ArchLinux: 201411-5: konversation: denial of service
Summary
Konversation's Blowfish ECB encryption support assumes incoming blocks to be the expected 12 bytes. The lack of a sanity-check for the actual size can cause a denial of service and an information leak to the local user.
Resolution
Upgrade to 1.5.1-1.
# pacman -Syu "konversation>=1.5.1-1"
The problem has been fixed upstream [0] in version 1.5.1.
References
[0] https://github.com/quassel/quassel/commit/8b5ecd https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-8483 https://bugs.archlinux.org/task/42698 https://kde.org/info/security/advisory-20141104-1.txt
Workaround
None.