Debian Package Tracker
Register | Log in
Subscribe

tensorflow

Choose email to subscribe with

general
  • source: tensorflow (main)
  • version: 2.14.1+dfsg-3
  • maintainer: Debian Deep Learning Team (archive) (DMD)
  • uploaders: Dylan Aïssi [DMD] – Bardia Moshiri [DMD]
  • arch: any
  • std-ver: 4.7.2
  • VCS: Git (Browse, QA)
versions [more versions can be listed by madison] [old versions available from snapshot.debian.org]
[pool directory]
  • testing: 2.14.1+dfsg-3
  • unstable: 2.14.1+dfsg-3
versioned links
  • 2.14.1+dfsg-3: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
binaries
  • libtensorflow-lite-dev
  • libtensorflow-lite2.14.1
action needed
A new upstream version is available: 2.20.0 high
A new upstream version 2.20.0 is available, you should consider packaging it.
Created: 2025-11-26 Last update: 2026-02-21 14:02
2 security issues in sid high

There are 2 open security issues in sid.

2 important issues:
  • CVE-2026-2492: TensorFlow HDF5 Library Uncontrolled Search Path Element Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of TensorFlow. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the handling of plugins. The application loads plugins from an unsecured location. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of a target user. Was ZDI-CAN-25480.
  • CVE-2025-55556: TensorFlow v2.18.0 was discovered to output random results when compiling Embedding, leading to unexpected behavior in the application.
Created: 2025-09-02 Last update: 2026-02-21 10:00
2 security issues in forky high

There are 2 open security issues in forky.

2 important issues:
  • CVE-2026-2492: TensorFlow HDF5 Library Uncontrolled Search Path Element Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of TensorFlow. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the handling of plugins. The application loads plugins from an unsecured location. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of a target user. Was ZDI-CAN-25480.
  • CVE-2025-55556: TensorFlow v2.18.0 was discovered to output random results when compiling Embedding, leading to unexpected behavior in the application.
Created: 2025-09-07 Last update: 2026-02-21 10:00
lintian reports 2 errors high
Lintian reports 2 errors about this package. You should make the package lintian clean getting rid of them.
Created: 2026-01-17 Last update: 2026-01-18 03:01
1 open merge request in Salsa normal
There is 1 open merge request for this package on Salsa. You should consider reviewing and/or merging these merge requests.
Created: 2026-02-16 Last update: 2026-02-16 10:55
Standards version of the package is outdated. wishlist
The package should be updated to follow the last version of Debian Policy (Standards-Version 4.7.3 instead of 4.7.2).
Created: 2025-12-23 Last update: 2025-12-23 20:00
testing migrations
  • This package will soon be part of the auto-abseil transition. You might want to ensure that your package is ready for it. You can probably find supplementary information in the debian-release archives or in the corresponding release.debian.org bug.
news
[rss feed]
  • [2025-09-14] tensorflow 2.14.1+dfsg-3 MIGRATED to testing (Debian testing watch)
  • [2025-09-07] Accepted tensorflow 2.14.1+dfsg-3 (source) into unstable (Dylan Aïssi)
  • [2025-09-07] tensorflow 2.14.1+dfsg-2 MIGRATED to testing (Debian testing watch)
  • [2025-09-01] Accepted tensorflow 2.14.1+dfsg-2 (source) into unstable (Dylan Aïssi)
  • [2025-09-01] Accepted tensorflow 2.14.1+dfsg-1 (source amd64) into experimental (Debian FTP Masters) (signed by: Dylan Aïssi)
  • [2022-02-09] Accepted tensorflow 2.3.1-1 (source amd64) into experimental, experimental (Debian FTP Masters) (signed by: Wookey)
  • [2019-08-27] Removed 1.10.1+dfsg-A2 from experimental (Debian FTP Masters)
  • [2019-08-27] Removed 1.10.1+dfsg-A1 from experimental (Debian FTP Masters)
  • [2018-12-29] Accepted tensorflow 1.10.1+dfsg-A2 (source) into experimental (Mo Zhou) (signed by: Zhou Mo)
  • [2018-11-22] Accepted tensorflow 1.10.1+dfsg-A1 (source amd64 all) into experimental, experimental (Mo Zhou) (signed by: Zhou Mo)
bugs [bug history graph]
  • all: 1
  • RC: 0
  • I&N: 1
  • M&W: 0
  • F&P: 0
  • patch: 0
links
  • homepage
  • lintian (2, 0)
  • buildd: logs, reproducibility, cross
  • popcon
  • browse source code
  • edit tags
  • other distros
  • security tracker
  • debian patches
  • debci
ubuntu Ubuntu logo [Information about Ubuntu for Debian Developers]
  • version: 2.14.1+dfsg-3build1

Debian Package Tracker — Copyright 2013-2025 The Distro Tracker Developers
Report problems to the tracker.debian.org pseudo-package in the Debian BTS.
Documentation — Bugs — Git Repository — Contributing