If trap service, disabled by default, has been explicitly enabled, an attacker can send a specially crafted packet to cause a null pointer dereference that will crash ntpd, resulting in a denial of service.
Use "restrict default noquery ..." in your ntp.conf file. Only allow mode 6 queries from trusted networks and hosts.
Is an RPM released with fix for this. I haven't seen one @ http://mirror.centos.org.
If not released, what is ETA for same?
This issue has been addressed in the following products:
Red Hat Enterprise Linux 6
Red Hat Enterprise Linux 7
Via RHSA-2017:0252 https://rhn.redhat.com/errata/RHSA-2017-0252.html