libqb before 1.0.5 allows local users to overwrite arbitrary files via a symlink attack, because it uses predictable filenames (under /dev/shm and /tmp) without O_EXCL.
https://security.gentoo.org/glsa/202107-03
https://github.com/ClusterLabs/libqb/releases/tag/v1.0.5
https://github.com/ClusterLabs/libqb/releases/tag/v1.0.4
https://github.com/ClusterLabs/libqb/issues/338
https://bugzilla.redhat.com/show_bug.cgi?id=1695948
https://access.redhat.com/errata/RHSA-2019:3610
http://www.securityfocus.com/bid/108691
http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00031.html
http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00027.html
http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00017.html