libqb before 1.0.5 allows local users to overwrite arbitrary files via a symlink attack, because it uses predictable filenames (under /dev/shm and /tmp) without O_EXCL.
The product attempts to access a file based on the filename, but it does not properly prevent that filename from identifying a link or shortcut that resolves to an unintended resource.
Link | Tags |
---|---|
https://github.com/ClusterLabs/libqb/issues/338 | issue tracking patch exploit third party advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=1695948 | patch exploit vdb entry third party advisory |
https://github.com/ClusterLabs/libqb/releases/tag/v1.0.5 | third party advisory release notes |
https://github.com/ClusterLabs/libqb/releases/tag/v1.0.4 | third party advisory release notes |
http://www.securityfocus.com/bid/108691 | vdb entry third party advisory |
http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00017.html | vendor advisory |
http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00027.html | vendor advisory |
http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00031.html | vendor advisory |
https://access.redhat.com/errata/RHSA-2019:3610 | vendor advisory |
https://security.gentoo.org/glsa/202107-03 | vendor advisory |