integer overflow, resulting in memory corruption that may cause a denial of service or, in worst cases, arbitrary code execution if the corrupted memory affects control data.
OpenCVE Enrichment