libqb is vulnerable to arbitrary file overwrite. An attacker is able to overwrite arbitrary files via a symlink attack due to the usage of predictable filenames under /dev/shm
and /tmp
without O_EXCL
.
lists.opensuse.org/opensuse-security-announce/2019-07/msg00017.html
lists.opensuse.org/opensuse-security-announce/2019-07/msg00027.html
lists.opensuse.org/opensuse-security-announce/2019-08/msg00031.html
www.securityfocus.com/bid/108691
access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.1_release_notes/
access.redhat.com/errata/RHSA-2019:3610
access.redhat.com/security/updates/classification/#moderate
bugzilla.redhat.com/show_bug.cgi?id=1695948
bugzilla.redhat.com/show_bug.cgi?id=1718773
github.com/ClusterLabs/libqb/issues/338
github.com/ClusterLabs/libqb/releases/tag/v1.0.4
github.com/ClusterLabs/libqb/releases/tag/v1.0.5