Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2024-34062

Опубликовано: 03 мая 2024
Источник: debian
EPSS Низкий

Описание

tqdm is an open source progress bar for Python and CLI. Any optional non-boolean CLI arguments (e.g. `--delim`, `--buf-size`, `--manpath`) are passed through python's `eval`, allowing arbitrary code execution. This issue is only locally exploitable and had been addressed in release version 4.66.3. All users are advised to upgrade. There are no known workarounds for this vulnerability.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
tqdmfixed4.66.4-1package
tqdmno-dsabookwormpackage
tqdmno-dsabullseyepackage
tqdmpostponedbusterpackage

Примечания

  • https://github.com/tqdm/tqdm/security/advisories/GHSA-g7vv-2v7x-gj9p

  • Fixed by: https://github.com/tqdm/tqdm/commit/b53348c73080b4edeb30b4823d1fa0d8d2c06721 (v4.66.3)

EPSS

Процентиль: 13%
0.00044
Низкий

Связанные уязвимости

CVSS3: 4.8
ubuntu
около 1 года назад

tqdm is an open source progress bar for Python and CLI. Any optional non-boolean CLI arguments (e.g. `--delim`, `--buf-size`, `--manpath`) are passed through python's `eval`, allowing arbitrary code execution. This issue is only locally exploitable and had been addressed in release version 4.66.3. All users are advised to upgrade. There are no known workarounds for this vulnerability.

CVSS3: 7.3
redhat
около 1 года назад

tqdm is an open source progress bar for Python and CLI. Any optional non-boolean CLI arguments (e.g. `--delim`, `--buf-size`, `--manpath`) are passed through python's `eval`, allowing arbitrary code execution. This issue is only locally exploitable and had been addressed in release version 4.66.3. All users are advised to upgrade. There are no known workarounds for this vulnerability.

CVSS3: 4.8
nvd
около 1 года назад

tqdm is an open source progress bar for Python and CLI. Any optional non-boolean CLI arguments (e.g. `--delim`, `--buf-size`, `--manpath`) are passed through python's `eval`, allowing arbitrary code execution. This issue is only locally exploitable and had been addressed in release version 4.66.3. All users are advised to upgrade. There are no known workarounds for this vulnerability.

CVSS3: 4.8
msrc
9 месяцев назад

Описание отсутствует

suse-cvrf
около 1 года назад

Security update for python-tqdm

EPSS

Процентиль: 13%
0.00044
Низкий