Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2026-41667

Summary
Assigner-samsung.tv_appliance
Assigner Org ID-ca193ba2-0cff-4e34-b04e-1ea07103c6fe
Published At-22 Apr, 2026 | 05:57
Updated At-03 May, 2026 | 22:43
Rejected At-
Credits

Integer overflow in constant tensor data size calculation in Samsung Open Source ONE could cause incorrect buffer sizing for large constant nodes. Affected version is prior to commit 1.30.0.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:samsung.tv_appliance
Assigner Org ID:ca193ba2-0cff-4e34-b04e-1ea07103c6fe
Published At:22 Apr, 2026 | 05:57
Updated At:03 May, 2026 | 22:43
Rejected At:
▼CVE Numbering Authority (CNA)

Integer overflow in constant tensor data size calculation in Samsung Open Source ONE could cause incorrect buffer sizing for large constant nodes. Affected version is prior to commit 1.30.0.

Affected Products
Vendor
Samsung Open Source
Product
ONE
Default Status
unaffected
Versions
Affected
  • 1.30.0
Problem Types
TypeCWE IDDescription
CWECWE-190CWE-190 Integer overflow or wraparound
Type: CWE
CWE ID: CWE-190
Description: CWE-190 Integer overflow or wraparound
Metrics
VersionBase scoreBase severityVector
3.16.6MEDIUM
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H
Version: 3.1
Base score: 6.6
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H
Metrics Other Info
Impacts
CAPEC IDDescription
CAPEC-100CAPEC-100 Overflow Buffers
CAPEC ID: CAPEC-100
Description: CAPEC-100 Overflow Buffers
Solutions

Configurations

Workarounds

Exploits

Credits

reporter
Sebastián Alba Vives
Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://github.com/Samsung/ONE/pull/16481
N/A
Hyperlink: https://github.com/Samsung/ONE/pull/16481
Resource: N/A
▼Authorized Data Publishers (ADP)
CISA ADP Vulnrichment
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:PSIRT@samsung.com
Published At:22 Apr, 2026 | 07:16
Updated At:22 Apr, 2026 | 21:23

Integer overflow in constant tensor data size calculation in Samsung Open Source ONE could cause incorrect buffer sizing for large constant nodes. Affected version is prior to commit 1.30.0.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Secondary3.16.6MEDIUM
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H
Type: Secondary
Version: 3.1
Base score: 6.6
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H
CPE Matches

Weaknesses
CWE IDTypeSource
CWE-190SecondaryPSIRT@samsung.com
CWE ID: CWE-190
Type: Secondary
Source: PSIRT@samsung.com
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://github.com/Samsung/ONE/pull/16481PSIRT@samsung.com
N/A
Hyperlink: https://github.com/Samsung/ONE/pull/16481
Source: PSIRT@samsung.com
Resource: N/A

Change History

0
Information is not available yet

Similar CVEs

10Records found

CVE-2026-41666
Matching Score-10
Assigner-Samsung TV & Appliance
ShareView Details
Matching Score-10
Assigner-Samsung TV & Appliance
CVSS Score-6.6||MEDIUM
EPSS-0.01% / 3.12%
||
7 Day CHG~0.00%
Published-22 Apr, 2026 | 05:56
Updated-03 May, 2026 | 22:42
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Integer overflow in tensor copy size calculation in Samsung Open Source ONE could lead to out of bounds access during loop state propagation. Affected version is prior to commit 1.30.0.

Action-Not Available
Vendor-Samsung Open Source
Product-ONE
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-2026-40450
Matching Score-10
Assigner-Samsung TV & Appliance
ShareView Details
Matching Score-10
Assigner-Samsung TV & Appliance
CVSS Score-6.6||MEDIUM
EPSS-0.02% / 4.56%
||
7 Day CHG~0.00%
Published-22 Apr, 2026 | 05:53
Updated-03 May, 2026 | 22:41
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Integer overflow in output tensor copy size calculation in Samsung Open Source ONE could cause incorrect copy length and memory corruption for oversized tensors. Affected version is prior to commit 1.30.0.

Action-Not Available
Vendor-Samsung Open Source
Product-ONE
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-2026-40449
Matching Score-10
Assigner-Samsung TV & Appliance
ShareView Details
Matching Score-10
Assigner-Samsung TV & Appliance
CVSS Score-6.6||MEDIUM
EPSS-0.01% / 3.12%
||
7 Day CHG~0.00%
Published-22 Apr, 2026 | 05:51
Updated-03 May, 2026 | 22:40
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Integer overflow in buffer size calculation could result in out of bounds memory access when handling large tensors in Samsung Open Source ONE. Affected version is prior to commit 1.30.0.

