)]}'
{
  "commit": "552563a1c443ec876edd92bf79f29ff3afe2c01e",
  "tree": "c0bf1cdbf045a493f1cbb4623e85724eeea4dc7f",
  "parents": [
    "308687b7d73c5cacf927a3a33efbfaea627ccc09"
  ],
  "author": {
    "name": "Denis Ovsienko",
    "email": "infrastation@yandex.ru",
    "time": "Mon Sep 26 13:18:51 2011 +0400"
  },
  "committer": {
    "name": "Denis Ovsienko",
    "email": "infrastation@yandex.ru",
    "time": "Mon Sep 26 18:40:48 2011 +0400"
  },
  "message": "ospf6d: CVE-2011-3323 (fortify packet reception)\n\nThis vulnerability (CERT-FI #514840) was reported by CROSS project.\n\nospf6d processes IPv6 prefix structures in incoming packets without\nverifying that the declared prefix length is valid. This leads to a\ncrash\ncaused by out of bounds memory access.\n\n* ospf6_abr.h: new macros for size/alignment validation\n* ospf6_asbr.h: idem\n* ospf6_intra.h: idem\n* ospf6_lsa.h: idem\n* ospf6_message.h: idem\n* ospf6_proto.h: idem\n* ospf6_message.c\n  * ospf6_packet_minlen: helper array for ospf6_packet_examin()\n  * ospf6_lsa_minlen: helper array for ospf6_lsa_examin()\n  * ospf6_hello_recv(): do not call ospf6_header_examin(), let upper\n    layer verify the input data\n  * ospf6_dbdesc_recv(): idem\n  * ospf6_lsreq_recv(): idem\n  * ospf6_lsupdate_recv(): idem\n  * ospf6_lsack_recv(): idem\n  * ospf6_prefixes_examin(): new function, implements A.4.1\n  * ospf6_lsa_examin(): new function, implements A.4\n  * ospf6_lsaseq_examin(): new function, an interface to above\n  * ospf6_packet_examin(): new function, implements A.3\n  * ospf6_rxpacket_examin(): new function, replaces\n    ospf6_header_examin()\n  * ospf6_header_examin(): sayonara\n  * ospf6_receive(): perform passive interface check earliest possible,\n    employ ospf6_rxpacket_examin()\n",
  "tree_diff": [
    {
      "type": "modify",
      "old_id": "86d00280855da2067898314a36ebc2608bf7d666",
      "old_mode": 33188,
      "old_path": "ospf6d/ospf6_abr.h",
      "new_id": "816f596451954b5d06ab41b5cc85f2f02b04cc83",
      "new_mode": 33188,
      "new_path": "ospf6d/ospf6_abr.h"
    },
    {
      "type": "modify",
      "old_id": "72644dfc405e3722a1f468bfa9b12cd64f291cd9",
      "old_mode": 33188,
      "old_path": "ospf6d/ospf6_asbr.h",
      "new_id": "db4561de49396978298130912baf88143f70497b",
      "new_mode": 33188,
      "new_path": "ospf6d/ospf6_asbr.h"
    },
    {
      "type": "modify",
      "old_id": "31643fd89dc90bd3564e6f7a1670549ef9075dce",
      "old_mode": 33188,
      "old_path": "ospf6d/ospf6_intra.h",
      "new_id": "3810174ea64c2308c173d8bcba97bb4b73ec7a3f",
      "new_mode": 33188,
      "new_path": "ospf6d/ospf6_intra.h"
    },
    {
      "type": "modify",
      "old_id": "c57727681d57d2c05d41ac39616a7e1d55ab1e20",
      "old_mode": 33188,
      "old_path": "ospf6d/ospf6_lsa.h",
      "new_id": "13b8990018bf9b83f3bcae63166e9affe1688b94",
      "new_mode": 33188,
      "new_path": "ospf6d/ospf6_lsa.h"
    },
    {
      "type": "modify",
      "old_id": "beec272b3f79f0e4c2f92365cb83fb19a973f07a",
      "old_mode": 33188,
      "old_path": "ospf6d/ospf6_message.c",
      "new_id": "362e8a96e1a6a0bb619bef3b1cc39b9ed40218a4",
      "new_mode": 33188,
      "new_path": "ospf6d/ospf6_message.c"
    },
    {
      "type": "modify",
      "old_id": "ebb6308e59d39d7525b8ea4203bd7f93a504e95d",
      "old_mode": 33188,
      "old_path": "ospf6d/ospf6_message.h",
      "new_id": "b24d2e62971c43ca01fd84171e03b2249be12173",
      "new_mode": 33188,
      "new_path": "ospf6d/ospf6_message.h"
    },
    {
      "type": "modify",
      "old_id": "a8c1b1a03b040aa6ee0017e0031b2190ca415094",
      "old_mode": 33188,
      "old_path": "ospf6d/ospf6_proto.h",
      "new_id": "646250047da86c1d3e2b6905795cfbeae765587c",
      "new_mode": 33188,
      "new_path": "ospf6d/ospf6_proto.h"
    }
  ]
}
