heap-buffer overflow in fig2dev in version 3.2.9a allows an attacker to availability via local input manipulation via create_line_with_spline.
https://sourceforge.net/p/mcj/tickets/184/
https://lists.debian.org/debian-lts-announce/2025/04/msg00030.html