Does Red Hat has mitigation steps for CVE-2015-8138?

Solution Unverified - Updated -

Issue

  • Rather than having to immediately patch all servers, can we provide mitigating protection for CVE-2015-8138? Following is an excerpt from /etc/ntp.conf file. Are the restrictions providing sufficient protection for this issue?
restrict default ignore kod
restrict 127.0.0.0 mask 255.0.0.0
restrict trinity.example.com noserve notrap
restrict neo.example.com noserve notrap
restrict agentsmith.example.com noserve notrap
restrict timevault1.example.com nomodify noquery notrap
restrict timeserv01.example.com nomodify noquery notrap
restrict timeserv02.example.com nomodify noquery notrap
restrict bountp01.example.com nomodify noquery notrap
restrict ntp1.example.com nomodify noquery notrap
restrict ntp2.example.com nomodify noquery notrap
restrict ntp3.example.com nomodify noquery notrap

Environment

  • Red Hat Enterprise Linux 6.7

Subscriber exclusive content

A Red Hat subscription provides unlimited access to our knowledgebase, tools, and much more.

Current Customers and Partners

Log in for full access

Log In

New to Red Hat?

Learn more about Red Hat subscriptions

Using a Red Hat product through a public cloud?

How to access this content