It was found that the kbd init script wrote a file to /dev/shm during shut-down action. A local attacker could use this flaw to conduct symlink attacks (cause corruption of arbitrary system files). References: [1] https://bugzilla.novell.com/show_bug.cgi?id=663898 [2] http://lists.opensuse.org/opensuse-updates/2011-04/msg00053.html
This issue did NOT affect the versions of the kbd package, as shipped with Red Hat Enterprise Linux 4, 5, or 6. -- This issue did NOT affect the versions of the kbd package, as shipped with Fedora release of 14 and 15.
Statement: Not vulnerable. This issue did not affect the versions of kbd as shipped with Red Hat Enterprise Linux 4, 5, or 6 as they do not include the affected script.