An issue was discovered in LemonLDAP::NG before 2.0.12. Session cache corruption can lead to authorization bypass or spoofing. By running a loop that makes many authentication attempts, an attacker might alternately be authenticated as one of two different users.
https://www.debian.org/security/2021/dsa-4943
https://gitlab.ow2.org/lemonldap-ng/lemonldap-ng/-/tags
https://gitlab.ow2.org/lemonldap-ng/lemonldap-ng/-/issues/2539
https://gitlab.ow2.org/lemonldap-ng/lemonldap-ng/-/commit/8d3b763b6af2b8a9c4ad2765fbfabffec8a73af5