)]}'
{
  "commit": "886c2e380bae3d4a1da83dc91d87f9904acfce64",
  "tree": "cce34a903174a7696c7670b707affe42323ee12a",
  "parents": [
    "a91740ef94ac4a908ecb4143b27551e11f0941ae"
  ],
  "author": {
    "name": "Vaibhav Rustagi",
    "email": "vaibhavrustagi@google.com",
    "time": "Tue Mar 22 11:04:46 2022 -0700"
  },
  "committer": {
    "name": "COS Cherry Picker",
    "email": "cloud-image-release@prod.google.com",
    "time": "Tue Mar 22 22:00:47 2022 -0700"
  },
  "message": "esp: Fix possible buffer overflow in ESP transformation\n\n[ Upstream commit ebe48d368e97d007bfeb76fcb065d6cfc4c96645 ]\n\nThe maximum message size that can be send is bigger than\nthe  maximum site that skb_page_frag_refill can allocate.\nSo it is possible to write beyond the allocated buffer.\n\nFix this by doing a fallback to COW in that case.\n\nv2:\n\nAvoid get get_order() costs as suggested by Linus Torvalds.\n\nFor having the patch build on v5.4, following changes are done:\n - `SKB_FRAG_PAGE_ORDER` declaration is moved from net/core/sock.c to include/net/sock.c.\n - Remove changes introduced due to `xfrm: add support for UDPv6 encapsulation of ESP` in esp6_output_head\n\nBUG\u003db/225430914\nTEST\u003dpresubmit\nRELEASE_NOTE\u003dFixed possible buffer overflow in ESP transformation.\n\ncos-patch: bug\nFixes: cac2661c53f3 (\"esp4: Avoid skb_cow_data whenever possible\")\nFixes: 03e2a30f6a27 (\"esp6: Avoid skb_cow_data whenever possible\")\nReported-by: valis \u003csec@valis.email\u003e\nSigned-off-by: Steffen Klassert \u003csteffen.klassert@secunet.com\u003e\nSigned-off-by: Vaibhav Rustagi \u003cvaibhavrustagi@google.com\u003e\nChange-Id: Ibba7d1063e1e78fe8cecb2d0ae1e94a586101a93\nReviewed-on: https://cos-review.googlesource.com/c/third_party/kernel/+/31082\nMain-Branch-Verified: Cusky Presubmit Bot \u003cpresubmit@cos-infra-prod.iam.gserviceaccount.com\u003e\nTested-by: Cusky Presubmit Bot \u003cpresubmit@cos-infra-prod.iam.gserviceaccount.com\u003e\nReviewed-by: Oleksandr Tymoshenko \u003covt@google.com\u003e\n",
  "tree_diff": [
    {
      "type": "modify",
      "old_id": "117652eb6ea32a836cd269f01e70f0e3c990fbc7",
      "old_mode": 33188,
      "old_path": "include/net/esp.h",
      "new_id": "465e38890ee986023fd7502d0abeb80bca3182a5",
      "new_mode": 33188,
      "new_path": "include/net/esp.h"
    },
    {
      "type": "modify",
      "old_id": "fed870667f6a6baf4ef7b86865018b79d5fda93c",
      "old_mode": 33188,
      "old_path": "include/net/sock.h",
      "new_id": "b5b3c6b92c3a8740222e3dbb0c2e67db251f490c",
      "new_mode": 33188,
      "new_path": "include/net/sock.h"
    },
    {
      "type": "modify",
      "old_id": "bf4f9d5cba2170451e163c8f86312a20c133b125",
      "old_mode": 33188,
      "old_path": "net/core/sock.c",
      "new_id": "a4ee17494eca65cea113683086fa0a7698190ac4",
      "new_mode": 33188,
      "new_path": "net/core/sock.c"
    },
    {
      "type": "modify",
      "old_id": "86c836fa21459d3446d7b6d0acf9069b4f43da37",
      "old_mode": 33188,
      "old_path": "net/ipv4/esp4.c",
      "new_id": "94e17790769bf80d34056698b0aed3f0ad35e389",
      "new_mode": 33188,
      "new_path": "net/ipv4/esp4.c"
    },
    {
      "type": "modify",
      "old_id": "12570a73def80b3ff227b75bd0af332f91fab165",
      "old_mode": 33188,
      "old_path": "net/ipv6/esp6.c",
      "new_id": "06a172aa18c61a97288457aa4817e6eb2c0dabdf",
      "new_mode": 33188,
      "new_path": "net/ipv6/esp6.c"
    }
  ]
}
