- Red Hat Enterprise Linux (release 5,6,7)
- Red Hat Enterprise MRG 2
- realtime kernel
- Is my Red Hat system affected by the kernel issue reported on April 4, 2017?
- Is my kernel susceptible to the new "UDP" attack?
- What is CVE-2016-10229, and does it affect my RHEL server?
This issue does not affect the Linux kernel packages as shipped with Red Hat Enterprise Linux 5, 6, and 7, Red Hat Enterprise MRG 2, and realtime kernels as the code that introduced the flaw is not present in these products. Code can not be remotely executed using this exploit on Red Hat Enterprise Linux systems.
A flaw was found in the Linux kernel which allows remote attackers to crash the system or corrupt kernel memory, possibly leading to arbitrary code execution, via UDP traffic that triggers an unsafe second checksum calculation during the execution of a recv system call with the MSG_PEEK flag.
- Red Hat Enterprise Linux for Real Time
- Red Hat Enterprise MRG Realtime
- Red Hat Enterprise Linux
This solution is part of Red Hat’s fast-track publication program, providing a huge library of solutions that Red Hat engineers have created while supporting our customers. To give you the knowledge you need the instant it becomes available, these articles may be presented in a raw and unedited form.
Welcome! Check out the Getting Started with Red Hat page for quick tours and guides for common tasks.