We can speculate about whether the tech exists, but read their guide to securing your Red Hat box and decide for yourself how good they are at publishing defense against attacks they won't tell you about: https://www.nsa.gov/ia/_files/os/redhat/rhel5-guide-i731.pdf