)]}'
{
  "commit": "852ba0e2cf9a1c6bba0988e98512a303cc9739e8",
  "tree": "6ab53c00990f5208317752b2649e6f31582e3033",
  "parents": [
    "bb3a023ed853b2335dccf25dfd8ec237fd9d8458"
  ],
  "author": {
    "name": "paul",
    "email": "paul",
    "time": "Tue Jun 03 03:03:34 2003 +0000"
  },
  "committer": {
    "name": "paul",
    "email": "paul",
    "time": "Tue Jun 03 03:03:34 2003 +0000"
  },
  "message": "From: kamatchi soundaram \u003ckamatchi@tdd.sj.nec.com\u003e\nSubject: [zebra 19259] Memory leak in OSPF\n\nThe detail of the memory leak follows:\n File name: ospf_interface.c\n Function name: ospf_if_new_hook().\n Type of leak: Overwriting the already allocated memory.\n Problem found and description:\n The ospf_new_if_params() fn allocates a memory for \"auth_crypt\" which\n is overwritten, down in the fn (ospf_if_new_hook) by explicitely allocating\n a memory for the same \"auth_crypt\".\n\n Fix: remove allocation from ospf_new_if_params()\n",
  "tree_diff": [
    {
      "type": "modify",
      "old_id": "a1b10c7439ccc0cc0e4b70e42538554180417386",
      "old_mode": 33188,
      "old_path": "ospfd/ospf_interface.c",
      "new_id": "9f566a452dffb29fa16f3eb3c6542b80742bcc91",
      "new_mode": 33188,
      "new_path": "ospfd/ospf_interface.c"
    }
  ]
}
