The nf_conntrack of the netfilter code does not set nfctinfo during reassembly
of fragmented packets, which leaves the default value as IP_CT_ESTABLISHED and
might allow remote attackers to bypass certain rulesets using IPv6 fragments.
A patch for this issue has been included in build 2.6.18-8.1.4.el5.
confirmed the fix is in 2.6.18-8.1.4.el5.
An advisory has been issued which should help the problem
described in this bug report. This report is therefore being
closed with a resolution of ERRATA. For more information
on the solution and/or where to find the updated files,
please follow the link below. You may reopen this bug report
if the solution does not work for you.