Import Source
https://github.com/microsoft/AzureLinuxVulnerabilityData/blob/main/osv/AZL-38926.json
JSON Data
https://api.test.osv.dev/v1/vulns/AZL-38926
Upstream
Published
2023-05-26T21:15:15Z
Modified
2026-04-01T05:23:48.298959Z
Severity
  • 5.9 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
CVE-2023-28320 affecting package tensorflow for versions less than 2.16.1-1
Details

A denial of service vulnerability exists in curl <v8.1.0 in the way libcurl provides several different backends for resolving host names, selected at build time. If it is built to use the synchronous resolver, it allows name resolves to time-out slow operations using alarm() and siglongjmp(). When doing this, libcurl used a global buffer that was not mutex protected and a multi-threaded application might therefore crash or otherwise misbehave.

References

Affected packages

Azure Linux:3 / tensorflow

Package

Name
tensorflow
Purl
pkg:rpm/azure-linux/tensorflow

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.16.1-1

Database specific

source
"https://github.com/microsoft/AzureLinuxVulnerabilityData/blob/main/osv/AZL-38926.json"