Debian LTS: DLA-3496-1: lemonldap-ng security update
Summary
Weak session ID generation in the AuthBasic handler and incorrect
failure handling during a password check allow attackers to bypass 2FA
verification. Any plugin that tries to deny session creation after the
store step does not deny an AuthBasic session.
Using the AuthBasic handler is now refused for users with a second
factor. Admins who are *absolutely sure* that such accounts should be
able to use AuthBasic handlers (which are password only) can append `and
not $ENV{AuthBasic}` to the 2FA activation rules.
For Debian 10 buster, these problems have been fixed in version
2.0.2+ds-7+deb10u9.
We recommend that you upgrade your lemonldap-ng packages.
For the detailed security status of lemonldap-ng please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/source-package/lemonldap-ng
Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS