The rwm overlay in OpenLDAP 2.4.23, 2.4.36, and earlier does not properly count references, which allows remote attackers to cause a denial of service (slapd crash) by unbinding immediately after a search request, which triggers rwmconndestroy to free the session context while it is being used by rwmopsearch.
{
    "availability": "No subscription required",
    "binaries": [
        {
            "binary_name": "ldap-utils",
            "binary_version": "2.4.31-1+nmu2ubuntu8.1"
        },
        {
            "binary_name": "libldap-2.4-2",
            "binary_version": "2.4.31-1+nmu2ubuntu8.1"
        },
        {
            "binary_name": "libldap2-dev",
            "binary_version": "2.4.31-1+nmu2ubuntu8.1"
        },
        {
            "binary_name": "slapd",
            "binary_version": "2.4.31-1+nmu2ubuntu8.1"
        },
        {
            "binary_name": "slapd-smbk5pwd",
            "binary_version": "2.4.31-1+nmu2ubuntu8.1"
        }
    ]
}