A flaw was found in libqb in which a privileged client application linked against libqb could overwrite arbitrary files it has access to with at least partially attacker controlled data which could cause the following consequences: - either such arbitrary file can be intentionally shrunk from original, bigger size (allowing an attacker to refine the granularity for some other brute-force extraction of the original file content, for instance, when combine with an issue akin to CVE-2013-4209. - or such file can be blown from its original size possibly causing DoS (due to limited storage capacity), unless the underlying FS support sparse files (?)
Acknowledgments: Name: Jan Pokorný (Red Hat)
*** This bug has been marked as a duplicate of bug 1695948 ***