libqb before 1.0.5 allows local users to overwrite arbitrary files via a symlink attack, because it uses predictable filenames (under /dev/shm and /tmp) without O_EXCL.
The product attempts to access a file based on the filename, but it does not properly prevent that filename from identifying a link or shortcut that resolves to an unintended resource.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Libqb | Clusterlabs | * | 1.0.5 (excluding) |
Red Hat Enterprise Linux 7 | RedHat | libqb-0:1.0.1-9.el7 | * |
Red Hat Enterprise Linux 8 | RedHat | libqb-0:1.0.3-10.el8 | * |
Libqb | Ubuntu | bionic | * |
Libqb | Ubuntu | cosmic | * |
Libqb | Ubuntu | disco | * |
Libqb | Ubuntu | esm-infra-legacy/trusty | * |
Libqb | Ubuntu | esm-infra/bionic | * |
Libqb | Ubuntu | esm-infra/xenial | * |
Libqb | Ubuntu | trusty | * |
Libqb | Ubuntu | trusty/esm | * |
Libqb | Ubuntu | upstream | * |
Libqb | Ubuntu | xenial | * |