Permission verification vulnerability in the system module. Impact: Successful exploitation of this vulnerability will affect availability.
The product does not preserve permissions or incorrectly preserves permissions when copying, restoring, or sharing objects, which can cause them to have less restrictive permissions than intended.