Does Red Hat has mitigation steps for CVE-2015-8138?
Issue
- Rather than having to immediately patch all servers, can we provide mitigating protection for CVE-2015-8138? Following is an excerpt from
/etc/ntp.conf
file. Are the restrictions providing sufficient protection for this issue?
restrict default ignore kod
restrict 127.0.0.0 mask 255.0.0.0
restrict trinity.example.com noserve notrap
restrict neo.example.com noserve notrap
restrict agentsmith.example.com noserve notrap
restrict timevault1.example.com nomodify noquery notrap
restrict timeserv01.example.com nomodify noquery notrap
restrict timeserv02.example.com nomodify noquery notrap
restrict bountp01.example.com nomodify noquery notrap
restrict ntp1.example.com nomodify noquery notrap
restrict ntp2.example.com nomodify noquery notrap
restrict ntp3.example.com nomodify noquery notrap
Environment
- Red Hat Enterprise Linux 6.7
Subscriber exclusive content
A Red Hat subscription provides unlimited access to our knowledgebase, tools, and much more.