Impact
An integer overflow occurs during constant tensor data size calculation in Samsung Open Source ONE. The calculation does not correctly account for large constant nodes, resulting in an under‑sized buffer. If an attacker can introduce a large constant node, the program may write data beyond the allocated buffer, potentially corrupting memory or causing a crash.
Affected Systems
Samsung Open Source:ONE implementations prior to commit 1.30.0 are affected. No other version or vendor details are provided, so all instances using earlier commits than 1.30.0 should be considered vulnerable.
Risk and Exploitability
The CVSS score of 6.6 indicates a moderate severity. EPSS is unavailable and the vulnerability is not listed in KEV, suggesting no known active exploitation. However, the integer overflow could be leveraged by an attacker who can influence tensor initialization; if exploited, it may lead to memory corruption and potentially allow code execution, particularly if the overflow triggers a crash that can be exploited. The exact attack vector is not documented, so the risk remains based on potential local or indirect exploitation scenarios.
OpenCVE Enrichment