)]}'
{
  "log": [
    {
      "commit": "bfd4bda097f8758d28e632ff2035e25577f6b060",
      "tree": "022276b3625a432c7132e39776e7e448445087ac",
      "parents": [
        "488f2eaca1b0831a5a5e6a66e33bad2cdeff7238",
        "b2d84f078a8be40f5ae3b4d2ac001e2a7f45fe4f"
      ],
      "author": {
        "name": "David Woodhouse",
        "email": "dwmw2@shinybook.infradead.org",
        "time": "Thu May 05 13:59:37 2005 +0100"
      },
      "committer": {
        "name": "David Woodhouse",
        "email": "dwmw2@shinybook.infradead.org",
        "time": "Thu May 05 13:59:37 2005 +0100"
      },
      "message": "Merge with master.kernel.org:/pub/scm/linux/kernel/git/torvalds/linux-2.6.git\n"
    },
    {
      "commit": "2a0a6ebee1d68552152ae8d4aeda91d806995dec",
      "tree": "a0b77861b3395b4728e75f2b2f92755e0a4777d3",
      "parents": [
        "96c36023434b7b6824b1da72a6b7b1ca61d7310c"
      ],
      "author": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Tue May 03 14:55:09 2005 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Tue May 03 14:55:09 2005 -0700"
      },
      "message": "[NETLINK]: Synchronous message processing.\n\nLet\u0027s recap the problem.  The current asynchronous netlink kernel\nmessage processing is vulnerable to these attacks:\n\n1) Hit and run: Attacker sends one or more messages and then exits\nbefore they\u0027re processed.  This may confuse/disable the next netlink\nuser that gets the netlink address of the attacker since it may\nreceive the responses to the attacker\u0027s messages.\n\nProposed solutions:\n\na) Synchronous processing.\nb) Stream mode socket.\nc) Restrict/prohibit binding.\n\n2) Starvation: Because various netlink rcv functions were written\nto not return until all messages have been processed on a socket,\nit is possible for these functions to execute for an arbitrarily\nlong period of time.  If this is successfully exploited it could\nalso be used to hold rtnl forever.\n\nProposed solutions:\n\na) Synchronous processing.\nb) Stream mode socket.\n\nFirstly let\u0027s cross off solution c).  It only solves the first\nproblem and it has user-visible impacts.  In particular, it\u0027ll\nbreak user space applications that expect to bind or communicate\nwith specific netlink addresses (pid\u0027s).\n\nSo we\u0027re left with a choice of synchronous processing versus\nSOCK_STREAM for netlink.\n\nFor the moment I\u0027m sticking with the synchronous approach as\nsuggested by Alexey since it\u0027s simpler and I\u0027d rather spend\nmy time working on other things.\n\nHowever, it does have a number of deficiencies compared to the\nstream mode solution:\n\n1) User-space to user-space netlink communication is still vulnerable.\n\n2) Inefficient use of resources.  This is especially true for rtnetlink\nsince the lock is shared with other users such as networking drivers.\nThe latter could hold the rtnl while communicating with hardware which\ncauses the rtnetlink user to wait when it could be doing other things.\n\n3) It is still possible to DoS all netlink users by flooding the kernel\nnetlink receive queue.  The attacker simply fills the receive socket\nwith a single netlink message that fills up the entire queue.  The\nattacker then continues to call sendmsg with the same message in a loop.\n\nPoint 3) can be countered by retransmissions in user-space code, however\nit is pretty messy.\n\nIn light of these problems (in particular, point 3), we should implement\nstream mode netlink at some point.  In the mean time, here is a patch\nthat implements synchronous processing.  \n\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "0dd8e06bdaa0a97e706ee1a489a1f6176c4ddc64",
      "tree": "f09181360e5b68d46ea2856c9fa63eaa3515080c",
      "parents": [
        "27b030d58c8e72fc7a95187a791bd9406e350f02"
      ],
      "author": {
        "name": "Chris Wright",
