CentOS Errata and Security Advisory CESA-2016:0005
The rpcbind utility is a server that converts RPC program numbers into universal addresses. It must be running on the host to be able to make RPC calls on a server on that machine.
A use-after-free flaw related to the PMAP_CALLIT operation and TCP/UDP connections was discovered in rpcbind. A remote attacker could possibly exploit this flaw to crash the rpcbind service by performing a series of UDP and TCP calls. (CVE-2015-7236)
All rpcbind users are advised to upgrade to these updated packages, which contain a backported patch to correct this issue. If the rpcbind service is running, it will be automatically restarted after installing this update.
Merged security bulletin from advisories: http://lists.centos.org/pipermail/centos-announce/2016-January/021593.html http://lists.centos.org/pipermail/centos-announce/2016-January/021604.html
Affected packages: rpcbind
Upstream details at: https://rhn.redhat.com/errata/RHSA-2016-0005.html