Mandriva Linux Security Advisory 2009-244 – Xfig in Debian GNU/Linux, possibly 3.2.5, allows local users to read and write arbitrary files via a symlink attack on the (1) xfig-eps[PID], (2) xfig-pic[PID].pix, (3) xfig-pic[PID].err, (4) xfig-pcx[PID].pix, (5) xfig-xfigrc[PID], (6) xfig[PID], (7) xfig-print[PID], (8) xfig-export[PID].err, (9) xfig-batch[PID], (10) xfig-exp[PID], or (11) xfig-spell.[PID] temporary files, where [PID] is a process ID. This update provides a solution to this vulnerability. Packages for 2008.0 are provided for Corporate Desktop 2008.0 customers.
You can download this advisory from the following link: https://packetstormsecurity.com/files/download/84435/MDVSA-2009-244-1.txt
Source: https://packetstormsecurity.com/files/84435/Mandriva-Linux-Security-Advisory-2009-244.html