A flaw was found in the linux kernels implementation of DCCP protocol in which a an application making a DCCP connection over IPV6 could crash a remote (or local) system. When attempting to send a DCCP reset packet, the system will incorrectly create the packet header and while updating the SNMP counters for this condition crash the kernel. The remote system would need to have both an application running as a DCCP server and have an IPV6 address routable. This can result in the system crash or denial of service. Upstream fix: https://git.kernel.org/cgit/linux/kernel/git/stable/linux-stable.git/commit/?id=f53dc67c5e7babafe239b93a11678b0e05bead51
*** Bug 1424753 has been marked as a duplicate of this bug. ***
Statement: This issue affects Red Hat Enterprise Linux 5 kernel. This issue was fixed in a versions 6 and 7 prior to this issue being raised. Future Linux kernel updates for Red Hat Enterprise Linux 5 may address this issue.
Acknowledgment: Name: Wade Mealing (Red Hat Product Security)
This issue has been addressed in the following products: Red Hat Enterprise Linux 5 Via RHSA-2017:0323 https://rhn.redhat.com/errata/RHSA-2017-0323.html
This issue has been addressed in the following products: Red Hat Enterprise Linux 5.6 Long Life Via RHSA-2017:0347 https://rhn.redhat.com/errata/RHSA-2017-0347.html
This issue has been addressed in the following products: Red Hat Enterprise Linux 5.9 Long Life Via RHSA-2017:0346 https://rhn.redhat.com/errata/RHSA-2017-0346.html