)]}'
{
  "commit": "4ab69a2b3b84415085d261bcf848b7a95c010c9d",
  "tree": "fb590d9c1a9158c686dd4eee1c7a728c4734f30b",
  "parents": [
    "7c4a95b5ec484244fc615be7b9f56c267c51ade6"
  ],
  "author": {
    "name": "Adrian Knoth",
    "email": "adi@drcomp.erfurt.thur.de",
    "time": "Wed Feb 23 11:43:14 2011 +0100"
  },
  "committer": {
    "name": "Takashi Iwai",
    "email": "tiwai@suse.de",
    "time": "Wed Feb 23 15:46:29 2011 +0100"
  },
  "message": "ALSA: hdspm - prevent reading unitialized stack memory\n\nOriginal patch by Dan Rosenberg \u003cdrosenberg@vsecurity.com\u003e under commit\ne68d3b316ab7b02a074edc4f770e6a746390cb7d. I\u0027m copying his text here:\n\nThe SNDRV_HDSPM_IOCTL_GET_CONFIG_INFO ioctl in hdspm.c allow unprivileged\nusers to read uninitialized kernel stack memory, because several fields\nof the hdspm_config struct declared on the stack are not altered\nor zeroed before being copied back to the user.  This patch takes care\nof it.\n\nSigned-off-by: Adrian Knoth \u003cadi@drcomp.erfurt.thur.de\u003e\nSigned-off-by: Takashi Iwai \u003ctiwai@suse.de\u003e\n",
  "tree_diff": [
    {
      "type": "modify",
      "old_id": "0b0293fb8f09b357670e8c73d0d534b85d9a6899",
      "old_mode": 33188,
      "old_path": "sound/pci/rme9652/hdspm.c",
      "new_id": "ced1406d777f3644ba3da58408db8805f9e21e78",
      "new_mode": 33188,
      "new_path": "sound/pci/rme9652/hdspm.c"
    }
  ]
}
