Automatic Bug Reporting Tool (ABRT) allows local users to read, change the ownership of, or have other unspecified impact on arbitrary files via a symlink attack on (1) /var/tmp/abrt//maps, (2) /tmp/jvm-/hs_error.log, (3) /proc/*/exe, (4) /etc/os-release in a chroot, or (5) an unspecified root directory related to librpm.
rhn.redhat.com/errata/RHSA-2015-1083.html
rhn.redhat.com/errata/RHSA-2015-1210.html
www.openwall.com/lists/oss-security/2015/04/14/4
www.openwall.com/lists/oss-security/2015/04/16/12
www.securityfocus.com/bid/75117
bugzilla.redhat.com/show_bug.cgi?id=1211835
github.com/abrt/abrt/commit/17cb66b13997b0159b4253b3f5722db79f476d68
github.com/abrt/abrt/commit/4f2c1ddd3e3b81d2d5146b883115371f1cada9f9
github.com/abrt/abrt/commit/80408e9e24a1c10f85fd969e1853e0f192157f92
github.com/abrt/abrt/commit/d6e2f6f128cef4c21cb80941ae674c9842681aa7
www.exploit-db.com/exploits/44097/