The (1) extract_keys_from_pdf and (2) fill_pdf functions in pdf_ext.py in logilab-common before 0.61.0 allows local users to overwrite arbitrary files and possibly have other unspecified impact via a symlink attack on /tmp/toto.fdf.
comments.gmane.org/gmane.comp.security.oss.general/11986
lists.opensuse.org/opensuse-updates/2014-02/msg00085.html
secunia.com/advisories/57209
www.logilab.org/ticket/207561
bugs.debian.org/cgi-bin/bugreport.cgi?bug=737051
github.com/advisories/GHSA-rr52-wg7f-8875
github.com/pypa/advisory-database/tree/main/vulns/logilab-common/PYSEC-2014-83.yaml
nvd.nist.gov/vuln/detail/CVE-2014-1838