Samba from version 4.0.0 and before versions 4.7.12, 4.8.7, 4.9.3 is
vulnerable to a denial of service. During the processing of an LDAP search
before Samba's AD DC returns the LDAP entries to the client, the entries
are cached in a single memory object with a maximum size of 256MB. When
this size is reached, the Samba process providing the LDAP service will
follow the NULL pointer, terminating the process. There is no further
vulnerability associated with this issue, merely a denial of service.
Source: samba (LP Ubuntu Debian)
Upstream:released (4.7.12,4.8.7,4.9.3)
Ubuntu 12.04 ESM (Precise Pangolin):released (2:3.6.25-0ubuntu0.12.04.16)
Ubuntu 14.04 LTS (Trusty Tahr):released (2:4.3.11+dfsg-0ubuntu0.14.04.19)
Ubuntu 16.04 LTS (Xenial Xerus):released (2:4.3.11+dfsg-0ubuntu0.16.04.18)
Ubuntu 18.04 LTS (Bionic Beaver):released (2:4.7.6+dfsg~ubuntu-0ubuntu2.5)
Ubuntu 18.10 (Cosmic Cuttlefish):released (2:4.8.4+dfsg-2ubuntu2.1)
Ubuntu 19.04 (Disco Dingo):needed
More Information

Updated: 2018-12-05 14:14:23 UTC (commit 9d35beeb9d40ed879dc7e2ee59c995c1872a11d6)