)]}'
{
  "commit": "abc7ef44ca05493500865ce81f7b84f5c4eb6594",
  "tree": "35504952c627e93203df81ebd5c96023879df00b",
  "parents": [
    "09395e2a0e93b2cf4258cb1de91887948796bb68"
  ],
  "author": {
    "name": "Denis Ovsienko",
    "email": "infrastation@yandex.ru",
    "time": "Mon Sep 26 13:18:51 2011 +0400"
  },
  "committer": {
    "name": "Denis Ovsienko",
    "email": "infrastation@yandex.ru",
    "time": "Mon Sep 26 18:47:16 2011 +0400"
  },
  "message": "ospf6d: CVE-2011-3323 (fortify packet reception)\n\nThis vulnerability (CERT-FI #514840) was reported by CROSS project.\n\nospf6d processes IPv6 prefix structures in incoming packets without\nverifying that the declared prefix length is valid. This leads to a\ncrash\ncaused by out of bounds memory access.\n\n* ospf6_abr.h: new macros for size/alignment validation\n* ospf6_asbr.h: idem\n* ospf6_intra.h: idem\n* ospf6_lsa.h: idem\n* ospf6_message.h: idem\n* ospf6_proto.h: idem\n* ospf6_message.c\n  * ospf6_packet_minlen: helper array for ospf6_packet_examin()\n  * ospf6_lsa_minlen: helper array for ospf6_lsa_examin()\n  * ospf6_hello_recv(): do not call ospf6_header_examin(), let upper\n    layer verify the input data\n  * ospf6_dbdesc_recv(): idem\n  * ospf6_lsreq_recv(): idem\n  * ospf6_lsupdate_recv(): idem\n  * ospf6_lsack_recv(): idem\n  * ospf6_prefixes_examin(): new function, implements A.4.1\n  * ospf6_lsa_examin(): new function, implements A.4\n  * ospf6_lsaseq_examin(): new function, an interface to above\n  * ospf6_packet_examin(): new function, implements A.3\n  * ospf6_rxpacket_examin(): new function, replaces\n    ospf6_header_examin()\n  * ospf6_header_examin(): sayonara\n  * ospf6_receive(): perform passive interface check earliest possible,\n    employ ospf6_rxpacket_examin()\n",
  "tree_diff": [
    {
      "type": "modify",
      "old_id": "86d00280855da2067898314a36ebc2608bf7d666",
      "old_mode": 33188,
      "old_path": "ospf6d/ospf6_abr.h",
      "new_id": "816f596451954b5d06ab41b5cc85f2f02b04cc83",
      "new_mode": 33188,
      "new_path": "ospf6d/ospf6_abr.h"
    },
    {
      "type": "modify",
      "old_id": "6deb93ef87913b9098357044f005d623d63b3953",
      "old_mode": 33188,
      "old_path": "ospf6d/ospf6_asbr.h",
      "new_id": "cd1c939ace84fd63e0dc531a89853aff9e3395de",
      "new_mode": 33188,
      "new_path": "ospf6d/ospf6_asbr.h"
    },
    {
      "type": "modify",
      "old_id": "31643fd89dc90bd3564e6f7a1670549ef9075dce",
      "old_mode": 33188,
      "old_path": "ospf6d/ospf6_intra.h",
      "new_id": "3810174ea64c2308c173d8bcba97bb4b73ec7a3f",
      "new_mode": 33188,
      "new_path": "ospf6d/ospf6_intra.h"
    },
    {
      "type": "modify",
      "old_id": "c1093cab5722df0e2dd3dddf7768bb0ee1f09e84",
      "old_mode": 33188,
      "old_path": "ospf6d/ospf6_lsa.h",
      "new_id": "a2991ba7d496d6bbbc869059e2a887f906f3a60e",
      "new_mode": 33188,
      "new_path": "ospf6d/ospf6_lsa.h"
    },
    {
      "type": "modify",
      "old_id": "f4df318bdf289fdb1685a8b1b33c293313c59578",
      "old_mode": 33188,
      "old_path": "ospf6d/ospf6_message.c",
      "new_id": "f40ad4b02704a902f39f3de736d398a4dd413f35",
      "new_mode": 33188,
      "new_path": "ospf6d/ospf6_message.c"
    },
    {
      "type": "modify",
      "old_id": "c72f0af45c2092ee83ee7ba9a5edb11f5950ad9b",
      "old_mode": 33188,
      "old_path": "ospf6d/ospf6_message.h",
      "new_id": "232b875e010122d479f951da0ebd06d889ada2c6",
      "new_mode": 33188,
      "new_path": "ospf6d/ospf6_message.h"
    },
    {
      "type": "modify",
      "old_id": "a8c1b1a03b040aa6ee0017e0031b2190ca415094",
      "old_mode": 33188,
      "old_path": "ospf6d/ospf6_proto.h",
      "new_id": "646250047da86c1d3e2b6905795cfbeae765587c",
      "new_mode": 33188,
      "new_path": "ospf6d/ospf6_proto.h"
    }
  ]
}
