{"id":"JLSEC-2026-160","details":"A NULL pointer dereference was found in OpenLDAP server and was fixed in openldap 2.4.55, during a request for renaming RDNs. An unauthenticated attacker could remotely crash the slapd process by sending a specially crafted request, causing a Denial of Service.","modified":"2026-04-21T00:16:38.692945Z","published":"2026-04-21T00:04:14.628Z","upstream":["CVE-2020-25692"],"database_specific":{"license":"CC-BY-4.0","sources":[{"id":"CVE-2020-25692","database_specific":{"status":"Modified"},"published":"2020-12-08T01:15:12.133Z","html_url":"https://nvd.nist.gov/vuln/detail/CVE-2020-25692","url":"https://services.nvd.nist.gov/rest/json/cves/2.0?cveId=CVE-2020-25692","imported":"2026-04-20T22:59:56.271Z","modified":"2024-11-21T05:18:29.210Z"}]},"references":[{"type":"WEB","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1894567"},{"type":"WEB","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1894567"},{"type":"WEB","url":"https://security.netapp.com/advisory/ntap-20210108-0006/"},{"type":"WEB","url":"https://security.netapp.com/advisory/ntap-20210108-0006/"}],"affected":[{"package":{"name":"OpenLDAPClient_jll","ecosystem":"Julia","purl":"pkg:julia/OpenLDAPClient_jll?uuid=234f2d50-f964-585e-b1c8-17cd4567e563"},"ranges":[{"type":"SEMVER","events":[{"introduced":"0"},{"fixed":"2.5.14+0"}]}],"database_specific":{"source":"https://github.com/JuliaLang/SecurityAdvisories.jl/tree/generated/osv/2026/JLSEC-2026-160.json"}}],"schema_version":"1.7.5"}