"value":"In the Linux kernel, the following vulnerability has been resolved:\n\nRDMA/mlx5: Fix fortify source warning while accessing Eth segment\n\n ------------[ cut here ]------------\n memcpy: detected field-spanning write (size 56) of single field \"eseg->inline_hdr.start\"at/var/lib/dkms/mlnx-ofed-kernel/5.8/build/drivers/infiniband/hw/mlx5/wr.c:131(size2)\nWARNING:CPU:0PID:293779at/var/lib/dkms/mlnx-ofed-kernel/5.8/build/drivers/infiniband/hw/mlx5/wr.c:131mlx5_ib_post_send+0x191b/0x1a60[mlx5_ib]\nModuleslinkedin:8021qgarpmrpstpllcrdma_ucm(OE)rdma_cm(OE)iw_cm(OE)ib_ipoib(OE)ib_cm(OE)ib_umad(OE)mlx5_ib(OE)ib_uverbs(OE)ib_core(OE)mlx5_core(OE)pci_hyperv_intfmlxdevm(OE)mlx_compat(OE)tlsmlxfw(OE)psamplenft_fib_inetnft_fib_ipv4nft_fib_ipv6nft_fibnft_reject_inetnf_reject_ipv4nf_reject_ipv6nft_rejectnft_ctnft_chain_natnf_natnf_conntracknf_defrag_ipv6nf_defrag_ipv4ip_setnf_tableslibcrc32cnfnetlinkmst_pciconf(OE)knem(OE)vfio_pcivfio_pci_corevfio_iommu_type1vfioiommufdirqbypasscusenfsv3nfsfscachenetfsxfrm_userxfrm_algoipmi_devintfipmi_msghandlerbinfmt_misccrct10dif_pclmulcrc32_pclmulpolyval_clmulnipolyval_genericghash_clmulni_intelsha512_ssse3snd_pcspaesni_intelcrypto_simdcryptdsnd_pcmsnd_timerjoydevsndsoundcoreinput_ledsserio_rawevbugnfsdauth_rpcgssnfs_acllockdgracesch_fq_codelsunrpcdrmefi_pstoreip_tablesx_tablesautofs4psmousevirtio_netnet_failoverfailoverfloppy\n[lastunloaded:mlx_compat(OE)]\nCPU:0PID:293779Comm:sshTainted:GOE6.2.0-32-generic#32~22.04.1-Ubuntu\nHardwarename:RedHatKVM,BIOS0.5.101/01/2011\nRIP:0010:mlx5_ib_post_send+0x191b/0x1a60[mlx5_ib]\nCode:0c0100a8017525488b75a0b90200000048c7c2105bfdc048c7c7805bfdc0c605570c030001e8954d93da<0f>0b448b4db04c8b45c8488b4dc0e949fbffff410fb7\nRSP:0018:ffffb5b48478b570EFLAGS:00010046\nRAX:0000000000000000RBX:0000000000000001RCX:0000000000000000\nRDX:0000000000000000RSI:0000000000000000RDI:0000000000000000\nRBP:ffffb5b48478b628R08:0000000000000000R09:0000000000000000\nR10:0000000000000000R11:0000000000000000R12:ffffb5b48478b5e8\nR13:ffff963a3c609b5eR14:ffff9639c3fbd800R15:ffffb5b480475a80\nFS:00007fc03b444c80(0000)GS:ffff963a3dc00000(0000)knlGS:0000000000000000\nCS:0010DS:0000ES:0000CR0:0000000080050033\nCR2:0000556f46bdf000CR3:0000000006ac6003CR4:00000000003706f0\nDR0:0000000000000000DR1:0000000000000000DR2:0000000000000000\nDR3:0000000000000000DR6:00000000fffe0ff0DR7:0000000000000400\nCallTrace:\n<TASK>\n?show_regs+0x72/0x90\n?mlx5_ib_post_send+0x191b/0x1a60[mlx5_ib]\n?__warn+0x8d/0x160\n?mlx5_ib_post_send+0x191b/0x1a60[mlx5_ib]\n?report_bug+0x1bb/0x1d0\n?handle_bug+0x46/0x90\n?exc_invalid_op+0x19/0x80\n?asm_exc_invalid_op+0x1b/0x20\n?mlx5_ib_post_send+0x191b/0x1a60[mlx5_ib]\nmlx5_ib_post_send_nodrain+0xb/0x20[mlx5_ib]\nipoib_send+0x2ec/0x770[ib_ipoib]\nipoib_start_xmit+0x5a0/0x770[ib_ipoib]\ndev_hard_start_xmit+0x8e/0x1e0\n?validate_xmit_skb_list+0x4d/0x80\nsch_direct_xmit+0x116/0x3a0\n__dev_xmit_skb+0x1fd/0x580\n__dev_queue_xmit+0x284/0x6b0\n?_raw_spin_unlock_irq+0xe/0x50\n?__flush_work.isra.0+0x20d/0x370\n?push_pseudo_header+0x17/0x40[ib_ipoib]\nneigh_connected_output+0xcd/0x110\nip_finish_output2+0x179/0x480\n?__smp_call_single_queue+0x61/0xa0\n__ip_finish_output+0xc3/0x190\nip_finish_output+0x2e/0xf0\nip_output+0x78/0x110\n?__pfx_ip_finish_output+0x10/0x10\nip_local_out+0x64/0x70\n__ip_queue_xmit+0x18a/0x460\nip_queue_xmit+0x15/0x30\n__tcp_transmit_skb+0x914/0x9c0\ntcp_write_xmit+0x334/0x8d0\ntcp_push_one+0x3c/0x60\ntcp_sendmsg_locked+0x2e1/0xac0\ntcp_sendmsg+0x2d/0x50\ninet_sendmsg+0x43/0x90\nsock_sendmsg+0x68/0x80\nsock_write_iter+0x93/0x100\nvfs_write+0x326/0x3c0\nksys_write+0xbd/0xf0\n?do_syscall_64+0x69/0x90\n__x64_sys_write+0x19/0x30\ndo_syscall_\n---truncated---