Bugzilla – Bug 1174711
VUL-1: CVE-2020-16118: balsa: a malicious server or MITM can trigger a NULL pointer dereference
Last modified: 2021-08-09 11:42:14 UTC
CVE-2020-16118 In GNOME Balsa before 2.6.0, a malicious server operator or man in the middle can trigger a NULL pointer dereference and client crash by sending a PREAUTH response to imap_mbox_connect in libbalsa/imap/imap-handle.c. References: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-16118 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16118 https://gitlab.gnome.org/GNOME/balsa/-/commit/4e245d758e1c826a01080d40c22ca8706f0339e5 https://gitlab.gnome.org/GNOME/balsa/-/issues/23
Affects openSUSE:Leap:15.1 only.
This is an autogenerated message for OBS integration: This bug (1174711) was mentioned in https://build.opensuse.org/request/show/825371 15.1 / balsa
openSUSE-SU-2020:1207-1: An update that fixes one vulnerability is now available. Category: security (moderate) Bug References: 1174711 CVE References: CVE-2020-16118 JIRA References: Sources used: openSUSE Leap 15.1 (src): balsa-2.5.5-lp151.3.3.1
openSUSE-SU-2020:1230-1: An update that fixes one vulnerability is now available. Category: security (moderate) Bug References: 1174711 CVE References: CVE-2020-16118 JIRA References: Sources used: openSUSE Backports SLE-15-SP1 (src): balsa-2.5.5-bp151.4.3.1
Updates released, closing as resolved fixed.