CVE-2013-2027

Publication date

2015-02-13 15:00:00

Family

redhat

State

PUBLISHED

Description

Jython 2.2.1 uses the current umask to set the privileges of the class cache files, which allows local users to bypass intended access restrictions via unspecified vectors.