)]}'
{
  "commit": "8e998b1eb5fea53f2a2eddd9f7f2b8ab004406f3",
  "tree": "95b756ddc86e043189c49a930a016051128c949b",
  "parents": [
    "000e157c852653288c5a1e6d0dee821c1765d315"
  ],
  "author": {
    "name": "Michal Sekletar",
    "email": "msekleta@redhat.com",
    "time": "Fri May 16 14:13:43 2014 +0000"
  },
  "committer": {
    "name": "David Lamparter",
    "email": "equinox@opensourcerouting.org",
    "time": "Tue May 27 19:50:45 2014 +0200"
  },
  "message": "zebra: raise the privileges before calling socket()\n\nBecause of recent changes when creating AF_NETLINK socket, kernel will\ncache capabilities of the caller and if file descriptor is used or\notherwise handed to another process it will check that current user has\nnecessary capabilities to use the socket. Hence we need to ensure we\nhave necessary capabilities when creating the socket and at the time we\nuse the socket.\n\nSee: http://www.spinics.net/lists/netdev/msg280198.html\n\nSigned-off-by: Michal Sekletar \u003cmsekleta@redhat.com\u003e\nSigned-off-by: David Lamparter \u003cequinox@opensourcerouting.org\u003e\n",
  "tree_diff": [
    {
      "type": "modify",
      "old_id": "ba0b0d7de2e12addf19512c9a80f11aac76c3ea9",
      "old_mode": 33188,
      "old_path": "zebra/rt_netlink.c",
      "new_id": "6a802f6906007968630f2fa89b7c21dc83eb053b",
      "new_mode": 33188,
      "new_path": "zebra/rt_netlink.c"
    }
  ]
}
