libqb before 1.0.5 allows local users to overwrite arbitrary files via a symlink attack, because it uses predictable filenames (under /dev/shm and /tmp) without O_EXCL.
lists.opensuse.org/opensuse-security-announce/2019-07/msg00017.html
lists.opensuse.org/opensuse-security-announce/2019-07/msg00027.html
lists.opensuse.org/opensuse-security-announce/2019-08/msg00031.html
www.securityfocus.com/bid/108691
access.redhat.com/errata/RHSA-2019:3610
bugzilla.redhat.com/show_bug.cgi?id=1695948
github.com/ClusterLabs/libqb/issues/338
github.com/ClusterLabs/libqb/releases/tag/v1.0.4
github.com/ClusterLabs/libqb/releases/tag/v1.0.5
security.gentoo.org/glsa/202107-03