        "email": "chrisw@osdl.org",
        "time": "Tue May 03 14:01:15 2005 +0100"
      },
      "committer": {
        "name": "David Woodhouse",
        "email": "dwmw2@shinybook.infradead.org",
        "time": "Tue May 03 14:01:15 2005 +0100"
      },
      "message": "[PATCH] add new audit data to last skb\n\nWhen adding more formatted audit data to an skb for delivery to userspace,\nthe kernel will attempt to reuse an skb that has spare room.  However, if\nthe audit message has already been fragmented to multiple skb\u0027s, the search\nfor spare room in the skb uses the head of the list.  This will corrupt the\naudit message with trailing bytes being placed midway through the stream.\nFix is to look at the end of the list.\n\nSigned-off-by: Chris Wright \u003cchrisw@osdl.org\u003e\nSigned-off-by: David Woodhouse \u003cdwmw2@infradead.org\u003e\n"
    },
    {
      "commit": "37509e749dc2072e667db806ef24b9e897f61b8a",
      "tree": "62e8c43ba360a9d0584822b06126284e4db428b8",
      "parents": [
        "c94c257c88c517f251da273a15c654224c7b6e21"
      ],
      "author": {
        "name": "Chris Wright",
        "email": "chrisw@osdl.org",
        "time": "Fri Apr 29 17:19:14 2005 +0100"
      },
      "committer": {
        "name": "",
        "email": "dwmw2@shinybook.infradead.org",
        "time": "Fri Apr 29 17:19:14 2005 +0100"
      },
      "message": "[AUDIT] Requeue messages at head of queue, up to audit_backlog\n\nIf netlink_unicast() fails, requeue the skb back at the head of the queue\nit just came from, instead of the tail. And do so unless we\u0027ve exceeded\nthe audit_backlog limit; not according to some other arbitrary limit.\n\nFrom: Chris Wright \u003cchrisw@osdl.org\u003e\nSigned-off-by: David Woodhouse \u003cdwmw2@infradead.org\u003e\n"
    },
    {
      "commit": "c94c257c88c517f251da273a15c654224c7b6e21",
      "tree": "992dd50f6bb13a70b04450cdfe0dbfb3c7b17ef5",
      "parents": [
        "85c8721ff3bc96b702427a440616079e8daf8a2f"
      ],
      "author": {
        "name": "Serge Hallyn",
        "email": "serue@us.ibm.com",
        "time": "Fri Apr 29 16:27:17 2005 +0100"
      },
      "committer": {
        "name": "",
        "email": "dwmw2@shinybook.infradead.org",
        "time": "Fri Apr 29 16:27:17 2005 +0100"
      },
      "message": "Add audit uid to netlink credentials\n\nMost audit control messages are sent over netlink.In order to properly\nlog the identity of the sender of audit control messages, we would like\nto add the loginuid to the netlink_creds structure, as per the attached\npatch.\n\nSigned-off-by: Serge Hallyn \u003cserue@us.ibm.com\u003e\nSigned-off-by: David Woodhouse \u003cdwmw2@infradead.org\u003e\n"
    },
    {
      "commit": "85c8721ff3bc96b702427a440616079e8daf8a2f",
      "tree": "1232ac4ebbd6d2453ee4d4a104003273ced20440",
      "parents": [
        "67eb81e1686f44bcf8f005b296213fd2c21b4719"
      ],
      "author": {
        "name": "",
        "email": "dwmw2@shinybook.infradead.org",
        "time": "Fri Apr 29 16:23:29 2005 +0100"
      },
      "committer": {
        "name": "",
        "email": "dwmw2@shinybook.infradead.org",
        "time": "Fri Apr 29 16:23:29 2005 +0100"
      },
      "message": "audit: update pointer to userspace tools, remove emacs mode tags\n"
    },
    {
      "commit": "c7fcb0ee74ef4cfdea02befacb55945c93641e44",
      "tree": "fbc01cfa85e2f7a3d070098e7d67d0196f52fa40",
      "parents": [
        "d812ddbb89e323d054a7d073466225966c8350c8"
      ],
      "author": {
        "name": "Peter Martuccelli",
        "email": "peterm@redhat.com",
        "time": "Fri Apr 29 16:10:24 2005 +0100"
      },
      "committer": {
        "name": "",
        "email": "dwmw2@shinybook.infradead.org",
        "time": "Fri Apr 29 16:10:24 2005 +0100"
      },
