Jython 2.2.1 uses the current umask to set the privileges of the class cache files, which allows local users to bypass intended access restrictions via unspecified vectors.
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: redhat

Published: 2015-02-13T15:00:00

Updated: 2017-08-08T16:57:01

Reserved: 2013-02-19T00:00:00


Link: CVE-2013-2027

JSON object: View

cve-icon NVD Information

Status : Modified

Published: 2015-02-13T15:59:00.067

Modified: 2018-10-30T16:27:35.843


Link: CVE-2013-2027

JSON object: View

cve-icon Redhat Information

No data.

CWE