Description
Jython 2.2.1 uses the current umask to set the privileges of the class cache files, which allows local users to bypass intended access restrictions via unspecified vectors.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-3281 | Jython 2.2.1 uses the current umask to set the privileges of the class cache files, which allows local users to bypass intended access restrictions via unspecified vectors. |
Github GHSA |
GHSA-9347-9w64-q5wp | Jython Improper Access Restrictions vulnerability |
References
History
No history.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-06T15:20:37.461Z
Reserved: 2013-02-19T00:00:00.000Z
Link: CVE-2013-2027
No data.
Status : Deferred
Published: 2015-02-13T15:59:00.067
Modified: 2025-04-12T10:46:40.837
Link: CVE-2013-2027
OpenCVE Enrichment
No data.
EUVD
Github GHSA