The distcheck rule in dist-check.mk in GNU coreutils 5.2.1 through 8.1 allows local users to gain privileges via a symlink attack on a file in a directory tree under /tmp.
https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00972.html
https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00954.html
https://exchange.xforce.ibmcloud.com/vulnerabilities/54673
https://bugzilla.redhat.com/show_bug.cgi?id=545439
http://www.vupen.com/english/advisories/2009/3453
http://www.ubuntu.com/usn/USN-2473-1
http://www.securityfocus.com/bid/37256
http://www.openwall.com/lists/oss-security/2009/12/08/4
http://www.mail-archive.com/bug-coreutils%40gnu.org/msg18787.html
http://www.mail-archive.com/bug-coreutils%40gnu.org/msg18779.html
http://secunia.com/advisories/62226
http://secunia.com/advisories/37860
http://secunia.com/advisories/37645
http://marc.info/?l=oss-security&m=126030454503441&w=2
http://git.savannah.gnu.org/cgit/coreutils.git/commit/?id=ae034822c535fa5