{"id":"AZL-43189","summary":"CVE-2024-5569 affecting package tensorflow for versions less than 2.16.1-9","details":"A Denial of Service (DoS) vulnerability exists in the jaraco/zipp library, affecting all versions prior to 3.19.1. The vulnerability is triggered when processing a specially crafted zip file that leads to an infinite loop. This issue also impacts the zipfile module of CPython, as features from the third-party zipp library are later merged into CPython, and the affected code is identical in both projects. The infinite loop can be initiated through the use of functions affecting the `Path` module in both zipp and zipfile, such as `joinpath`, the overloaded division operator, and `iterdir`. Although the infinite loop is not resource exhaustive, it prevents the application from responding. The vulnerability was addressed in version 3.19.1 of jaraco/zipp.","modified":"2026-04-21T04:30:54.423895Z","published":"2024-07-09T00:15:02Z","upstream":["CVE-2024-5569"],"references":[{"type":"WEB","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-5569"}],"affected":[{"package":{"name":"tensorflow","ecosystem":"Azure Linux:3","purl":"pkg:rpm/azure-linux/tensorflow"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2.16.1-9"}]}],"database_specific":{"source":"https://github.com/microsoft/AzureLinuxVulnerabilityData/blob/main/osv/AZL-43189.json"}}],"schema_version":"1.7.5"}