)]}'
{
  "commit": "e4a16ea22fd96fd2545fb9d403f7e8d31c9fc04a",
  "tree": "cf3dc0b536d29dce4c2adf26aceab4778659b424",
  "parents": [
    "b298c57901f55858ee7c48a1448681fa5a6c3f60"
  ],
  "author": {
    "name": "Eric Sandeen",
    "email": "sandeen@redhat.com",
    "time": "Tue Jul 13 17:49:23 2021 +0200"
  },
  "committer": {
    "name": "COS Cherry Picker",
    "email": "cloud-image-release@prod.google.com",
    "time": "Wed Jul 21 00:26:17 2021 -0700"
  },
  "message": "seq_file: disallow extremely large seq buffer allocations\n\nThere is no reasonable need for a buffer larger than this, and it avoids\nint overflow pitfalls.\n\nBUG\u003db/194227225\nTEST\u003dpresubmit\nSOURCE\u003dUPSTREAM(8cae8cd89f05f6de223d63e6d15e31c8ba9cf53b)\nRELEASE_NOTE\u003dFixed CVE-2021-33909\n\ncos-patch: security-high\nFixes: 058504edd026 (\"fs/seq_file: fallback to vmalloc allocation\")\nSuggested-by: Al Viro \u003cviro@zeniv.linux.org.uk\u003e\nReported-by: Qualys Security Advisory \u003cqsa@qualys.com\u003e\nSigned-off-by: Eric Sandeen \u003csandeen@redhat.com\u003e\nCc: stable@kernel.org\nSigned-off-by: Linus Torvalds \u003ctorvalds@linux-foundation.org\u003e\nChange-Id: Ief7d9d22ef5e05a29acc3817d4554556f05ecf8a\nReviewed-on: https://cos-review.googlesource.com/c/third_party/kernel/+/19733\nTested-by: Cusky Presubmit Bot \u003cpresubmit@cos-infra-prod.iam.gserviceaccount.com\u003e\nMain-Branch-Verified: Cusky Presubmit Bot \u003cpresubmit@cos-infra-prod.iam.gserviceaccount.com\u003e\nReviewed-by: Vaibhav Rustagi \u003cvaibhavrustagi@google.com\u003e\n",
  "tree_diff": [
    {
      "type": "modify",
      "old_id": "05e58b56f6202f6f2297b269f81d79e6be453e00",
      "old_mode": 33188,
      "old_path": "fs/seq_file.c",
      "new_id": "e11f62b29be87eca2ddef0d016acf1ab074ac841",
      "new_mode": 33188,
      "new_path": "fs/seq_file.c"
    }
  ]
}
