libqb before 1.0.5 allows local users to overwrite arbitrary files via a symlink attack, because it uses predictable filenames (under /dev/shm and /tmp) without O_EXCL.
{ "binaries": [ { "binary_name": "libqb-dev", "binary_version": "0.16.0.real-1ubuntu5" }, { "binary_name": "libqb0", "binary_version": "0.16.0.real-1ubuntu5" } ] }
{ "binaries": [ { "binary_name": "libqb-dev", "binary_version": "0.17.2.real-6ubuntu1" }, { "binary_name": "libqb0", "binary_version": "0.17.2.real-6ubuntu1" } ] }
{ "binaries": [ { "binary_name": "libqb-dev", "binary_version": "1.0.1-1ubuntu1" }, { "binary_name": "libqb0", "binary_version": "1.0.1-1ubuntu1" } ] }