Jython 2.2.1 uses the current umask to set the privileges of the class cache files, which allows local users to bypass intended access restrictions via unspecified vectors.
Weaknesses in this category are related to the management of permissions, privileges, and other security features that are used to perform access control.
Link | Tags |
---|---|
http://www.mandriva.com/security/advisories?name=MDVSA-2015:158 | vendor advisory broken link |
http://lists.opensuse.org/opensuse-updates/2015-02/msg00055.html | third party advisory vendor advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=947949 | issue tracking |
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html | |
http://advisories.mageia.org/MGASA-2015-0096.html | third party advisory |