An issue was discovered in LemonLDAP::NG before 2.0.12. Session cache corruption can lead to authorization bypass or spoofing. By running a loop that makes many authentication attempts, an attacker might alternately be authenticated as one of two different users.
{ "ubuntu_priority": "low", "binaries": [ { "binary_version": "2.0.11+ds-4", "binary_name": "lemonldap-ng" }, { "binary_version": "2.0.11+ds-4", "binary_name": "lemonldap-ng-doc" }, { "binary_version": "2.0.11+ds-4", "binary_name": "lemonldap-ng-fastcgi-server" }, { "binary_version": "2.0.11+ds-4", "binary_name": "lemonldap-ng-handler" }, { "binary_version": "2.0.11+ds-4", "binary_name": "lemonldap-ng-uwsgi-app" }, { "binary_version": "2.0.11+ds-4", "binary_name": "liblemonldap-ng-common-perl" }, { "binary_version": "2.0.11+ds-4", "binary_name": "liblemonldap-ng-handler-perl" }, { "binary_version": "2.0.11+ds-4", "binary_name": "liblemonldap-ng-manager-perl" }, { "binary_version": "2.0.11+ds-4", "binary_name": "liblemonldap-ng-portal-perl" } ], "availability": "No subscription required" }