Integer overflow in buffer size calculation could result in out of bounds memory access when handling large tensors in Samsung Open Source ONE.
Affected version is prior to commit 1.30.0.
Affected version is prior to commit 1.30.0.
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
| Link | Providers |
|---|---|
| https://github.com/Samsung/ONE/pull/16481 |
|
History
Wed, 22 Apr 2026 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Samsung Open Source
Samsung Open Source one |
|
| Vendors & Products |
Samsung Open Source
Samsung Open Source one |
Wed, 22 Apr 2026 07:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Integer Overflow in Buffer Size Calculation Causing Out‑of‑Bounds Memory Access in Samsung ONE |
Wed, 22 Apr 2026 06:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Integer overflow in buffer size calculation could result in out of bounds memory access when handling large tensors in Samsung Open Source ONE. Affected version is prior to commit 1.30.0. | |
| Weaknesses | CWE-190 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: samsung.tv_appliance
Published:
Updated: 2026-04-22T13:08:23.828Z
Reserved: 2026-04-13T04:23:34.943Z
Link: CVE-2026-40449
No data.
Status : Received
Published: 2026-04-22T07:16:13.450
Modified: 2026-04-22T07:16:13.450
Link: CVE-2026-40449
No data.
OpenCVE Enrichment
Updated: 2026-04-22T11:44:40Z
Weaknesses