libqb before 1.0.5 allows local users to overwrite arbitrary files via a symlink attack, because it uses predictable filenames (under /dev/shm and /tmp) without O_EXCL.
{ "binaries": [ { "binary_version": "0.16.0.real-1ubuntu5", "binary_name": "libqb-dev" }, { "binary_version": "0.16.0.real-1ubuntu5", "binary_name": "libqb0" } ] }
{ "binaries": [ { "binary_version": "0.17.2.real-6ubuntu1", "binary_name": "libqb-dev" }, { "binary_version": "0.17.2.real-6ubuntu1", "binary_name": "libqb0" } ] }
{ "binaries": [ { "binary_version": "1.0.1-1ubuntu1", "binary_name": "libqb-dev" }, { "binary_version": "1.0.1-1ubuntu1", "binary_name": "libqb0" } ] }