PatchSiren cyber security CVE debrief
CVE-2016-10075 Tqdm Project CVE debrief
CVE-2016-10075 is a high-severity local code execution issue in tqdm’s _version module. According to the CVE description and NVD record, vulnerable versions 4.4.1 and 4.10 can be abused when a crafted repository with a malicious git log is present in the current working directory, allowing arbitrary code execution by a local user context.
- Vendor
- Tqdm Project
- Product
- CVE-2016-10075
- CVSS
- HIGH 7.8
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2017-01-19
- Original CVE updated
- 2026-05-13
- Advisory published
- 2017-01-19
- Advisory updated
- 2026-05-13
Who should care
Administrators and developers who run tqdm 4.4.1 or 4.10 on multi-user systems, developer workstations, CI agents, or build environments should care most—especially if those environments may open or inspect untrusted repositories.
Technical summary
NVD classifies the issue with CVSS 3.0 AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H and CWE-17. The vulnerable behavior is tied to tqdm._version and is triggered by malicious git log content in the current working directory, making this a local attack surface rather than a network-exposed one. The NVD CPE entries specifically list tqdm 4.4.1 and 4.10 as vulnerable.
Defensive priority
High. Treat this as urgent on any system that may process untrusted repositories or shared working directories, because successful exploitation can lead to full code execution with the privileges of the affected local user.
Recommended defensive actions
- Upgrade tqdm to a non-vulnerable release before using it in shared, developer, or automation environments.
- Remove or replace the specifically vulnerable versions 4.4.1 and 4.10 from golden images, dependency locks, and build caches.
- Avoid running affected tqdm versions in directories that can contain attacker-controlled or untrusted git repositories.
- Review scripts and CI jobs that import or initialize tqdm in repository workspaces, and constrain them to trusted inputs only.
- Verify downstream packages and environment images that vendor or pin tqdm, then redeploy after remediation.
Evidence notes
The supplied CVE description states that tqdm._version in versions 4.4.1 and 4.10 can execute arbitrary code via a crafted repo with a malicious git log in the current working directory. NVD lists the same affected versions in its CPE criteria and assigns CVSS 3.0 AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H with CWE-17. Public discussion is reflected in the Openwall oss-security thread dated 2016-12-28, and the CVE record was published on 2017-01-19.
Official resources
-
CVE-2016-10075 CVE record
CVE.org
-
CVE-2016-10075 NVD detail
NVD
-
Source item URL
nvd_modified
-
Mitigation or vendor reference
[email protected] - Mailing List, Third Party Advisory
-
Mitigation or vendor reference
[email protected] - Third Party Advisory, VDB Entry
-
Mitigation or vendor reference
[email protected] - Issue Tracking, Vendor Advisory
- Source reference
Public discussion appears in the Openwall oss-security thread on 2016-12-28, and the CVE record was published on 2017-01-19.