Gentoo Linux Security Advisory GLSA 200903-24 - An insecure temporary file usage in Shadow may allow local users to gain root privileges. Paul Szabo reported a race condition in the login executable when setting up tty permissions. Versions less than 4.1.2.2 are affected.
024dea4d4945ff11e176b4d3f8e31a9f6fab11c9d699ae4e96d59d56ecce6f05
Mandriva Linux Security Advisory 2009-062 - A security vulnerability has been identified and fixed in login application from shadow-utils, which could allow local users in the utmp group to overwrite arbitrary files via a symlink attack on a temporary file referenced in a line (aka ut_line) field in a utmp entry. The updated packages have been patched to prevent this. Note: Mandriva Linux is using login application from util-linux-ng by default, and therefore is not affected by this issue on default configuration.
f85164ad0dd2f9a35f8b48660973cda52086237a9ab2d346109d2032752d2d29
Debian Security Advisory 1709-1 - Paul Szabo discovered that login, the system login tool, did not correctly handle symlinks while setting up tty permissions. If a local attacker were able to gain control of the system utmp file, they could cause login to change the ownership and permissions on arbitrary files, leading to a root privilege escalation.
09833b69f4afe2a9898a02704962c10e5a4940dd1d419a7c77ac8e88550c008f