diff --git a/advisories/unreviewed/2026/01/GHSA-6w46-j5rx-g56g/GHSA-6w46-j5rx-g56g.json b/advisories/unreviewed/2026/01/GHSA-6w46-j5rx-g56g/GHSA-6w46-j5rx-g56g.json index d2b4be143e67b..ea2a02c0d8204 100644 --- a/advisories/unreviewed/2026/01/GHSA-6w46-j5rx-g56g/GHSA-6w46-j5rx-g56g.json +++ b/advisories/unreviewed/2026/01/GHSA-6w46-j5rx-g56g/GHSA-6w46-j5rx-g56g.json @@ -1,11 +1,12 @@ { "schema_version": "1.4.0", "id": "GHSA-6w46-j5rx-g56g", - "modified": "2026-01-22T06:30:29Z", + "modified": "2026-01-22T06:30:35Z", "published": "2026-01-22T06:30:29Z", "aliases": [ "CVE-2025-71176" ], + "summary": "Add Affected Product as PIP package", "details": "pytest through 9.0.2 on UNIX relies on directories with the /tmp/pytest-of-{user} name pattern, which allows local users to cause a denial of service or possibly gain privileges.", "severity": [ { @@ -13,7 +14,27 @@ "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L" } ], - "affected": [], + "affected": [ + { + "package": { + "ecosystem": "PyPI", + "name": "pytest" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "fixed": "9.0.3" + } + ] + } + ] + } + ], "references": [ { "type": "ADVISORY",