CVE-2020-26164
Published: 7 October 2020
In kdeconnect-kde (aka KDE Connect) before 20.08.2, an attacker on the local network could send crafted packets that trigger use of large amounts of CPU, memory, or network connection slots, aka a Denial of Service attack.
Priority
Status
Package | Release | Status |
---|---|---|
kdeconnect Launchpad, Ubuntu, Debian |
kinetic |
Ignored
(end of life, was needed)
|
hirsute |
Ignored
(end of life)
|
|
impish |
Ignored
(end of life)
|
|
xenial |
Needed
|
|
bionic |
Needed
|
|
focal |
Needed
|
|
groovy |
Ignored
(end of life)
|
|
jammy |
Needed
|
|
trusty |
Does not exist
|
|
upstream |
Needs triage
|
|
mantic |
Needed
|
|
lunar |
Ignored
(end of life, was needed)
|
Severity score breakdown
Parameter | Value |
---|---|
Base score | 5.5 |
Attack vector | Local |
Attack complexity | Low |
Privileges required | Low |
User interaction | None |
Scope | Unchanged |
Confidentiality | None |
Integrity impact | None |
Availability impact | High |
Vector | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
References
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26164
- https://kde.org/info/security/advisory-20201002-1.txt
- https://invent.kde.org/network/kdeconnect-kde/-/commit/f183b5447bad47655c21af87214579f03bf3a163
- https://invent.kde.org/network/kdeconnect-kde/-/commit/b279c52101d3f7cc30a26086d58de0b5f1c547fa
- https://invent.kde.org/network/kdeconnect-kde/-/commit/d35b88c1b25fe13715f9170f18674d476ca9acdc
- https://invent.kde.org/network/kdeconnect-kde/-/commit/b496e66899e5bc9547b6537a7f44ab44dd0aaf38
- https://invent.kde.org/network/kdeconnect-kde/-/commit/5310eae85dbdf92fba30375238a2481f2e34943e
- https://invent.kde.org/network/kdeconnect-kde/-/commit/721ba9faafb79aac73973410ee1dd3624ded97a5
- https://invent.kde.org/network/kdeconnect-kde/-/commit/ae58b9dec49c809b85b5404cee17946116f8a706
- https://invent.kde.org/network/kdeconnect-kde/-/commit/66c768aa9e7fba30b119c8b801efd49ed1270b0a
- https://invent.kde.org/network/kdeconnect-kde/-/commit/85b691e40f525e22ca5cc4ebe79c361d71d7dc05
- https://invent.kde.org/network/kdeconnect-kde/-/commit/48180b46552d40729a36b7431e97bbe2b5379306
- https://bugzilla.suse.com/show_bug.cgi?id=1176268
- https://github.com/KDE/kdeconnect-kde/commit/024e5f23db8d8ad3449714b906b46094baaffb89
- https://github.com/KDE/kdeconnect-kde/commit/4fbd01a3d44a0bcca888c49a77ec7cfd10e113d7
- https://github.com/KDE/kdeconnect-kde/commit/542d94a70c56aa386c8d4d793481ce181b0422e8
- https://github.com/KDE/kdeconnect-kde/commit/613899be24b6e2a6b3e5cc719efce8ae8a122991
- https://github.com/KDE/kdeconnect-kde/commit/8112729eb0f13e6947984416118531078e65580d
- https://github.com/KDE/kdeconnect-kde/commit/ce0f00fc2d3eccb51d0af4eba61a4f60de086a59
- https://github.com/KDE/kdeconnect-kde/releases
- https://kdeconnect.kde.org/official/
- https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00014.html
- NVD
- Launchpad
- Debian