)]}'
{
  "commit": "67286640f638f5ad41a946b9a3dc75327950248f",
  "tree": "34844d5e00a54f78b384f75f6cded995423d7fc6",
  "parents": [
    "57fe93b374a6b8711995c2d466c502af9f3a08bb"
  ],
  "author": {
    "name": "Vasiliy Kulikov",
    "email": "segooon@gmail.com",
    "time": "Wed Nov 10 12:09:10 2010 -0800"
  },
  "committer": {
    "name": "David S. Miller",
    "email": "davem@davemloft.net",
    "time": "Wed Nov 10 12:09:10 2010 -0800"
  },
  "message": "net: packet: fix information leak to userland\n\npacket_getname_spkt() doesn\u0027t initialize all members of sa_data field of\nsockaddr struct if strlen(dev-\u003ename) \u003c 13.  This structure is then copied\nto userland.  It leads to leaking of contents of kernel stack memory.\nWe have to fully fill sa_data with strncpy() instead of strlcpy().\n\nThe same with packet_getname(): it doesn\u0027t initialize sll_pkttype field of\nsockaddr_ll.  Set it to zero.\n\nSigned-off-by: Vasiliy Kulikov \u003csegooon@gmail.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n",
  "tree_diff": [
    {
      "type": "modify",
      "old_id": "3616f27b9d46c08e0f750b47865cc17c3130c5f2",
      "old_mode": 33188,
      "old_path": "net/packet/af_packet.c",
      "new_id": "0856a13cb53d8001ff33f48cfd7e048721e476d2",
      "new_mode": 33188,
      "new_path": "net/packet/af_packet.c"
    }
  ]
}
