Resource Exhaustion Affecting kdeconnect package, versions <20.08.2-1


Severity

Recommended
0.0
medium
0
10

Snyk's Security Team recommends NVD's CVSS assessment. Learn more

Threat Intelligence

EPSS
0.1% (28th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Resource Exhaustion vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-DEBIAN14-KDECONNECT-11746892
  • published10 Aug 2025
  • disclosed7 Oct 2020

Introduced: 7 Oct 2020

CVE-2020-26164  (opens in a new tab)
CWE-400  (opens in a new tab)

How to fix?

Upgrade Debian:14 kdeconnect to version 20.08.2-1 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream kdeconnect package and not the kdeconnect package as distributed by Debian. See How to fix? for Debian:14 relevant fixed versions and status.

In kdeconnect-kde (aka KDE Connect) before 20.08.2, an attacker on the local network could send crafted packets that trigger use of large amounts of CPU, memory, or network connection slots, aka a Denial of Service attack.

CVSS Base Scores

version 3.1