Tools/faqwiz/move-faqwiz.sh (aka the generic FAQ wizard moving tool) in Python 2.4.5 might allow local users to overwrite arbitrary files via a symlink attack on a tmp$RANDOM.tmp temporary file. NOTE: there may not be common usage scenarios in which tmp$RANDOM.tmp is located in an untrusted directory.
bugs.debian.org/cgi-bin/bugreport.cgi?bug=498899
marc.info/?l=oss-security&m=122148330903513&w=2
marc.info/?l=oss-security&m=122152861617434&w=2
securityreason.com/securityalert/4274
www.securityfocus.com/bid/31184
www.securitytracker.com/id?1020904
www.vupen.com/english/advisories/2008/2659
bugzilla.redhat.com/show_bug.cgi?id=462326
exchange.xforce.ibmcloud.com/vulnerabilities/45161