2015-02-13 15:00:00
redhat
PUBLISHED
Jython 2.2.1 uses the current umask to set the privileges of the class cache files, which allows local users to bypass intended access restrictions via unspecified vectors.