The tqdm._version module in tqdm versions 4.4.1 and 4.10 allows local users to execute arbitrary code via a crafted repo with a malicious git log in the current working directory.
{ "binaries": [ { "binary_name": "python-tqdm", "binary_version": "4.11.2-1" }, { "binary_name": "python3-tqdm", "binary_version": "4.11.2-1" } ], "availability": "No subscription required" }
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2016/UBUNTU-CVE-2016-10075.json"