libqb: Insecure temporary file — GLSA 202107-03

An insecure temporary file usage has been reported in libqb possibly allowing local code execution.

Affected packages

sys-cluster/libqb on all architectures
Affected versions < 1.0.5
Unaffected versions >= 1.0.5

Background

libqb is a library with the primary purpose of providing high-performance, reusable features for client-server architecture, such as logging, tracing, inter-process communication (IPC), and polling.

Description

It was discovered that libqb used predictable filenames (under /dev/shm and /tmp) without O_EXCL.

Impact

A local attacker could perform symlink attacks to overwrite arbitrary files with the privileges of the user running the application linked against libqb.

Workaround

There is no known workaround at this time.

Resolution

All libqb users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=sys-cluster/libqb-1.0.5"
 

References

Release date
July 03, 2021

Latest revision
July 03, 2021: 1

Severity
high

Exploitable
local

Bugzilla entries