The LDAP server in the AD domain controller in Samba 4.x before 4.1.22 does not check return values to ensure successful ASN.1 memory allocation, which allows remote attackers to cause a denial of service (memory consumption and daemon crash) via crafted packets.
lists.fedoraproject.org/pipermail/package-announce/2015-December/174076.html
lists.fedoraproject.org/pipermail/package-announce/2015-December/174391.html
lists.opensuse.org/opensuse-security-announce/2015-12/msg00033.html
www.debian.org/security/2016/dsa-3433
www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
www.securityfocus.com/bid/79736
www.securitytracker.com/id/1034492
www.ubuntu.com/usn/USN-2855-1
www.ubuntu.com/usn/USN-2855-2
bugzilla.redhat.com/show_bug.cgi?id=1288451
git.samba.org/?p=samba.git%3Ba=commit%3Bh=530d50a1abdcdf4d1775652d4c456c1274d83d8d
git.samba.org/?p=samba.git%3Ba=commit%3Bh=9d989c9dd7a5b92d0c5d65287935471b83b6e884
security.gentoo.org/glsa/201612-47
www.samba.org/samba/security/CVE-2015-7540.html