diff --git a/advisories/unreviewed/2026/01/GHSA-6w46-j5rx-g56g/GHSA-6w46-j5rx-g56g.json b/advisories/unreviewed/2026/01/GHSA-6w46-j5rx-g56g/GHSA-6w46-j5rx-g56g.json index d2b4be143e67b..61bc49bdec1c8 100644 --- a/advisories/unreviewed/2026/01/GHSA-6w46-j5rx-g56g/GHSA-6w46-j5rx-g56g.json +++ b/advisories/unreviewed/2026/01/GHSA-6w46-j5rx-g56g/GHSA-6w46-j5rx-g56g.json @@ -1,19 +1,43 @@ { "schema_version": "1.4.0", "id": "GHSA-6w46-j5rx-g56g", - "modified": "2026-01-22T06:30:29Z", + "modified": "2026-01-22T06:30:35Z", "published": "2026-01-22T06:30:29Z", "aliases": [ "CVE-2025-71176" ], - "details": "pytest through 9.0.2 on UNIX relies on directories with the /tmp/pytest-of-{user} name pattern, which allows local users to cause a denial of service or possibly gain privileges.", + "summary": "Vulnerable tmpdir handling in pytest", + "details": "pytest through 9.0.2 on UNIX relies on directories with the `/tmp/pytest-of-{user}` name pattern, which allows local users to cause a denial of service or possibly gain privileges.", "severity": [ { "type": "CVSS_V3", "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L" } ], - "affected": [], + "affected": [ + { + "package": { + "ecosystem": "PyPI", + "name": "pytest" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "fixed": "9.0.3" + } + ] + } + ], + "database_specific": { + "last_known_affected_version_range": "< 9.0.2" + } + } + ], "references": [ { "type": "ADVISORY", @@ -23,6 +47,10 @@ "type": "WEB", "url": "https://github.com/pytest-dev/pytest/issues/13669" }, + { + "type": "PACKAGE", + "url": "https://github.com/pytest-dev/pytest" + }, { "type": "WEB", "url": "https://www.openwall.com/lists/oss-security/2026/01/21/5"