Advisories ยป MGASA-2020-0475

Updated kdeconnect-kde packages improve security

Publication date: 29 Dec 2020
Type: security
Affected Mageia releases : 7


For the pairing procedure, the GUI component only presented the friendly
'deviceName' to identify peer devices, which is completely under attacker
control. Furthermore the 'deviceName' is transmitted in cleartext in UDP
broadcast messages for all other nodes in the network segment to see.
Therefore malicious devices can attempt to confuse users by requesting a
pairing under the same 'deviceName' to gain access to a system.

Now, a sha256 fingerprint of the concatenated public keys of the two involved
certificates is displayed. In the initial popup, a prefix of 8 hex digits of
the fingerprint is displayed. The full fingerprint is reachable via an
additional "view key" button.