Action-Not Available
Vendor-Samsung Open Source
Product-ONE
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-2026-41664
Matching Score-10
Assigner-Samsung TV & Appliance
ShareView Details
Matching Score-10
Assigner-Samsung TV & Appliance
CVSS Score-6.6||MEDIUM
EPSS-0.01% / 3.12%
||
7 Day CHG~0.00%
Published-22 Apr, 2026 | 05:54
Updated-22 Apr, 2026 | 21:23
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Integer overflow in memory copy size calculation in Samsung Open Source ONE could lead to invalid memory operations with large tensor shapes. Affected version is prior to commit 1.30.0.

Action-Not Available
Vendor-Samsung Open Source
Product-ONE
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-2026-6839
Matching Score-8
Assigner-Samsung TV & Appliance
ShareView Details
Matching Score-8
Assigner-Samsung TV & Appliance
CVSS Score-6.6||MEDIUM
EPSS-0.02% / 6.45%
||
7 Day CHG~0.00%
Published-22 Apr, 2026 | 06:07
Updated-22 Apr, 2026 | 21:23
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper validation of STRING tensor offsets could allows malformed string metadata to trigger out of bounds access during constant tensor import in Samsung Open Source ONE Affected version is prior to commit 1.30.0.

Action-Not Available
Vendor-Samsung Open Source
Product-ONE
CWE ID-CWE-1284
Improper Validation of Specified Quantity in Input
CVE-2026-40447
Matching Score-6
Assigner-Samsung Mobile
ShareView Details
Matching Score-6
Assigner-Samsung Mobile
CVSS Score-5.1||MEDIUM
EPSS-0.02% / 4.30%
||
7 Day CHG~0.00%
Published-13 Apr, 2026 | 05:06
Updated-13 Apr, 2026 | 15:01
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Integer overflow or wraparound vulnerability in Samsung Open Source Escargot allows undefined behavior.This issue affects Escargot: 97e8115ab1110bc502b4b5e4a0c689a71520d335.

Action-Not Available
Vendor-Samsung Open Source
Product-Escargot
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-2026-41665
Matching Score-6
Assigner-Samsung TV & Appliance
ShareView Details
Matching Score-6
Assigner-Samsung TV & Appliance
CVSS Score-6.1||MEDIUM
EPSS-0.02% / 3.53%
||
7 Day CHG~0.00%
Published-22 Apr, 2026 | 05:55
Updated-03 May, 2026 | 22:42
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Integer overflow in scratch buffer initialization size calculation in Samsung Open Source ONE cause incorrect memory initialization for large intermediate tensors. Affected version is prior to commit 1.30.0.

Action-Not Available
Vendor-Samsung Open Source
Product-ONE
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-2026-40448
Matching Score-6
Assigner-Samsung TV & Appliance
ShareView Details
Matching Score-6
Assigner-Samsung TV & Appliance
CVSS Score-5.3||MEDIUM
EPSS-0.02% / 3.53%
||
7 Day CHG~0.00%
Published-22 Apr, 2026 | 05:40
Updated-03 May, 2026 | 22:39
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Potential Integer overflow in tensor allocation size calculation could lead to insufficient memory allocation for large tensors in Samsung Open Source ONE. Affected version is prior to commit  1.30.0.

Action-Not Available
Vendor-Samsung Open SourceSamsung
Product-oneONE
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-2026-25208
Matching Score-6
Assigner-Samsung Mobile
ShareView Details
Matching Score-6
Assigner-Samsung Mobile
CVSS Score-8.1||HIGH
EPSS-0.05% / 16.21%
||
7 Day CHG~0.00%
Published-13 Apr, 2026 | 04:49
Updated-28 Apr, 2026 | 20:47
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Integer overflow vulnerability in Samsung Open Source Escargot allows Overflow Buffers.This issue affects Escargot: 97e8115ab1110bc502b4b5e4a0c689a71520d335.

Action-Not Available
Vendor-Samsung Open SourceSamsung
Product-escargotEscargot
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-2026-45130
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-6.6||MEDIUM
EPSS-Not Assigned
Published-08 May, 2026 | 22:42
Updated-08 May, 2026 | 23:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Vim: Heap Buffer Overflow in spell file loading

Vim is an open source, command line text editor. Prior to version 9.2.0450, a heap buffer overflow exists in read_compound() in src/spellfile.c when loading a crafted spell file (.spl) with UTF-8 encoding active. An attacker-controlled length field in the spell file's compound section overflows a 32-bit signed integer multiplication, causing a small buffer to be allocated for a write loop that runs many iterations, overflowing the heap. Because the 'spelllang' option can be set from a modeline, a text file modeline can trigger spell file loading if a malicious .spl file has been planted on the runtimepath. This issue has been patched in version 9.2.0450.

Action-Not Available
Vendor-Vim
Product-vim
CWE ID-CWE-122
Heap-based Buffer Overflow
CWE ID-CWE-190
Integer Overflow or Wraparound
Details not found