Impact
Integer overflow occurs during tensor copy size calculation in Samsung Open Source ONE, which can cause the program to read or write memory beyond the intended bounds during loop state propagation. This flaw falls under CWE‑190 and may lead to memory corruption, potentially allowing an attacker to disrupt system integrity or, in a worst‑case scenario, execute arbitrary code if the bounds violation can be leveraged to overwrite control data.
Affected Systems
Samsung Open Source ONE for all versions prior to commit 1.30.0. No higher‑level product names are provided in the CNA data, but the stated affected-range covers every build before that commit.
Risk and Exploitability
The CVSS score of 6.6 indicates moderate severity, and the flaw is not listed in the CISA KEV catalog. EPSS is not available, so exploitation likelihood cannot be quantified. The attack vector is inferred to be an attacker able to supply crafted tensor data that triggers the overflow; the flaw does not require privileged access or network exposure, but would likely need local execution within the application. Successful exploitation could corrupt memory, crash the process, or provide a foothold for further compromise if additional vulnerabilities exist.
OpenCVE Enrichment