From CVE-2008-5375 (http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2008-5375) cmus-status-display in cmus 2.2.0 allows local users to overwrite arbitrary files via a symlink attack on the /tmp/cmus-status temporary file. Reproducible: Always
*cmus-2.2.0-r1 (12 May 2009) 12 May 2009; Samuli Suominen <ssuominen@gentoo.org> +cmus-2.2.0-r1.ebuild, +files/cmus-2.2.0-symlink_attack.patch: CVE-2008-5375, symlink attack wrt #250474. amd64/x86, please test and mark stable. security, please adjust the bug fields, still can't remember how you want it done :-)
x86 stable
amd64 stable, all arches done.
And vulnerable version removed from tree.
All arches done, entering [glsa?]. I vote YES.
Yes too. Request filed.
GLSA 200909-08