{"id":"AZL-48141","summary":"CVE-2024-8088 affecting package tensorflow for versions less than 2.16.1-7","details":"There is a HIGH severity vulnerability affecting the CPython \"zipfile\"\nmodule affecting \"zipfile.Path\". Note that the more common API \"zipfile.ZipFile\" class is unaffected.\n\n\n\n\n\nWhen iterating over names of entries in a zip archive (for example, methods\nof \"zipfile.Path\" like \"namelist()\", \"iterdir()\", etc)\nthe process can be put into an infinite loop with a maliciously crafted\nzip archive. This defect applies when reading only metadata or extracting\nthe contents of the zip archive. Programs that are not handling\nuser-controlled zip archives are not affected.","modified":"2026-04-01T05:17:08.573364Z","published":"2024-08-22T19:15:09Z","upstream":["CVE-2024-8088"],"references":[{"type":"WEB","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-8088"}],"affected":[{"package":{"name":"tensorflow","ecosystem":"Azure Linux:3","purl":"pkg:rpm/azure-linux/tensorflow"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2.16.1-7"}]}],"database_specific":{"source":"https://github.com/microsoft/AzureLinuxVulnerabilityData/blob/main/osv/AZL-48141.json"}}],"schema_version":"1.7.5"}