Does Red Hat has mitigation steps for CVE-2015-8138?

Solution Unverified - Updated -

Issue

  • Rather than having to immediately patch all servers, can we provide mitigating protection for CVE-2015-8138? Following is an excerpt from /etc/ntp.conf file. Are the restrictions providing sufficient protection for this issue?
restrict default ignore kod
restrict 127.0.0.0 mask 255.0.0.0
restrict trinity.example.com noserve notrap
restrict neo.example.com noserve notrap
restrict agentsmith.example.com noserve notrap
restrict timevault1.example.com nomodify noquery notrap
restrict timeserv01.example.com nomodify noquery notrap
restrict timeserv02.example.com nomodify noquery notrap
restrict bountp01.example.com nomodify noquery notrap
restrict ntp1.example.com nomodify noquery notrap
restrict ntp2.example.com nomodify noquery notrap
restrict ntp3.example.com nomodify noquery notrap

Environment

  • Red Hat Enterprise Linux 6.7

Subscriber exclusive content

A Red Hat subscription provides unlimited access to our knowledgebase of over 48,000 articles and solutions.

Current Customers and Partners

Log in for full access

Log In