)]}'
{
  "commit": "f03e6a6bab451262a053740dee065aeee91b03dc",
  "tree": "dc216350050582b64d57305fddd999c8fb64d703",
  "parents": [
    "36f4a9c8ef0e56938b5b4a8dc01f28a7f926162b"
  ],
  "author": {
    "name": "Todd Kjos",
    "email": "tkjos@google.com",
    "time": "Tue Oct 01 23:11:47 2024 +0000"
  },
  "committer": {
    "name": "Kevin Berry",
    "email": "kpberry@google.com",
    "time": "Thu Jan 16 00:56:15 2025 -0800"
  },
  "message": "PCI: Fix reset_method_store() memory leak\n\n[ Upstream commit 2985b1844f3f3447f2d938eff1ef6762592065a5 ]\n\nIn reset_method_store(), a string is allocated via kstrndup() and assigned\nto the local \"options\". options is then used in with strsep() to find\nspaces:\n\n  while ((name \u003d strsep(\u0026options, \" \")) !\u003d NULL) {\n\nIf there are no remaining spaces, then options is set to NULL by strsep(),\nso the subsequent kfree(options) doesn\u0027t free the memory allocated via\nkstrndup().\n\nFix by using a separate tmp_options to iterate with strsep() so options is\npreserved.\n\nBUG\u003db/388469016\nTEST\u003dpresubmit\nRELEASE_NOTE\u003dFixed CVE-2024-56745 in the Linux kernel.\n\ncos-patch: security-moderate\nLink: https://lore.kernel.org/r/20241001231147.3583649-1-tkjos@google.com\nFixes: d88f521da3ef (\"PCI: Allow userspace to query and set device reset mechanism\")\nChange-Id: I60291dc171a9882fdebd2fa00a4756d496fa71a7\nSigned-off-by: Todd Kjos \u003ctkjos@google.com\u003e\nSigned-off-by: Bjorn Helgaas \u003cbhelgaas@google.com\u003e\nSigned-off-by: Sasha Levin \u003csashal@kernel.org\u003e\nSigned-off-by: Kevin Berry \u003ckpberry@google.com\u003e\nReviewed-on: https://cos-review.googlesource.com/c/third_party/kernel/+/90520\nTested-by: Cusky Presubmit Bot \u003cpresubmit@cos-infra-prod.iam.gserviceaccount.com\u003e\nReviewed-by: Shuo Yang \u003cgshuoy@google.com\u003e\n",
  "tree_diff": [
    {
      "type": "modify",
      "old_id": "ee1d74f89a05f8835be150c2273649f8aed60324",
      "old_mode": 33188,
      "old_path": "drivers/pci/pci.c",
      "new_id": "09d1b6974660299bc4fb5d720dbb5a5963a54e4e",
      "new_mode": 33188,
      "new_path": "drivers/pci/pci.c"
    }
  ]
}
