)]}'
{
  "commit": "db31c55a6fb245fdbb752a2ca4aefec89afabb06",
  "tree": "ab94a0065aaa0db14bdca1ae6c92b6e29a086165",
  "parents": [
    "ec6f809ff6f19fafba3212f6aff0dda71dfac8e8"
  ],
  "author": {
    "name": "Dan Carpenter",
    "email": "dan.carpenter@oracle.com",
    "time": "Wed Nov 27 15:40:21 2013 +0300"
  },
  "committer": {
    "name": "David S. Miller",
    "email": "davem@davemloft.net",
    "time": "Fri Nov 29 16:12:52 2013 -0500"
  },
  "message": "net: clamp -\u003emsg_namelen instead of returning an error\n\nIf kmsg-\u003emsg_namelen \u003e sizeof(struct sockaddr_storage) then in the\noriginal code that would lead to memory corruption in the kernel if you\nhad audit configured.  If you didn\u0027t have audit configured it was\nharmless.\n\nThere are some programs such as beta versions of Ruby which use too\nlarge of a buffer and returning an error code breaks them.  We should\nclamp the -\u003emsg_namelen value instead.\n\nFixes: 1661bf364ae9 (\"net: heap overflow in __audit_sockaddr()\")\nReported-by: Eric Wong \u003cnormalperson@yhbt.net\u003e\nSigned-off-by: Dan Carpenter \u003cdan.carpenter@oracle.com\u003e\nTested-by: Eric Wong \u003cnormalperson@yhbt.net\u003e\nAcked-by: Eric Dumazet \u003cedumazet@google.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n",
  "tree_diff": [
    {
      "type": "modify",
      "old_id": "618c6a8a911b65c9a406ba5d7d0e221cb124960e",
      "old_mode": 33188,
      "old_path": "net/compat.c",
      "new_id": "dd32e34c1e2c9481aa2db3c37437ef0d85ba5277",
      "new_mode": 33188,
      "new_path": "net/compat.c"
    },
    {
      "type": "modify",
      "old_id": "0b18693f2be6deb2f6f6b6bbf99aa131c767e830",
      "old_mode": 33188,
      "old_path": "net/socket.c",
      "new_id": "e83c416708af5554f89c98723bba150b8750b3f0",
      "new_mode": 33188,
      "new_path": "net/socket.c"
    }
  ]
}