      "message": "[AUDIT] Avoid using %*.*s format strings.\n\nThey don\u0027t seem to work correctly (investigation ongoing), but we don\u0027t\nactually need to do it anyway.\n\nPatch from Peter Martuccelli \u003cpeterm@redhat.com\u003e\nSigned-off-by: David Woodhouse \u003cdwmw2@infradead.org\u003e\n"
    },
    {
      "commit": "d812ddbb89e323d054a7d073466225966c8350c8",
      "tree": "469e3e7bb7d1ca450059fc1b45660b8bc6452dc7",
      "parents": [
        "2fd6f58ba6efc82ea2c9c2630f7ff5ed9eeaf34a"
      ],
      "author": {
        "name": "Steve Grubb",
        "email": "sgrubb@redhat.com",
        "time": "Fri Apr 29 16:09:52 2005 +0100"
      },
      "committer": {
        "name": "",
        "email": "dwmw2@shinybook.infradead.org",
        "time": "Fri Apr 29 16:09:52 2005 +0100"
      },
      "message": "[AUDIT] Fix signedness of \u0027serial\u0027 in various routines.\n\nAttached is a patch that corrects a signed/unsigned warning. I also noticed\nthat we needlessly init serial to 0. That only needs to occur if the kernel\nwas compiled without the audit system.\n\n-Steve Grubb\n\nSigned-off-by: David Woodhouse \u003cdwmw2@infradead.org\u003e\n"
    },
    {
      "commit": "81b7854d52d35ed2353dd47033ae630d18322a2d",
      "tree": "9df2b6f7accc3a7f3bcee9af5493c0cdf6b1f140",
      "parents": [
        "83c7d09173fdb6b06b109e65895392db3e49ac9c"
      ],
      "author": {
        "name": "Andrew Morton",
        "email": "akpm@osdl.org",
        "time": "Fri Apr 29 15:59:11 2005 +0100"
      },
      "committer": {
        "name": "",
        "email": "dwmw2@shinybook.infradead.org",
        "time": "Fri Apr 29 15:59:11 2005 +0100"
      },
      "message": "audit_log_untrustedstring() warning fix\n\nkernel/audit.c: In function `audit_log_untrustedstring\u0027:\nkernel/audit.c:736: warning: comparison is always false due to limited range of data type\n\nSigned-off-by: Andrew Morton \u003cakpm@osdl.org\u003e\nSigned-off-by: David Woodhouse \u003cdwmw2@infradead.org\u003e\n"
    },
    {
      "commit": "83c7d09173fdb6b06b109e65895392db3e49ac9c",
      "tree": "3f48367a4d1413e221a5367bcd0cf8df7322c368",
      "parents": [
        "c60c390620e0abb60d4ae8c43583714bda27763f"
      ],
      "author": {
        "name": "",
        "email": "dwmw2@shinybook.infradead.org",
        "time": "Fri Apr 29 15:54:44 2005 +0100"
      },
      "committer": {
        "name": "",
        "email": "dwmw2@shinybook.infradead.org",
        "time": "Fri Apr 29 15:54:44 2005 +0100"
      },
      "message": "AUDIT: Avoid log pollution by untrusted strings.\n\nWe log strings from userspace, such as arguments to open(). These could\nbe formatted to contain \\n followed by fake audit log entries. Provide\na function for logging such strings, which gives a hex dump when the\nstring contains anything but basic printable ASCII characters. Use it\nfor logging filenames.\n\nSigned-off-by: David Woodhouse \u003cdwmw2@infradead.org\u003e\n"
    },
    {
      "commit": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2",
      "tree": "0bba044c4ce775e45a88a51686b5d9f90697ea9d",
      "parents": [],
      "author": {
        "name": "Linus Torvalds",
        "email": "torvalds@ppc970.osdl.org",
        "time": "Sat Apr 16 15:20:36 2005 -0700"
      },
      "committer": {
        "name": "Linus Torvalds",
        "email": "torvalds@ppc970.osdl.org",
        "time": "Sat Apr 16 15:20:36 2005 -0700"
      },
      "message": "Linux-2.6.12-rc2\n\nInitial git repository build. I\u0027m not bothering with the full history,\neven though we have it. We can create a separate \"historical\" git\narchive of that later if we want to, and in the meantime it\u0027s about\n3.2GB when imported into git - space that would just make the early\ngit days unnecessarily complicated, when we don\u0027t have a lot of good\ninfrastructure for it.\n\nLet it rip!\n"
    }
  ]
}
