From ${URL} : It was reported that wine uses /tmp/.wine-$UID as a directory for sockets and lock files. Malicious local user could create /tmp/.wine-$UID for another user's uid, preventing the other user from using wine. Moreover, the server_connect() function doesn't check if /tmp/.wine-$UID or its subdirectories are symlinks, so in some circumstances it might be possible to trick wine to connect to an unrelated socket. Debian bug report: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=816034 @maintainer(s): after the bump, in case we need to stabilize the package, please let us know if it is ready for the stabilization or not.
Upstream has a bug that raised the point a while ago, no action. Bringing it back to their attention noting that at least 3 distros have marked it as a security bug. Will keep an eye on upstream. Adding upstream URL.