kernel is vulnerable to Spoofing Attack. The mixed IPID assignment method with the hash-based IPID assignment policy allows an off-path attacker to inject data into a victim’s TCP session or terminate that session, where a Man-in-the-Middle Attack (MITM) performs an IP fragmentation attack and an IPID collision. This flaw allows a remote user to pretend to be the sender of the TCP/IP packet for an existing TCP/IP session.
access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.7_release_notes/index
access.redhat.com/errata/RHSA-2022:7444
access.redhat.com/security/updates/classification/#moderate
access.redhat.com/solutions/6971358
bugzilla.redhat.com/show_bug.cgi?id=2059928
dl.acm.org/doi/10.1145/3372297.3417884
security.netapp.com/advisory/ntap-20220331-0003/
www.spinics.net/lists/netdev/msg795642.html