Tools/faqwiz/move-faqwiz.sh (aka the generic FAQ wizard moving tool) in Python 2.4.5 might allow local users to overwrite arbitrary files via a symlink attack on a tmp$RANDOM.tmp temporary file. NOTE: there may not be common usage scenarios in which tmp$RANDOM.tmp is located in an untrusted directory.
https://exchange.xforce.ibmcloud.com/vulnerabilities/45161
https://bugzilla.redhat.com/show_bug.cgi?id=462326
http://www.vupen.com/english/advisories/2008/2659
http://www.securitytracker.com/id?1020904
http://www.securityfocus.com/bid/31184
http://securityreason.com/securityalert/4274
http://marc.info/?l=oss-security&m=122152861617434&w=2