CVE Vulnerabilities

CVE-2022-2850

NULL Pointer Dereference

Published: Oct 14, 2022 | Modified: Nov 03, 2025
CVSS 3.x
6.5
MEDIUM
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
CVSS 2.x
RedHat/V2
RedHat/V3
6.5 MODERATE
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

A flaw was found In 389-ds-base. When the Content Synchronization plugin is enabled, an authenticated user can reach a NULL pointer dereference using a specially crafted query. This flaw allows an authenticated attacker to cause a denial of service. This CVE is assigned against an incomplete fix of CVE-2021-3514.

Weakness

The product dereferences a pointer that it expects to be valid but is NULL.

Affected Software

NameVendorStart VersionEnd Version
Directory_serverRedhat11.0 (including)11.0 (including)
Directory_serverRedhat12.0 (including)12.0 (including)
Enterprise_linuxRedhat6.0 (including)6.0 (including)
Enterprise_linuxRedhat7.0 (including)7.0 (including)
Enterprise_linuxRedhat8.0 (including)8.0 (including)
Enterprise_linuxRedhat9.0 (including)9.0 (including)
Red Hat Directory Server 11.5 for RHEL 8RedHatredhat-ds:11-8060020221122205230.0ca98e7e*
Red Hat Directory Server 12.0 for RHEL 9RedHatredhat-ds:12-9000020230124175804.fd05c7f4*
Red Hat Enterprise Linux 7RedHat389-ds-base-0:1.3.10.2-17.el7_9*
Red Hat Enterprise Linux 8RedHat389-ds:1.4-8060020221011200628.824efc52*
Red Hat Enterprise Linux 8.4 Extended Update SupportRedHat389-ds:1.4-8040020221110201811.96015a92*
Red Hat Enterprise Linux 9RedHat389-ds-base-0:2.1.3-4.el9_1*
Red Hat Enterprise Linux 9.0 Extended Update SupportRedHat389-ds-base-0:2.0.14-3.el9_0*
389-ds-baseUbuntubionic*
389-ds-baseUbuntufocal*
389-ds-baseUbuntukinetic*
389-ds-baseUbuntulunar*
389-ds-baseUbuntumantic*
389-ds-baseUbuntuoracular*
389-ds-baseUbuntuplucky*
389-ds-baseUbuntutrusty*
389-ds-baseUbuntuxenial*

Potential Mitigations

References