{"id":"AZL-38755","summary":"CVE-2022-35260 affecting package tensorflow for versions less than 2.16.1-1","details":"curl can be told to parse a `.netrc` file for credentials. If that file endsin a line with 4095 consecutive non-white space letters and no newline, curlwould first read past the end of the stack-based buffer, and if the readworks, write a zero byte beyond its boundary.This will in most cases cause a segfault or similar, but circumstances might also cause different outcomes.If a malicious user can provide a custom netrc file to an application or otherwise affect its contents, this flaw could be used as denial-of-service.","modified":"2026-04-01T05:13:21.157030Z","published":"2022-12-05T22:15:10Z","upstream":["CVE-2022-35260"],"references":[{"type":"WEB","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-35260"}],"affected":[{"package":{"name":"tensorflow","ecosystem":"Azure Linux:3","purl":"pkg:rpm/azure-linux/tensorflow"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2.16.1-1"}]}],"database_specific":{"source":"https://github.com/microsoft/AzureLinuxVulnerabilityData/blob/main/osv/AZL-38755.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}]}