Samba from version 4.0.0 and before versions 4.7.12, 4.8.7, 4.9.3 is
vulnerable to a denial of service. During the processing of an LDAP search
before Samba's AD DC returns the LDAP entries to the client, the entries
are cached in a single memory object with a maximum size of 256MB. When
this size is reached, the Samba process providing the LDAP service will
follow the NULL pointer, terminating the process. There is no further
vulnerability associated with this issue, merely a denial of service.
Source: samba (LP Ubuntu Debian)
Upstream:released (4.7.12,4.8.7,4.9.3)
Ubuntu 12.04 ESM (Precise Pangolin):released (2:3.6.25-0ubuntu0.12.04.16)
Ubuntu 14.04 LTS (Trusty Tahr):released (2:4.3.11+dfsg-0ubuntu0.14.04.19)
Ubuntu 16.04 LTS (Xenial Xerus):released (2:4.3.11+dfsg-0ubuntu0.16.04.18)
Ubuntu 18.04 LTS (Bionic Beaver):released (2:4.7.6+dfsg~ubuntu-0ubuntu2.5)
Ubuntu 18.10 (Cosmic Cuttlefish):released (2:4.8.4+dfsg-2ubuntu2.1)
Ubuntu 19.04 (Disco Dingo):released (2:4.9.4+dfsg-1ubuntu1)
More Information

Updated: 2019-03-19 12:30:36 UTC (commit 15472795df7e9de45b82f2d36b8b419b939f97b2)