CVE-2026-1188
BaseFortify
Publication date: 2026-01-29
Last updated on: 2026-02-09
Assigner: Eclipse Foundation
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| eclipse | omr | From 0.2 (inc) to 0.8.0 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-120 | The product copies an input buffer to an output buffer without verifying that the size of the input buffer is less than the size of the output buffer. |
| CWE-131 | The product does not correctly calculate the size to be used when allocating a buffer, which could lead to a buffer overflow. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability occurs in the Eclipse OMR port library component where an API function that returns the textual names of all supported processor features does not properly account for the separator inserted between processor features. If the output buffer provided to this function is incorrectly sized by not including space for the separator, it can lead to a buffer overflow when writing to the buffer. [1]
How can this vulnerability impact me? :
The vulnerability can lead to a buffer overflow, which may cause unexpected behavior such as crashes or potential exploitation by attackers to execute arbitrary code or cause denial of service. This impacts the stability and security of systems using the affected Eclipse OMR versions prior to 0.8.0. [1]
What immediate steps should I take to mitigate this vulnerability?
Update Eclipse OMR to version 0.8.0 or later, which includes the fix for this buffer overflow issue in the processor feature string function. The fix ensures sufficient space is allocated for separator characters, preventing buffer overflows. [1]